Top 8 Extended Detection and Response (XDR)

CrowdStrike FalconSentinelOne Singularity CompleteCortex XDR by Palo Alto NetworksMicrosoft Defender for CloudMicrosoft 365 DefenderCynetTrend Micro XDRForescout Platform
  1. leader badge
    The solution offers great stability.The most valuable features are the complete IPS and IDS.
  2. leader badge
    The most valuble feature of SentinelOne Singularity Complete is the recovery and zero-day detection.The most valuable feature is that it does what it says it will do. It fulfills its claims. It’s not really common for products to do that today.
  3. Buyer's Guide
    Extended Detection and Response (XDR)
    May 2023
    Find out what your peers are saying about CrowdStrike, SentinelOne, Palo Alto Networks and others in Extended Detection and Response (XDR). Updated: May 2023.
    708,830 professionals have used our research since 2012.
  4. leader badge
    The tool's use cases are relevant to security. We can use Cortex XDR to get the entire graph of the incidents from source to destination, and we can take remedial action.
  5. leader badge
    DSPM is the most valuable feature.Defender is user-friendly and provides decent visibility into threats.
  6. For me, the advanced hunting capabilities have been really great. It allowed querying the dataset with their own language, which is KQL or Kusto Query Language. That has allowed me to get much more insight into the events that have occurred. The whole power of 365 Defender is that you can get the whole story. It allows you to query an email-based activity and then correlate it with an endpoint-based activity.
  7. The most valuable aspect of this solution is that it is a complete solution, which makes cyber security very free and almost perfect. There is no such thing as perfect cyber security, but as far as it can go, sign it comes close to being perfect and holistic. Cynet is always comprehensive from the perspective of functionality, as well as from the standpoint that it encompasses not only technology but also processes and people. The triad of people, processes, and technology is crucial and should always be in place. To my knowledge, no other product or platform combines all three components into one, but Cynet does.
  8. report
    Use our free recommendation engine to learn which Extended Detection and Response (XDR) solutions are best for your needs.
    708,830 professionals have used our research since 2012.
  9. It is a stable product. It works very well.For scalability, I would give a rating of ten out of ten.
  10. Forescout Platform's best feature is plug-in integration.Forescout has a feature that blocks the endpoint at the point of collection. It sets preconditions and will block the system if those aren't met.

Advice From The Community

Read answers to top Extended Detection and Response (XDR) questions. 708,830 professionals have gotten help from our community of experts.
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Dec 21 2022

Hi SOC analysts and other infosec professionals,

Which standard/custom method do you use to decide about the alert severity in your SOC? 

Is it possible to avoid being too subjective? How do you fight the "alert fatigue"?

Robert Cheruiyot - PeerSpot reviewer
Robert CheruiyotHi @Evgeny Belenky, I think as long as you do this thing manually, you will… more »
7 Answers
Ariel Lindenfeld - PeerSpot reviewer
Ariel Lindenfeld
Sr. Director of Community
PeerSpot

Let the community know what you think. Share your opinions now!

Enayat Galsulkar - PeerSpot reviewer
Enayat GalsulkarThreat Hunting, Threat Feed and Analytics.  Visibility and Co-Relation of… more »
7 Answers
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Hi infosec professionals, What are the main architectural differences between those two technologies? What are the relations between the two of them? Are they complementary? What does an XDR solution provide that SIEM doesn't and vice versa? Thanks for sharing your knowledge with the community!
Read More »
David Swift - PeerSpot reviewer
David SwiftSIEM focuses on correlation - detection, both known (and with UEBA), unknown/0… more »
6 Answers

Extended Detection and Response (XDR) Articles

Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager at PeerSpot (formerly IT Central Station)
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features...
Read More »
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Hi community members, As usual, this new Community Spotlight shares with you the latest articles, questions and trending discussions from your peers. Trending See what is trending at the moment and chime in to discuss! Top 8 Extended Detection and Response (XDR) Tools 2022 Would you reco...
Read More »
Ravi Suvvari - PeerSpot reviewer
Ravi SuvvariGood very informative
2 Comments
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Hi peers, Spotlight #6 is our fresh bi-weekly community digest. It helps you catch up on recent contributions by community members. Please comment below with your feedback about our new brand name and this Spotlight!  Trending Top RPA trends and forecasts that will help boost the techn...
Read More »
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky@Shibu Babuchandran ​and @Dominic-Gopal, thank you for contributing your… more »
reviewer1577907 - PeerSpot reviewer
reviewer1577907Thank you for this helpful post and congratulations on the new company name!
2 Comments
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Hi community members, Spotlight #2 is our fresh bi-weekly community digest for you. It covers cybersecurity, IT and DevOps topics. Check it out and comment below with your feedback! Trending What are the pros and cons of internal SOC vs SOC-as-a-Service? Join The Moderator Team at IT Ce...
Read More »

Extended Detection and Response (XDR) Topics

What problems does XDR solve?

Attackers target many layers of the IT environment, including the corporate network, email servers, and cloud systems. Security teams must build a security toolset that enables effective detection and response to security threats

Extended detection and response helps resolve both security and operational challenges. It is a security solution that:

  • Consolidates data from all layers of the IT environment - endpoints, network, email, cloud systems, etc.

  • Provides a single interface for security personnel to review and manage.

  • Automates triage and investigation.
How does XDR serve as a benefit for cybersecurity professionals?

Extended detection and response is designed to help security teams:

  • Identify highly sophisticated threats.

  • Identify hidden threats.

  • Track threats across the entire IT infrastructure.

  • Improve detection and response speed.

  • Effectively and efficiently investigate threats.
Is XDR an antivirus?

XDR is not an antivirus.

XDR is a centrally managed security solution that protects networks and all their endpoints from various threats. An antivirus is a standalone security solution that protects the individual system or device it is installed upon from various malware activities.

XDR, on the other hand, is a complete solution with multiple capabilities, including intrusion detection, data encryption, and firewalls, etc. An antivirus works like a subset of XDR that detects and removes malicious files.

What is the difference between EDR and XDR?

Endpoint detection and response (EDR) products monitor events generated by endpoint agents to look for suspicious activity. These solutions also collect data on suspicious activity and improve it with other contextual information from correlated events. However, EDR solutions do not offer integrations with other tools and data sources for full visibility.

XDR provides a wider view, integrating data from endpoint, cloud, identity, and other solutions, allowing for full visibility into an organization’s network and IT environments.

What is the difference between XDR and SIEM?

Security information and event management (SIEM) is a key element of the modern security operations center (SOC). SIEM pulls log data from dozens or hundreds of security tools to generate meaningful alerts and provides one interface for security analysis.

This is similar to XDR. However, SIEM only provides a summarized view of security data. This results in a very low level of detail.

SIEM cannot access or process additional information from other security tools to further investigate a specific incident.

In addition, SIEMs don’t have built-in response capabilities. SIEM is a detection tool that can identify security incidents but cannot stop or eradicate threats.

XDR has the following features that SIEM lacks:

  • Interaction with security tools: XDR retrieves information related to an incident and using that information, activates defensive measures to deal with that incident.

  • Unified data view: XDR accesses data drawn from multiple security layers, as opposed to the shallow data provided by SIEM. This enables querying and manipulation of in-depth data from security tools, such as cloud system entitlements or endpoint configuration data.

  • Artificial intelligence: XDR uses advanced machine learning and AI capabilities to improve alerting.
What is MDR and EDR?

Managed detection and response (MDR) is an outsourced service that offers dedicated personnel and technology to help companies improve the efficiency of security operations, threat identification, threat investigation, and threat response.

Endpoint detection and response (EDR) refers to a group of tools used to find and investigate threats to endpoint devices. EDR tools typically provide detection, analysis, investigation, and response capabilities.

Is XDR MDR?

Managed detection and response (MDR) solves challenges faced by security teams by strengthening a company's internal security team with external resources and personnel. An MDR service provider will offer an external Security operations center (SOC) that carries out the necessary actions to monitor and protect an organization’s IT assets. An MDR provider will likely use XDR solutions, but they will be controlled by external SOC analysts rather than an in-house team.

XDR solves security challenges by simplifying them and enabling in-house security teams to efficiently do their jobs. XDR unifies visibility across an organization’s security architecture and automates recurring and time-consuming tasks.

What are endpoint detection and response tools?

Endpoint detection and response tools integrate network, endpoint, cloud, and third-party data to prevent security attacks. XDR tools unify threat prevention, detection, investigation, and response all in one platform. XDR tools detect threats using behavioral analytics to help reveal the root cause of the threats.

XDR Tools Benefits

Some of the benefits of using XDR tools include:

  • Endpoint protection: Block known and unknown threats with endpoint protection. In addition, block malware, exploits, and other attacks with integrated AI-driven antivirus and security intelligence.

  • Data visibility: Collect and correlate data from any source to detect, investigate, and respond to threats.

  • Automatic attack detection: XDR tools provide out-of-the-box analytics and custom rules to detect advanced continuous threats and other covert attacks.

  • Unnecessary alert reduction: Simplify investigations with automated root cause analysis and a unified incident engine, reducing the number of alerts being sent.

  • Threat protection: Protect networks against internal and external attacks, ransomware, fileless and memory-only attacks, and advanced zero-day malware.

  • Swift recovery: Promptly remedy an attack by removing malicious files and registry keys, as well as restoring corrupted files and registry keys using remediation suggestions.

  • Third-party detection and response: Enable behavioral analytics on logs collected from third-party firewalls and consolidate third-party notifications into a unified report for analysis and investigation.
XDR Tools Features

When choosing an XDR tool, here are some features to look out for:

  • Single analyst interface: XDR tools provide a unified management workflow across the entire company’s security environment. This allows analysts to review attack stories and investigate incidents across all security silos in one place.

  • Unified visibility: XDR tools enable security visibility in a single dashboard across the network, endpoints, cloud environment, mobile devices, and any other part of the IT infrastructure.

  • Unified management console: Security teams have one central location to manage security configurations and policies throughout the entire IT environment.

  • Integrated platform: XDR tools have off-the-shelf, integrated, pre-tuned detection mechanisms for many types of security data. This enables IT teams to identify threats, investigate them, and respond, all in a short period of time from a unified interface.
Buyer's Guide
Extended Detection and Response (XDR)
May 2023
Find out what your peers are saying about CrowdStrike, SentinelOne, Palo Alto Networks and others in Extended Detection and Response (XDR). Updated: May 2023.
708,830 professionals have used our research since 2012.