{"id":1847,"date":"2019-05-02T01:57:54","date_gmt":"2019-05-02T01:57:54","guid":{"rendered":"http:\/\/34.65.207.89\/2019\/05\/02\/security-teams-deserve-a-better-approach-to-detection-and-response-2\/"},"modified":"2019-05-02T01:57:54","modified_gmt":"2019-05-02T01:57:54","slug":"security-teams-deserve-a-better-approach-to-detection-and-response-2","status":"publish","type":"post","link":"https:\/\/www.ideus.com.tr\/index.php\/security-teams-deserve-a-better-approach-to-detection-and-response-2\/","title":{"rendered":"Security Teams Deserve a Better Approach to Detection and Response"},"content":{"rendered":"<div>\n<p>For many organizations, security teams are the first line of defense against all known and unknown threats. The core function of these teams is to identify, investigate and mitigate threats across their entire digital domain. As adversaries become more automated and complex, security teams are relying on a layered approach to prevention.<\/p>\n<p>This approach involves deploying technologies such as Endpoint, Detection and Response (EDR), User and Entity Behavioral Analytics (UEBA) and Network Traffic Analysis (NTA) to gain visibility across their environment. In addition, security teams typically use alert and log aggregation technologies like Security Information Event Management (SIEM) tools to set policies, correlate events and prioritize issues. Finally, there is a need to somehow link the alerts generated with the data to help them investigate and mitigate threats faster.<\/p>\n<p>This layered prevention approach comes at the cost of time and expertise. Many security teams are not capable of handling a large amount of alerts. The average SOC might see <a href=\"https:\/\/www.demisto.com\/news\/latest-research-shows-security-teams-review-an-average-12000-alerts-week-setting-the-stage-for-automation\/\">174,000 alerts per week.<\/a> With a finite security team, the math doesn\u2019t work. Security teams may depend on 40+ narrowly focused tools to investigate and mitigate attacks, which can produce 200+ cases per day. This creates a swivel-chair effect that causes security teams to spend time piecing together data and reacting to alerts, rather than being proactive and preventing attacks in the first place.<\/p>\n<p>It takes <a href=\"https:\/\/www.ibm.com\/security\/data-breach\">197 days to identify a breach within a network<\/a>, and 69 days to respond to it. No wonder breaches are making headline news.\u00a0 An average cost of a breach in the US was an estimated <a href=\"https:\/\/www.ibm.com\/security\/data-breach\">$7.91M in 2018<\/a>.<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" class=\"size-large wp-image-97150 aligncenter\" src=\"http:\/\/34.65.207.89\/wp-content\/uploads\/2019\/05\/XDR-1-500x282.png\" alt=\"\" width=\"500\" height=\"282\" srcset=\"http:\/\/34.65.207.89\/wp-content\/uploads\/2019\/05\/XDR-1-500x282.png 500w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/02\/XDR-1-230x130.png 230w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/02\/XDR-1-768x434.png 768w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/02\/XDR-1-510x288.png 510w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/02\/XDR-1-71x40.png 71w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/02\/XDR-1-531x300.png 531w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/02\/XDR-1.png 974w\" sizes=\"(max-width: 500px) 100vw, 500px\"><\/p>\n<p>\u00a0<\/p>\n<p>Security teams deserve a better approach that bypasses the complexity and limitations of siloed tools like EDR, UEBA and NTA. An approach that can break the silos and aid the security team at all stages\u2013 anomaly detection, alert triage, incident investigation and threat hunting. This ideal approach would:<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" class=\"size-large wp-image-97163 aligncenter\" src=\"http:\/\/34.65.207.89\/wp-content\/uploads\/2019\/05\/ZDR2-500x230.png\" alt=\"\" width=\"500\" height=\"230\" srcset=\"http:\/\/34.65.207.89\/wp-content\/uploads\/2019\/05\/ZDR2-500x230.png 500w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/02\/ZDR2-230x106.png 230w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/02\/ZDR2-768x354.png 768w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/02\/ZDR2-510x235.png 510w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/02\/ZDR2-87x40.png 87w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/02\/ZDR2-650x300.png 650w, https:\/\/blog.paloaltonetworks.com\/wp-content\/uploads\/2019\/02\/ZDR2.png 974w\" sizes=\"(max-width: 500px) 100vw, 500px\"><\/p>\n<p>\u00a0<\/p>\n<p>This is an entirely new\u00a0approach called XDR, a dramatic departure from the traditional detection and response category. The \u201cX\u201d stands for any data source, be it network, endpoint or cloud, with a focus on force-multiplying the productivity of every member of the security operations team through automation. The ultimate goal is to ensure products within this category reduce mean time to detect and respond to threats without increasing effort somewhere else in the team.<\/p>\n<p>To learn more about this\u00a0groundbreaking\u00a0approach, <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/redefine-security-operations-with-xdr\">download this whitepaper<\/a> and get details on how XDR can help you redefine your security operations.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.paloaltonetworks.com\/2019\/02\/security-teams-deserve-better-approach\/\">Security Teams Deserve a Better Approach to Detection and Response<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.paloaltonetworks.com\/\">Palo Alto Networks Blog<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>For many organizations, security teams are the first line of defense against all known and unknown threats. The core function of these teams is to identify, investigate and mitigate threats across their entire digital domain. As adversaries become more automated and complex, security teams are relying on a layered approach to prevention. This approach involves<\/p>\n","protected":false},"author":1,"featured_media":1848,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":""},"categories":[24],"tags":[33,29,27,34],"jetpack_featured_media_url":"https:\/\/www.ideus.com.tr\/wp-content\/uploads\/2019\/05\/XDR-1-500x282.png","_links":{"self":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/1847"}],"collection":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/comments?post=1847"}],"version-history":[{"count":0,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/1847\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/media\/1848"}],"wp:attachment":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/media?parent=1847"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/categories?post=1847"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/tags?post=1847"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}