No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

What C-Suite Leaders Need to Know About XDR

July 17, 2023
in Protection
0
KnowBe4 Launches Password Kit to Celebrate World Password Day


Extended detection and response (XDR) was coined by Nir Zuk at Palo Alto Networks in 2018 to address challenges in siloed approaches to data analysis for security. Previous approaches focused on a single type of device or area, such as endpoint, network, or user behavior, thereby missing context and indicators from other areas that could have identified risk.

XDR analyzes all these focus areas, bringing them into a holistic platform that can understand all the data involved in an event. Then it provides tracking and remediation steps across the entire environment to help the security operations center (SOC) respond to malicious or risky events.

What Is XDR?

Enterprises often raise challenges around visibility and difficulty understanding which security events in their environments are significant. Palo Alto Networks realized there was a gap between the focused, siloed products vendors release and the broad coverage of a unified platform enterprises need. XDR was designed to bridge this gap by connecting information from all sides of an enterprise IT infrastructure.

It is exceptionally important to include a machine learning engine to analyze this massive increase in raw data. Machine learning verifies that only significant events would be brought to an analyst’s attention so that they are not drowned in unactionable or irrelevant alerts.

The “X” in XDR is key to this philosophy of extending detection and response to any and every IT operation. To demonstrate this, Palo Alto Networks created a vision map of how XDR came about and where it is expected to grow in the future.

How Is XDR Important in Cybersecurity?

Moving from segregated datasets for endpoints, networks, and threats into a single platform that aggregates these and other areas creates a fundamental shift in how enterprises can understand their entire security operations and IT landscape. Having a single view for everything reduces missed significant events, false positives, false negatives, skill barriers, and manual aggregation and reporting. Analyzing these combined data sets with machine learning has already transformed how businesses can handle the shift in cybercrime — from individual “hacktivists” to cybercrime businesses to nation-state level operators — and the increasingly complex attacks expected from this evolution.

How Has the Market Responded to XDR?

Many vendors are begrudgingly adopting the term XDR while trying as hard as they can to pass off their endpoint detection and response (EDR), network detection and response (NDR), or network traffic analysis (NTA) products as XDR. Multiple vendors have redesigned their user interface to present all the information as a “unified single source” without changing the underlying application to ingest data from all sources; they’re merely showing their siloed data streams in one view.

There has also been a rise in new players who are focused on gaining in-depth visibility but do not have coverage across all the different types of equipment that make up an IT infrastructure. This leaves holes in the information they can present.

Finally, and most egregiously, other vendors are releasing products without automation through machine learning. This leaves businesses with a deluge of alerts that cannot be given proper attention or incomplete data that prevents analysts from understanding the full chain of events that led to an incident.

What to Look For When Adopting XDR

The concept of XDR focuses on two main topics that must be fundamentally intertwined:

  1. All data streams need to be brought together and correlated into a single understanding of an event.
  2. There must be a system to automatically determine the severity of an event and whether the incident needs further investigation by an analyst.

Neither of these can be lacking, and they must work in tandem for a business to achieve success in today’s cybersecurity defense programs. Learn more about how Palo Alto Networks approaches endpoint security.

About the Author

Zachary Malone is a Systems Engineering manager at Palo Alto Networks’ SE Academy. With more than a decade of experience, Zachary is a seasoned security engineer specializing in cyber security, compliance, networking, firewalls, IoT, NGFW, system deployment and orchestration.

Editorial Team

Editorial Team

Related Posts

Here's What We Expect to See at Google I/O 2026
Protection

Here’s What We Expect to See at Google I/O 2026

April 30, 2026
Samsung Says the Memory Crisis Will Get Worse, so You Have Two Choices
Protection

Samsung Says the Memory Crisis Will Get Worse, so You Have Two Choices

April 30, 2026
Amazon Prime Day Is Coming Early This Year
Protection

Amazon Prime Day Is Coming Early This Year

April 30, 2026
The Samsung Odyssey OLED G9 Is $300 Off
Protection

The Samsung Odyssey OLED G9 Is $300 Off

April 30, 2026
No, Sony Isn't Forcing Gamers to Connect to the Internet Every 30 Days
Protection

No, Sony Isn’t Forcing Gamers to Connect to the Internet Every 30 Days

April 30, 2026
15 Shows Like 'Nobody Wants This' You Should Watch Next
Protection

15 Shows Like ‘Nobody Wants This’ You Should Watch Next

April 30, 2026
Load More
Next Post
China’s economy loses momentum in second quarter

China’s economy loses momentum in second quarter

Popular News

  • 35 Best Hotels in New York City We Won't Shut Up About

    35 Best Hotels in New York City We Won’t Shut Up About

    0 shares
    Share 0 Tweet 0
  • Asda to buy UK operations of petrol chain operator EG Group in £2.3bn deal

    0 shares
    Share 0 Tweet 0
  • AIM Summit London Edition 2026 

    0 shares
    Share 0 Tweet 0
  • Fed’s Goolsbee warns rate cuts may be delayed until 2027 on Iran war oil shock

    0 shares
    Share 0 Tweet 0
  • These Bose QuietComfort Ultra Headphones Are $50 Off Right Now

    0 shares
    Share 0 Tweet 0

Latest News

New Ledger Scan Shows How Much XRP Is Quantum-Exposed

ew Ledger Scan Shows How Much XRP Is Quantum-Exposed

May 1, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure A full-history scan of the XRP Ledger...

Student Career Program Specialist - HigherEdJobs

Student Career Program Specialist – HigherEdJobs

May 1, 2026
0

Job Title: Student Career Program Specialist Job ID: 31980 Location: LaGuardia Community College Full/Part Time: Full-Time Regular/Temporary: Regular POSITION DETAILS...

South Korean April exports rise 48.0% y/y as chip boom extends

South Korean April exports rise 48.0% y/y as chip boom extends

May 1, 2026
0

South Korean April exports rise 48.0% y/y as chip boom extends

Mortgage rates increase to 6.3% — but home buyers aren’t scared away

Mortgage rates increase to 6.3% — but home buyers aren’t scared away

May 1, 2026
0

The average rate on a 30-year mortgage is still lower than it was a year ago.

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.