{"id":19510,"date":"2022-04-07T13:56:12","date_gmt":"2022-04-07T09:56:12","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/choosing-xdr-vendor\/19510\/"},"modified":"2022-04-07T13:56:12","modified_gmt":"2022-04-07T09:56:12","slug":"choosing-xdr-vendor","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/choosing-xdr-vendor\/19510\/","title":{"rendered":"How to choose an XDR vendor"},"content":{"rendered":"<p>XDR (Extended Detection and Response) technology has already become one of the most conspicuous in the cybersecurity market. Its main advantage is its comprehensive approach to countering sophisticated cyberattacks. This is achieved by maximizing control over potential entry points and through the use of top-of-the-line tools for incident detection, threat hunting, investigation and response within a single incident-handling process.<\/p>\n<p>Leading information technology research and advisory agencies are paying special attention to the technology \u2013 describing it as the most promising for the coming years. It therefore comes as no surprise to see the list of XDR vendors growing rapidly as many new companies enter the market. Some vendors already offer full-fledged solutions, while others continue to build convergence among their IT-security products and upscale XDR functionality.<\/p>\n<p>Since the XDR concept is still in the making, let\u2019s figure out what to consider when choosing an XDR vendor. In our view, a reliable XDR supplier needs to be able to provide the following:<\/p>\n<h2>1.\u00a0\u00a0\u00a0\u00a0\u00a0 EPP and EDR synergy<\/h2>\n<p>An EDR (Endpoint Detection and Response) solution for advanced detection and response to sophisticated cyberthreats at the endpoint level is a key element of XDR. For its part, EDR cannot do its job properly without a robust EPP (Endpoint Protection Platform) solution \u2013 a fundamental endpoint protection technology that automatically sifts out a huge number of mass threats \u2013 on top of which EDR comes into play. So, when choosing an XDR vendor, you need to look carefully at the endpoint protection features to make sure there\u2019s support for various types of endpoints: PCs, laptops, virtual machines, mobile devices, and various operating systems (OS). The quality of an XDR solution depends directly on the synergy between EPP and EDR on the vendor\u2019s side.<\/p>\n<h2>2.\u00a0\u00a0\u00a0\u00a0\u00a0 Comprehensive threat intelligence<\/h2>\n<p>It goes without saying that reliable and up-to-date threat intelligence is vital in effectively countering modern cyberthreats. Effective response is impossible without a full overview of cybercriminal tactics and techniques. Therefore, IT-security experts who use an XDR solution must have access to comprehensive, up-to-date threat intelligence; this additional context improves process of incident investigation and response by speeding it up.<\/p>\n<h2>3.\u00a0\u00a0\u00a0\u00a0\u00a0 Interoperability with third-party solutions<\/h2>\n<p>Although XDR solutions are usually a single-vendor affair from the start, when comparing XDR solutions it\u2019s important to consider how well they integrate and interoperate with third-party solutions. Opting for an XDR solution with a strong ability in this regard would both help sustain IT-security investments and serve the main purpose of XDR: collect, correlate data and alerts from multiple IT-security components and provided on top additional cross-product scenarios to increase efficiency of complex incident response. The more sources of data the solution collects, the more complete the picture of what is happening in your infrastructure will be.<\/p>\n<h2>4.\u00a0\u00a0\u00a0\u00a0\u00a0 Technologies verified by independent experts and in practice<\/h2>\n<p>It is often difficult for organizations to independently evaluate the performance of intrinsically new solutions. In the case of XDR, it\u2019s important to understand that the idea behind it is the consolidation of various IT-security tools into a single concept. Hence, the different components that make up this novel technology need to have been:<\/p>\n<ul>\n<li>successfully implemented worldwide;<\/li>\n<li>tested extensively by independent organizations \u2013 such as MITRE, SE Labs, or AV-Test;<\/li>\n<li>recognized by international analytical agencies \u2013 such as Gartner, Forrester, or IDC.<\/li>\n<\/ul>\n<h2>5.\u00a0\u00a0\u00a0\u00a0\u00a0 Clear development plans<\/h2>\n<p>Since XDR is still a nascent infosec trend, potential buyers need to study (i) vendors\u2019 plans for development of their solutions\u2019 components, and (ii) vendors\u2019 roadmaps for system refinement. The more purposeful and clear such intentions are \u2013 and the more willingly they are shared \u2013 the more trustworthy the vendor.<\/p>\n<p>\u00a0<\/p>\n<p>Our enterprise-level security solutions working in conjunction provide XDR capabilities to your company\u2019s cybersecurity experts. Thanks to seamless interoperability our products allow your organization to control all key entry points to your infrastructure, increase visibility and provide centralized defense. If you want to learn more please visit\u00a0<a href=\"https:\/\/go.kaspersky.com\/expert?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=ae_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=ae_kdaily_organic_clm8sxksaqwj92k\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Expert Security web page<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What to look for when choosing an XDR vendor.<\/p>\n","protected":false},"author":2480,"featured_media":19511,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[2294,2315,2297],"class_list":{"0":"post-19510","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-edr","10":"tag-epp","11":"tag-xdr"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/choosing-xdr-vendor\/19510\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/choosing-xdr-vendor\/24023\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/choosing-xdr-vendor\/26345\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/choosing-xdr-vendor\/24292\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/choosing-xdr-vendor\/24646\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/choosing-xdr-vendor\/27059\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/choosing-xdr-vendor\/32974\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/choosing-xdr-vendor\/10611\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/choosing-xdr-vendor\/44063\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/choosing-xdr-vendor\/18735\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/choosing-xdr-vendor\/15903\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/choosing-xdr-vendor\/28440\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/choosing-xdr-vendor\/24888\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/choosing-xdr-vendor\/30372\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/choosing-xdr-vendor\/30140\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/xdr\/","name":"XDR"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2480"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19510"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19510\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/19511"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}