Report: IT leaders believe XDR is necessary

Report: IT leaders believe XDR is necessary

Share post

A new study underscores the uncertainty surrounding XDR definition, implementation and required resources. The ExtraHop report shows that 78 percent of the IT managers surveyed consider the topic of XDR to be necessary, despite irritation.

ExtraHop has released the results of the study "To Achieve the Promise of XDR, Look Beyond the Endpoint" examining the adoption of Extended Detection and Response (XDR) in organizations. The global study highlights the successes, obstacles, challenges and hesitations of companies that have developed or are considering an XDR strategy. Despite the uncertainty, nearly a third of participants believe an XDR strategy goes beyond detecting endpoints, with more than half believing they lack the resources to adequately implement it.

72 percent already have an XDR strategy

According to the report, 78% of respondents believe that more widespread adoption of XDR strategies and solutions is critical to reducing risk and improving one's resilience. Further evidence of this is that the majority (72%) have already developed an XDR strategy in their organization and another 20% plan to implement one in the next 12 months.

However, as XDR's popularity has skyrocketed, so has confusion over what XDR is, who benefits from it, and how companies can successfully implement it.

Main findings of the report

The study shows that there is general irritation about XDR's value proposition

The most recent study shows that there is a general confusion about what XDR is and why companies need it. When asked to define XDR, only 47% of IT leaders could name the correct definition: a strategy to improve threat visibility and accelerate threat detection and response by correlating endpoint data with more reliable network telemetry data and other data sources.

IT leaders agree that XDR goes beyond the endpoint

When discussing the different building blocks in their XDR technologies, there was a wide range of responses. However, nearly a third of IT decision makers using XDR saw Network Detection and Response (NDR) (32%) and Security Information and Event Management (SIEM) (31%) as the most important components of their strategy.

XDR is misperceived as a resource intensive solution

According to the study, 24% of respondents believe that deploying XDR would require an overhaul or replacement of components of current network security strategy and solutions. Another 56% believe they do not have enough staff or in-house expertise to oversee implementation.

"As interest in XDR skyrocketed in 2022, there was some confusion about what XDR is and how it works," says Jeff Costlow, CISO at ExtraHop. “XDR isn't a one-off solution, it's a strategy that enables security teams to select the best products for their business without fear of vendor lock-in. The key to XDR's success lies in strong, purpose-built integrations that leverage the tools in your tech stack today to provide complete end-to-end visibility that helps stop sophisticated attacks in their tracks.”

More at Extrahop.com

 


About ExtraHop

ExtraHop is dedicated to helping businesses with security that cannot be undermined, outwitted or compromised. The dynamic cyber defense platform Reveal (x) 360 helps companies to identify complex threats and react to them - before they put the company at risk. We apply cloud-scale AI to petabytes of traffic per day and conduct line rate decryption and behavioral analysis for all infrastructures, workloads and data on the fly. With the complete transparency of ExtraHop, companies can quickly identify malicious behavior, hunt down advanced threats and reliably forensic investigate every incident.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more