Page 105 - Cyber Defense Magazine RSA Edition for 2021
P. 105

•  XDR response is not granular


            Normally, EDR will tell the firewall that the endpoint is infected.  But what malware was detected or what
            ports the malware uses for C&C are not communicated. So, the firewall will block all communications
            from the endpoint, effectively isolating it from other network segments or the internet.  But that would not
            be good if the endpoint were an ecommerce server generating revenue.



               •  Response time slowed due to indirect communications


            As exciting as integrating EDR and NGFWs together sounds, the EDR and NGFW may not directly
            communicate with each other.  Instead, communications and response instructions are routed through a
            management or threat intelligence (TI) platform.  This indirect communication could impact how long it
            takes for a response to be initiated.



               •  XDR does not close gaps between products

            All  security  products  have  a  sphere  of  influence  or  area  domain  that  they  protect.  NGFWs  protect
            communications between networks. EDR protects endpoint from malware.  But malware is becoming
            more sophisticated and can exploit the gaps in coverage between networks and endpoints.












































                                                                                                            105
   100   101   102   103   104   105   106   107   108   109   110