Read Time:1 Minute, 48 Second

A new report was released stating the significance of an Extended Detection and Response Strategy (XDR)

ExtraHop, a cloud-native network intelligence company, found in their research regarding extended detection and response (XDR) implementation in organisations.

The international study conducted by Wakefield Research has outlined the risks, successes, challenges, and hesitations that implementing the XDR strategy can bring to global companies and in Australia.

The findings are as follows:

  • One-third of respondents said an XDR technique goes beyond endpoint detection.
  • More than half of respondents (50%) believed they lacked the resources to adopt an XDR methodology successfully.
  • 79% of Australian respondents believe that broader adoption of XDR strategies and solutions is critical to mitigating risk and increasing resiliency
  • 73 per cent of the respondents have said that they already have an XDR strategy in place at their business organisation.
  • 22 per cent of the remaining respondents that still need to integrate XDR into the operations are planning to have it next year.

However, the main challenge of XDR is that it needs to be more widely known to the community, including what benefits it could bring to the table. Only 51 per cent of the IT leaders asked were able to answer the correct definition of XDR.

Their primary question is the process of injecting the strategy into their system. They were still determining whether it would require them to overhaul their existing network security. Also, almost half of the respondents admit that they need to gain expertise to oversee the process.

“As the buzz around XDR skyrocketed in 2022, single-vendor solutions muddied the waters when it came to explaining what it is and how it works,” says Jeff Costlow, CISO, ExtraHop.

“XDR is not a single solution – it’s a strategy that allows security teams to choose the best products for their organisation without the fear of vendor lock-in. The key to XDR success lies in strong, purpose-built integrations that take the tools in your tech stack today to offer complete end-to-end visibility that will help stop sophisticated attacks in their tracks.”

ExtraHop sees how education regarding this matter is needed to move forward.

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
Previous post In Response to Its Significant Data Breach, Medibank Has Committed to Fight a Class Action
Next post A Call for IT Security Budget Increase: APAC Enterprises Need to Cope with the Evolving Threat Landscape