Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

XDR is a Destination, Not a Solution

If we define XDR as a solution, SOCs can’t reach their ultimate destination because, as a solution, XDR can’t be a holistic approach

If we define XDR as a solution, SOCs can’t reach their ultimate destination because, as a solution, XDR can’t be a holistic approach

Extended Detection and Response (XDR) is the latest buzz word in the security industry and, as with any new technology development, in the early days there is a lot of confusion. Industry analysts each have their own definition. Meanwhile, security vendors are quickly jumping on the bandwagon, recasting their products as XDR solutions and spinning up their own definitions. 

Here is the problem…XDR is a destination, not a solution. Let me explain.

Unpacking XDR

Let’s step back and consider that the primary objective of today’s security operations centers (SOCs) is to address the detection and response use case. But the challenge is that on average organizations have more than 45 different security tools that for the most part don’t talk to one another, and they have teams that don’t work together. The promise of XDR is to enable detection and response across the enterprise, which requires ALL tools and ALL teams working in concert. How do you go from your current state to reach this destination? The promise is there, but the operational reality looks very different if you try to approach XDR as a solution.

Industry analysts have started writing about XDR, with widely differing definitions. Some state that XDR is vendor-locked and a cloud-based solution. Other analysts say XDR solutions require and build off of Endpoint Detection and Response (EDR) solutions. And some also claim there are different variations of XDR solutions using terms like native, open and hybrid amongst others. 

If the goal of XDR is to have detection and response across the infrastructure, across all attack vectors, should it be limited to only one vendor, only cloud? Yes, EDR is important for XDR, but so are SIEM, network detection and response and cloud security tools. Integrations with these tools, and others, are critical to truly have XDR. Does it matter what technology is the starting point? When we talk about XDR as a solution, it results in confusion.  

An Architectural Approach 

Advertisement. Scroll to continue reading.

Going back to the challenge of SOC optimization. SOCs are trying to become more efficient and effective and to accelerate detection and response across the enterprise by getting their tools and teams working together. This cannot be achieved if you look at XDR as a solution. Instead, XDR must be a holistic, architectural approach. An XDR architecture needs to include tools across different vendors; systems that protect at various enforcement points across your surface area of attack; security technologies that are cloud based and on premise.  

Over the past few years, we’ve seen a movement towards the construct of a single security architecture to accelerate detection and response. In 2016, John Oltisk of ESG defined and started using the term Security Operations and Analytics Platform Architecture (SOAPA) which includes a common distributed data service, a software services and integration layer, an analytics layer and a security operations platform layer. Today, Oltsik notes that “in ESG terms, XDR qualifies as a SOAPA.”

If we define XDR as a solution, SOCs can’t reach their ultimate destination because, as a solution, XDR can’t be a holistic approach. Organizations will end up with multiple XDRs from multiple vendors that still need to talk to one another, and security gaps will continue to exist for threat actors to exploit. 

However, when XDR is defined as an architectural approach that enables organizations to put all the pieces together, the promise can become a reality. Teams can work together, using the tools they are comfortable with and extending their capabilities with additional, integrated solutions for an end-to-end approach. It doesn’t matter where an XDR platform architecture starts from, and full rip and replace is off the table. SOCs can chart their own course and reach their destination of accelerated detection and response across the enterprise.

What do others think? 

Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet