{"id":10122,"date":"2024-05-22T11:00:56","date_gmt":"2024-05-22T18:00:56","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=10122"},"modified":"2024-06-07T00:41:37","modified_gmt":"2024-06-07T07:41:37","slug":"the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/","title":{"rendered":"The Promise of XDR: Exploring ESG\u2019s XDR and SOC Modernization Survey"},"content":{"rendered":"<p><a href=\"https:\/\/info.infoblox.com\/resources-ebooks-the-race-to-support-overwhelmed-security-teams-with-xdr-and-soc-modernization\" rel=\"noopener\" target=\"_blank\">A recent ESG survey of 374 IT and cybersecurity professionals<\/a> reveals how security leaders are facing the challenges of integrating XDR with existing security tools to reap all the promised rewards.  This strategic move is aimed to enhance threat visibility, accelerate response times, and fortify security postures by unlocking XDR\u2019s full potential to transform reactive security measures into a more proactive defense system.<\/p>\n<p>Infoblox found this vendor-neutral ebook report excitingly comprehensive as it even calls out bridging the gap between networking and security tools as a crucial part of a complete XDR approach.  The introduction mentions this as one of three key areas where XDR can support better threat detection and response by:<\/p>\n<ul>\n<li><a href=\"https:\/\/blogs.infoblox.com\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/\" rel=\"noopener\" target=\"_blank\">Operationalizing threat intelligence<\/a><\/li>\n<li>Expanding the integration of <a href=\"https:\/\/www.infoblox.com\/products\/ipam-dhcp\/\" rel=\"noopener\" target=\"_blank\">asset management<\/a> with SecOps<\/li>\n<li>Improving <a href=\"https:\/\/blogs.infoblox.com\/security\/enhancing-security-operations-with-ai-driven-soc-insights\/\" rel=\"noopener\" target=\"_blank\">alert triage and prioritization<\/a><\/li>\n<\/ul>\n<p>For many, the most important information may be in the middle of the ebook where ESG discusses \u2018The State of XDR\u2019, emphasizing that the early perspective of XDR as a possible SecOps panacea has given way to a more realistic understanding.  In the 2022 survey<\/p>\n<p>XDR is now primarily seen as a mix of strategy and technology that can help our existing security stack do a better \u201cDR\u201d job of detecting advanced threats and supporting more effective and efficient investigation, forensic and response efforts.  As a result, only 28% of respondents see XDR as potentially replacing some of their current technologies.<\/p>\n<p>But connecting all the survey results to these three benefits is not as straightforward as you might expect, so here\u2019s a guide to learning more about what this report has to say around these three benefit areas, and how it demonstrates that <a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\" rel=\"noopener\" target=\"_blank\">Infoblox BloxOne Threat Defense<\/a> customers are already well on their way to XDR and SOC Modernization.<\/p>\n<h3>Operationalizing Threat Intelligence<\/h3>\n<p>The first of the three key benefit areas of XDR figures prominently in the chapters on SIEM and \u201cAutomation and GenAI\u201d.  Each chapter talks about the value of \u2019context\u2019 to make threat intelligence useful.  But there are clear challenges to making this happen as just over half of respondents (51%) reported that they were using more than one SIEM to accomplish all of their key objectives.  Even then, 57% of respondents have only been able to automate processes associated with tier one analysts (i.e. alert enrichment, alert prioritization, and alert triage support.)  <\/p>\n<p>This resonates with Infoblox customers who frequently call out the BloxOne Threat Defense <a href=\"https:\/\/insights.infoblox.com\/solution-notes\/infoblox-solution-note-infoblox-dossier\" rel=\"noopener\" target=\"_blank\">threat research feature, Dossier<\/a> as their favorite feature as it auto-collects relevant threat intel from multiple sources making it easy for analysts to drill-down and pivot around the data to better understand the threat.  And it validates heavy investment in <a href=\"https:\/\/insights.infoblox.com\/solution-notes\/infoblox-solution-note-soc-insights\" rel=\"noopener\" target=\"_blank\">AI-driven analytics to support our SOC Insights<\/a> feature, enabling customers to boil hundreds of thousands of alerts into a handful of insights for investigation.<\/p>\n<h3>Expanding the Integration of Asset Management with SecOps<\/h3>\n<p>Asset management is referenced throughout the ebook in regard to its critical role as another source of background or contextual information for alerts to help analysts and responders make informed decisions about what is important, and how to respond. <\/p>\n<p>With that said, the section on \u201cSecurity Tools and Data Stack\u201d was very revealing about the challenge defenders face to use the information they may already have.  As multi-cloud environments, IoT, remote work, and other factors expand our attack surface, both security and network data around the related assets often lacks centralization.  Over half of respondents reported that they depended on more than 4-5 data repositories, with only 6% claiming to have a single, centralized data repository.<\/p>\n<p>As a result, a coordinated effort is needed between the networking and security teams to centrally collect comprehensive asset data, and <a href=\"https:\/\/insights.infoblox.com\/solution-notes\/infoblox-solution-note-transform-security-effectiveness-with-dns-detection-and-response-dnsdr\" rel=\"noopener\" target=\"_blank\">leverage DNS Detection and Response (DNSDR)<\/a> to take advantage of its ability to enable security for any hardware, any OS, and any application \u2026 anywhere.  ESG also recently release a report on \u201c<a href=\"https:\/\/www.infoblox.com\/resources\/analyst-report\/hybrid-multi-cloud-management-maturity\/\" rel=\"noopener\" target=\"_blank\">Hybrid, Multi-cloud Management Maturity<\/a>\u201d that may be of interest.<\/p>\n<h3>Improving Alert Triage and Prioritization<\/h3>\n<p>It should be no surprise that dealing with \u201calerts\u201d continues to be a top priority for cybersecurity leaders, with 37% reporting that the volume and complexity is increasing.  So the issue comes up more than any other topic throughout the report, particularly in the chapters on \u201cThe State of SecOps\u201d and \u201cAutomation and GenAI\u201d with 82% of organizations reporting that they are still dependent on numerous, disconnected analytics engines and point tools. <\/p>\n<p>It is worth noting that only 17% of respondents felt that things would \u2018come together by sending logs and alerts to a SIEM platform\u2019.  But more respondents are seeing results through XDR by correlating event, vulnerability, asset, and other data from networking and security tools.   Some highlights of areas where respondents reported \u2018significant\u2019 or \u2018somewhat\u2019 measurable improvements:<\/p>\n<ul>\n<li>93% &#8211; \u201cOur ability to keep up with alert volumes\u201d<\/li>\n<li>94% &#8211; Our ability to detect advanced threats\u201d<\/li>\n<li>95% &#8211; \u201cInvestigation Times\u201d<\/li>\n<li>97% &#8211; Our overall security posture\u201d<\/li>\n<\/ul>\n<h3>The XDR Vision<\/h3>\n<p>The overriding message of this report is that XDR is about more than dumping data into a single SIEM or data lake.  The value of XDR will be realized when tools both share data and take action with 2-way communication.  An XDR <a href=\"https:\/\/www.infoblox.com\/products\/cybersecurity-ecosystem\/\" rel=\"noopener\" target=\"_blank\">security ecosystem<\/a> requires tools to automatically collect and correlate data by helping to expose what matters most, and then be prepared to take action and\/or share the results of that specialized analysis to other tools in the stack. <\/p>\n<p>For a great example of how this can work, take a look at the <a href=\"https:\/\/insights.infoblox.com\/solution-notes\/infoblox-solution-note-soc-insights\" rel=\"noopener\" target=\"_blank\">SOC Insights<\/a> feature available for our BloxOne Threat Defense solution.  SOC Insights applies AI-driven analytics to event, network, ecosystem and unique DNS Threat Intel to first reduce hundreds of thousands of alerts down to a more manageable set of \u2018Insights\u2019.  But it then correlates that data into a unique investigation portal, or can share the results with other tools.<\/p>\n<p>With XDR, a vendor specialized in an area such as \u2018vulnerabilities\u2019 can apply their own expertise via AI or other analytics.  Then, as with SOC Insights, it can take action or provide the next tool in line with a better place to start applying its own expertise.<\/p>\n<style>\n.green {color: #00bd4d;}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">The Promise of XDR<\/span>: Exploring ESG\u2019s XDR and SOC Modernization Survey');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A recent ESG survey of 374 IT and cybersecurity professionals reveals how security leaders are facing the challenges of integrating XDR with existing security tools to reap all the promised rewards. This strategic move is aimed to enhance threat visibility, accelerate response times, and fortify security postures by unlocking XDR\u2019s full potential to transform reactive [&hellip;]<\/p>\n","protected":false},"author":334,"featured_media":10132,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[985,40,1034,917,135,361,1035],"class_list":{"0":"post-10122","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-xdr","9":"tag-threat-intelligence","10":"tag-siem-integration","11":"tag-threat-detection","12":"tag-incident-response","13":"tag-network-security","14":"tag-dns-detection-and-response-dnsdr","15":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Amplifying XDR Integrating for Stronger Cyber Resilience<\/title>\n<meta name=\"description\" content=\"Read this Infoblox blog by Bob Hansmann to learn how integrating XDR with security tools enhances threat visibility, accelerates response, and fortifies defenses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Amplifying XDR Integrating for Stronger Cyber Resilience\" \/>\n<meta property=\"og:description\" content=\"Read this Infoblox blog by Bob Hansmann to learn how integrating XDR with security tools enhances threat visibility, accelerates response, and fortifies defenses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-22T18:00:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-07T07:41:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"339\" \/>\n\t<meta property=\"og:image:height\" content=\"303\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Hansmann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Amplifying XDR Integrating for Stronger Cyber Resilience\" \/>\n<meta name=\"twitter:description\" content=\"Read this Infoblox blog by Bob Hansmann to learn how integrating XDR with security tools enhances threat visibility, accelerates response, and fortifies defenses.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Hansmann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\\\/\"},\"author\":{\"name\":\"Bob Hansmann\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/28fb1d8fd532fc28e3af32405568afd8\"},\"headline\":\"The Promise of XDR: Exploring ESG\u2019s XDR and SOC Modernization Survey\",\"datePublished\":\"2024-05-22T18:00:56+00:00\",\"dateModified\":\"2024-06-07T07:41:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\\\/\"},\"wordCount\":1013,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey-thumbnail.jpg\",\"keywords\":[\"XDR\",\"Threat Intelligence\",\"SIEM Integration\",\"threat detection\",\"incident response\",\"Network Security\",\"DNS Detection and Response (DNSDR)\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\\\/\",\"name\":\"Amplifying XDR Integrating for Stronger Cyber Resilience\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey-thumbnail.jpg\",\"datePublished\":\"2024-05-22T18:00:56+00:00\",\"dateModified\":\"2024-06-07T07:41:37+00:00\",\"description\":\"Read this Infoblox blog by Bob Hansmann to learn how integrating XDR with security tools enhances threat visibility, accelerates response, and fortifies defenses.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey-thumbnail.jpg\",\"width\":339,\"height\":303},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Promise of XDR: Exploring ESG\u2019s XDR and SOC Modernization Survey\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/28fb1d8fd532fc28e3af32405568afd8\",\"name\":\"Bob Hansmann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"caption\":\"Bob Hansmann\"},\"description\":\"Bob Hansmann has spent over three decades helping global enterprises and government agencies to uplift their threat prevention, detection, investigation, and response capabilities. Working in areas ranging from threat research and engineering to product management and marketing across his career, Mr. Hansmann has helped pioneer many of today\u2019s security industry standards. This breadth of experience has given him a unique perspective on finding the optimal balance between an organization\u2019s security needs with its success criteria.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-hansmann\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Amplifying XDR Integrating for Stronger Cyber Resilience","description":"Read this Infoblox blog by Bob Hansmann to learn how integrating XDR with security tools enhances threat visibility, accelerates response, and fortifies defenses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/","og_locale":"en_US","og_type":"article","og_title":"Amplifying XDR Integrating for Stronger Cyber Resilience","og_description":"Read this Infoblox blog by Bob Hansmann to learn how integrating XDR with security tools enhances threat visibility, accelerates response, and fortifies defenses.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/","og_site_name":"Infoblox Blog","article_published_time":"2024-05-22T18:00:56+00:00","article_modified_time":"2024-06-07T07:41:37+00:00","og_image":[{"width":339,"height":303,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey-thumbnail.jpg","type":"image\/jpeg"}],"author":"Bob Hansmann","twitter_card":"summary_large_image","twitter_title":"Amplifying XDR Integrating for Stronger Cyber Resilience","twitter_description":"Read this Infoblox blog by Bob Hansmann to learn how integrating XDR with security tools enhances threat visibility, accelerates response, and fortifies defenses.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey-thumbnail.jpg","twitter_misc":{"Written by":"Bob Hansmann","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/"},"author":{"name":"Bob Hansmann","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/28fb1d8fd532fc28e3af32405568afd8"},"headline":"The Promise of XDR: Exploring ESG\u2019s XDR and SOC Modernization Survey","datePublished":"2024-05-22T18:00:56+00:00","dateModified":"2024-06-07T07:41:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/"},"wordCount":1013,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey-thumbnail.jpg","keywords":["XDR","Threat Intelligence","SIEM Integration","threat detection","incident response","Network Security","DNS Detection and Response (DNSDR)"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/","url":"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/","name":"Amplifying XDR Integrating for Stronger Cyber Resilience","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey-thumbnail.jpg","datePublished":"2024-05-22T18:00:56+00:00","dateModified":"2024-06-07T07:41:37+00:00","description":"Read this Infoblox blog by Bob Hansmann to learn how integrating XDR with security tools enhances threat visibility, accelerates response, and fortifies defenses.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey-thumbnail.jpg","width":339,"height":303},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-promise-of-xdr-exploring-esgs-xdr-and-soc-modernization-survey\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"The Promise of XDR: Exploring ESG\u2019s XDR and SOC Modernization Survey"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/28fb1d8fd532fc28e3af32405568afd8","name":"Bob Hansmann","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","caption":"Bob Hansmann"},"description":"Bob Hansmann has spent over three decades helping global enterprises and government agencies to uplift their threat prevention, detection, investigation, and response capabilities. Working in areas ranging from threat research and engineering to product management and marketing across his career, Mr. Hansmann has helped pioneer many of today\u2019s security industry standards. This breadth of experience has given him a unique perspective on finding the optimal balance between an organization\u2019s security needs with its success criteria.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-hansmann\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/334"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=10122"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10122\/revisions"}],"predecessor-version":[{"id":10127,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10122\/revisions\/10127"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/10132"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=10122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=10122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=10122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}