Network Detection and Response: Using Data to Stop Threats that Defy Endpoint Protection In our recent article, “Endpoint Detection and Response: What Data Do You Need?”, we examined how Endpoint Detection