NSM vs AV vs IPS vs IDS vs EDR: What Your Security Architecture Is Probably Missing
Many organizations believe they are "secure" because they have a firewall and antivirus installed.
Then a breach happens.
The reason? Most teams misunderstand the difference between NSM, AV, IPS, IDS, and EDR — and more importantly, how they should work together.
This article explains each component clearly and shows how modern security architecture actually works.
Why One Security Tool Is Never Enough
Cyber attacks today are:
- Encrypted
- Fileless
- Behavior‑based
- Living-off-the-land
- Designed to bypass signature detection
No single tool can detect all of this.
Security today is about layered visibility and control.
Let’s break down each layer.
1. NSM (Network Security Monitoring)
The Visibility Layer
Network Security Monitoring focuses on deep inspection and long-term analysis of network traffic.
Unlike IPS, NSM does not primarily block traffic. Its job is to observe, record, detect patterns, and support investigation.
Think of NSM as CCTV for your network — always watching, always recording.
What NSM Collects
- Full packet capture (PCAP)
- NetFlow / Traffic metadata
- DNS logs
- HTTP logs
- SSL/TLS metadata
- Firewall logs
- IDS alerts
What NSM Is Good At
- Detecting lateral movement inside the network
- Detecting data exfiltration
- Identifying suspicious DNS tunneling
- Supporting forensic investigations
- Providing historical visibility
If an attacker bypasses your firewall and AV, NSM is often the system that reveals what actually happened.
2. AV (Antivirus)
The Basic Endpoint Protection Layer
Antivirus runs directly on endpoints:
- Windows
- macOS
- Linux
- Servers
- Workstations
It scans files and memory for known malicious signatures.
What AV Does Well
- Detect known malware
- Stop common ransomware variants
- Quarantine infected files
Where AV Fails
- Fileless attacks
- PowerShell abuse
- Credential dumping
- Advanced persistent threats
AV is necessary — but it is not sufficient.
3. IPS (Intrusion Prevention System)
The Real-Time Blocking Layer
IPS sits inline in your network path:
Internet → Firewall → IPS → Internal Network
It inspects traffic in real time and blocks known malicious activity.
What IPS Does
- Blocks malicious IP addresses
- Stops exploit attempts
- Drops suspicious packets
- Prevents command-and-control traffic
IPS is your network gatekeeper.
However, IPS focuses on prevention — not deep investigation.
4. IDS (Intrusion Detection System)
The Alerting Layer
IDS monitors traffic but does not block it.
It generates alerts when suspicious behavior is detected.
IDS is often used when organizations want visibility without risking false-positive blocking.
Think of IDS as an alarm system.
5. EDR (Endpoint Detection & Response)
The Advanced Endpoint Intelligence Layer
EDR is the evolution of traditional antivirus.
Instead of just scanning files, EDR monitors behavior.
What EDR Detects
- Suspicious PowerShell execution
- Credential dumping activity
- Abnormal process chains
- Lateral movement techniques
What EDR Can Do
- Detect
- Block
- Investigate
- Isolate compromised machines
If AV is a guard, EDR is a trained investigator.
Side-by-Side Comparison
| System | Runs Where | Detect | Block | Investigation Depth | Focus |
|---|---|---|---|---|---|
| AV | Endpoint | Yes | Yes | Low | Known malware |
| EDR | Endpoint | Yes | Yes | High | Behavior-based |
| IDS | Network | Yes | No | Medium | Alerts |
| IPS | Network | Yes | Yes | Medium | Prevention |
| NSM | Network | Yes | Usually No | Very High | Visibility |
| SIEM | Log layer | Yes | No | Correlation | Central analysis |
How Modern Security Architecture Works
A mature architecture combines all layers:
Endpoints → AV / EDR
Network → IDS / IPS
Traffic Visibility → NSM
Central Log Correlation → SIEM
Automation & Orchestration → SOAR
Each layer covers blind spots of the others.
System Diagram (How These Components Fit Together)
flowchart TB
Internet["Internet"] --> FW["Firewall"]
FW --> IPS["IPS (Inline Blocking)"]
IPS --> LAN["Internal Network (LAN)"]
%% Endpoint layer
LAN --> EP["Endpoints / Servers"]
EP --> AV["AV (File/Signature Protection)"]
EP --> EDR["EDR (Behavior + Response)"]
%% Detection vs prevention on the network
LAN --> IDS["IDS (Alerting)"]
LAN --> NSM["NSM (Zeek/PCAP/Flow Visibility)"]
%% Telemetry to SIEM
FW --> SIEM["SIEM (Correlation)"]
IPS --> SIEM
IDS --> SIEM
NSM --> SIEM
AV --> SIEM
EDR --> SIEM
%% Automation
SIEM --> SOAR["SOAR (Automation/Orchestration)"]
SOAR --> RESP["Response Actions
- Block IP / isolate host
- Create ticket
- Notify SOC
- Run playbook"]
%% Notes
classDef layer fill:#fff,stroke:#999,stroke-width:1px;
class Internet,FW,IPS,LAN,EP,AV,EDR,IDS,NSM,SIEM,SOAR,RESP layer;
How to Read This Diagram
- Firewall + IPS are your front-line blockers.
- IDS detects suspicious network activity without blocking.
- NSM provides deep visibility (what happened, when, and how).
- AV + EDR protect endpoints where attacks often succeed.
- SIEM is the central brain that correlates signals from every layer.
- SOAR turns alerts into consistent response actions.
They are complementary — not replacements.
They are complementary — not replacements.
Executive Perspective: Why This Matters
When a customer says:
"We already have firewall and antivirus."
The real question is:
- Who detects lateral movement?
- Who sees encrypted DNS tunneling?
- Who reconstructs attacker timeline?
- Who correlates endpoint + network activity?
That is where NSM, EDR, SIEM, and automation become critical.
Final Takeaway
- AV protects files.
- EDR protects behavior.
- IPS blocks known network threats.
- IDS alerts suspicious traffic.
- NSM provides deep visibility and forensic power.
- SIEM correlates everything into intelligence.
Security today is not about one tool.
It is about layered defense, visibility, and response capability.
That is the foundation of modern cyber resilience.
Get in Touch with us
Related Posts
- 现代榴莲集散中心:告别手写账本,用系统掌控你的生意
- The Modern Durian Depot: Stop Counting Stock on Paper. Start Running a Real Business.
- AI System Reverse Engineering:用 AI 理解企业遗留软件系统(架构、代码与数据)
- AI System Reverse Engineering: How AI Can Understand Legacy Software Systems (Architecture, Code, and Data)
- 人类的优势:AI无法替代的软件开发服务
- The Human Edge: Software Dev Services AI Cannot Replace
- From Zero to OCPP: Launching a White-Label EV Charging Platform
- How to Build an EV Charging Network Using OCPP Architecture, Technology Stack, and Cost Breakdown
- Wazuh 解码器与规则:缺失的思维模型
- Wazuh Decoders & Rules: The Missing Mental Model
- 为制造工厂构建实时OEE追踪系统
- Building a Real-Time OEE Tracking System for Manufacturing Plants
- The $1M Enterprise Software Myth: How Open‑Source + AI Are Replacing Expensive Corporate Platforms
- 电商数据缓存实战:如何避免展示过期价格与库存
- How to Cache Ecommerce Data Without Serving Stale Prices or Stock
- AI驱动的遗留系统现代化:将机器智能集成到ERP、SCADA和本地化部署系统中
- AI-Driven Legacy Modernization: Integrating Machine Intelligence into ERP, SCADA, and On-Premise Systems
- The Price of Intelligence: What AI Really Costs
- 为什么你的 RAG 应用在生产环境中会失败(以及如何修复)
- Why Your RAG App Fails in Production (And How to Fix It)













