Industry Trends, Research, Security Operations
Survey Says: A Modern SOC Requires XDR
XDR is a relatively new term in the security tools landscape. It stands for Extended Detection and Response – the approach that security operations centers should extend visibility and analysis to include threat intelligence, telemetries, vulnerabilities, and other relevant IT information. XDR is built to accelerate detection and response and reduce security engineering headaches that plague security operations teams.
What are the challenges with current approaches to detection and response? Should you displace your current SIEM? What about the cloud?
Let’s talk about it. Join Respond Software as we host a live chat with Dave Gruber, Senior Cybersecurity Industry Analyst, from ESG. Dave will discuss the key findings from the latest industry research on XDR in the ESG eBook, The Impact of XDR in the Modern SOC. Hosted by Mike Epplin, Solutions Architect, get the definitive roadmap for everything you need to modernize the SOC.
We will explore why XDR is so important for security teams to address today’s advanced attacks, how organizations are approaching XDR implementations, and what core outcomes can be expected. If you are evaluating XDR, join us here on BrightTALK on December 2 at 11 am ET. You don’t want to miss it!
Source: ESG eBook, The Impact of XDR in the Modern SOC – Taking Detection and Response to the Next Level, November, 2020.
Security Analysts, Security Operations
To XDR or Not to XDR? How XDR Can Supercharge the Modern SOC
The security operations center (SOC) will never keep up with information overload. CISOs are challenged to transform the paradigm so the investments in people payoff, while reducing attrition and making security work fun. Automation is only just part of the solution.
Modern security operations need to abandon the current model bogged down by formalities in process and procedure to one that is incident-aware, and situation focused. As enterprises deploy solutions for endpoint detection and response (EDR), security teams are realizing that they also need tools and strategies that are more all-encompassing to include threat intelligence, cloud services, SOAR, and next-gen SIEM, among others. So, where is the SOC to go from here?
Join Chris Triolo, Chief Customer Officer at Respond Software, as he welcomes Jackie Groark, VP of Security and CISO at Veristor. Triolo and Groark will explore the promise of Extended Detection and Response (XDR) and start a discussion on how to supercharge automation and effectiveness in the security operations center.
Product, Security Operations
Remediate Incidents Faster | The Respond Analyst & Splunk Phantom
The Respond Analyst investigates, scopes, triages, and correlates events, increasing the incident remediation capabilities of Phantom. The combination of the Respond Analyst and Phantom will result in reduced attack dwell time for customers that have or are considering the use of both solutions.
Learn how The Respond Analyst & Phantom integrate together to streamline incident remediation.
Research, Security Operations
Investigate Security Incidents at Machine Speed
Security analysts are the detectives of the Security Operations Center; investigating suspicious alerts and events, corroborating related evidence from multiple sensors, threat intelligence, and company context. The security analyst position is pivotal, yet they still face manual challenges of connecting pieces of evidence; having to chase false positives, or pivoting between different consoles. In the likeness of how the evidence board enables detectives to collect and connect evidence from a crime, XDR solutions enable our security detectives to detect, investigate and respond to incidents more efficiently and effectively. An open XDR works with the best-of-breed security telemetries to correlate the probability of a security event being malicious and actionable. Security analysts receive a fully scoped investigation, from the first suspicious alert through the entire malicious scenario that occurred in the environment, all mapped to the MITRE ATT&CK Framework.
The Respond Analyst is a simple, open, and intelligent XDR Engine:
- Simple – cloud-native and deploys in hours without coding or content writing
- Open – vendor-agnostic integrations modernize the sensor grid, no rip & replace
- Intelligent – powered by Integrated Reasoning, the combination of data science and automated analysis from multiple sources determines the
likelihood of an event being malicious and actionable
Join Mike Epplin, Solutions Architect, for the technical Q&A and on-demand demo of the Respond Analyst, an XDR Engine.
Research, Security Operations
What is XDR and How Will it Impact the SOC?
XDR is the hottest new category in cybersecurity.
eXtended Detection and Response (XDR) solutions offer streamlined security incident detection through unified security sensor integrations that enable the Security Operations teams to respond to threats more effectively and efficiently and promise to eliminate much of the costly and painful security engineering that mature SIEM and SOAR solutions require. Cybersecurity professionals are no strangers to vendor saturation, so how do security leaders find the best XDR solution for their enterprise?
In this webcast, Marilyn Littell, VP of Software Solutions, and Jeff Smith, VP of Digital Transformation Technologies at IIS, discuss the key considerations for evaluating the operational and business costs/benefits of implementing an XDR solution.
Joined by guest Dan Lamorena, CMO of Respond Software, the interactive discussion focuses on answering these three questions:
1. What are the key benefits of an XDR, and do we need them?
2. What is beneath the hood in an XDR, and will it effectively find real events in our environment?
3. What are the considerations we should have when building out a shortlist of vendors?
Research, Security Operations
Connect the Dots of Your Security Evidence
Security analysts are swimming in a sea of alerts. They end up staring screens and multiple consoles instead of the real cyber detective work of finding attackers. Current SOC tools only fill in some of the blanks and require constant tuning and maintenance. There is a better way.
Leading SOC builder and co-founder of Respond Software, Chris Calvert has helped many organizations change their SOC from a reactive posture to one that is proactive in finding the bad guys. Attend this live webinar to hear from Chris about the new product category of XDR (Extended Detection and Response) and how organizations are deploying XDRs to detect and respond to attacks faster at a fraction of the cost.
Join our growing community! Subscribe to our newsletter, the "First Responder Notebook," delivered straight to your inbox.