EDR, NDR, MDR, XDR: It Still Comes Down to Detection and Response

Play video

ReliaQuest’s Erin Sweeney on the Evolution and Rebranding of Defense

EDR, NDR, XDR – we keep rebranding defense, but it all still comes down to detection and response, says Erin Sweeney of ReliaQuest. She discusses the latest evolution – including open XDR – and how enterprises are deploying it to proactively manage risk and advise the business.

In this video interview with ISMG, Sweeney discusses:

  • The challenges that prompt the constant rebranding of detection and response;
  • What approach enterprises need to deliver a comprehensive picture of their security program;
  • How ReliaQuest is helping customers tackle 2021’s challenges by unifying detection and response across their existing technology investments.

Sweeney leads product marketing for ReliaQuest after an 11-year tenure at Splunk, where she held a variety of roles across solution, industry, field, and customer success. While there, her efforts helped drive the growth of the company from a start-up with $8 million in annual revenue to a $2 billion publicly traded cybersecurity industry leader. Prior to Splunk, Sweeney held marketing roles at Vocus (now Cision) and EFI.

Watch the Podcast

Get your complimentary transcript of the interview below:

More resources

10 Minute-Take: Ready, Set, Automate!

In theory, automation is the perfect remedy for the security professional’s biggest headaches: manual, repetitive, time-consuming processes; inconsistent analysis and workflow; employee retention; and slow investigations and response times. It’s not a silver bullet though. To make automation work, you need to take an approach that spans the entire cyber lifecycle. That means mapping out […]

Continuous Attack Simulations

Attack simulations continuously mimic real-world threats to highlight gaps in security systems, and unlike traditional ad hoc testing, they provide an ongoing view of dynamic security environments. Can the insights from attack simulations be used to close gaps and strengthen security programs? They can, if integrated into your existing security operations. In this paper, you’ll […]