{"id":17821,"date":"2020-12-04T23:13:45","date_gmt":"2020-12-04T23:13:45","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=17821"},"modified":"2023-08-16T21:32:28","modified_gmt":"2023-08-16T21:32:28","slug":"xdr-emerges-as-a-key-next-generation-security-tool","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/","title":{"rendered":"XDR Emerges as a Key Next-Generation Security Tool"},"content":{"rendered":"\n<p><span style=\"font-weight: 400;\">Corporate networks are complex, and so is the myriad of cybersecurity solutions that protect them. Trying to manage all the security tools in a comprehensive way can leave security teams overwhelmed.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.esecurityplanet.com\/products\/xdr-security-solutions\/\">Extended detection and response<\/a> (XDR) solutions are a new attempt to unify all those security tools. They&#8217;re designed to consolidate multiple products into a unified security solution that provides automated monitoring, analysis, detection, and remediation. The goal is to increase detection accuracy while simultaneously improving remediation and security operations efficiency. The advantages of XDR are considered to be so promising that Gartner named XDR the <\/span><a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/gartner-top-9-security-and-risk-trends-for-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">number one security trend<\/span><\/a><span style=\"font-weight: 400;\"> to come out of 2020.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">What is XDR?<\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">One of the main goals of XDR solutions is enhanced detection and response capabilities. XDR unifies visibility and control across all endpoints, the network, and cloud workloads. This improved visibility provides contextualization of these threats to assist with remediation efforts. Not only does it help protect against modern attacks, but also future unknown attacks as they emerge.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">XDR also provides integration between data sources and security operations. By collecting and analyzing data from multiple sources to validate threat alerts, it is able to reduce the occurrence of false positives and the overall number of alerts. When security teams can focus their efforts only on real threats, they save precious time.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">XDR shares <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">SIEM<\/span><\/a><span style=\"font-weight: 400;\">&#8216;s ability to pull together data for a unified view of security, but unlike SIEM, XDR is an actual collection of products merged into a single solution. You can expect all XDR products to include <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Endpoint detection and response (EDR)<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/threat-intelligence-and-analytics-staying-ahead-of-cyber-criminals\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">threat intelligence and analytics<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">antivirus software<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/types-of-firewalls\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">firewalls<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">data encryption<\/span><\/a><span style=\"font-weight: 400;\">, among other technologies.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Palo Alto Networks was the first to introduce the concept of XDR in 2018 with Cortex XDR. The company&#8217;s goal was to provide security teams with a higher level of threat awareness and the tools to eliminate vulnerabilities beyond what EDR could offer. Cortex XDR comprises an assortment of capabilities, including the following:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Next-generation antivirus:<\/b><span style=\"font-weight: 400;\"> This advanced antivirus software can block the latest malware, ransomware, exploits and fileless attacks.<\/span><\/li>\n\n\n\n<li><b>Endpoint protection:<\/b><span style=\"font-weight: 400;\"> A combination of device controls, host firewalls and disk encryption secure all endpoints in a network.<\/span><\/li>\n\n\n\n<li><b>Detection and response:<\/b><span style=\"font-weight: 400;\"> Cortex XDR uses AI-driven analytics to pinpoint the location of vulnerabilities, identify the root cause of the issue and coordinate response efforts.<\/span><\/li>\n\n\n\n<li><b>Managed threat hunting:<\/b><span style=\"font-weight: 400;\"> With help from Palo Alto Network&#8217;s Unit 42 experts, you can uncover complex and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">advanced persistent threats (APT)<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n\n\n\n<li><b>Threat intelligence:<\/b><span style=\"font-weight: 400;\"> Cortex XDR can collect data from a global community of researchers and organizations to extend visibility and enrich investigations with in-depth contextualization.<\/span><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">EDR vs. MDR vs. NDR vs. XDR<\/h2>\n\n\n\n<p>From the birth of EDR as a security solution space in 2013 by a Gartner analyst, three generally accepted offshoots exist.&nbsp;<\/p>\n\n\n\n<p>As EDR became a more widely accepted security service, it was a matter of time before managed service providers (MSP) would offer their expertise for a price. MDR vendors can provide clients with traditional EDR security, SOC resources, and IDPS capabilities. One can expect MDR vendors are en route to adding more XDR features to their managed IT solutions.<\/p>\n\n\n\n<p>Unlike EDR, which focuses on endpoints at the network perimeter, an alternative solution dubbed network detection and response (NDR) by Gartner in 2020 manages the internal network data and workloads. While NDR might be less familiar, it plays into how XDR improves upon its predecessors and covers end-to-end infrastructure segments.<\/p>\n\n\n\n<p>The following graphic touches on some of the critical differences between the detection and response family of solutions.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1425\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/07\/ESP.TypesofDR.png\" alt=\"A graphic designed by Sam Ingalls that show how EDR, MDR, NDR, and XDR differ in their capabilities .\" class=\"wp-image-18844\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.TypesofDR.png 2560w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.TypesofDR-300x167.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.TypesofDR-1024x570.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.TypesofDR-768x428.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.TypesofDR-1536x855.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.TypesofDR-2048x1140.png 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.TypesofDR-150x84.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.TypesofDR-696x388.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.TypesofDR-1068x595.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.TypesofDR-1920x1069.png 1920w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><figcaption class=\"wp-element-caption\">Designed by Sam Ingalls. \u00a9 eSecurityPlanet 2021.<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Contextualize threats<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">The broad umbrella of solutions encompassed in XDR solutions provides a holistic perspective over a network&#8217;s security. An XDR product collects and correlates data across email, endpoints, servers, cloud workloads and networks. It then applies situational security context to reduce noise and expedite identification of the root cause of the threat.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Benefits of XDR<\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">There are many benefits to implementing XDR into your security infrastructure. Ultimately, you&#8217;ll gain improved protection, detection and response capabilities. Even with large investments in security, detection and response times can still be slowed down due to a large number of data streams from different products that must be analyzed. XDR tools can centralize all of this data into a single repository, making it much easier to get a holistic view of potential threats.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Properly maintaining network security requires constant attention. This can leave security teams stretched thin, executing time-consuming tasks that take away from more important work. But they must be carried out nonetheless. XDR tools were designed to improve the efficiency of security operations with extensive automation capabilities, such as monitoring for abnormalities, pulling information from relevant data sources, sending out alerts, and even implementing remediation efforts.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">If your security budget is a concern, XDR may be a good option. Without the need to pay for multiple licenses and SaaS subscriptions, you may ultimately see a lower total cost of ownership and reduced overhead.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Elements of XDR<\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">The elements of XDR can be boiled down to three main components:<\/span><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Detection<\/strong><\/p>\n\n\n\n<p>Robust analytics that combines endpoint data collection with a growing list of security controls means XDR software can identify more advanced threats.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Investigation<\/strong> <\/p>\n\n\n\n<p>A highly contextualized view from XDR tools makes identifying the root cause of issues a much quicker process.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Recommendations<\/strong> <\/p>\n\n\n\n<p>XDR tools can provide query recommendations to security teams to help further an investigation. They can also offer counsel on responding to threats and remediation.<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Risks of XDR<\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">As with any new product that enters the market, there is potential for unseen consequences, the biggest of which in this case is vendor lock-in. Organizations often use a combination of vendors to fill out their security infrastructure. But if all the security solutions you need are wrapped up in one product from a single vendor, then you&#8217;re locked in. This isn&#8217;t a major issue if you&#8217;re a happy customer, but if you find that one aspect of the product is not working for your business needs, or the tech support offered by the vendor is less than satisfactory, there may not be much you can do about it.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Efficiency is a cornerstone principle for XDR products. They automate certain processes, grant high-visibility to security teams and free up time for them to work on other projects. But if you focus too much on efficiency and how quickly teams are getting things done, you risk sacrificing efficacy in the process. Don&#8217;t get too caught up in streamlining all security tasks. You should still regularly review the efficacy of your XDR solution.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">XDR platforms are increasingly showing up in vendors&#8217; catalogs, but they are by no means commonplace yet, so there are currently limited XDR vendors to choose from. But given all of the issues they can resolve if pieced together and operated properly, you will likely see more options available in the near future.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Top XDR vendors<\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Because XDR is a newer industry, the vendor who do offer it are powerhouse names in the industry. Some of the vendors to make our list of top XDR solutions this year include:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Trend Micro<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Palo Alto Networks<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Cynet<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Crowdstrike<\/span><\/li>\n<\/ul>\n\n\n\n<p>Learn more about the emerging, comprehensive technology and the budding XDR market in our <a href=\"https:\/\/www.esecurityplanet.com\/products\/xdr-security-solutions\/\">Top XDR Solutions<\/a>.<\/p>\n\n\n\n<p>This article was updated by <a href=\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\">Sam Ingalls<\/a> on July 17, 2021.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6ec12e321a-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ec12e321a\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ec12e321a\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ec12e321a\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ec12e321a\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ec12e321a\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ec12e321a\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Corporate networks are complex, and so is the myriad of cybersecurity solutions that protect them. Trying to manage all the security tools in a comprehensive way can leave security teams overwhelmed. Extended detection and response (XDR) solutions are a new attempt to unify all those security tools. They&#8217;re designed to consolidate multiple products into a [&hellip;]<\/p>\n","protected":false},"author":161,"featured_media":17822,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[23445,30578],"b2b_audience":[33,30,31,32],"b2b_industry":[48],"b2b_product":[385,378,65,375,379],"class_list":["post-17821","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-endpoint-detection-and-response","tag-xdr","b2b_audience-awareness-and-consideration","b2b_audience-large-enterprise","b2b_audience-medium-business-enterprise","b2b_audience-small-business-enterprise","b2b_industry-industry","b2b_product-cloud-saas-and-hosted-security-services","b2b_product-endpoint-security","b2b_product-product-and-service","b2b_product-security-management","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>XDR Software Emerges as a Key Next-Generation Security Tool<\/title>\n<meta name=\"description\" content=\"Extended detection and response (XDR) solutions unify security products to improve detection, response and operations efficiency.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"XDR Software Emerges as a Key Next-Generation Security Tool\" \/>\n<meta property=\"og:description\" content=\"Extended detection and response (XDR) solutions unify security products to improve detection, response and operations efficiency.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-04T23:13:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-16T21:32:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/productivity-1995786_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1122\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kyle Guercio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kyle Guercio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/\"},\"author\":{\"name\":\"Kyle Guercio\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fcdece1299767aff305bb146ab672b20\"},\"headline\":\"XDR Emerges as a Key Next-Generation Security Tool\",\"datePublished\":\"2020-12-04T23:13:45+00:00\",\"dateModified\":\"2023-08-16T21:32:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/\"},\"wordCount\":1225,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/productivity-1995786_1920.jpg\",\"keywords\":[\"endpoint detection and response\",\"XDR\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/\",\"name\":\"XDR Software Emerges as a Key Next-Generation Security Tool\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/productivity-1995786_1920.jpg\",\"datePublished\":\"2020-12-04T23:13:45+00:00\",\"dateModified\":\"2023-08-16T21:32:28+00:00\",\"description\":\"Extended detection and response (XDR) solutions unify security products to improve detection, response and operations efficiency.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/productivity-1995786_1920.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/productivity-1995786_1920.jpg\",\"width\":1920,\"height\":1122,\"caption\":\"Man at a laptop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"XDR Emerges as a Key Next-Generation Security Tool\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fcdece1299767aff305bb146ab672b20\",\"name\":\"Kyle Guercio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a28973bbf29322be5ea89bd09def6a83?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a28973bbf29322be5ea89bd09def6a83?s=96&d=blank&r=g\",\"caption\":\"Kyle Guercio\"},\"description\":\"Kyle Guercio has worked in content creation for six years contributing blog posts, featured news articles, press releases, white papers, and more for a wide variety of subjects in the technology space. He covers topics relating to servers and cybersecurity and has contributed to ServerWatch and Webopedia.com.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/kyle-guercio\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"XDR Software Emerges as a Key Next-Generation Security Tool","description":"Extended detection and response (XDR) solutions unify security products to improve detection, response and operations efficiency.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/","og_locale":"en_US","og_type":"article","og_title":"XDR Software Emerges as a Key Next-Generation Security Tool","og_description":"Extended detection and response (XDR) solutions unify security products to improve detection, response and operations efficiency.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/","og_site_name":"eSecurity Planet","article_published_time":"2020-12-04T23:13:45+00:00","article_modified_time":"2023-08-16T21:32:28+00:00","og_image":[{"width":1920,"height":1122,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/productivity-1995786_1920.jpg","type":"image\/jpeg"}],"author":"Kyle Guercio","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Kyle Guercio","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/"},"author":{"name":"Kyle Guercio","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fcdece1299767aff305bb146ab672b20"},"headline":"XDR Emerges as a Key Next-Generation Security Tool","datePublished":"2020-12-04T23:13:45+00:00","dateModified":"2023-08-16T21:32:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/"},"wordCount":1225,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/productivity-1995786_1920.jpg","keywords":["endpoint detection and response","XDR"],"articleSection":["Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/","url":"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/","name":"XDR Software Emerges as a Key Next-Generation Security Tool","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/productivity-1995786_1920.jpg","datePublished":"2020-12-04T23:13:45+00:00","dateModified":"2023-08-16T21:32:28+00:00","description":"Extended detection and response (XDR) solutions unify security products to improve detection, response and operations efficiency.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/productivity-1995786_1920.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/productivity-1995786_1920.jpg","width":1920,"height":1122,"caption":"Man at a laptop"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"XDR Emerges as a Key Next-Generation Security Tool"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fcdece1299767aff305bb146ab672b20","name":"Kyle Guercio","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a28973bbf29322be5ea89bd09def6a83?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a28973bbf29322be5ea89bd09def6a83?s=96&d=blank&r=g","caption":"Kyle Guercio"},"description":"Kyle Guercio has worked in content creation for six years contributing blog posts, featured news articles, press releases, white papers, and more for a wide variety of subjects in the technology space. He covers topics relating to servers and cybersecurity and has contributed to ServerWatch and Webopedia.com.","url":"https:\/\/www.esecurityplanet.com\/author\/kyle-guercio\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/17821"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/161"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=17821"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/17821\/revisions"}],"predecessor-version":[{"id":31492,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/17821\/revisions\/31492"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/17822"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=17821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=17821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=17821"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=17821"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=17821"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=17821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}