Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Is XDR Enough? The Hidden Gaps in Your Security Net

When evaluating XDR, consider its value based on its ability to reduce complexity and improve threat detection and response times.

Enterprise networks have undergone a massive change over the last two decades. Data and applications are everywhere, spanning a complex labyrinth of multi-cloud, on-premises, and legacy infrastructures being accessed by mobile and remote users.

In fact, some architectures have become so vast and distributed that security teams lack complete visibility of potential threats that put environments at risk. Traditionally, security teams have deployed multiple security tools — an average of 50-100 — thinking this will give them best-of-breed protection against various threats.

Without end-to-end visibility into network traffic flows and user activity, managing distributed deployments using multiple management tools will adversely impact a security team’s effectiveness. Moving between multiple tools, chasing 1000-plus security alerts daily, and hoping nothing gets missed, will frustrate even the most senior security analyst. And despite these efforts, attackers still find ways to exploit gaps in protection.

Of course, the security industry is aware of these issues plaguing enterprises and has produced XDR (extended detection and response). But does XDR live up to the hype?

What Is XDR?

XDR provides consolidated visibility across multiple security platforms to bring a holistic view of the security posture and create a simple starting point for security operations. It enables a deep analysis of multiple data sources to deliver more accurate detection with less noise, resulting in a faster, more effective response to security threats. Its detection and prevention mechanisms include machine learning and behavioral analytics, contextual analysis, threat hunting, SOAR integration and other functions.

Advertisement. Scroll to continue reading.

XDR is a more advanced approach to detection and response because it extends beyond endpoints alone to expose complex threats across the entire security posture. It is a highly effective tool for security organizations that are suffering from a skills shortage and insufficient resources. The contextual information regarding actual attacks allows security analysts to comprehend and quickly contain threats. 

This means threat monitoring and threat remediation are made effective because security teams can view all threat data using a single platform that correlates events from multiple security sources. XDR addresses visibility gaps and helps address alert fatigue, improving detection and response times.

XDR Hype and Reality

Let’s understand some top reasons why XDR may be overhyped.

1. Seamless Integration And Interoperability is a Far-fetched Reality

On paper, XDR promises to offer native integration with most third-party products. Some may speculate that it is unrealistic to expect that a single tool can offer and maintain threat detection and response capabilities that would seamlessly work across scores of disparate and siloed security controls. There’s already too much confusion surrounding open XDR versus closed XDR.

2. Limited Visibility Into Cloud Traffic and Applications

As cloud, remote work, and the Industrial Internet of Things (IIoT) become the new norm, data, applications, and devices that once resided within on-premise corporate environments have suddenly drifted away. Even the most sophisticated XDR solutions will find it challenging to gain visibility and make sense of this hybrid traffic. This loss of visibility and control across cloud and on-premises components can result in a loss of context, inevitably leaving gaping holes in the security posture.

3. Never Have Enough Resources To Investigate All XDR Alerts

Security teams are already inundated with thousands of alerts per day. Imagine the number of alerts they would receive if XDR ingested information from multiple sources. Without automation, prioritization, and contextual information, security teams can get distracted, creating more loopholes. The security skills gap is real and there will never be enough resources to investigate every alert in detail.

Is SASE the Future of XDR?

Single-vendor SASE is a model that converges networking and security technologies into a single cloud-delivered platform. Since all traffic flows through a single converged platform, detecting and correlating security events is less troublesome. From an XDR perspective, this means SASE would ideally make threat detection and response easier since all security tools are part of the same platform and would, therefore, speak a common language. 

A key strength of XDR is how it facilitates in-depth analysis of disconnected security alerts from multiple data sources. This allows it to deliver more coherent threat identification while filtering out most of the noise. XDR detects security threats across networks and endpoints by enhancing cross-network visibility to enhance security operations. This, naturally, leads to faster responses to security threats and an improved overall security posture. However, a gap in data quality tends to render this argument less effective for standard XDR tools.

This is where a single-vendor SASE cloud can extend the capabilities of XDR. Security teams get the needed visibility into all network and endpoint traffic flows over a single global cloud network to detect potential threats. It captures all security events in a single data lake, easily correlates and prioritizes threats, and presents them in a single management dashboard. In turn, security teams can view, understand, and act on these threats to eliminate risk to their organizations.

This is all possible with a SASE cloud because there is no integration or normalization required for the security data to be understood. This provides a higher quality of data to the XDR engine, which leads to more accurate threat detection and faster remediation. This is how the SASE cloud makes XDR more effective, reducing security risk.

When evaluating XDR, consider its value based on its ability to reduce complexity and improve threat detection and response times. Evaluate the platform that it’s built upon because this will also impact its effectiveness.

Related: XDR and the Age-old Problem of Alert Fatigue

Written By

Etay Maor is Vice President of Threat Intelligence at Cato Networks, a founding member of Cato CTRL, and an industry-recognized cybersecurity researcher. Prior to joining Cato in 2021, Etay was the chief security officer for IntSights (acquired by Rapid7), where he led strategic cybersecurity research and security services. Etay has also held senior security positions at Trusteer (acquired by IBM) and RSA Security’s Cyber Threats Research Labs. Etay is an adjunct professor at Boston College and is part of the Call for Paper (CFP) committees for the RSA Conference and Qubits Conference. Etay holds a Master’s degree in Counterterrorism and Cyber-Terrorism and a Bachelor's degree in Computer Science from IDC Herzliya.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.