How a Risk-based XDR Approach Improves Threat Detection and Response

Logo
Presented by

Jon Oltsik, Analyst and Fellow with Enterprise Strategy Group and Briana Farro, Director, XDR Product Management with Cisco

About this talk

Existing threat detection and response technologies are not as effective as they need to be for today’s security landscape. This unfortunate reality is becoming more evident as increasingly insidious cyber-attacks are disrupting businesses globally, and overwhelming security teams with the volume and complexity of the alerts they see daily. Maintaining effective security operations in today's chaotic threat landscape requires an extended detection and response (XDR) approach that improves upon past threat detection models and leverages new technology and techniques that can defend against today’s threats. Join us for a chat with ESG and Cisco experts as they walk through ESG’s recent XDR research and detail: • How XDR addresses current and future challenges by utilizing threat correlation and automation • How network insights can help detect complex threats beyond current industry approaches • How to take a phased approach to XDR implementation that leverages existing investments and unifies visibility regardless of vendor or vector. • How the right XDR automates security operations processes to elevate SOC productivity By the end of this session, you’ll be equipped with the knowledge needed to determine XDR’s suitability for your organization and how you can implement it into your organization.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (85)
Subscribers (7253)
Designed by SOC experts for SOC experts, Cisco XDR simplifies security operations to help security analysts remain proactive and resilient against the most sophisticated threats. By aggregating and correlating data from multiple disparate detection technologies into a unified view, Cisco XDR enables faster, more simplified investigations, reduces false positives, and streamlines incident response through clear prioritization of alerts.