What is XDR?...Oh no not another security tool!
Updated: Jul 27
Do we need another new security acronym, or another security product to add to the existing plethora of security tools currently used?
If you have and/or are thinking about migrating to the cloud then XDR should be considered as an essential part of your security compliance moving forward.
Much like how the introduction of NGFW disrupted the perimeter firewall market in 2009, XDR is a new approach to threat detection and response, specifically designed for today's dynamic dispersed environments where the threat landscape has increased significantly.
Existing security tools that take a reactive layered approach, relying on user admins to sift their way through a high volume of security alerts. The outcome is either increased time to identify a breach, or risk that they are just ignored. This is because these existing layered toolsets are technology, rather than business outcome focussed.
Inca Cloud partners with Prismo Systems to deliver end to end cloud compliance
The attributes of XDR are very different, and Prismo takes a proactive approach to cloud security, and is able to map 100% of the transactions between an "Actor" and "Resource" where an "Actor" can be a user, end point, application, and/or 3rd party connection, and a "Resource" can be is any environment public of private.
Prismo achieves 100% visibility through HyperConverged security so rather than work in individual layers Prismo maps the Network, Operating System, and Application layers during the discovery phase.
Like other products in our portfolio, Prismo is is an administrative control plane, and not part of the data plane, therefore unlike static firewalls where the data needs to traverse the ingress and egress, Prismo creates a "Trust Fabric" which delivers granular configuration, that can be tailored to meet and enforce the most stringent polices.
Another attribute of XDR is to deliver just enough privileges to the user to enable them to perform their job function, this is achieved through a "zero static privileges" approach to user and network access.
So if you are struggling with too many toolsets, and too many security threats, and would like to see the power of this new technology please call Sam Cottle on 07741 667249, or email at email@example.com