NSM vs AV vs IPS vs IDS vs EDR: What Your Security Architecture Is Probably Missing
Many organizations believe they are "secure" because they have a firewall and antivirus installed.
Then a breach happens.
The reason? Most teams misunderstand the difference between NSM, AV, IPS, IDS, and EDR — and more importantly, how they should work together.
This article explains each component clearly and shows how modern security architecture actually works.
Why One Security Tool Is Never Enough
Cyber attacks today are:
- Encrypted
- Fileless
- Behavior‑based
- Living-off-the-land
- Designed to bypass signature detection
No single tool can detect all of this.
Security today is about layered visibility and control.
Let’s break down each layer.
1. NSM (Network Security Monitoring)
The Visibility Layer
Network Security Monitoring focuses on deep inspection and long-term analysis of network traffic.
Unlike IPS, NSM does not primarily block traffic. Its job is to observe, record, detect patterns, and support investigation.
Think of NSM as CCTV for your network — always watching, always recording.
What NSM Collects
- Full packet capture (PCAP)
- NetFlow / Traffic metadata
- DNS logs
- HTTP logs
- SSL/TLS metadata
- Firewall logs
- IDS alerts
What NSM Is Good At
- Detecting lateral movement inside the network
- Detecting data exfiltration
- Identifying suspicious DNS tunneling
- Supporting forensic investigations
- Providing historical visibility
If an attacker bypasses your firewall and AV, NSM is often the system that reveals what actually happened.
2. AV (Antivirus)
The Basic Endpoint Protection Layer
Antivirus runs directly on endpoints:
- Windows
- macOS
- Linux
- Servers
- Workstations
It scans files and memory for known malicious signatures.
What AV Does Well
- Detect known malware
- Stop common ransomware variants
- Quarantine infected files
Where AV Fails
- Fileless attacks
- PowerShell abuse
- Credential dumping
- Advanced persistent threats
AV is necessary — but it is not sufficient.
3. IPS (Intrusion Prevention System)
The Real-Time Blocking Layer
IPS sits inline in your network path:
Internet → Firewall → IPS → Internal Network
It inspects traffic in real time and blocks known malicious activity.
What IPS Does
- Blocks malicious IP addresses
- Stops exploit attempts
- Drops suspicious packets
- Prevents command-and-control traffic
IPS is your network gatekeeper.
However, IPS focuses on prevention — not deep investigation.
4. IDS (Intrusion Detection System)
The Alerting Layer
IDS monitors traffic but does not block it.
It generates alerts when suspicious behavior is detected.
IDS is often used when organizations want visibility without risking false-positive blocking.
Think of IDS as an alarm system.
5. EDR (Endpoint Detection & Response)
The Advanced Endpoint Intelligence Layer
EDR is the evolution of traditional antivirus.
Instead of just scanning files, EDR monitors behavior.
What EDR Detects
- Suspicious PowerShell execution
- Credential dumping activity
- Abnormal process chains
- Lateral movement techniques
What EDR Can Do
- Detect
- Block
- Investigate
- Isolate compromised machines
If AV is a guard, EDR is a trained investigator.
Side-by-Side Comparison
| System | Runs Where | Detect | Block | Investigation Depth | Focus |
|---|---|---|---|---|---|
| AV | Endpoint | Yes | Yes | Low | Known malware |
| EDR | Endpoint | Yes | Yes | High | Behavior-based |
| IDS | Network | Yes | No | Medium | Alerts |
| IPS | Network | Yes | Yes | Medium | Prevention |
| NSM | Network | Yes | Usually No | Very High | Visibility |
| SIEM | Log layer | Yes | No | Correlation | Central analysis |
How Modern Security Architecture Works
A mature architecture combines all layers:
Endpoints → AV / EDR
Network → IDS / IPS
Traffic Visibility → NSM
Central Log Correlation → SIEM
Automation & Orchestration → SOAR
Each layer covers blind spots of the others.
System Diagram (How These Components Fit Together)
flowchart TB
Internet["Internet"] --> FW["Firewall"]
FW --> IPS["IPS (Inline Blocking)"]
IPS --> LAN["Internal Network (LAN)"]
%% Endpoint layer
LAN --> EP["Endpoints / Servers"]
EP --> AV["AV (File/Signature Protection)"]
EP --> EDR["EDR (Behavior + Response)"]
%% Detection vs prevention on the network
LAN --> IDS["IDS (Alerting)"]
LAN --> NSM["NSM (Zeek/PCAP/Flow Visibility)"]
%% Telemetry to SIEM
FW --> SIEM["SIEM (Correlation)"]
IPS --> SIEM
IDS --> SIEM
NSM --> SIEM
AV --> SIEM
EDR --> SIEM
%% Automation
SIEM --> SOAR["SOAR (Automation/Orchestration)"]
SOAR --> RESP["Response Actions
- Block IP / isolate host
- Create ticket
- Notify SOC
- Run playbook"]
%% Notes
classDef layer fill:#fff,stroke:#999,stroke-width:1px;
class Internet,FW,IPS,LAN,EP,AV,EDR,IDS,NSM,SIEM,SOAR,RESP layer;
How to Read This Diagram
- Firewall + IPS are your front-line blockers.
- IDS detects suspicious network activity without blocking.
- NSM provides deep visibility (what happened, when, and how).
- AV + EDR protect endpoints where attacks often succeed.
- SIEM is the central brain that correlates signals from every layer.
- SOAR turns alerts into consistent response actions.
They are complementary — not replacements.
They are complementary — not replacements.
Executive Perspective: Why This Matters
When a customer says:
"We already have firewall and antivirus."
The real question is:
- Who detects lateral movement?
- Who sees encrypted DNS tunneling?
- Who reconstructs attacker timeline?
- Who correlates endpoint + network activity?
That is where NSM, EDR, SIEM, and automation become critical.
Final Takeaway
- AV protects files.
- EDR protects behavior.
- IPS blocks known network threats.
- IDS alerts suspicious traffic.
- NSM provides deep visibility and forensic power.
- SIEM correlates everything into intelligence.
Security today is not about one tool.
It is about layered defense, visibility, and response capability.
That is the foundation of modern cyber resilience.
Get in Touch with us
Related Posts
- ERP项目为何失败(以及如何让你的项目成功)
- Why ERP Projects Fail (And How to Make Yours Succeed)
- Payment API幂等性设计:用Stripe、支付宝、微信支付和2C2P防止重复扣款
- Idempotency in Payment APIs: Prevent Double Charges with Stripe, Omise, and 2C2P
- Agentic AI in SOC Workflows: Beyond Playbooks, Into Autonomous Defense (2026 Guide)
- 从零构建SOC:Wazuh + IRIS-web 真实项目实战报告
- Building a SOC from Scratch: A Real-World Wazuh + IRIS-web Field Report
- 中国品牌出海东南亚:支付、物流与ERP全链路集成技术方案
- 再生资源工厂管理系统:中国回收企业如何在不知不觉中蒙受损失
- 如何将电商平台与ERP系统打通:实战指南(2026年版)
- AI 编程助手到底在用哪些工具?(Claude Code、Codex CLI、Aider 深度解析)
- 使用 Wazuh + 开源工具构建轻量级 SOC:实战指南(2026年版)
- 能源管理软件的ROI:企业电费真的能降低15–40%吗?
- The ROI of Smart Energy: How Software Is Cutting Costs for Forward-Thinking Businesses
- How to Build a Lightweight SOC Using Wazuh + Open Source
- How to Connect Your Ecommerce Store to Your ERP: A Practical Guide (2026)
- What Tools Do AI Coding Assistants Actually Use? (Claude Code, Codex CLI, Aider)
- How to Improve Fuel Economy: The Physics of High Load, Low RPM Driving
- 泰国榴莲仓储管理系统 — 批次追溯、冷链监控、GMP合规、ERP对接一体化
- Durian & Fruit Depot Management Software — WMS, ERP Integration & Export Automation













