Explaining EDR vs MDR

Discussing firstly on Endpoint Detection and Response (EDR); anecdotally from client engagements, when asked to identify the newest to-implement functionality of their endpoint protection strategy, many said EDR.

Apart from EDR, another trend is quietly but ferociously growing – managed detection and response (MDR). The two terms look similar but are vastly different in many aspects.

EDR to MDR

EDR is able to record and store queries, behaviors, and events on the endpoints, allowing the security teams to detect and investigate suspicious activities. In this regard, the IT team is able to go beyond just indicators of compromise and achieve high visibility into the nitty-gritty that’s going on. Once an attack is discovered, customers want to know what the root cause was and how it spread – EDR is a useful tool for this.

EDR also enables the IT team to answer and resolve issues faster. Imagine if the team wants to know how many devices in the organization are using a particular piece of vulnerable software, or have accessed a bad domain.

However, as organizations expand their security technology stash, a bigger team and more technical skills are needed. Unfortunately, the market doesn’t produce security professionals as fast as the changing IT landscape demands them. MDR has emerged to fill this cybersecurity skills gap.

MDR to boost existing security

Firstly, by nature, MDR is offered by security providers to augment an organization’s existing security infrastructures and address threats that can bypass traditional controls. Modern-day threats such as network attacks, targeted attacks, cryptominers, fileless malware, and remote access tools are designed to be difficult to detect and circumvent many types of security technology.

This is because many organizations’ primary focus is to secure the perimeters, that is to know where threats enter and exit an organization’s network. However, less attention is often being paid to the lateral movements of threats once they find their way into the system.

While EDR supplements the traditional anti-virus software, it does not replace it entirely. It works together with the anti-virus and blocks known threat indicators. Traditional security controls are not equipped to handle these types of secret threats, especially those that need continuous detection and response.

How do MDR and EDR work together?

Some EDR offerings can feature advanced technologies such as machine learning and behavioral analysis, while also integrating other technologies. Because of the complexity of EDR technology, some in-house IT teams don’t have the skills or the time to maximize EDR, leaving many functions and capabilities unused.

MDR then comes in to bridge the skills and resource gap in deploying complex EDR solutions. When used together, EDR provides the powerful tools for comprehensive security implementation, which MDR can tap into for detection, analysis, and response.

要查看或添加评论,请登录

David Siah Yang Meng的更多文章

  • How do I protect my identity online?

    How do I protect my identity online?

    We’ve all been spending more of our time online since the crisis hit. Whether it’s ordering food for delivery…

    3 条评论
  • The Rise of the Fileless (Cyber)Attack

    The Rise of the Fileless (Cyber)Attack

    It behaves like a malware, it does not look like a typical malware, it does not even exist is a file, namely, it…

  • Cloud Security Notes : 2019.

    Cloud Security Notes : 2019.

    The public cloud market is predicted to grow by 17.3% globally in 2019, there will be cyber-security breaches as a…

  • Machine Learning to Fight Spam

    Machine Learning to Fight Spam

    One of the key pressing problems for corporate email users today is the persistence of spam messages. This article…

  • Trend Micro’s Endpoint Security Cited as a Leader

    Trend Micro’s Endpoint Security Cited as a Leader

    Noted for “Best-in-class Suite Capabilities” Trend Micro Incorporated (TYO: 4704; ~US$8 billion mkt cap), a global…

  • Is Singapore ready for the GDPR?

    Is Singapore ready for the GDPR?

    2017 is coming to a close and with it comes reflection and anticipation. We reflect on the things that have transpired…

  • Remembering The Human Factor in a Smart Nation

    Remembering The Human Factor in a Smart Nation

    Other countries have begun their smart city initiatives, but Singapore’s is unique in that the transformation is not…

  • Why collaboration is crucial in cybersecurity

    Why collaboration is crucial in cybersecurity

    According to a recent IDC survey, 91 percent of Singapore companies are in the early stages of security preparedness…

  • Leveling Up Security Strategies in Singapore

    Leveling Up Security Strategies in Singapore

    Last month, the draft for the proposed Cybersecurity Bill was released to the public. According to the Straits Times…

  • Duqu Detection

    Duqu Detection

    Trend Micro engine detects DUKU: TROJ_DUQU.SV TROJ64_DUQU.

    1 条评论

社区洞察

其他会员也浏览了