Close Menu
Nabka News
  • Home
  • News
  • Business
  • China
  • India
  • Pakistan
  • Political
  • Tech
  • Trend
  • USA
  • Sports

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

FM meets UN chief, raises IWT violations

July 22, 2025

Infantino backs England’s Carter over racist abuse – Sport

July 22, 2025

Senators denounce honour killing as lawmakers call for justice

July 22, 2025
Facebook X (Twitter) Instagram
  • Home
  • About NabkaNews
  • Advertise with NabkaNews
  • DMCA Policy
  • Privacy Policy
  • Terms of Use
  • Contact us
Facebook X (Twitter) Instagram Pinterest Vimeo
Nabka News
  • Home
  • News
  • Business
  • China
  • India
  • Pakistan
  • Political
  • Tech
  • Trend
  • USA
  • Sports
Nabka News
Home » Upgrade your EDR solution | Trend Micro (US)
Trend

Upgrade your EDR solution | Trend Micro (US)

i2wtcBy i2wtcJune 3, 2024No Comments6 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email WhatsApp Copy Link
Follow Us
Google News Flipboard Threads
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Not all threats originate from the endpoint. According to IBM’s 2023 Cost of a Data Breach Report, phishing and stolen or compromised credentials were the two most common initial attack vectors. XDR can be used to detect email threats, such as a compromised account sending an internal phishing email. Upon detection, XDR can scan the mailbox to identify other users who received the email so it can be quarantined or removed to prevent it from spreading.

Additionally, network detection and response (NDR) fills EDR’s blind spots. Real-time activity data collected about traffic flows and behavior, as well as perimeter and lateral connections, allows analysts to discover how threats are communicating and moving on the network. With this knowledge, security professionals can block hosts and URLs and disable Active Directory accounts to limit the scope of attacks.
Cloud workloads, servers, and containers are critical to business operations, so monitoring activity at this layer is essential to reducing critical incidents. XDR collects and correlates activity data such as user account activity, processes, commands executed, network connections, files created/accessed, and registry changes to tell the full story beyond alerts. This allows security teams to take a closer look at what happened within cloud workloads and how attacks propagated.

Operationalizing threat intelligence from XDR

According to ESG’s report on SOC modernization and the role of XDR, the top initiative for SOCs in 2022 is “improving threat intelligence operationalization.” In the face of increasingly sophisticated and successful cyber attacks, incorporating threat intelligence is an essential part of SOC functionality. The more we understand attacker tactics and objectives, the more resilient and accountable our organizations will be.
The MITRE ATT&CK framework is extremely useful for mapping specific attack campaigns, threat groups, and individual attack activities, but despite its widespread adoption, many organizations are still struggling to find ways to leverage this framework consistently.

From an XDR solution perspective, TTPs can be used to develop detection rules and models that allow threat intelligence to be injected directly into event investigations, uncovering the identity of specific attack campaigns and providing visibility into the entire campaign lifecycle.

TTPs can also be used to develop threat hunting baselines and provide a proactive view of identified TTPs in your environment, serving as a starting point for targeted investigations.
Finally, the MITRE ATT&CK framework can help you identify security gaps and prioritize activities to reduce risk and improve resilience.

Key Considerations for XDR

While sensor coverage is important, there are many other things to consider when selecting an XDR vendor to ensure you have the best threat detection and response capabilities. Ask yourself the following questions:

1. Is your product API friendly? Some vendors don’t integrate their APIs with SIEMs or SOARs. The more integrated your XDR is, the greater your ability to automate and orchestrate tasks, enabling workflows across your ecosystem. And vendors that offer XDR solutions that integrate into their cybersecurity platforms provide security professionals with a much-needed single-pane-of-glass view across the entire attack surface.

2. Does the product provide end-to-end visibility into an attack? Some XDR solutions may only provide a snapshot of an attack. Security teams need visibility into managed and unmanaged assets and encrypted network traffic to understand where an attack originated and how it spreads. Extending network telemetry and correlating with network events via NDR allows teams to establish the complete attack chain and improve their security posture.

3. What about the user experience? Finding (and retaining) skilled staff remains a challenge. Avoid security solutions with steep learning curves and poor support. Vendors who want you to succeed, not just sell you a product, will build in in-app tutorials, online help centers, and even direct feedback loops and feature requests.

4. Are they forward-thinking? Make sure the vendor is committed to improving their product to not only address the evolving threat landscape, but also to making it easier for your team to do so. Does the vendor have a strong strategy for using AI to significantly reduce the burden on your security team? Don’t be afraid to ask the tough questions to make sure it’s not a false ploy. Bonus points go to vendors who have a strategy for safeguarding the use of AI tools in your organization.

5. Are the alerts actionable? As mentioned earlier, traditional SIEMs spit out a ton of alerts, and they’re often useless. To make them work, you have to do a lot of detection engineering. A proper XDR solution should provide actionable alerts with out-of-the-box cross-layer correlation and detection models. It should also prioritize alerts based on risk score and impact severity to speed up response times.

6. What is the pricing structure? Look for a vendor that offers a pricing model that fits your changing business trends. Most vendors charge by bundle or seat-based subscription, which means you end up paying for unused sensors if an employee leaves or is fired. Consider more flexible licensing options that let you adjust allocations on demand, eliminating fixed costs and losses from underutilized licenses.

7. Do you offer managed services? Staffing shortages and budget constraints can hinder your threat detection and response efforts. Vendors who can provide managed services to your existing teams that provide specialized threat hunting, 24/7 monitoring and detection, and rapid investigation and mitigation are invaluable. You can gain expertise and capabilities while relieving overworked teams to work on higher priority programs.

8. Has your product received positive reviews from industry analysts? Everyone wants to say they’re number one, so be sure to check trusted industry analyst reports to verify vendor claims. We’re not afraid to advertise, but see how Trend ranks in the industry:

Board to board with XDRStatistics show that cybersecurity spending continues to rise, but there’s no guarantee that budgets will grow accordingly. Getting approval for cybersecurity investments can be difficult, so it’s important to be clear about the benefits of XDR from a financial and risk perspective. Here are some things to consider when considering implementing XDR:

Investing in security solutions = investing in your business. According to IBM’s “Cost of a Data Breach 2022,” organizations using XDR reduced breach costs by approximately 10% on average and shortened the breach lifecycle by 29 days. Reduced downtime and financial impact is good news for executives.

Reduced cyber insurance premiumsUnderwriters want EDR, but demonstrating that you’re leveraging XDR beyond the endpoint to mitigate cyber risk can help lower high cyber premiums.

Next steps

To learn more about XDR and cyber risk management, check out our next series or click here to read Trend Vision One™ – How XDR Leaves Attackers Nowhere to Hide.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email WhatsApp Copy Link
i2wtc
  • Website

Related Posts

Trend

Nvidia’s China return buys time for Beijing to boost its chip drive

July 21, 2025
Trend

CoreWeave announces $1.5 billion bond sale

July 21, 2025
Trend

OpenAI says it will use Google’s cloud for ChatGPT

July 16, 2025
Trend

Nvidia CEO wants to sell advanced chips to China after H20 ban lifted

July 16, 2025
Trend

ASML Q2 2025 earnings report

July 16, 2025
Trend

Amazon-backed Anthropic rolls out Claude AI for financial services

July 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

FM meets UN chief, raises IWT violations

July 22, 2025

House Republicans unveil aid bill for Israel, Ukraine ahead of weekend House vote

April 17, 2024

Prime Minister Johnson presses forward with Ukraine aid bill despite pressure from hardliners

April 17, 2024

Justin Verlander makes season debut against Nationals

April 17, 2024
Don't Miss

Trump says China’s Xi ‘hard to make a deal with’ amid trade dispute | Donald Trump News

By i2wtcJune 4, 20250

Growing strains in US-China relations over implementation of agreement to roll back tariffs and trade…

Donald Trump’s 50% steel and aluminium tariffs take effect | Business and Economy News

June 4, 2025

The Take: Why is Trump cracking down on Chinese students? | Education News

June 4, 2025

Chinese couple charged with smuggling toxic fungus into US | Science and Technology News

June 4, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to NabkaNews, your go-to source for the latest updates and insights on technology, business, and news from around the world, with a focus on the USA, Pakistan, and India.

At NabkaNews, we understand the importance of staying informed in today’s fast-paced world. Our mission is to provide you with accurate, relevant, and engaging content that keeps you up-to-date with the latest developments in technology, business trends, and news events.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

FM meets UN chief, raises IWT violations

July 22, 2025

Infantino backs England’s Carter over racist abuse – Sport

July 22, 2025

Senators denounce honour killing as lawmakers call for justice

July 22, 2025
Most Popular

Trump or Harris? Why Chinese-born scientists fear the shadow of US suspicions will continue

October 30, 2024

An NPC deputy & senior welder devoted to training young craftsmen-Xinhua

February 23, 2025

Digital intelligence empowers old industry base in NE China-Xinhua

February 28, 2025
© 2025 nabkanews. Designed by nabkanews.
  • Home
  • About NabkaNews
  • Advertise with NabkaNews
  • DMCA Policy
  • Privacy Policy
  • Terms of Use
  • Contact us

Type above and press Enter to search. Press Esc to cancel.