You are on page 1of 23

WHAT IS DIFFERENCE BETWEEN EDR & XDR

Avinash Sharma

Confidential
What is Endpoint Detection and Response?

Real-time continuous
Endpoint detection and
monitoring is combined with
response solutions are These solutions provide multi-
data analytics to detect
designed to provide state of layer, fully integrated endpoint
threats, and automated, rule-
the art protection for protection.
driven response enables rapid
corporate endpoints.
mitigation of detected threats.

This visibility is leveraged by


EDR’s automated response This transition from traditional
The initial goal of an EDR
capabilities for threat (like AV), responsive security
solution is to provide deep
mitigation, enables prevention to proactive threat
visibility into a particular
of attacks, and can support management is EDR’s
endpoint.
proactive threat hunting primary objective.
activities.

* Footnotes

Definition

1. References

Confidential 2
What is Extended Detection and Response?

XDR solutions integrate This single pane of glass


security visibility across an visibility and management
Extended Detection and
organization’s entire simplifies security
Response is designed to
infrastructure, including management and
simplify enterprise network
endpoints, cloud enforcement of consistent
security management.
infrastructure, mobile security policies across the
devices, and more. enterprise.

* Footnotes

Definition

1. References

Confidential 3
EDR vs XDR

EDR and XDR solutions are both designed to replace legacy, reactive approaches to cybersecurity. As a result, EDR and XDR
solutions are similar in several ways, such as:
• Preventative Approach: Traditional security solutions are often focused on detecting and remediating ongoing threats. EDR and XDR
attempt to prevent security incidents by collecting in-depth data and applying data analytics and threat intelligence to identify threats
before they occur.
• Rapid Threat Response: EDR and XDR both support automated threat detection and response. This enables an organization to
minimize the cost, impact, and damage caused by a cyberattack by preventing or rapidly remediating it.
• Threat Hunting Support: Threat hunting enables proactive security by allowing analysts to identify and remediate potential security
issues before they are exploited by an attacker. EDR and XDR provide deep visibility and easy access to data, which aids threat hunting
efforts.

Despite their similarities, EDR and XDR take different approaches to cybersecurity. Some of the primary
differences between EDR and XDR include:
•Focus: EDR is focused on protecting the endpoint, providing in-depth visibility and threat prevention for a particular
device. XDR takes a wider view, integrating security across endpoints, cloud computing, email, and other solutions.
•Solution Integration: EDR solutions can provide “best in breed” protection for endpoints, and an organization may be
able to manually integrate them with an array of point solutions. XDR is designed to provide integrated visibility and
threat management within a single solution, dramatically simplifying an organization’s security architecture.

Confidential 4
EDR vs XDR coverage

Confidential 5
How is XDR different from SIEM?

When we talk about XDR, some users think that we are describing a SIEM (Security Information & Event Management) tool in
a different way. But XDR and SIEM are two different things.

SIEM collects, aggregates, analyzes and stores large amounts of log data from across the organization. SIEM began its
development with a very broad approach: collecting available log and event data from almost every source in the organization
and storing it for various use cases. These include governance and compliance, rules-based pattern matching,
heuristic/behavioral threat detection such as UEBA, and searching for IOCs or atomic indicators in telemetry sources.

However, SIEM tools require a lot of fine-tuning and effort to implement. Security teams can also become overwhelmed by the
sheer number of alerts coming from a SIEM, causing the SOC to ignore critical alerts. Additionally, even though a SIEM
collects data from dozens of sources and sensors, it is still a passive analytics tool that provides alerts.

The XDR platform aims to solve the challenges of SIEM tooling for effective detection and response to targeted attacks and
includes behavioral analysis, threat intellegnce behavioral analytics and analytics.

Confidential 6
Thank you slide

7
TITLE SLIDE
John Smith, MD
October 6 2021
Divider Slide
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed
do eiusmod tempor incididunt ut labore et dolore.
Content Slide

Lorem Ipsum dolor sit amet


– Lorem Ipsum dolor sit amet
• Lorem Ipsum dolor sit amet
– Lorem Ipsum dolor sit amet

* Footnotes
Definition
1. References

10
Content Slide with Subhead
Subhead
Lorem Ipsum dolor sit amet
– Lorem Ipsum dolor sit amet
• Lorem Ipsum dolor sit amet
– Lorem Ipsum dolor sit amet

* Footnotes
Definition
1. References

11
Boxed Text

Title Title

• Nullam egestas, arcu ut ornare sollicitudin, lacus orci • Nullam egestas, arcu ut ornare sollicitudin, lacus orci
cursus nibh, et pellentesque turpis. cursus nibh, et pellentesque turpis.
• Etiam facilisis ultrices turpis. • Etiam facilisis ultrices turpis.
• Morbi fringilla ligula eget nisl. • Morbi fringilla ligula eget nisl.

* Footnotes
Definition
1. References

12
Table

Title Title Title Title

Text Text Text Text Text

Text Text Text Text Text

Highlight Row Text Text Text Text

Text Text Text Text Text

Text Text Text Text Text

Text Text Text Text Text

* Footnotes
Definition
1. References

13
Bar Chart

Chart Title
6

4
Y-Axis Label

Series 1
3 Series 2
Series 3

0
Category 1 Category 2 Category 3 Category 4

* Footnotes
X-Axis Label
Definition
1. References

14
Line Chart

Chart Title
6

4
Y-Axis Label

Series 1
3 Series 2
Series 3

0
Category 1 Category 2 Category 3 Category 4

* Footnotes
X-Axis Label
Definition
1. References

15
Pie Chart with Five Colors and Callout

Chart Title
1st Qtr
2nd Qtr
3rd Qtr
4th Qtr

20%

40% Lorem Ipsum dolor sit amet

20%

20%

* Footnotes
Definition
1. References

16
Timeline

Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec

Heading Heading Heading


• Lorem ipsum dolor • Lorem ipsum dolor • Lorem ipsum dolor
sit amet sit amet sit amet
• dolor sit amet • dolor sit amet • dolor sit amet

* Footnotes
Definition
1. References

17
Study Design

Loading Dose Maintenance Dose

N=12,562
n=6,259
Heading Text Text
• Lorem ipsum dolor
sit amet R
• dolor sit amet
Text Text
n=6,303

Heading 482 centers


• Lorem ipsum dolor sit amet 28 countries
• Lorem ipsum dolor sit amet
Heading
• Lorem ipsum dolor sit amet
• Lorem ipsum dolor sit amet

* Footnotes
Definition
1. References

18
Template Palette Colors (RGB Values)

PRIMARY COLORS SECONDARY COLORS

COLOR 1 COLOR 2 COLOR 3 COLOR 4 COLOR 5 COLOR 6


Teal Pink Lime Green Gold Red Orange
5,72,82 220,18,117 184,212,51 245,204,36 219,99,95 250,166,37

* Footnotes
Definition
1. References

19
Template Art Accents: Icons and Callout

Icons Callout

Lorem Ipsum dolor sit amet

• The callout element should be used for key takeaways of


associated copy/text and is not intended to hold paragraphs
of text
• When utilizing, ensure callout copy is in Arial and fit it
beneath the gradient bar, using the spacing shown above
• The call out may be resized slightly to fit within your slide,
but the elements should never be moved (ie, the connector
• These brand icons can be used to accent content within
circle should always be on the left of the gradient bar, and
body slides
the gradient bar should always be above the text)
• Icons may be resized slightly to be appropriate for use
on your slide, but should never be skewed
• Icons should not be rotated nor re-colored in any way

* Footnotes
Definition
1. References

20
Template Art Accents: Image Borders

Image Borders

• To replace Adi’s headshot with your image, click the


desired shape you would like your image to be set
within
• With the shape still selected, in the Toolbar click the
dropdown arrow to the right of “Shape Fill”
• Select “Picture” from the Shape Fill dropdown
• In the “Insert Picture” pop up select the source
you will be taking your image from (ie “From a
File”)
• Once selected, insert desired image

21
Template Art Accents: Image Borders (Con’t)

• If image is skewed (as shown in image to the


right), select framed image again
• Select “Picture Format” in the top Toolbar
• Click the dropdown arrow beneath the
“Crop” button
• Select “Fill” from the “Crop” dropdown

22
Thank you slide

23

You might also like