{"id":1496,"date":"2020-11-04T08:26:56","date_gmt":"2020-11-04T08:26:56","guid":{"rendered":"http:\/\/www.cllsystems.com\/?p=1496"},"modified":"2020-11-04T08:27:40","modified_gmt":"2020-11-04T08:27:40","slug":"moving-beyond-traditional-edr","status":"publish","type":"post","link":"https:\/\/www.cllsystems.com\/staging\/2020\/11\/04\/moving-beyond-traditional-edr\/","title":{"rendered":"Moving Beyond Traditional EDR"},"content":{"rendered":"\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\"><strong>An evolution is happening in the cybersecurity industry. Even as our workforce is becoming more and more distributed, our security architecture is unifying into a single security analytics capability for threat detection and response. Extended detection and response (XDR) is\u00a0at the center of this shift, providing centralized visibility across your various security data sources. Security teams who are investing in detection and response tools must consider XDR in their evaluations, as XDR delivers all the capabilities of traditional endpoint detection and response (EDR), but with superior extensibility and analytics to meet the needs of the future.<\/strong><\/p>\n<h2>\u00a0<\/h2>\n<h2 style=\"text-align: justify;\">XDR Is an Extension of EDR Capabilities<\/h2>\n<p style=\"text-align: justify;\">To tell the story of\u00a0XDR, we must begin with traditional EDR because it is the foundation from which we are extending. EDR capabilities are a critical precursor to an XDR solution because there is no better way to detect an intrusion than by monitoring the actual target environment being attacked, and the telemetry collected by EDR forms the basis of triage and investigation. You simply cannot have a marketable XDR solution if you don\u2019t have best-in-class EDR capabilities. That said, 10-20% of any organization\u2019s laptops and workstations are not under management, so as great as EDR is, it\u2019s only situationally useful. Let\u2019s take a look at how\u00a0XDR improves upon this situation.<\/p>\n<div style=\"text-align: justify;\">\u00a0<\/div>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Cloud Workloads Require a Different Type of Endpoint Monitoring<\/h2>\n<p style=\"text-align: justify;\">An endpoint is traditionally understood to be an end user computing device such as a laptop or workstation. Unfortunately, this ignores another important endpoint if we\u2019re to view network communication using the middle-school definition of a line segment, connecting\u00a0<i>two<\/i>\u00a0endpoints. As cloud technologies such as\u00a0<a href=\"https:\/\/blog.paloaltonetworks.com\/prisma-cloud\/category\/container-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">containers<\/a>\u00a0and\u00a0<a href=\"https:\/\/blog.paloaltonetworks.com\/prisma-cloud\/category\/serverless-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">serverless<\/a>\u00a0become more prevalent, it\u2019s essential that we be able to monitor these endpoints with the same confidence we have in our end user computing environment. This critical next step toward a full-fledged XDR product enables a unified view across the endpoints within your environment, regardless of system function.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Let\u2019s Not Forget How the Network Ties It All Together<\/h2>\n<p style=\"text-align: justify;\">Network telemetry serves three critical functions in an XDR environment:\u00a0<\/p>\n<ol style=\"text-align: justify;\">\n<li>Detecting compromise of unmanaged assets.\u00a0<\/li>\n<li>Providing application-layer anomaly detection where some attacks may never compromise the system itself.\u00a0<\/li>\n<li>Correlating events across systems to enable triage of alerts as a single incident across your environment.\u00a0<\/li>\n<\/ol>\n<p style=\"text-align: justify;\">While the first two objectives are advantages of having a network detection and response (NDR) solution, only by leveraging XDR can you accomplish the third to greatly reduce not only the frequency of alerts but the time to triage and investigate them.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Why Are You Still Shopping for a Traditional EDR Product?<\/h2>\n<p style=\"text-align: justify;\">XDR extends all the benefits you expect from a traditional EDR product by further stitching together telemetry from non-endpoint sources to provide better detection and a bigger picture of what\u2019s going on in your environment for your security operations team. Organizations without XDR invest tons of time and money sending traditional EDR data into their SIEM in an attempt to achieve the same benefits an XDR solution will give you out of the box. Don\u2019t invest in the last generation of endpoint security products with traditional EDR, extend your team by unifying your threat detection capabilities with XDR.<\/p>\n<p><strong>To learn more,\u00a0<a href=\"http:\/\/www.cllsystems.com\/contact-us\/\" target=\"_blank\" rel=\"noopener noreferrer\">contact us<\/a> today.\u00a0<\/strong><\/p>\n<p>\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-facebook  wp-block-social-link\"><a href=\"https:\/\/www.facebook.com\/cllsystems\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n\n\n\n\n<li class=\"wp-social-link wp-social-link-linkedin  wp-block-social-link\"><a href=\"https:\/\/www.linkedin.com\/company\/cll-systems-sdn-bhd\/?viewAsMember=true\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 An evolution is happening in the cybersecurity industry. Even as our workforce is becoming more and more distributed, our security architecture is unifying into a single security analytics capability for threat detection and response. Extended detection and response (XDR) is\u00a0at the center of this shift, providing centralized visibility across your various security data sources. &hellip; <a href=\"https:\/\/www.cllsystems.com\/staging\/2020\/11\/04\/moving-beyond-traditional-edr\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Moving Beyond Traditional EDR&#8221;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":1497,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/posts\/1496"}],"collection":[{"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/comments?post=1496"}],"version-history":[{"count":3,"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/posts\/1496\/revisions"}],"predecessor-version":[{"id":1500,"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/posts\/1496\/revisions\/1500"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/media\/1497"}],"wp:attachment":[{"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/media?parent=1496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/categories?post=1496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/tags?post=1496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}