Cybersecurity In-Depth: Feature articles on security strategy, latest trends, and people to know.
Does XDR Mark the Spot? 6 Questions to Ask
Extended detection and response technology goes well beyond endpoint management to provide visibility into networks, servers, cloud, and applications. Could it be the answer to your security challenges?
Extended detection and response – aka XDR – is one of those "buzzy" solution terms that seems to be everywhere in security lately. But despite the hype, there is still a lot of misunderstanding around the technology.
XDR promises to go beyond endpoint monitoring and detection to extend visibility into networks, servers, cloud, and applications. XDR analyzes data from all of these locations, takes action on threats, and sends information back to analysts.
Indeed, threat detection and response (TDR) is still a major pain point for security. According to research firm ESG, 83% of organizations will increase spending on threat detection and response this year.
"Organizations have been spending regularly on threat detection and response but still can't detect sophisticated threats. And it takes too long to detect and respond to even common threats," says Jon Oltsik, a senior principal analyst at ESG. "By aggregating threat detection and response across multiple controls, XDR promises to improve TDR efficacy and streamline operations. This value proposition is too good to ignore, so XDR is getting lots of attention."
Is XDR right for your organization? Here are some common questions to ask as you think it through.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024