What is XDR? - Extended Detection and Response



There’s a relatively new acronym out there in the security space: it’s XDR(Extended Detection and Response). But why do we need yet another acronym and should you care? Over the last several years, many analyst groups have tried to capture the idea of more complex attacks and how to build best practices to put the right security infrastructure in place to help.

The past has delivered successive sets of tools that do solve unique problems.


  • The rise of Endpoint Detection and Response (EDR) — endpoints are in many cases the first line of defense or first line of breakdown.

  • The rise of Network Traffic Analysis (NTA / NDR) besides NGFW– packets have a wealth of insight imbedded in both their header and content

  • The rise of Cloud Application Security Brokers (CASB) — a new way to protect SaaS applications like Office365, which can not be protected with traditional firewalls.

  • The SIEM — the backbone of security operations teams; logs have a lot of value for sure

Each of these tools has helped, but that said it is difficult to use so many tools and they add to operational inefficiencies. Yet even with EDR solutions in place, security teams continue to struggle to keep up. Enterprise Strategy Group (ESG) has surveyed many organizations who have tried post-processing EDR and NTA data in an attempt to stitch together attack details. While most teams are depending on multiple, independent tools, ESG research shows that 66% of respondents believe that effectiveness is limited with this approach because it is based on multiple independent point tools.

ESG further notes that “…with 76% of companies claiming that threat detection and response is more difficult today than it was two years ago, current detection and response tools aren’t keeping up. While endpoint detection and response solutions have helped many organizations identify and respond to attacks they believe would have otherwise been missed, many organizations say that they are still falling further behind, lacking the ability to keep up with the volume of modern attacks. A new approach is needed.”

Popular posts from this blog

Why MSSPs Need a Human-Augmented Autonomous SOC

SIEM Logging: Overview & Best Practices

Unpacking the 2023 Top 250 MSSPs Report