Resiliency and Adaptivity with XDR

Resiliency and Adaptivity with XDR

Dynamic Approaches for Tackling the Threat Landscape

Dynamic Approaches for Tackling the Threat Landscape

Moderator

Panelists

Addressing common holes in existing infrastructures and how to successfully patch them

At Trellix’s recent virtual thought leadership event, Resiliency and Adaptivity with XDR: Dynamic Approaches for Tackling the Threat Landscape,  a select group of senior cybersecurity leaders and  panelists came together to share their thoughts on:

  • Building awareness around the merging capabilities of XDR and its ability to reshape the marketplace
  • Navigating the threat challenges propelled by work-from-anywhere environments
  • Implementing automated strategies to build security measures proportionally to business size and needs
  • Addressing common holes in existing infrastructures and how to successfully patch them
  • Responding to attacks across endpoints, networks, and clouds with agility and accuracy

Access the Full
Content Here:

Access the Full Content Here:

Addressing common holes in existing infrastructures and how to successfully patch them

At Trellix’s recent virtual thought leadership event, Resiliency and Adaptivity with XDR: Dynamic Approaches for Tackling the Threat Landscape,  a select group of senior cybersecurity leaders and  panelists came together to share their thoughts on:

  • Building awareness around the merging capabilities of XDR and its ability to reshape the marketplace
  • Navigating the threat challenges propelled by work-from-anywhere environments
  • Implementing automated strategies to build security measures proportionally to business size and needs
  • Addressing common holes in existing infrastructures and how to successfully patch them
  • Responding to attacks across endpoints, networks, and clouds with agility and accuracy

Access the Full
Content Here:

Access the Full Content Here:

Key Panel Takeaways

Key Panel Takeaways

With security threats coming in from all sides faster than ever, IT teams may struggle to sift through and navigate these threats, leaving them with slim resources and old solutions. XDR technology can help to mitigate these struggles by delivering resilient security capabilities that improve constantly, improving business agility and creating elastic prevention.

On March 31st, Trellix virtually gathered a panel of experts to discuss Resiliency and Adaptivity with XDR: Dynamic Approaches for Tackling the Threat Landscape, and how to strategically implement new approaches to security that go beyond traditional measures in a fast-paced environment.

Check out a few takeaways from our discussion on the 31st:

1. Closing the gaps with XDR

As ways of detection and analysis shift in a company, XDR can be a good solution to gaps in the results.Barbara Shurtleff of SAIC talked about the change from SIM to XDR in her company from the perspective of a contractor and provider as opposed to a consumer.

“As we go through the evolution of things, the SIM was logging all sorts of information and then it became more of a security event,” Barbara said. “XDR is taking it one step further as a collector and manager of managers to predict and protect and prepare for things coming our way.

2. Taking advantage of the R in XDR

“I think the big portion of XDR is the response,”Richard Rushingof Motorola Mobility explained. “That capability is what’s going to save you. And then extend that response. So that response and capability is really designed to integrate with your security ecosystem and get the best value from the tools that are already there.”

Using XDR and taking advantage of its response means that what currently works will only get better with XDR’s quick response.

3. Using automation to respond to a security issue

Peter Berry of ACI Worldwide responded to a question of automating critical threat responses using XDR. The response of XDR means that it’s not just recognizing the issue of a threat, it’s actually doing something about it.

“I think automation is key,” he said. “Security now moves at a much faster pace. We have to find ways to automate the response. If you’re not responding then you’re already toast once the event kicks in.”

4. Building off of product and capability to predict the future of threats

While XDR may be a tool that can be used from all angles, changing the way a company responds to threats, Barbara also spoke about its capabilities beyond the initial product.

“The beauty of XDR is that it’s taking it to a whole different level,” she said. “You’re trying to build things from your staff, with the XDR you’re looking at a collective whole that is able to take in information to be able to say what you saw and what it’s going to be.”

5. Retaining trust by communicating

“You really have to think about the comms and how that works with your process and everything else,” said Richard. “I look at what ticketing systems I’m integrating, how do I share data with my end user support? Don’t get backstabbed by your own processes not working.”

To retain trust in any system, it’s vital to keep good communication from the product to the user. Using ticketing or another type of record can be the extra step to a best security practice.

Curious to learn more about our discussion with Trellix and our expert panelists? Access the full event content by filling out the form at the top of this page.

Sponsor

Trellix_LOGO_Color_Graphite

Trellix is a cybersecurity company creating a resilient digital world that enables trust and success. Our market-leading XDR ecosystem learns and adapts through a living security platform built to disrupt active threats. Along with actionable intelligence gleaned from threat researchers, Trellix empowers over 40,000 business and government customers to build confidence by embedding security into their DNA. Learn more at Trellix.com.

The Adobe family of companies would like to keep you informed with personalized emails about products and services. See our Privacy Policy for more details.

Please contact me via email.

By clicking “Submit” I agree that I have read and accepted the Terms of Use.

adobe.comadobe.com
Adobe Privacy Center
Adobe Privacy Policy

adobe.comadobe.com
Adobe marketing and advertising practices I Adobe
Adobe marketing and advertising practices

adobe.comadobe.com
Adobe Privacy Center
Adobe Privacy Policy

adobe.comadobe.com
Legal
Legal Terms of Use for Adobe products & services