In the digital age, enterprises face more diverse security threats, but there are a lot of shortages of security professionals in enterprises. Even if security products are purchased, the flood of security alerts and numerous security product silos make security teams miserable. What kind of security threat detection and response plan can be adopted to help enterprises improve their security operation capabilities and resist potential network security risks?
In this context, why has XDR become a “hot” tool for enterprise security operations?
On October 26th, the 2022 XDR Network Security Operation New Concept Summit (2022 XDR New Vision Summit, referred to as “XDR Summit 2022”), hosted by the first domestic XDR implementation company XDR SEC, was successfully held in Beijing.
Tang Jiajia, founder and CEO of XDR SEC
Tang Jiajia, founder and CEO of Future Zhian, the organizer, said: “We chose the XDR track two years ago. The process was very difficult and the investment was huge. But fortunately, we have the support of a group of like-minded investors and friends, let us persist Do the hard and right thing.”
The theme of this conference is “Security Left, Middle, Right”, based on XDR’s Extended Detection and Response, an emerging network security technology. Trends and other topics are discussed, aiming to interpret the new technical concept of XDR and define new ideas for safe operation and management.
The new concept of XDR – safety left, middle and right, what is it?
Chen Yuduan, co-founder and CTO of Future Zhian, pointed out: “If security is regarded as a war, you need to be familiar with the terrain, see the battlefield environment, deploy and control key positions, and even develop strategies for defensive counterattacks. If cyberspace is regarded as a war, there will be offense and defense, and it is divided into three stages: before the war, during the war, and after the war. Before, during, and after the war based on security, we must use the security left, center, and right to land. ”
Chen Yuduan, Co-founder and CTO of Future Zhian (XDR SEC)
He concluded:
The value that ‘Left’ brings to customers is to see the existing security problems and risks of the enterprise through understanding the family background, sorting out the attack surface, and risk management. Continuous optimization and iteration;
‘Medium’ refers to threat detection covering terminals and traffic. More importantly, it protects the user’s investment from the perspective of the enterprise’s existing security investment, accesses data from various existing security devices, and can converge massive alarms at the same time. , to reach an operationally safe state;
‘Right’ provides the core security orchestration capability, which can automate the process orchestration of existing security device data, access and integrate various security principles and capabilities, and ultimately hope to achieve the release of comprehensive instructions, so that the company’s existing security Based on the security operation process and security events triggered by some special events, the device can automatically conduct risk research, analysis and disposal.
Chen Yuduan said that Zhian has been thinking and exploring the current situation of network security in the future: “We have served many customers in the financial, energy, and operator industries, and we are thinking and exploring how to make security products and concepts better. The solution is passed on to the customer. Consider whether it is possible to use a down-to-earth way to abandon the complex concept and let the security technology return to the essence to solve the security problem on the user side in response to these problems.”
At the same time, after elaborating on the new version of Zhian V4.0 in the future, Chen Yuduan and the founder Tang Jiajia jointly completed the release of the new version of Zhian XDR V4.0 in the future.
It is understood that since the official release of Zhian XDR 1.0 version in January 2021, 4 versions of iterations have been completed so far. In order to polish XDR products that truly meet the needs of user scenarios and can be implemented, in the past two years, Tang Jiajia and his entrepreneurial Partner Chen Yuduan visited 105 customers, conducted in-depth analysis and excavation, and thus precipitated the current XDR “safety left, middle and right” concept.
Tang Jiajia said: “In the future, Zhian will follow the concept of ‘security on the left, center on the right’, and it will be implemented in a very down-to-earth scenario, completely focusing on the asset level, threat detection level, and response and disposal level, to provide customers with accurate and comprehensive attack surface management and network security. Detection, efficient and automated threat operation capabilities and product solutions.” Based on continuous in-depth cultivation and practice, Future Zhian was able to lead the writing of the first domestic XDR industry standard under the guidance of the China Academy of Information and Communications Technology, and the project has been successfully established.
In the end, Tang Jiajia concluded: “The future of threat detection and operation is XDR, the ‘left’ must be ‘find out’, the ‘middle’ must be ‘capable’, the ‘right’ must be ‘fast response’, openness + integration is ours In the future, Zhian will continue to work with everyone to build an XDR ecosystem and create a truly valuable and operational security testing platform for customers.” (Leifeng.com)
This article is reprinted from: https://www.leiphone.com/category/gbsecurity/kbAZggIm4m2tUNdK.html
This site is for inclusion only, and the copyright belongs to the original author.