Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

MDR

Why Threat Hunting is Crucial to a Managed Detection and Response Service

Managed detection and response (MDR) is justifiably one of the fastest-growing areas of cybersecurity, with Gartner estimating 50 percent of organizations will be using MDR services by 2025. But in choosing an MDR service, security pros should take into consideration what kind of expertise the provider can bring to bear – and how that expertise should extend beyond the MDR service itself.

Features Every Managed Detection and Response Solution Must Have

Gartner’s newly released 2023 Market Guide for Managed Detection and Response Services offers detailed advice to organizations on what capabilities an MDR provider must deliver in order to keep its clients secure. The guide reinforces the notion that a MDR provider must come to the table with a portfolio of strong supporting solutions to deliver an effective and comprehensive security product.

Featured Post

MDR vs EDR vs XDR: What is Best for Your Business?

Protecting your organisation from sophisticated and damaging cyber threats is no easy feat. Not only is the cyber threat landscape growing all the more versatile, but threat actors are becoming increasingly difficult to spot, often penetrating a network or system and going months without being detected. Keeping up with today's complex cyber threats involves managing highly intricate and complicated security technologies and infrastructure, which is challenging.

Kroll recognised as an MDR Champion by Bloor Research

In this blog post, we provide a brief overview of the report and its perspective on changes in the MDR market. We are proud to have been named as an MDR Champion by Bloor in its latest report. This isn’t the first time that Bloor has recognised us in this way, as it previously identified Redscan an MDR Champion in 2020.

Trustwave and Trellix Enter into a Strategic Managed Detection and Response Partnership

Trustwave and Trellix have entered a strategic partnership that will see the two premier cybersecurity companies deliver best-in-class Managed Detection and Response (MDR) solutions to enterprise-class organizations. The partnership will begin with Trustwave's innovative MDR services on Trellix EDR products, which will result in these clients receiving unrivaled threat visibility and the ability to detect and respond to threats faster and more precisely.

Modern SOCs and MDR services: Modern SOC Key Functions

At a high level, the SOC's core mission remains to help the enterprise manage cyber risk, but what has changed is the sophistication of cyber threats and the mechanics of the SOC to operate. To successfully protect and respond to threats, SOCs need deep visibility into organization activity and automate key but repetitive functions while freeing analysts to focus on more valuable functions such as threat hunting and vulnerability management.

Trustwave Government Solutions Named Palo Alto Networks Cortex XMDR Specialization Partner

Trustwave Government Solutions (TGS), a wholly-owned subsidiary of Trustwave Holdings, Inc., which supports the public sector with market-leading Managed Detection and Response (MDR) cybersecurity services, has achieved Palo Alto Networks Cortex eXtended Managed Detection and Response (XMDR) Specialization.

Bloor Research: Managed Detection and Response - 2023 Market Update

Bloor analyzed the most often cited MDR providers delivering technology-agnostic services and named Kroll a Champion. Nearly three years since Bloor Research analyzed the managed detection and response (MDR) landscape, its 2023 MDR Market Update shows a maturing market sector where vendors go beyond endpoint detection and response (EDR) to ingest a variety of telemetry, including cloud services, and develop more robust incident response (IR).

Modern SOCs and MDR services IV: Deployment Models

Currently, it is possible to offer managed detection and response services from a SOC that are implemented in different ways. All implementation alternatives have their advantages and disadvantages, which must be carefully evaluated before deciding to adopt one or another deployment model. The most common deployment models include.