Threat detection and response remain a key priority for organizations as ransomware and data breaches continue to disrupt business operations. With multiple solutions known as EDR, NDR, and XDR, as well as the “managed” versions known as MNDR and MXDR, it can feel like an acronym soup and be challenging to determine the best fit for an organization’s unique security needs.
Let’s start by breaking down the components of the acronyms. Starting from right to left - ‘R’ is Respond, ‘D’ is Detect. In such a landscape, the important question is what and how do they detect? Response without detection is not possible and lack of good detection capability on a complex, evolving threat landscape leads to SOC inefficiencies.
Organizations are doing the best they can with the tools they have. Plus, as organizations hold on to technological debt (i.e., legacy tools that are still part of the stack) and continue to add more, they end up with a disparate mix and likely overlapping – but perhaps still not comprehensive – products from a detection perspective. Between commercial, homegrown, and open source, large enterprises run an average of 25 security tools. Instead of making things easier, this onslaught of inadequate tools adds work and risk for CISOs and SOC teams.
With the increased focus on threat Detection and Response, security teams continue to face challenges regarding:
In response to some of these challenges, eXtended Detection and Response (XDR)
technologies have emerged and benefited from significant marketing investment by security vendors as the market strives toward improved ‘D’ detection. XDR is a term coined by industry analysts and subsequently adopted by vendors, though there continues to be a lack of full consensus on what it means.
XDR as a cybersecurity concept integrating threat detection and response to combine, correlate and contextualize data and alerts from multiple security prevention, detection and response components. XDR must have the ability to correlate at least three (but not all) of the following capabilities:
While this à la carte approach may be helpful from a marketing perspective, it is concerning from a security perspective. Further, it more than likely compromises the messaging from numerous XDR vendors that promise to improve one’s cybersecurity posture by accomplishing the following:
A lot of the XDR capability in the market today is EDR-centric and not fully encompassing the network telemetry available to make the solution more robust. Far too often, adversaries evade endpoint detections, leaving endpoint-centric strategies in the dust.
Let's examine why XDR cannot exist without NDR:
From a detection and evasion perspective, the network is significantly more difficult for
adversaries to evade. The network packet cannot be altered by an adversary and is a source of truth. The network serves as a potential chokehold for adversaries and a position of strength for security teams.
Bottom line: NDR is a critical component of XDR, as it provides vital network-level visibility and enhances the overall effectiveness of threat detection and response. Without NDR, XDR would not be able to deliver the comprehensive security coverage it promises, leaving organizations vulnerable to threats that exploit network-level vulnerabilities.
Postscript: This is the first post of a three-part series. Watch for the next post in the series about our thoughts on whether XDR is a “solution,” or rather, a “strategy.”