<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/detect-respond/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #detect &amp; respond</title><description>Cloud 9 Advisers - News #detect &amp; respond</description><link>https://www.cloud9advisers.com/News/tag/detect-respond</link><lastBuildDate>Wed, 25 Feb 2026 18:47:15 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Always-On Endpoint Management]]></title><link>https://www.cloud9advisers.com/News/post/always-on-endpoint-management</link><description><![CDATA[In a world where employees are increasingly working from anywhere and on any device, it's more important than ever to have a solution in place that can manage and protect all endpoints at all times.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ySVH76efQ62VB_veNkwGVg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dX0DToqGSlGiEMcXZkj3UA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_l_YWXfYJTp-sZL1YyjsiGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Dr6nyHGHQuW-MT-OFu01Pg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Dr6nyHGHQuW-MT-OFu01Pg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div>Always-on endpoint management is a must-have</div></div></h2></div>
<div data-element-id="elm_Rz8W-V3rGYLpyLYll5lOAA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Rz8W-V3rGYLpyLYll5lOAA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_LdAUsiXlVWQjCA1wfGIbfA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_LdAUsiXlVWQjCA1wfGIbfA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_wzK-_ZLqwDaqF0KJDqxN6Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wzK-_ZLqwDaqF0KJDqxN6Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-size:16px;color:inherit;">Always-on endpoint management is a must-have for enterprises today.</span><br></div><div><br></div><div><p style="margin-bottom:24px;font-size:16px;">In a world where employees are increasingly working from anywhere and on any device, it's more important than ever to have a solution in place that can manage and protect all endpoints at all times.</p><p style="margin-bottom:24px;font-size:16px;">Here are just a few of the benefits of always-on endpoint management:</p><ul><li style="margin-bottom:10px;"><span style="font-weight:bold;">Improved security</span>:&nbsp;Always-on endpoint management can help to protect your organization from cyber threats by providing real-time visibility and control over all endpoints.</li><li style="margin-bottom:10px;"><span style="font-weight:bold;">Reduced downtime</span>:&nbsp;By proactively monitoring and managing endpoints, always-on endpoint management can help to reduce downtime and keep your employees productive.</li><li style="margin-bottom:10px;"><span style="font-weight:bold;">Increased compliance</span>:&nbsp;Always-on endpoint management can help you to comply with industry regulations by ensuring that all endpoints are configured and patched correctly.</li></ul><p style="margin-bottom:24px;font-size:16px;"><span style="color:inherit;">If you're not already using an always-on endpoint management solution, here are a few things to consider when choosing one:</span><br></p><ul><li style="margin-bottom:10px;"><span style="font-weight:bold;">Comprehensive endpoint visibility</span>:&nbsp;Make sure that the solution you choose provides comprehensive visibility into all endpoints, including laptops, desktops, mobile devices, and IoT devices.</li><li style="margin-bottom:10px;"><span style="font-weight:bold;">Real-time monitoring and control</span>:&nbsp;The solution should also be able to monitor and control endpoints in real time, so that you can quickly respond to threats and incidents.</li><li style="margin-bottom:10px;"><span style="font-weight:bold;">Security automation</span>:&nbsp;The solution should be able to automate many common security tasks, such as patch management and vulnerability scanning.</li><li style="margin-bottom:10px;"><span style="font-weight:bold;">Compliance reporting</span>:&nbsp;The solution should also be able to generate reports that can help you to comply with industry regulations.</li></ul></div><div><div style="color:inherit;"><br><div><div><span style="font-size:16px;">Read more from our friends at Spiceworks:&nbsp;<a href="https://www.spiceworks.com/it-security/endpoint-security/guest-article/why-enterprise-needs-always-on-endpoint-management/">https://www.spiceworks.com/it-security/endpoint-security/guest-article/why-enterprise-needs-always-on-endpoint-management/</a></span></div><br><div><br></div><br></div></div></div></div></div>
</div></div><div data-element-id="elm_JWf4ErFCYxwBGPzOhVpnTw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg zpsticky-enabled"><style type="text/css"> [data-element-id="elm_JWf4ErFCYxwBGPzOhVpnTw"].zpelem-col{ border-radius:1px; } @media (min-width:992px) { [data-element-id="elm_JWf4ErFCYxwBGPzOhVpnTw"].zpelem-col{ top:0px;z-index:1; } } </style><div data-element-id="elm_F1PH6uHK7-vh0RToDenqjg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_F1PH6uHK7-vh0RToDenqjg"] .zpimage-container figure img { width: 333px !important ; height: 151px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_F1PH6uHK7-vh0RToDenqjg"] .zpimage-container figure img { width:333px ; height:151px ; } } @media (max-width: 767px) { [data-element-id="elm_F1PH6uHK7-vh0RToDenqjg"] .zpimage-container figure img { width:333px ; height:151px ; } } [data-element-id="elm_F1PH6uHK7-vh0RToDenqjg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/EPSec.jpg" width="333" height="151" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_bCZ-B98r91F6sf7v4mnIiA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_bCZ-B98r91F6sf7v4mnIiA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cyber Readiness</h2></div>
<div data-element-id="elm_IGwDPez9rt7JL7nAnHk5tg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_IGwDPez9rt7JL7nAnHk5tg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Click the button below to schedule your appointment and learn more about our Cybersecurity Readiness Report - custom tailored recommendations and roadmap for your business and your needs</p></div>
</div><div data-element-id="elm_pOCBkhdUWC-I6CusHlFDkA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_pOCBkhdUWC-I6CusHlFDkA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://appts.cloud9advisers.com/#/customer/cybersurvey" target="_blank"><span class="zpbutton-content">Book now</span></a></div>
</div></div></div><div data-element-id="elm_FFcgyMHOpEcdMrLTmUQ3Tw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_FFcgyMHOpEcdMrLTmUQ3Tw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Technology Sourcing</h2></div>
<div data-element-id="elm_NbNpljBLQ6CwgJVj0sb0ZA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NbNpljBLQ6CwgJVj0sb0ZA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:11pt;">Cybersecurity can be complex, but getting the right strategy and solutions in place doesn’t have to be.&nbsp; Cloud 9 Advisers&nbsp;</span><span style="font-size:11pt;">will provide you clarity so you can make quick and confident IT buying decisions.&nbsp;</span><span style="font-size:11pt;">We help decision-makers make smart IT investments.&nbsp;</span></p></div>
</div><div data-element-id="elm_igc090WjSkS6FsDE8rs8Sg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_igc090WjSkS6FsDE8rs8Sg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/cyber-threats"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 14 Nov 2023 13:06:11 -0500</pubDate></item><item><title><![CDATA[Remediation vs. Response]]></title><link>https://www.cloud9advisers.com/News/post/remediation-vs.-response</link><description><![CDATA[There is an important and distinct difference between response and remediation. As with many things these days there are plenty of opinions. And like other things along that train of thought, they all stink. Except this one, of course!]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_cheik6V2T6aOfsTEHK0wNQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_jZueJQo7Q1CLC1HaUDRKFA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__4woVd79SlalIwDRzmrpDw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qLYvG2NLRaqSHApkLqw7rw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qLYvG2NLRaqSHApkLqw7rw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">What about the &quot;big R&quot;, Remediation?&nbsp;</span></h2></div>
<div data-element-id="elm_znLwfAtw-OissOaq-e921g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_znLwfAtw-OissOaq-e921g"] .zpimage-container figure img { width: 1110px ; height: 622.22px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_znLwfAtw-OissOaq-e921g"] .zpimage-container figure img { width:723px ; height:405.28px ; } } @media (max-width: 767px) { [data-element-id="elm_znLwfAtw-OissOaq-e921g"] .zpimage-container figure img { width:415px ; height:232.63px ; } } [data-element-id="elm_znLwfAtw-OissOaq-e921g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/remediation.jpg" width="415" height="232.63" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_PGFQaF13ojZaKwBgJqohnQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_PGFQaF13ojZaKwBgJqohnQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_4sHUvkt_PY84Uo60UWDN1w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4sHUvkt_PY84Uo60UWDN1w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_w3MqvZAc0jahS4CtGs7nNg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_w3MqvZAc0jahS4CtGs7nNg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">There's a pretty big difference</h2></div>
<div data-element-id="elm_UIlLtG2tX-VnKGM4TUIUzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_UIlLtG2tX-VnKGM4TUIUzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">We wanted to expand a little more on a previous article about EDR, XDR, and MDR. As many of you already know, the “r” is for response: Endpoint Detection and </span><span style="font-size:12pt;font-style:italic;">Response</span><span style="font-size:12pt;">. Extended Detection and </span><span style="font-size:12pt;font-style:italic;">Response</span><span style="font-size:12pt;">. Managed Detection and </span><span style="font-size:12pt;font-style:italic;">Response</span><span style="font-size:12pt;">. But, for some reason there seems to be little confusion on what response actually means and what it does.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">As with many things these days there are plenty of opinions. And like other things along that train of thought, they all stink. Except this one, of course!&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">There is an important and distinct difference between response and remediation:</span></p></div>
</div><div data-element-id="elm_wYfTUKQehoA6ZgS5MZQe5w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wYfTUKQehoA6ZgS5MZQe5w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Response </span><span style="font-size:12pt;">is “a reaction to something”. Response in cybersecurity is focused on containing and mitigating the immediate threat. While we’re thumbing through the dictionary, mitigation is “the action of reducing the severity, seriousness, or painfulness of something”</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Remediation</span><span style="font-size:12pt;">, or </span><span style="font-size:12pt;font-style:italic;">to remedy</span><span style="font-size:12pt;"> on the other hand is, simply put, “to set right”. So to remediate a security incident is to </span><span style="font-size:12pt;font-style:italic;">fix it.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Pretty big difference.</span></p></div>
</div><div data-element-id="elm_CPD3m9HXGVM5nORWNzdWOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CPD3m9HXGVM5nORWNzdWOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Response and remediation are both important parts of any cybersecurity strategy and incident response (IR) plan. However, as shown, there is a key difference between the two.&nbsp; It is important to be able to quickly detect and then respond to an incident. But we would like to highlught that not all _DRs&nbsp; are created equal, and you should never assume that the solution or service you have in place automatically includes remediation. Having a plan in place for remediating security incidents quickly and effectively is also critical and in most cases, not necessarily included.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">In the context of EDR, XDR, and MDR, both response and remediation are important capabilities. EDR, XDR, and MDR solutions can all help organizations to respond to security incidents quickly and effectively. However, remediation is typically more of a manual process that involves fixing the underlying vulnerability and other problems that caused the incident in the first place.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Some EDR, XDR, and MDR solutions may provide automated remediation capabilities for certain types of threats. For example, an EDR solution might be able to automatically remove malware from an infected endpoint. However, for more complex vulnerabilities, remediation may need to be performed manually.</span></p></div>
</div><div data-element-id="elm_FL-NlIVRUCjAo8NsAW4q-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FL-NlIVRUCjAo8NsAW4q-Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Remediation can be performed by either the organization itself or by the security solution provider. It often depends not only on the solution/software, but also on the service selected and service provider you get it from.</span></p><p><span style="color:inherit;"></span></p><ul><li style="font-size:12pt;"><p><span style="font-size:12pt;">EDR solutions typically provide tools to help organizations remediate threats </span><span style="font-size:12pt;font-style:italic;">on their own</span><span style="font-size:12pt;">. Most out-of-the-box solutions won’t </span><span style="font-size:12pt;font-style:italic;">remedy </span><span style="font-size:12pt;">a security threat.&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">XDR solutions can automate </span><span style="font-size:12pt;font-style:italic;">some </span><span style="font-size:12pt;">remediation tasks, such as quarantining infected endpoints or blocking malicious traffic.</span></p></li><li style="font-size:12pt;"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">MDR providers typically provide full remediation services, including removing malware, patching vulnerabilities, and restoring data from backups.</span></p></li></ul></div>
</div><div data-element-id="elm_kp8auAOOcgDvmlJrBaGddg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kp8auAOOcgDvmlJrBaGddg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">It is important to note that the specific capabilities of EDR, XDR, and MDR solutions vary widely. When choosing a solution, it is important to consider the specific needs of your organization and to ensure that the solution you choose provides the necessary response and/or remediation capabilities.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Which organization is responsible for remediation (either you or the service provider( will depend on the specific solution, or rather </span><span style="font-size:12pt;font-style:italic;">service</span><span style="font-size:12pt;">, in place. For example, some EDR solutions provide the option to have the security solution provider perform remediation on behalf of the organization.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Here are some examples of how remediation might be used in each of the three solutions:</span></p><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">EDR:</span><span style="font-size:12pt;"> An EDR solution might be used to remediate a malware infection by removing the malware from the infected endpoint.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">XDR:</span><span style="font-size:12pt;"> An XDR solution might be used to remediate a ransomware attack by automating the process of restoring data from backups and isolating the infected endpoints from the network.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">MDR:</span><span style="font-size:12pt;"> An MDR provider might be used to remediate a data breach by investigating the incident, identifying the affected systems, and taking steps to prevent the breach from happening again.</span></p></blockquote><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Overall, remediation is an important part of any cybersecurity strategy, and it is important to have a plan in place for remediating security incidents quickly and effectively. EDR, XDR, and MDR can all help organizations to detect and respond and get organizations on the right path to remediate threats and incidents effectively. But understand that most solutions are not a complete remediation plan or strategy.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Again, response is to react, mitigate is to reduce, remediate is to fix.</span></p></div>
</div></div><div data-element-id="elm_OMWRRp9XVgEjLCUcV70tPQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_OMWRRp9XVgEjLCUcV70tPQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_0yYDaVyKvYqst7bOvpVMTA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_0yYDaVyKvYqst7bOvpVMTA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_0yYDaVyKvYqst7bOvpVMTA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_pY_3c7Em2RMS5OEgBcFR5w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pY_3c7Em2RMS5OEgBcFR5w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Security Readiness</h2></div>
<div data-element-id="elm_Ulm0phTgcDpgVpXBRMArBQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Ulm0phTgcDpgVpXBRMArBQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>You've done a great job so far, put all the right pieces in place, and now you need to be able to prove it. Or, you think your nicely buttoned up, but wouldn't mind a second pair of eyes.</p><p><br></p><p>Our comprehensive, customized Cybersecurity Readiness Report will give you 50 to 150 pages of dos, don'ts, best practices, and the latest strategies and innovations on your security preparedness. You'll get confirmation on some things, plenty of food for thought, and maybe even uncover some gaps you weren't aware of.&nbsp;</p></div>
</div><div data-element-id="elm_9XhL8-kTQOMplOEC5rDe4g" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_9XhL8-kTQOMplOEC5rDe4g"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://appts.cloud9advisers.com/#/customer/3844308000002924034" target="_blank" title="Cyber Readiness Survey"><span class="zpbutton-content">Schedule your Report</span></a></div>
</div></div></div><div data-element-id="elm_pJxxZm0ilVGoO02qjlCbQw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pJxxZm0ilVGoO02qjlCbQw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cloud 9 Advisers</h2></div>
<div data-element-id="elm_q4VDg-QRTV-6nQzeI1RUeg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_q4VDg-QRTV-6nQzeI1RUeg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>As a leading technology advisory firm with a security-first focus, Cloud 9 stands ready to help you unravel the complex web of noise and &quot;FUD&quot; you'll hear out in the cybersecurity marketplace. Cybersecurity should never be only about the latest products and solutions or the fear uncertainty, and doubt (FUB) often found in the marketplace. Cybersecurity isn't an IT problem, it is a business problem</p></div>
</div><div data-element-id="elm_piqTGcrcTUOWqN9lhBW3SA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 26 Oct 2023 08:50:16 -0500</pubDate></item><item><title><![CDATA[EDR, XDR, and MDR]]></title><link>https://www.cloud9advisers.com/News/post/edr-xdr-and-mdr</link><description><![CDATA[Back in the old days the name of the cybersecurity game was prevention - if you had a strong perimeter, then you're good! That thought process has shifted rather dramatically, because we know they'll get it regardless.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_xi8EiLn9TIW0uATsv_GPPg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_s-rvUTpkR62m2FRCBDHQTg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_tDT5eudNTdWvm6byINTgDA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_tDT5eudNTdWvm6byINTgDA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jWrAiBL2Seuoz3VziRLVsQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jWrAiBL2Seuoz3VziRLVsQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>EDR, XDR, and MDR: What are they and why are they important?</div></div></div></h2></div>
<div data-element-id="elm_13Kq9Tyg8H0jV4QIZucjwg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_13Kq9Tyg8H0jV4QIZucjwg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_DjM1Njwb2lljQkqTcgryuw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_DjM1Njwb2lljQkqTcgryuw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_kOSll6w1qazWgnXNw_s9Xw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kOSll6w1qazWgnXNw_s9Xw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:24px;font-size:16px;">As one piece to a larger cybersecurity puzzle (strategy, plan, and ultimately, framework), EDR, XDR, and MDR are all cybersecurity <span style="font-style:italic;">solutions</span> that help organizations detect and respond to threats. However, they have different features and capabilities.</p><div style="color:inherit;"><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">Importance of EDR, XDR, and MDR</span></p><p style="margin-bottom:24px;font-size:16px;">EDR, XDR, and MDR are all important cybersecurity solutions, but the best solution for an organization will depend on its specific needs and budget.</p><p style="margin-bottom:24px;font-size:16px;">Organizations with limited resources may want to consider EDR. EDR solutions can be effective at detecting and responding to threats, and they are typically more affordable than XDR and MDR solutions.</p><p style="margin-bottom:24px;font-size:16px;">Organizations with more complex needs may want to consider XDR or MDR. XDR solutions can provide a more complete view of threats and can automate threat detection and response. MDR solutions can provide organizations with 24/7 monitoring and threat response, which can be helpful for organizations with limited security resources.</p><div><div><span style="font-weight:bold;">What are they?</span></div>
</div><div><span style="font-weight:bold;"><br></span></div></div><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">EDR</span> (Endpoint Detection and Response) is a software solution that collects and analyzes endpoint data to detect and respond to threats. EDR solutions typically collect data from endpoints such as Windows Event Logs, Sysmon logs, and file system changes. They use this data to identify suspicious activity, such as malware infections, unauthorized access, and data exfiltration. EDR solutions can also be used to block threats and remediate incidents.</p><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">XDR</span> (Extended Detection and Response) is a more comprehensive approach to EDR that collects data from a wider range of sources, including endpoints, networks, cloud, and user behavior. This allows XDR solutions to provide a more complete view of threats and to respond more effectively. XDR solutions typically integrate with other security tools, such as SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response), to automate threat detection and response.</p><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">MDR</span> (Managed Detection and Response) is a service that provides organizations with 24/7 monitoring and threat response for their endpoints. MDR providers typically use EDR or XDR solutions to collect and analyze endpoint data. They then use this data to identify and respond to threats on behalf of their customers. MDR providers can also provide additional services, such as threat hunting, incident response, and compliance reporting.</p><p style="margin-bottom:24px;font-size:16px;">In summary, the key differences between EDR, XDR, and MDR are:</p><ul><li style="margin-bottom:10px;">Scope:&nbsp;EDR focuses on endpoints, while XDR collects data from a wider range of sources. MDR is a service that provides 24/7 monitoring and threat response for endpoints and other key components of the network.</li><li style="margin-bottom:10px;">Capabilities:&nbsp;EDR can detect and respond to threats, but XDR has more comprehensive capabilities, such as threat hunting and incident response. MDR providers can also provide additional services, such as threat hunting and compliance reporting.</li><li style="margin-bottom:10px;">Pricing:&nbsp;EDR solutions are typically priced per endpoint, while XDR and MDR solutions are typically priced per organization.</li></ul><p style="margin-bottom:24px;font-size:16px;">The best solution for an organization will depend on its specific needs and budget. Organizations with limited resources may want to consider EDR. Organizations with more complex needs may want to consider XDR or MDR.</p><p style="margin-bottom:24px;font-size:16px;">Here is a table that summarizes the key differences between EDR, XDR, and MDR</p></div>
</div></div><div data-element-id="elm_gyRIFGoh65EFx0q6svaIVQ" data-element-type="table" class="zpelement zpelem-table "><style type="text/css"> [data-element-id="elm_gyRIFGoh65EFx0q6svaIVQ"].zpelem-table{ border-radius:1px; } [data-element-id="elm_gyRIFGoh65EFx0q6svaIVQ"] .zptable{ width:100% !important; } </style><div class="zptable zptable-align-left zptable-header- zptable-header-none zptable-cell-outline-on zptable-outline-on zptable-style- " data-width="100" data-editor="true"><table style="width:100%;"><tbody><tr><td style="width:25%;" class="zp-selected-cell"><span style="font-weight:bold;"><span style="color:inherit;"><span style="font-size:14px;">Feature</span></span> </span></td><td style="width:25%;"><span style="font-weight:bold;">EDR</span></td><td style="width:25%;"><span style="font-weight:bold;">XDR</span></td><td style="width:25%;"><span style="font-weight:bold;">MDR</span></td></tr><tr><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Scope</span></span><br></td><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Endpoints</span></span><br></td><td style="width:25%;"> Endpoints, networks, cloud, user behavior</td><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Endpoints</span></span><br></td></tr><tr><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Capabilities</span></span><br></td><td style="width:25%;"><span style="color:inherit;">Detect and respond to threats</span><br></td><td style="width:25%;"><span style="color:inherit;">Detect, respond, and hunt for threats</span><br></td><td style="width:25%;"><div style="color:inherit;"><div>Detect, respond, hunt for threats, and provide 24/7 monitoring</div><br><div><br></div></div></td></tr><tr><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Pricing</span></span><br></td><td style="width:25%;"><span style="color:inherit;">Per endpoint</span><br></td><td style="width:25%;"><span style="color:inherit;">Per organization</span><br></td><td style="width:25%;"><span style="color:inherit;">Per organization</span><br></td></tr></tbody></table></div>
</div><div data-element-id="elm_2pLXKWWkKP0xFH9UhNZ6oQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2pLXKWWkKP0xFH9UhNZ6oQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div><span style="font-weight:bold;">Why should&nbsp;<span style="font-style:italic;">every</span> company have either one, two, or all three solutions in place?</span></div>
</div><div><br></div><div><div> No matter what size or industry, every company should have well-thought-out cybersecurity solutions in place to protect against threats. Back in &quot;the old days&quot; the name of the cybersecurity game was prevention (only) - if you had a strong perimeter, then you're good! That thought process has shifted rather dramatically, because we know they'll get it&nbsp;regardless. Today, to protect yourself, you must first be able to <span style="font-style:italic;">detect</span>&nbsp;those threats first in order to respond. EDR, XDR, and MDR can all help companies to detect and respond to threats effectively.&nbsp; </div>
</div><div><br></div><div><div> EDR is a great foundation for any cybersecurity strategy. Many will argue that EDR should be the <span style="font-style:italic;">first</span>&nbsp;step. It can help to detect and respond to threats on endpoints, which are often the first target of attackers - especially considering so many remote/hybrid staff with access to company data.&nbsp; </div>
</div><div><br></div><div> XDR can provide a more complete view of threats and can automate threat detection and response. This can be helpful for companies with complex IT environments. </div>
<div><br></div><div> MDR can provide companies with 24/7 monitoring and threat response, which can be helpful for companies with limited security resources. </div>
<div><br></div><div> A typical company should have one, two, or all three of these solutions in place depending on its specific needs and budget. For example, a small company with limited resources may only need EDR. A large company with a complex IT environment may want to have all three solutions in place. </div>
</div></div></div><div data-element-id="elm_zp13fDFmZGlc7cBg8d7IqQ" data-element-type="table" class="zpelement zpelem-table "><style type="text/css"> [data-element-id="elm_zp13fDFmZGlc7cBg8d7IqQ"].zpelem-table{ border-radius:1px; } [data-element-id="elm_zp13fDFmZGlc7cBg8d7IqQ"] .zptable{ width:100% !important; } </style><div class="zptable zptable-align-left zptable-header- zptable-header-none zptable-cell-outline-on zptable-outline-on zptable-style- " data-width="100" data-editor="true"><table style="width:100%;"><tbody><tr><td style="width:50%;"><span style="color:inherit;">Company type</span> </td><td style="width:50%;"><div style="color:inherit;"><div>Best solution</div></div></td></tr><tr><td style="width:50%;"><span style="color:inherit;">Small company with limited resources</span><br></td><td style="width:50%;">EDR</td></tr><tr><td style="width:50%;"><span style="color:inherit;">Medium-sized company with moderate resources</span><br></td><td style="width:50%;">EDR and/or XDR</td></tr><tr><td style="width:50%;"><span style="color:inherit;">Large company with complex IT environment</span><br></td><td style="width:50%;" class="zp-selected-cell">EDR + XDR and/or MDR</td></tr></tbody></table></div>
</div><div data-element-id="elm_2-QsG4go9CYs7RMcMBfA8Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2-QsG4go9CYs7RMcMBfA8Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>It is important to note that this is just a general guide. The best way to determine which solution is right for your company is to consult with a vendor-neutral, unbiased cybersecurity expert.</div><br><div><span style="font-style:italic;font-weight:bold;">Remember: if your company can only afford one cybersecurity solution, make it EDR</span></div></div><div style="color:inherit;"><div style="width:948px;"><div><div></div></div></div><div style="width:948px;"></div></div></div>
</div></div><div data-element-id="elm_fHtwhbUv4Ei7bJ7CZgJNYg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg zpsticky-enabled"><style type="text/css"> [data-element-id="elm_fHtwhbUv4Ei7bJ7CZgJNYg"].zpelem-col{ border-radius:1px; } @media (min-width:992px) { [data-element-id="elm_fHtwhbUv4Ei7bJ7CZgJNYg"].zpelem-col{ top:0px;z-index:1; } } </style><div data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"] .zpimage-container figure img { width: 350px ; height: 254.92px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"] .zpimage-container figure img { width:723px ; height:526.59px ; } } @media (max-width: 767px) { [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"] .zpimage-container figure img { width:415px ; height:302.26px ; } } [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/TPS-Report-Meme.jpg" width="415" height="302.26" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Uj2bEWxJE05ghFSbibOy1g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Uj2bEWxJE05ghFSbibOy1g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:rgb(48, 4, 234);">Readiness Report</span></h2></div>
<div data-element-id="elm_azldy0VBAu7gRgLjB6TkDw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_azldy0VBAu7gRgLjB6TkDw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(48, 4, 234);">Schedule a security interview with one of our experts, then in a few days, we'll generate a custom, 50 to 100 page Cybersecurity Readiness Report you can use&nbsp; as a playbook for your security strategy.&nbsp;<br></span></p><p><span style="color:rgb(48, 4, 234);"><br></span></p><p><span style="color:rgb(48, 4, 234);">You can even use the report as ammunition for your case to get your security budget passed.&nbsp;</span></p></div></div>
</div><div data-element-id="elm_hj4rUfdaxsD5ZteiO_PN9w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_hj4rUfdaxsD5ZteiO_PN9w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="/aboutus" target="_blank"><span class="zpbutton-content">Book now</span></a></div>
</div></div></div><div data-element-id="elm_uPz45HKcReKZhhdLR5m6sw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_uPz45HKcReKZhhdLR5m6sw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="/cybersecurity" target="_blank"><span class="zpbutton-content">Security Experts</span></a></div>
</div><div data-element-id="elm_4a5p1d_2uL6Vbm39-egz8Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4a5p1d_2uL6Vbm39-egz8Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Cloud 9</h2></div>
<div data-element-id="elm_jcH2LiwKlaBzMqIn95Yayg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jcH2LiwKlaBzMqIn95Yayg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Cloud 9 Advisers, LLC was formed as a client-facing, </span>business<span style="color:inherit;">-to-</span>business<span style="color:inherit;">&nbsp;agency/firm in 2017 with the goal of forever changing the way businesses buy AI, cybersecurity, contact center, and other important IT-related services and solutions: faster, better, less formal, and with the high-quality due diligence and integrity that all companies expect.&nbsp;</span><br></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;font-weight:bold;">Technology Sourcing Experts</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 17 Oct 2023 17:49:19 -0500</pubDate></item></channel></rss>