Lead Machine Pink 160x1200

Lead Machine Pink 160x1200

iTWire TV 705x108

Thursday, 28 October 2021 09:56

How an intelligence-driven approach can close the extended detection and response gap

By Stree Naidu, senior vice president and general manager, Anomali

GUEST OPINION: Threat detection isn’t getting any easier. Today’s hackers are escalating the number of attacks they launch, going after more targets, using increasingly sophisticated techniques, and achieving their goals through a surreptitious approach.

With more than 2,000 security vendors catalogued and organisations reporting an average of 45 security solutions deployed, why aren’t we any closer to solving the threat detection gap?

To answer this question, we first need to ask, what are we trying to achieve? For years now, we have known that the “whack-a-mole” approach of detecting discrete threats is at best a stopgap for the next inevitable attack. At a high level, most would likely agree that the always-shifting nature of adversaries, emergence of new vulnerabilities and exploits, and the all-menacing “zero-day” leads to the continued proliferation of incidents ranging across data breaches, ransomware, and cyber espionage.

As soon as we close one door to attackers, they find and open another. This has always been the case. There’s more to this though. We think some of the answer can be found in the failure to fully optimise and connect existing tools, processes, and people to give them broader visibility over traffic and threats moving in and out of their networks while layering in detection and response capabilities.

An industry analyst said recently: “We’ve reached an inflection point. Enterprises know that the resources needed to greatly improve their security operations exist, they are now hungry to start using them to their maximum potential.”

In other words, we know the goods are available, how do we start using them to better find and neutralise the bad actors?

Enter extended detection and response (XDR)
Lately XDR has become the white-hot name in the security world. Scores of vendors are entering the fray, ranging across from small start-ups to established 500kg gorillas. Dozens of industry analysts are quickly validating XDR as more than just a buzzword, with Gartner adding XDR to the ‘innovation trigger’ on the newly-created Security Operations Hype Cycle.

As a long-time member of the security technology community, I can add that while we have certainly seen enthusiasm for trends at different periods, the level that XDR is generating reminds me of three other significant movements that changed the course of computing and security.

The first was for Security Information and Event Management (SIEM). The second was during the ‘big data’ era. The third was for ‘cloud’, which in many ways has been reinvigorated due to COVID.

XDR: What is it?
Multiple definitions exist. We think of XDR as an architecture and in terms of how enterprises can leverage it to maximise the performance of their overall security investment (people, technologies, services) to take action against threats at the fastest possible speed.

As leaders in the threat intelligence market and with deference to the essential role that global threat intelligence plays in accelerating detection and response, we offer the following working definition: “Organisations that run on top of XDR architectures are able to move closer to managing their security infrastructure as an integrated, unified platform. With XDR, security operations centres (SOCs) can break silos to converge all security data and telemetry collected and generated by security technologies they’ve deployed (tech that includes firewalls, EDR, CASB, SIEM, SOAR, and TIP).”

With this information, they can generate strategic threat intelligence that empowers immediate threat detection, streamlined investigations, and high-performance, automated-response capabilities that isolate and mitigate threats before they escalate into costly and disruptive incidents.

Certainly, there are deeper and more technical discussions to be had, specific to each of these capabilities, which we’ll save for another time. For now, we think this definition works, although we also expect it will evolve as new lessons are learned and innovations introduced.

XDR: The early days?
XDR is perceived as new (added to the hype cycle just over eight months ago). Although there is hype, it is a very real and tangible movement within the security market with a level of momentum we haven’t experienced in close to a decade.

We’re intrigued by the emergence of attention and excitement around XDR. Not only because it is ushering in acceptance of an available leap forward when it comes to closing the gap between information gathering, detection, and response, but also in many ways because it validates what Anomali has been delivering to the market all along.

Seven years ago, we recognised that organisations needed a way to collect, aggregate, analyse, and operationalise threat intelligence, which led to the development of Anomali ThreatStream, an early enterprise threat intelligence platform (TIP).

Shortly after, we introduced Anomali Match, opening new opportunities for our customers to further optimise intelligence by immediately matching internal threats against external threats.

As it turns out, these innovations were supporting a key XDR layer—threat intel. Before XDR was XDR, we were extending the ability to collect and manage unlimited levels of threat data, making it available for investigations, enabling internal threat detection by matching it against all telemetry, and helping to power faster response by operationalising intelligence across security infrastructures.

XDR, COVID, and the Cloud
No future vision of any technology can be presented without acknowledging what impact the cloud is going to have on it, and the same can now be said of COVID. Any enterprise that wasn’t a cloud operation prior to the pandemic is certainly one now. Organisations that have made it through this past year aren’t going to descend from the cloud—ever.

The cloud provides consistent access in a world characterised by uncertainty. People may not be allowed into the office, but they can always connect from remote locations. Sales reps may not be able to travel to customer locations, but they can always meet virtually. Marketers may no longer have access to trade shows, but they are finding ways to keep their organisations relevant through virtual events. For businesses, leaders, and employees, the cloud has become essential to survivability.

The ability to scale fast enough for millions of workers and processes to shift from the office to a remote reality could be handled only because of the cloud. For security operations, the cloud has created new challenges.

Overnight, millions of endpoints connected to corporate networks via at-home WiFi, meetings started taking place over vulnerable video and chat applications, data became cloud-native, patching and vulnerability scanning backlogged. This sea of change wasn’t missed by adversaries, which are taking advantage of it all.
To meet the present and keep pace with the future, XDR has to move into the cloud as well. It’s the only way it will be able to scale alongside the new IT infrastructure reality.

Remember when Big Data burst onto the scene? As it quickly became part of the Silicon Valley vernacular, everywhere we turned there were vendors “differentiating” by claiming that their solutions were “Big Data Ready.” As it turned out, this wasn’t all hype. Security technologies that could handle massive data volumes ended up in the winners’ column.

In that same vein, soon we are certain to see vendors start differentiating their XDR by marketing around terms like “Cloud Native.” Although much of this will be marketing, enterprises should demand that vendors can do XDR in the cloud before investing.

XDR: The end game
Gaining the ability to holistically manage a security infrastructure, extend a unified set of tentacles across it, ingest every bit of security data available, apply analytics to it, and then use it to automate threat detection and response has always been a goal of security.

Unattainable? Maybe not. Established players are committing huge resources to bringing XDR solutions to market. Disruptive start-ups are eager to contribute. Enterprises have everything to gain from the efficiency and risk reduction benefits it promises to provide. It’s worth keeping an eye.


Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinatrs and campaigns and assassistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

INTRODUCING ITWIRE TV

iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!

BACK TO HOME PAGE
Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments