Professional Documents
Culture Documents
Avinash Sharma
Confidential
What is Endpoint Detection and Response?
Real-time continuous
Endpoint detection and
monitoring is combined with
response solutions are These solutions provide multi-
data analytics to detect
designed to provide state of layer, fully integrated endpoint
threats, and automated, rule-
the art protection for protection.
driven response enables rapid
corporate endpoints.
mitigation of detected threats.
* Footnotes
Definition
1. References
Confidential 2
What is Extended Detection and Response?
* Footnotes
Definition
1. References
Confidential 3
EDR vs XDR
EDR and XDR solutions are both designed to replace legacy, reactive approaches to cybersecurity. As a result, EDR and XDR
solutions are similar in several ways, such as:
• Preventative Approach: Traditional security solutions are often focused on detecting and remediating ongoing threats. EDR and XDR
attempt to prevent security incidents by collecting in-depth data and applying data analytics and threat intelligence to identify threats
before they occur.
• Rapid Threat Response: EDR and XDR both support automated threat detection and response. This enables an organization to
minimize the cost, impact, and damage caused by a cyberattack by preventing or rapidly remediating it.
• Threat Hunting Support: Threat hunting enables proactive security by allowing analysts to identify and remediate potential security
issues before they are exploited by an attacker. EDR and XDR provide deep visibility and easy access to data, which aids threat hunting
efforts.
Despite their similarities, EDR and XDR take different approaches to cybersecurity. Some of the primary
differences between EDR and XDR include:
•Focus: EDR is focused on protecting the endpoint, providing in-depth visibility and threat prevention for a particular
device. XDR takes a wider view, integrating security across endpoints, cloud computing, email, and other solutions.
•Solution Integration: EDR solutions can provide “best in breed” protection for endpoints, and an organization may be
able to manually integrate them with an array of point solutions. XDR is designed to provide integrated visibility and
threat management within a single solution, dramatically simplifying an organization’s security architecture.
Confidential 4
EDR vs XDR coverage
Confidential 5
How is XDR different from SIEM?
When we talk about XDR, some users think that we are describing a SIEM (Security Information & Event Management) tool in
a different way. But XDR and SIEM are two different things.
SIEM collects, aggregates, analyzes and stores large amounts of log data from across the organization. SIEM began its
development with a very broad approach: collecting available log and event data from almost every source in the organization
and storing it for various use cases. These include governance and compliance, rules-based pattern matching,
heuristic/behavioral threat detection such as UEBA, and searching for IOCs or atomic indicators in telemetry sources.
However, SIEM tools require a lot of fine-tuning and effort to implement. Security teams can also become overwhelmed by the
sheer number of alerts coming from a SIEM, causing the SOC to ignore critical alerts. Additionally, even though a SIEM
collects data from dozens of sources and sensors, it is still a passive analytics tool that provides alerts.
The XDR platform aims to solve the challenges of SIEM tooling for effective detection and response to targeted attacks and
includes behavioral analysis, threat intellegnce behavioral analytics and analytics.
Confidential 6
Thank you slide
7
TITLE SLIDE
John Smith, MD
October 6 2021
Divider Slide
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed
do eiusmod tempor incididunt ut labore et dolore.
Content Slide
* Footnotes
Definition
1. References
10
Content Slide with Subhead
Subhead
Lorem Ipsum dolor sit amet
– Lorem Ipsum dolor sit amet
• Lorem Ipsum dolor sit amet
– Lorem Ipsum dolor sit amet
* Footnotes
Definition
1. References
11
Boxed Text
Title Title
• Nullam egestas, arcu ut ornare sollicitudin, lacus orci • Nullam egestas, arcu ut ornare sollicitudin, lacus orci
cursus nibh, et pellentesque turpis. cursus nibh, et pellentesque turpis.
• Etiam facilisis ultrices turpis. • Etiam facilisis ultrices turpis.
• Morbi fringilla ligula eget nisl. • Morbi fringilla ligula eget nisl.
* Footnotes
Definition
1. References
12
Table
* Footnotes
Definition
1. References
13
Bar Chart
Chart Title
6
4
Y-Axis Label
Series 1
3 Series 2
Series 3
0
Category 1 Category 2 Category 3 Category 4
* Footnotes
X-Axis Label
Definition
1. References
14
Line Chart
Chart Title
6
4
Y-Axis Label
Series 1
3 Series 2
Series 3
0
Category 1 Category 2 Category 3 Category 4
* Footnotes
X-Axis Label
Definition
1. References
15
Pie Chart with Five Colors and Callout
Chart Title
1st Qtr
2nd Qtr
3rd Qtr
4th Qtr
20%
20%
20%
* Footnotes
Definition
1. References
16
Timeline
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
* Footnotes
Definition
1. References
17
Study Design
N=12,562
n=6,259
Heading Text Text
• Lorem ipsum dolor
sit amet R
• dolor sit amet
Text Text
n=6,303
* Footnotes
Definition
1. References
18
Template Palette Colors (RGB Values)
* Footnotes
Definition
1. References
19
Template Art Accents: Icons and Callout
Icons Callout
* Footnotes
Definition
1. References
20
Template Art Accents: Image Borders
Image Borders
21
Template Art Accents: Image Borders (Con’t)
22
Thank you slide
23