New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

Democratizing security with Open XDR

New York Tech Editorial Team by New York Tech Editorial Team
February 14, 2022
in Cybersecurity
0
Democratizing security with Open XDR
Share on FacebookShare on Twitter

There is no denying the notion of strength in unity. Similarly, inclusiveness and the broad participation of many is another idea that is widely cherished. These are both principles that are essential for achieving success in security in these challenging times.

Open XDR

Conventional security has separate tools, alerts, policies, procedures, teams, and reporting. At one time, this approach made sense by applying specialization to specific areas of the attack surface or data and computing infrastructure specific to the needs and vulnerabilities of each. Attacks were generally focused and not overly progressive.

Today, the challenge is more about finding the real indications of an attack early and less about trying to protect a certain part of the attack surface. There are nearly an unlimited number of vulnerabilities facing every organization, and they change frequently. Attackers have almost an infinite number of chances to penetrate infrastructure, explore it, find valuable assets and work towards exploiting them.

Successfully finding an attacker at work is less about discovering a single point of compromise—although that is still valuable—and more about seeing progression. The latest attack chain models reflect this idea. Seeing progression involves multiple points and multiple pieces of data. It may also involve the skilled processing or analysis of each tool. Data and findings need to be centrally collected, correlated, and analyzed as a whole to understand progression, see the early stages of an attack and rule out other abnormalities that are not relevant.

Democratizing security means that all data and findings can and should be considered. It is not about augmenting a particular platform, but rather about creating an open environment that accepts information from all tools and sources without restrictions due to technical or marketing limitations. It is possible that not all sources have the same “weight,” but it’s important that each has a “voice” that can be heard. Democratization is the ability to have the participation of all.

Combining all sources means not only that every stone will be turned to ensure we’re not missing some vital piece of information about ingress, egress, or anything in between. Lots of “dots” provide better resolution or fidelity (as any consumer of monitors or cameras can tell you) but also enable a more precise connection of the dots. Such an ability can elevate the paradigm of an unwieldy level of security alerts to one of far more accurate incidents. False positives can be ruled out for far more accuracy. The combination of broad participation and the strength of unity is becoming essential.

The traditional approach to security results in a state where a data breach, or something worse, is inevitable, and teams are taxed far beyond their ability. Security teams are already short-staffed and overworked. Hiring new or additional professionals is difficult due to the acute worldwide shortage. At the same time, companies are expecting security teams to become enablers of digital business and become more involved with risk, adding to already full plates or shifting time to these new demands.

Getting rid of existing tools and systems is not the answer. For the most part, each still has value, and most companies have sunk investments in them that are more than just monetary. Each tool also has investments of training time, procedures, rules, reporting and other things. Each still performs a function that has value in minimizing vulnerabilities, improving hygiene and stopping less sophisticated attacks.

The old mentality needs to be discarded—instead, we need to use these tools to stop the new era of attacks and move from an alert-centric to incident-centric security team. The tools can still be left in place, and their data and findings given over to a new approach. Jettisoning these tools is a bit like tossing out the baby with the bath water.

A highly experienced, robustly staffed security team could potentially gather all the data and alerts, correlate them manually and make better assessments of security events. Such an environment would be rare. The alternative is to employ the latest generation of Extended Response and Detection (XDR) that is beginning to be known as Open XDR. The value of this new type of XDR is that it accommodates all tools and all sources. It embodies democratization and inclusion to provide the necessary breadth and depth to find an attack quickly and accurately. Teams can then work to quickly stop attacks and mitigate or prevent damage.

There is strength in unity and democracy when it comes to security. It is rapidly becoming a necessity to those who want to survive or flourish in new realities.

Credit: Source link

Previous Post

Baringa and Retail Technology Show put focus on startup innovation — Retail Technology Innovation Hub

Next Post

Singapore and Switzerland Co-Organise Point Zero Forum to Discuss Innovation in Digital Financial Technology

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Singapore and Switzerland Co-Organise Point Zero Forum to Discuss Innovation in Digital Financial Technology

Singapore and Switzerland Co-Organise Point Zero Forum to Discuss Innovation in Digital Financial Technology

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
PointFive Secures Spot on Redpoint’s InfraRed 100, Cementing Its Role in Cloud Infrastructure’s Next Era

PointFive Secures Spot on Redpoint’s InfraRed 100, Cementing Its Role in Cloud Infrastructure’s Next Era

June 12, 2025
Alisha Outridge: Redrawing the Future of Tech, Leadership & Learning

Alisha Outridge: Redrawing the Future of Tech, Leadership & Learning

June 11, 2025
New Funding Backs Unibeam’s SIM-Driven Fix for Broken Authentication Systems

New Funding Backs Unibeam’s SIM-Driven Fix for Broken Authentication Systems

June 9, 2025
New York City

Why Bite-Sized Learning is Booming in NYC’s Hustle Culture

June 4, 2025
Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

June 4, 2025
Designer Paulina Raczkowska on UX, UI Design and the Power of Empathy in Product Design

Designer Paulina Raczkowska on UX, UI Design and the Power of Empathy in Product Design

June 2, 2025

Recommended

PointFive Secures Spot on Redpoint’s InfraRed 100, Cementing Its Role in Cloud Infrastructure’s Next Era

PointFive Secures Spot on Redpoint’s InfraRed 100, Cementing Its Role in Cloud Infrastructure’s Next Era

June 12, 2025
Alisha Outridge: Redrawing the Future of Tech, Leadership & Learning

Alisha Outridge: Redrawing the Future of Tech, Leadership & Learning

June 11, 2025
New Funding Backs Unibeam’s SIM-Driven Fix for Broken Authentication Systems

New Funding Backs Unibeam’s SIM-Driven Fix for Broken Authentication Systems

June 9, 2025
New York City

Why Bite-Sized Learning is Booming in NYC’s Hustle Culture

June 4, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech crypto cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media