<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/remediation/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #remediation</title><description>Cloud 9 Advisers - News #remediation</description><link>https://www.cloud9advisers.com/News/tag/remediation</link><lastBuildDate>Sat, 28 Feb 2026 13:51:41 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Remediation vs. Response]]></title><link>https://www.cloud9advisers.com/News/post/remediation-vs.-response</link><description><![CDATA[There is an important and distinct difference between response and remediation. As with many things these days there are plenty of opinions. And like other things along that train of thought, they all stink. Except this one, of course!]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_cheik6V2T6aOfsTEHK0wNQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_jZueJQo7Q1CLC1HaUDRKFA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__4woVd79SlalIwDRzmrpDw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qLYvG2NLRaqSHApkLqw7rw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qLYvG2NLRaqSHApkLqw7rw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">What about the &quot;big R&quot;, Remediation?&nbsp;</span></h2></div>
<div data-element-id="elm_znLwfAtw-OissOaq-e921g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_znLwfAtw-OissOaq-e921g"] .zpimage-container figure img { width: 1110px ; height: 622.22px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_znLwfAtw-OissOaq-e921g"] .zpimage-container figure img { width:723px ; height:405.28px ; } } @media (max-width: 767px) { [data-element-id="elm_znLwfAtw-OissOaq-e921g"] .zpimage-container figure img { width:415px ; height:232.63px ; } } [data-element-id="elm_znLwfAtw-OissOaq-e921g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/remediation.jpg" width="415" height="232.63" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_PGFQaF13ojZaKwBgJqohnQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_PGFQaF13ojZaKwBgJqohnQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_4sHUvkt_PY84Uo60UWDN1w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4sHUvkt_PY84Uo60UWDN1w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_w3MqvZAc0jahS4CtGs7nNg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_w3MqvZAc0jahS4CtGs7nNg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">There's a pretty big difference</h2></div>
<div data-element-id="elm_UIlLtG2tX-VnKGM4TUIUzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_UIlLtG2tX-VnKGM4TUIUzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">We wanted to expand a little more on a previous article about EDR, XDR, and MDR. As many of you already know, the “r” is for response: Endpoint Detection and </span><span style="font-size:12pt;font-style:italic;">Response</span><span style="font-size:12pt;">. Extended Detection and </span><span style="font-size:12pt;font-style:italic;">Response</span><span style="font-size:12pt;">. Managed Detection and </span><span style="font-size:12pt;font-style:italic;">Response</span><span style="font-size:12pt;">. But, for some reason there seems to be little confusion on what response actually means and what it does.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">As with many things these days there are plenty of opinions. And like other things along that train of thought, they all stink. Except this one, of course!&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">There is an important and distinct difference between response and remediation:</span></p></div>
</div><div data-element-id="elm_wYfTUKQehoA6ZgS5MZQe5w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wYfTUKQehoA6ZgS5MZQe5w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Response </span><span style="font-size:12pt;">is “a reaction to something”. Response in cybersecurity is focused on containing and mitigating the immediate threat. While we’re thumbing through the dictionary, mitigation is “the action of reducing the severity, seriousness, or painfulness of something”</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Remediation</span><span style="font-size:12pt;">, or </span><span style="font-size:12pt;font-style:italic;">to remedy</span><span style="font-size:12pt;"> on the other hand is, simply put, “to set right”. So to remediate a security incident is to </span><span style="font-size:12pt;font-style:italic;">fix it.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Pretty big difference.</span></p></div>
</div><div data-element-id="elm_CPD3m9HXGVM5nORWNzdWOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CPD3m9HXGVM5nORWNzdWOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Response and remediation are both important parts of any cybersecurity strategy and incident response (IR) plan. However, as shown, there is a key difference between the two.&nbsp; It is important to be able to quickly detect and then respond to an incident. But we would like to highlught that not all _DRs&nbsp; are created equal, and you should never assume that the solution or service you have in place automatically includes remediation. Having a plan in place for remediating security incidents quickly and effectively is also critical and in most cases, not necessarily included.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">In the context of EDR, XDR, and MDR, both response and remediation are important capabilities. EDR, XDR, and MDR solutions can all help organizations to respond to security incidents quickly and effectively. However, remediation is typically more of a manual process that involves fixing the underlying vulnerability and other problems that caused the incident in the first place.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Some EDR, XDR, and MDR solutions may provide automated remediation capabilities for certain types of threats. For example, an EDR solution might be able to automatically remove malware from an infected endpoint. However, for more complex vulnerabilities, remediation may need to be performed manually.</span></p></div>
</div><div data-element-id="elm_FL-NlIVRUCjAo8NsAW4q-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FL-NlIVRUCjAo8NsAW4q-Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Remediation can be performed by either the organization itself or by the security solution provider. It often depends not only on the solution/software, but also on the service selected and service provider you get it from.</span></p><p><span style="color:inherit;"></span></p><ul><li style="font-size:12pt;"><p><span style="font-size:12pt;">EDR solutions typically provide tools to help organizations remediate threats </span><span style="font-size:12pt;font-style:italic;">on their own</span><span style="font-size:12pt;">. Most out-of-the-box solutions won’t </span><span style="font-size:12pt;font-style:italic;">remedy </span><span style="font-size:12pt;">a security threat.&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">XDR solutions can automate </span><span style="font-size:12pt;font-style:italic;">some </span><span style="font-size:12pt;">remediation tasks, such as quarantining infected endpoints or blocking malicious traffic.</span></p></li><li style="font-size:12pt;"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">MDR providers typically provide full remediation services, including removing malware, patching vulnerabilities, and restoring data from backups.</span></p></li></ul></div>
</div><div data-element-id="elm_kp8auAOOcgDvmlJrBaGddg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kp8auAOOcgDvmlJrBaGddg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">It is important to note that the specific capabilities of EDR, XDR, and MDR solutions vary widely. When choosing a solution, it is important to consider the specific needs of your organization and to ensure that the solution you choose provides the necessary response and/or remediation capabilities.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Which organization is responsible for remediation (either you or the service provider( will depend on the specific solution, or rather </span><span style="font-size:12pt;font-style:italic;">service</span><span style="font-size:12pt;">, in place. For example, some EDR solutions provide the option to have the security solution provider perform remediation on behalf of the organization.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Here are some examples of how remediation might be used in each of the three solutions:</span></p><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">EDR:</span><span style="font-size:12pt;"> An EDR solution might be used to remediate a malware infection by removing the malware from the infected endpoint.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">XDR:</span><span style="font-size:12pt;"> An XDR solution might be used to remediate a ransomware attack by automating the process of restoring data from backups and isolating the infected endpoints from the network.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">MDR:</span><span style="font-size:12pt;"> An MDR provider might be used to remediate a data breach by investigating the incident, identifying the affected systems, and taking steps to prevent the breach from happening again.</span></p></blockquote><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Overall, remediation is an important part of any cybersecurity strategy, and it is important to have a plan in place for remediating security incidents quickly and effectively. EDR, XDR, and MDR can all help organizations to detect and respond and get organizations on the right path to remediate threats and incidents effectively. But understand that most solutions are not a complete remediation plan or strategy.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Again, response is to react, mitigate is to reduce, remediate is to fix.</span></p></div>
</div></div><div data-element-id="elm_OMWRRp9XVgEjLCUcV70tPQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_OMWRRp9XVgEjLCUcV70tPQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_0yYDaVyKvYqst7bOvpVMTA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_0yYDaVyKvYqst7bOvpVMTA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_0yYDaVyKvYqst7bOvpVMTA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_pY_3c7Em2RMS5OEgBcFR5w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pY_3c7Em2RMS5OEgBcFR5w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Security Readiness</h2></div>
<div data-element-id="elm_Ulm0phTgcDpgVpXBRMArBQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Ulm0phTgcDpgVpXBRMArBQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>You've done a great job so far, put all the right pieces in place, and now you need to be able to prove it. Or, you think your nicely buttoned up, but wouldn't mind a second pair of eyes.</p><p><br></p><p>Our comprehensive, customized Cybersecurity Readiness Report will give you 50 to 150 pages of dos, don'ts, best practices, and the latest strategies and innovations on your security preparedness. You'll get confirmation on some things, plenty of food for thought, and maybe even uncover some gaps you weren't aware of.&nbsp;</p></div>
</div><div data-element-id="elm_9XhL8-kTQOMplOEC5rDe4g" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_9XhL8-kTQOMplOEC5rDe4g"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://appts.cloud9advisers.com/#/customer/3844308000002924034" target="_blank" title="Cyber Readiness Survey"><span class="zpbutton-content">Schedule your Report</span></a></div>
</div></div></div><div data-element-id="elm_pJxxZm0ilVGoO02qjlCbQw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pJxxZm0ilVGoO02qjlCbQw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cloud 9 Advisers</h2></div>
<div data-element-id="elm_q4VDg-QRTV-6nQzeI1RUeg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_q4VDg-QRTV-6nQzeI1RUeg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>As a leading technology advisory firm with a security-first focus, Cloud 9 stands ready to help you unravel the complex web of noise and &quot;FUD&quot; you'll hear out in the cybersecurity marketplace. Cybersecurity should never be only about the latest products and solutions or the fear uncertainty, and doubt (FUB) often found in the marketplace. Cybersecurity isn't an IT problem, it is a business problem</p></div>
</div><div data-element-id="elm_piqTGcrcTUOWqN9lhBW3SA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 26 Oct 2023 08:50:16 -0500</pubDate></item></channel></rss>