EDR is Dead. Long Live XDR!
True EDR security requires redefining what an “endpoint” is and how we protect it
61% of data from Secureworks customers doesn’t come from endpoints, which means endpoints shouldn’t get 100% of your cybersecurity investment.
I hope that title got your attention. Do we believe EDR is really dead? No, at least not yet, but siloed EDR is also not the future of cybersecurity. Once upon a time, we thought of the devices on our networks as “endpoints.” To protect those endpoints, we built firewall fortresses around them. Now with remote work
Today, endpoints have become a more abstract concept where data can be gathered — nodes that can exist virtually anywhere, rendering the “endpoint” term an anachronism. Perimeters are no longer fences, but multidimensional attack surfaces that can expand, contract and otherwise morph as it includes every device, network segment, cloud, document, database and line of application code in your environment. Complexity doesn’t end there either, as threat surfaces also span supply chain partners and contractors.
Standalone endpoint detection and response (EDR) is no longer what it once was. It’s a vastly outdated view when considering organizations’ growing attack surfaces.
Telemetry has evolved and how we can maximize its value has changed. Security telemetry was once isolated to point solutions or noisy SIEMs, but now it needs to come from everywhere in the organization — also making it more valuable than ever. The evolution of telemetry over time represents the molecular structure of XDR — a technology which you simply must implement if your organization is to evade the ever-evolving cyber threat.
EDR as a Component of XDR
Cybersecurity is experiencing a shift from “defend the perimeter” to “Zero Trust.” Now it’s time to replace that old school EDR thinking with contemporary ideas that we can all rally around. Here are four brief things to consider when it comes to EDR security.
Recommended by LinkedIn
None of these points are meant to dismiss the importance of EDR security, which truly is an important piece of a holistic cybersecurity portfolio. But, cybersecurity in the 21st century is about a lot more than getting alerts from systems. It’s about leveraging all your technology, people and processes for the lowest total cost of ownership. In other words, maximum security with maximum value.
Speaking of Secureworks...
I’m blogging about EDR security because Secureworks just released a new version of our Taegis endpoint agent featuring cross-platform support from Windows to MacOS to Linux, real-time connectivity and industry leading performance with a low footprint. The agent with sundry other features that make it ideal for collecting endpoint telemetry feeding into our industry leading open Taegis XDR platform for optimal threat prevention, detection and response.
Now, because we’re open, we ingest telemetry from third-party endpoint vendors as well as hundreds of other data sources from cloud, network and business systems. However, we include our Taegis endpoint agent at no additional cost with our XDR solution, because the value is in the telemetry, not in a siloed endpoint approach. Security teams that combine endpoint telemetry with additional security telemetry, machine learning and expert human analysts will maximize their detection performance by reducing false positives and false negatives. After all, you want to own the signal, not the noise.
Also bear in mind that a move to Taegis XDR may also enable you to free yourself from the SIEM “tax” you’re paying simply to aggregate your security-related telemetry (assuming you’re a SIEM user). Taegis XDR performs that aggregation as an intrinsic platform function. You don’t need a separate, expensive database just to store that telemetry somewhere.
In other words, by moving to Taegis XDR you get:
Some 61% of data from Secureworks customers doesn’t come from endpoints, which means endpoints shouldn’t get 100% of your cybersecurity investment. Now is the time to take a panoramic view of your organization and get a real feel for your current security maturity
Written by Steve Fulton , Chief Product Officer