top of page
  • Writer's pictureMark van Vuuren

XDR and Zero-Trust Strategy: The Whole is Greater than the sum of the parts

Shared by Joseph Vigorito

We are often asked, what is the near-term future of Cybersecurity? While experts’ answers may differ, we typically highlight the ascension of Extended Detection and Response (XDR) as a significant step change to an organization’s cybersecurity toolkit along with the adoption of the Zero-Trust Maturity Model providing both a trust-centric and data-centric approach to the protection of digital assets.

Zero-Trust is a trust-centric architecture that puts human and machine identities at the heart of security policy creation. In this architecture, enterprise access controls and policies are based on identity and assigned attributes. In Zero-Trust, every access request requires an establishment of permitted access combined with a provable identity regardless of where the request came from. Its dynamic and adaptive, supporting modern enterprise models: BYOD, remote worker, cloud apps, hybrid cloud, on-premises, social integration, and more. XDR then does the heavy lifting, preventing unknown and known ransomware, stopping active attacks, detecting and preventing lateral movement, hunting for undetected signs of compromise, and identifying MITRE ATT&CK adversarial tactics and techniques.

XDR correlates data across endpoints, applications, the cloud, operations technology, Internet of Things and the aforementioned identity-centric architecture, essentially the entire IT estate. One (Zero-Trust or XDR) without the other leaves an incomplete technical security framework. So our advice is the following: opt for complete visibility and extended protection to any application, workload, resource, compliance objective (e.g. PCI-DSS), or network.

Detect advanced threats and respond to them rapidly along with the ability to identify the origin, deeply track and investigate. Insist your solution includes native integrations and support for APIs and protocols to protect the totality of your investment. Then establish trust and least privilege before granting any access (device or user) or allowing a connection.

Lastly, align the attacker’s likely path with the highest level of coverage across differing attack techniques. Sleep better while doing risk management and security better. You can do all of this with a zero-trust architecture and a field-proven XDR solution.

Refer to the full in-depth article here

5 views0 comments


bottom of page