XDR adds even more data and context than EDR to both increase visibility and give the user more insight during an investigation.Additional data sources can include firewall, email, cloud and mobile information.
“One of the most valuable ways to use XDR is to begin with the ‘macro’ spotlight that gives you the tools to quickly scan across your entire environment and highlight suspicious activity, anomalous behaviour and other IT issues.” “XDR takes the idea of EDR and extends it. It goes beyond the endpoint and server, incorporating data from other security tools such as firewalls, email gateways, public cloud tools and mobile threat management solutions.”
We have summarized this news so that you can read it quickly. If you are interested in the news, you can read the full text here. Read more: