Skip to Content
Dismiss
Innovation
A platform built for AI

Unified, automated, and ready to turn data into intelligence.

Find Out How
Dismiss
June 16-18, Las Vegas
Pure//Accelerate® 2026

Discover how to unlock the true value of your data. 

Register Now
Dismiss
NVIDIA GTC San Jose 2026
Experience the Everpure difference at GTC

March 16-19 | Booth #935
San Jose McEnery Convention Center

Schedule a Meeting

What Is MTTD?

Mean time to detect, or MTTD, is the average time it takes a DevOps team to detect a problem, such as a software bug or hardware failure, within an organization.

MTTD is one of the key performance indicators of incident management. Obviously, the sooner an organization discovers a problem, the better. Incidents often can lead to system downtime, which on average can cost $5,600 per minute, according to Gartner.

Although MTTD isn't the only metric available to DevOps teams, it's one of the easiest to track and measure, and it’s an essential metric for any organization that wants to avoid problems like system outages.

How to Calculate MTTD: Step by Step

To calculate MTTD:

  1. Keep track of all incidents using tools such as logs, a help desk, and/or an intrusion detection system (more on these tools below).
  2. Determine the goal of your MTTD calculation and what you want to calculate it for. MTTD is typically calculated for a certain facility or system over a specific time period, such as overnight, weekly, monthly, or annually. It can also be calculated for a specific technician or team.
  3. Use the previously mentioned tools to calculate the start time and detection time for each incident within the time frame you’ve chosen.
  4. Divide the total incident detection time by the number of incidents.

For example, let’s say the 24x7 operations support team for a large auto parts manufacturer tracks weekly MTTD for the entire facility. During the week of February 7-11, 2022, there were four incidents. Using systems logs, the team determined the start time and detection time of each incident and recorded them in a table as follows:

Start Time

Detection Time

Elapsed (min)

4:45 am

6:43 am

118

2:01 am

2:54 am

53

9:05 am

11:33 am

148

3:44 pm

5:09 pm

85

Slide

The mean time to detect is calculated as:

(118 + 53 + 148 + 85)/4

MTTD = 101 minutes

The auto parts manufacturer could then use this number to compare MTTD from this particular week to other weeks or to the same week in the previous year. If they’d calculated MTTD for a certain team, they could use this result to gauge the team’s performance over time. Some companies choose to remove outliers from the table, and many will also tier incidents by severity to see if MTTD varies according to the seriousness of the problem.

What Tools Do You Need to Monitor MTTD?

Monitoring MTTD mainly involves keeping track of anything that qualifies as an event or an issue, which can vary greatly from organization to organization.

The primary tools you need to monitor MTTD include:

Logs: Logs are automatically produced and time-stamped documentations of events relevant to a particular computer system or software application. For example, a web server’s access log lists all the individual files that people request from a website, including HTML files and any other associated files that get transmitted. Another example is a database log, which records all activity in the database, including all changes to records.

Help desks: Held desks are centralized help centers for product users who need help with anything related to the product, especially IT issues. They can be physical or online call centers or ticket systems that operate through SaaS applications. Help desks have a knowledge base that keeps records of customer issues, including what the issue was, when it was identified, and how it was resolved.

Intrusion detection systems: An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and produces alerts when such activity is discovered. The primary functions of an IDS are reporting and anomaly detection, but some intrusion detection systems can take action when they detect malicious activity, including blocking traffic sent from suspicious IP addresses.

What Is a Good MTTD?

What constitutes a “good” MTTD will vary greatly depending on the company, its product, the industry, and the particular threat or intrusion the company wants to prevent or intercept. Obviously, the best possible MTTD is zero, meaning you catch the threat actor before it even has a chance to cause damage.

A zero MTTD is, of course, very hard to achieve. According to Ponemon Institute, which provides the industry standard benchmark for MTTD, the average time to identify and contain a data breach was 280 days in 2020 and 279 days in 2019.

To figure out what a good MTTD is for your particular company, you should look not only at the overall average for all companies but also try to get information on how other companies in your sector do with MTTD. Also, you need to calculate what the cost of the average data breach is for your company and how much your company can afford to lose per breach without causing serious financial hardship to the company.

There are various steps you can take to lower MTTD:

  • Invest in the best possible cybersecurity talent and solutions.
  • Make sure all internal teams are aligned and communicating around potential cyber threats.
  • Accurately and consistently record incidents and maintain a reliable and thorough event log.
  • For every incident, always examine what caused it and how to prevent it or detect it faster moving forward.

Other things that can help organizations lower their MTTD include security orchestration, automation and response (SOAR) technologies, and incident response plans.

Who Should Use MTTD and When?

Any company with systems or networks that need to stay up and running and secure can benefit from regularly measuring MTTD.

MTTD should always be measured at the times when the occurrence of the incident would cause damage. For example, for a manufacturing facility that only operates at night, you would only want to be checking for incidents at night. It wouldn’t make sense to include daytime data.

What Is the Next Metric after Detection?

MTTD reflects the amount of time it takes your team to discover a potential security incident. But, the next step after detection is response.

Mean time to respond, or MTTR, is the time it takes to control, remediate, and/or eradicate a threat once it’s been discovered.

Learn more about MTTR.

03/2026
Empowering Healthcare Cyber Resilience
Everpure™️ and Rubrik provide a unified cyber resilience stack specifically designedto protect healthcare infrastructure, which is a primary target for cyber threats.
Solution Brief
3 pages

Browse key resources and events

TRADESHOW
Pure//Accelerate® 2026
Save the date. June 16-19, 2026 | Resorts World Las Vegas

Get ready for the most valuable event you’ll attend this year.

Register Now
PURE360 DEMOS
Explore, learn, and experience Everpure.

Access on-demand videos and demos to see what Everpure can do.

Watch Demos
VIDEO
Watch: The value of an Enterprise Data Cloud

Charlie Giancarlo on why managing data—not storage—is the future. Discover how a unified approach transforms enterprise IT operations.

Watch Now
RESOURCE
Legacy storage can’t power the future

Modern workloads demand AI-ready speed, security, and scale. Is your stack ready?

Take the Assessment
Your Browser Is No Longer Supported!

Older browsers often represent security risks. In order to deliver the best possible experience when using our site, please update to any of these latest browsers.

Personalize for Me
Steps Complete!
1
2
3
Personalize your Everpure experience
Select a challenge, or skip and build your own use case.
Future-proof virtualisation strategies

Storage options for all your needs

Enable AI projects at any scale

High-performance storage for data pipelines, training, and inferencing

Protect against data loss

Cyber resilience solutions that defend your data

Reduce cost of cloud operations

Cost-efficient storage for Azure, AWS, and private clouds

Accelerate applications and database performance

Low-latency storage for application performance

Reduce data centre power and space usage

Resource efficient storage to improve data centre utilization

Confirm your outcome priorities
Your scenario prioritizes the selected outcomes. You can modify or choose next to confirm.
Primary
Reduce My Storage Costs
Lower hardware and operational spend.
Primary
Strengthen Cyber Resilience
Detect, protect against, and recover from ransomware.
Primary
Simplify Governance and Compliance
Easy-to-use policy rules, settings, and templates.
Primary
Deliver Workflow Automation
Eliminate error-prone manual tasks.
Primary
Use Less Power and Space
Smaller footprint, lower power consumption.
Primary
Boost Performance and Scale
Predictability and low latency at any size.
What’s your role and industry?
We've inferred your role based on your scenario. Modify or confirm and select your industry.
Select your industry
Financial services
Government
Healthcare
Education
Telecommunications
Automotive
Hyperscaler
Electronic design automation
Retail
Service provider
Transportation
Which team are you on?
Technical leadership team
Defines the strategy and the decision making process
Infrastructure and Ops team
Manages IT infrastructure operations and the technical evaluations
Business leadership team
Responsible for achieving business outcomes
Security team
Owns the policies for security, incident management, and recovery
Application team
Owns the business applications and application SLAs
Describe your ideal environment
Tell us about your infrastructure and workload needs. We chose a few based on your scenario.
Select your preferred deployment
Hosted
Dedicated off-prem
On-prem
Your data centre + edge
Public cloud
Public cloud only
Hybrid
Mix of on-prem and cloud
Select the workloads you need
Databases
Oracle, SQL Server, SAP HANA, open-source

Key benefits:

  • Instant, space-efficient snapshots

  • Near-zero-RPO protection and rapid restore

  • Consistent, low-latency performance

 

AI/ML and analytics
Training, inference, data lakes, HPC

Key benefits:

  • Predictable throughput for faster training and ingest

  • One data layer for pipelines from ingest to serve

  • Optimised GPU utilization and scale
Data protection and recovery
Backups, disaster recovery, and ransomware-safe restore

Key benefits:

  • Immutable snapshots and isolated recovery points

  • Clean, rapid restore with SafeMode™

  • Detection and policy-driven response

 

Containers and Kubernetes
Kubernetes, containers, microservices

Key benefits:

  • Reliable, persistent volumes for stateful apps

  • Fast, space-efficient clones for CI/CD

  • Multi-cloud portability and consistent ops
Cloud
AWS, Azure

Key benefits:

  • Consistent data services across clouds

  • Simple mobility for apps and datasets

  • Flexible, pay-as-you-use economics

 

Virtualisation
VMs, vSphere, VCF, vSAN replacement

Key benefits:

  • Higher VM density with predictable latency

  • Non-disruptive, always-on upgrades

  • Fast ransomware recovery with SafeMode™

 

Data storage
Block, file, and object

Key benefits:

  • Consolidate workloads on one platform

  • Unified services, policy, and governance

  • Eliminate silos and redundant copies

 

What other vendors are you considering or using?
Thinking...
Your personalized, guided path
Get started with resources based on your selections.