Today, active, fast and comprehensive threat detection and defense against cyber attacks is more important than ever. Companies are already using many different "threat detection and response" tools. The goal is to detect and report attack activities in a timely manner and thus significantly increase the level of security. EDR, XDR or MDR are currently considered relevant security responses to current and future threats: The days when the use of antivirus solutions was sufficient for solid protection of corporate networks are long gone.

EDR, XDR, MDR & Co.: What do companies need for their IT security?

Dealing with vulnerabilities remains one of the biggest challenges in information security, according to the German Federal Office for Information Security (BSI). In addition to sophisticated malware, IT security teams must also keep an eye on social engineering attacks, advanced persistent threats and malicious scripts. Behind the three letters of EDR, XDR or MDR and are “detection and response” models that detect, i.e. recognize, cyber threats and respond to them. The solutions and services are considered particularly relevant for securing a corporate network against cyber attacks where classic security measures are no longer effective.

What is Endpoint Detection & Response (EDR)?

Endpoints, i.e. all devices connected to a network, represent potential gateways for cyber threats: EDR stands for detection and response based on these endpoints. The focus is thus on increasing the visibility of anomalies on the endpoint. This is how EDR systems differ from other technical security solutions such as firewalls: protection takes place directly on the end devices and not at the network boundary. In the age of the Internet of Things and a sharp increase in the proportion of employees working from the home office, the number of endpoints in the company has also risen sharply among small and medium-sized enterprises. With Endpoint Detection & Response, endpoint activity is captured, logged and analyzed in real time to detect potential attacks early. The ability to centrally provide artifacts and traces left by attackers provides analysts with a comprehensive view of the overall security posture. EDR systems also significantly speed up responses. Rapid response is supported by extensive automation capabilities and the use of APIs.

Identified anomalies are reported by EDR solutions to IT security teams, which can then react promptly. EDR is primarily used by IT security analysts and the so-called “threat hunters”, specially trained IT security experts who use threat information to protect IT systems from attacks. EDR thus marks the first steps toward automated threat defense controlled by IT specialists.

What is Extended Detection & Response (XDR)?

Extended Detection & Response is an extended solution approach that takes the principles of EDR and adds automation approaches and the use of Artificial Intelligence (AI). XDR not only focuses on endpoints in the enterprise, but holistically monitors all traffic as well as applications within a network – this includes email, servers, endpoints, network as well as cloud workloads. By incorporating activity data from all levels of IT risk, XDR enables a layered defense strategy from just one consolidated management console.

The approach: An XDR Security Platform captures complete data from the IT infrastructure and stores it in a database. The data is automatically analyzed, sorted and prioritized and made available to IT security experts via a central dashboard. Analysts thus work with detailed and correlated threat information. In addition, an XDR solution provides them with automated response recommendations.

The analysis of detected attack activities is hardly possible with a purely manual evaluation due to the diverse parameters – this is where AI approaches come into play, among other things. With their support, an XDR system detects IT security threats comprehensively, reliably and, above all, quickly.

What can XDR do more compared to EDR?

XDR systems master threat detection and defense across a company’s entire IT infrastructure. A holistic picture of the threat situation is created – unlike EDR systems, which view IT security solely from the perspective of the endpoints. Accordingly, an EDR system can be a good starting point for increasing visibility on endpoints.

With XDR, this approach is extended to the network, email, app, cloud, container and user layers. Thus, correlations and machine learning can be used to trace attacks back to their source. For a reliable deployment of XDR solutions, an orchestrated system from a vendor’s portfolio of components is usually required.

What is managed detection and response (MDR) needed for?

MDR stands for managed detection and response of attacks. Here, the focus is not on technology, but on a service provided by specialized IT security service providers. As a managed service, MDR provides organizations with round-the-clock, 365-day-a-year security services from IT security teams specializing in IT infrastructure monitoring, IT security incident analysis and appropriate response. An external security analyst can take immediate defensive action upon detection and confirmation of a real threat.

MDR services, which are usually modular, can be called upon as a company needs them, relieving internal IT security teams of the time-consuming task of handling alerts. Another major advantage with Managed Detection & Response is that customers receive high-quality consulting services and a valuable transfer of knowledge.

When does MDR make sense for a company?

Few organizations have the appropriate tools in-house, as well as the necessary manpower and expertise, to manage a current security posture and proactively protect against new cybersecurity threats: Savvy IT security experts are in short supply on the job market. The more data is generated, the more complex threat detection becomes.

Therefore, a service provider is needed to detect, identify and respond to IT security threats, in whole or in part, as needed – and to do so quickly enough to avert or at least reduce significant damage. The use of MDR service providers that do exactly this will therefore play an increasingly important role in the IT security industry. Professional and state-of-the-art analysis tools coupled with the cyber defense expertise of the MDR service provider ensure that events are correctly interpreted, evaluated and that an appropriate response is made to actual threats. To do this, MDR experts typically draw on a combination of different host and network security layers. Ideally, MDR service providers should ensure 24/7 availability of their services.

When selecting an MDR provider, aspects such as the size of the company, existing IT security solutions, manpower, expertise and experience of the company’s own IT security team, and corporate guidelines should be included in the decision-making process.

Conclusion

Complex threat situations require efficient measures: Companies around the world are currently being targeted by cyber criminals and have to deal with espionage, extortion attempts or social engineering attacks. Accordingly, companies are building their cyber defenses in multiple layers – often with several tools deployed in parallel, each covering a specific threat scenario. Vast amounts of data are generated that need to be analyzed and overburden IT security team capacities.

As a managed service, MDR provides companies with security services from professional IT security teams around the clock, 365 days a year. Specialized in monitoring and analyzing IT security incidents, they can respond quickly. Similar to authorities and organizations with security tasks (BOS), IT security teams are used to extreme situations. Critical situations that are perceived as stressful by the company are handled routinely.

SECUINFRA SIEM Experts Team · Author

Managed SIEM & Co-Managed SIEM Experten

Das SECUINFRA SIEM Experts Team ist auf die Bereiche “Managed SIEM” und “Co-Managed SIEM” spezialisiert. Dabei führt das Team nicht nur die klassischen operativen SOC Tätigkeiten wie das Analysieren und Bewerten von SIEM Alarmen oder dem Threat Hunting durch, sondern konzeptioniert, implementiert und betreibt die SIEM-Umgebungen.

Das SECUINFRA SIEM Experts Team ist auf die Bereiche “Managed SIEM” und “Co-Managed SIEM” spezialisiert. Dabei führt das Team nicht nur die klassischen operativen SOC Tätigkeiten wie das Analysieren und Bewerten von SIEM Alarmen oder dem Threat Hunting durch, sondern konzeptioniert, implementiert und betreibt die SIEM-Umgebungen. Dazu gehören unter anderem die Wartung des SIEM-Systems, die Use Case Entwicklung und Weiterentwicklung inklusive Erstellen und Pflege von Audit-Logpolicies und Runbooks sowie die Überwachung der Log-Quellen-Anbindung. Als weiteren Mehrwert für unsere Kunden leiten unsere SIEM Experten erkannte Sicherheitsvorfälle nicht nur weiter, sondern unterstützen die Incident response Aktivitäten mit detaillierten Analyse-Informationen und Handlungsanweisungen.

Managed SIEM and Co-Managed SIEM experts

The SECUINFRA SIEM Experts Team is specialized in the areas of "Managed SIEM" and "Co-Managed SIEM". The team not only performs the classic operational SOC activities such as analyzing and evaluating SIEM alerts or threat hunting, but also designs, implements and operates the SIEM environments.

The SECUINFRA SIEM Experts Team is specialized in the areas of "Managed SIEM" and "Co-Managed SIEM". The team not only performs the classic operational SOC activities such as analyzing and evaluating SIEM alerts or threat hunting, but also designs, implements and operates the SIEM environments. This includes SIEM system maintenance, use case development and enhancement including creation and maintenance of audit log policies and runbooks as well as monitoring of log source connectivity. As a further added value for our customers, our SIEM experts not only forward detected security incidents, but also support the incident response activities with detailed analysis information and instructions for action.

Ramon Weil · Author

Founder & CEO

Ramon Weil ist Gründer und Geschäftsführer der SECUINFRA GmbH. Seit 2010 hat er SECUINFRA zu einem der führenden Unternehmen im Bereich der Erkennung, Analyse und Abwehr von Cyberangriffen in Deutschland entwickelt.

Ramon Weil ist Gründer und Geschäftsführer der SECUINFRA GmbH. Seit 2010 hat er SECUINFRA zu einem der führenden Unternehmen im Bereich der Erkennung, Analyse und Abwehr von Cyberangriffen in Deutschland entwickelt. Vor der Gründung von SECUINFRA war Ramon mehr als 20 Jahre im Bereich IT & IT-Security tätig. Unter anderem hat er bei Siemens im Security Operation Center (SOC) gearbeitet, den Back Level Support für IT-Security Produkte bei Siemens aufgebaut und weltweit IT- Security Projekte umgesetzt und geleitet. Von 2006 bis zur Gründung von SECUINFRA hat Ramon das IT-Security Geschäft für Siemens und später Nokia Siemens Networks (NSN) in der Region Asia Pacific (APAC) aufgebaut. Neben zahlreichen IT-Security Produkt-Zertifizierungen ist er seit 2006 CISSP und seit 2010 CISM.

Founder & CEO

Ramon Weil is founder and managing director of SECUINFRA GmbH. Since 2010, he has developed SECUINFRA into one of the leading companies in the field of detection, analysis and defense against cyber attacks in Germany.

Ramon Weil is founder and managing director of SECUINFRA GmbH. Since 2010, he has developed SECUINFRA into one of the leading companies in the field of detection, analysis and defense against cyber attacks in Germany. Before founding SECUINFRA, Ramon worked for more than 20 years in the field of IT & IT security. Among other things, he worked at Siemens in the Security Operation Center (SOC), established the back level support for IT security products at Siemens and implemented and managed IT security projects worldwide. From 2006 until the foundation of SECUINFRA, Ramon built up the IT Security business for Siemens and later Nokia Siemens Networks (NSN) in the Asia Pacific (APAC) region. In addition to numerous IT security product certifications, he has been a CISSP since 2006 and a CISM since 2010.
Beitrag teilen auf: