{"id":77846,"date":"2024-04-25T17:46:52","date_gmt":"2024-04-25T09:46:52","guid":{"rendered":"https:\/\/version-2.com\/?p=77846"},"modified":"2024-04-19T17:50:33","modified_gmt":"2024-04-19T09:50:33","slug":"how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/04\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/","title":{"rendered":"How XDR and MDR help secure your tomorrow against ransomware"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"77846\" class=\"elementor elementor-77846\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"content-c8913731\" class=\"csc-frame csc-frame-default\"><h4 class=\"bold\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/xdr-mdr-blog-250x250.png\" alt=\"\" width=\"250\" height=\"250\" \/><\/h4><div><div id=\"content-c10483421\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h4 class=\"bold\">Locating XDR and MDR in a prevention-first approach to security.<\/h4><\/header><p>\u201cHow could this happen?\u201d<\/p><p>This is what both executives and Security Operations Center (SOC) teams of enterprises might keep asking themselves after a successful ransomware attack.<\/p><p>The story is often the same \u2013 a random phishing email finds its way into the inbox of an employee, who then proceeds to provide personally identifiable information, including work account details, to a seemingly legitimate-looking entity.<\/p><p>Social engineering and email scams remain some of the top threats facing businesses worldwide, with <a href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-threat-report-h22023.pdf\" target=\"_blank\" rel=\"noopener\">ESET Research finding<\/a> phishing and fraud trojans at the top of email threat detections.<\/p><p>Recently, Insomniac Games, a subsidiary of PlayStation Studios, was compromised by the <a href=\"https:\/\/www.polygon.com\/24009631\/insomniac-games-leak-hack-rhysida-files-breach\" target=\"_blank\" rel=\"noopener\">Rhysida ransomware<\/a>, ending up with terabytes of leaked data, as the studio refused to pay the ransom asked of them (which, despite the result, is a <a href=\"https:\/\/www.welivesecurity.com\/2021\/07\/08\/ransomware-pay-not-pay-legal-illegal-these-are-questions\/\" target=\"_blank\" rel=\"noopener\">legitimate strategy<\/a>, since threat actors are not the most trustworthy of entities).<\/p><p>Is there an approach to security that could have prevented an attack like this? Let\u2019s explore a prevention-first approach employing Extended Detection and Response (XDR) or Managed Detection and Response (MDR).<\/p><\/div><div id=\"content-c10483422\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Persistent threats persistently threaten established businesses<\/h3><\/header><p>Just as fairy tales tell of big villains that kidnap princesses and valiant heroes running to save them, the same is true for ransomware and cyberattacks in general.<\/p><p>However, instead of dragons trying to burn down castles, we\u2019re discussing dangerous forms of malware deployed to penetrate and occupy them. Valiant heroes, in the form of security specialists, then try to hold what was supposed to be a rather secure castle with all the defensive bells and whistles available \u2026 apart from that big gaping hole right under the north-facing castle walls, obscured by a green bush.<br \/>Perhaps the metaphor went a bit too far, but the idea is clear \u2013 there will always be certain vulnerabilities, unprotected threat surfaces\/vectors, or gaps in defenses that might not be as obvious at first sight as we would assume.<\/p><p>Threat actors will always try to gain entry to a business&#8217;s internal systems because that\u2019s where to find the most important access rights\/files\/data that are dear to the managers and CEOs. That value can be enumerated in millions and in some cases even billions of (dollars, Euros\/other). And crooks know that, so they will keep trying their best to pull the chair from under the people tasked with securing businesses.<\/p><p>Consider the <a href=\"https:\/\/www.techtarget.com\/whatis\/feature\/SolarWinds-hack-explained-Everything-you-need-to-know\" target=\"_blank\" rel=\"noopener\">SolarWinds<\/a> and the <a href=\"https:\/\/www.welivesecurity.com\/2023\/06\/23\/what-to-know-about-the-moveit-hack-week-in-security-with-tony-anscombe\/\" target=\"_blank\" rel=\"noopener\">MOVEit<\/a> supply chain attacks, for example. The former happened in 2020 because of understated and poorly communicated vulnerabilities, while the latter, in 2023, was caused by hackers exploiting a flaw within the file transfer software, gaining access to sensitive customer data.<\/p><p>The result of the MOVEit hack? According to <a href=\"https:\/\/www.emsisoft.com\/en\/blog\/44123\/unpacking-the-moveit-breach-statistics-and-analysis\/\" target=\"_blank\" rel=\"noopener\">Emsisoft\u2019s estimate<\/a>, USD 15 billion in damages. This after having impacted around 2,726 organizations. They say you can\u2019t put a price on many things, like health and safety \u2026 however, this is not the case for cybersecurity.<\/p><p>Regarding both attacks, it didn\u2019t matter whether a particular business was targeted, since due to the nature of a supply-chain attack, any partner\/client can sustain collateral damage, often having their information accessed and leaked as a result. Therefore, it can be said that as far as a supply-chain attack is concerned, no one in it is safe \u2026 unless they take some specific precautions, such as by investing in XDR or an MDR service.<\/p><\/div><div id=\"content-c10483423\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Vulnerabilities in and out<\/h3><\/header><p>Now, zero-day vulnerabilities are tough to prevent, since they usually crop up due to flaws in software that not even the developer may know about \u2013 hence the name.<\/p><p>Vulnerabilities can be disclosed, and subsequently recorded, by organizations like <a href=\"https:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noopener\">MITRE<\/a>, which maintains the registry of common vulnerabilities and exposures (CVEs).<\/p><p>One way to prevent the exploitation of vulnerabilities is to always keep systems and apps up to date, such as with security updates, or by patching vulnerabilities through patch management functions, which are often a requirement of <a href=\"https:\/\/www.eset.com\/blog\/business\/how-to-decrease-security-liabilities-for-smbs-look-at-cyber-risks-through-the-eyes-of-an-insurer\/\" target=\"_blank\" rel=\"noopener\">cyber insurance<\/a> nowadays.<\/p><\/div><div id=\"content-c10483424\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/VAPMRansom.png\" alt=\"\" width=\"605\" height=\"338\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c10483460\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>The reason vulnerabilities are so important in the grand scheme of things is that successful patching and updates are make or break for the management of a company\u2019s threat surfaces. Security admins have to demonstrate effectiveness here, both in the office and for employees working hybrid or fully remotely. This is true regardless of how device use expands beyond the limits of company premises and must even extend security to areas and activities security admins may not see. This brings with it a whole slew of problems, including potential new vulnerabilities, the resulting incidents, and users being targeted who have access to critical internal networks and data through their computers, phones, or tablets.<\/p><p>This fact is driven home, especially as cloud-based tools become the norm. As a result, cloud security has become a key component of prevention, since most companies now use products like SharePoint or other cloud-powered internal data repositories and sharing networks. And what\u2019s more, both the benefits and the risks trickle down to cloud-powered apps like Office 365 or Google Workspace Suite, meaning that the more connection there is between an internal server and an external user, the more opportunities there are for exploitation. This is very evident when we look at cases where, for example, Microsoft Teams was used to <a href=\"https:\/\/www.eset.com\/blog\/business\/intruder-from-within-or-is-it\/\" target=\"_blank\" rel=\"noopener\">share malware through external accounts<\/a> that did not even belong to the targeted organization.<\/p><\/div><div id=\"content-c10483461\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Monitoring an extended network<\/h3><\/header><p>Cloud security is important, but it is not enough, especially from the perspective of a security admin who might want to have a deeper understanding of their company network, with specific alerts, rules, and triggers that would highlight and specify issues arising during crucial moments \u2013 like when an attacker is trying to exploit one of the company\u2019s assets.<\/p><p>Skilled admins would probably pick an XDR solution to gain an understanding of their environment, with access to quick remediation of potential incidents. This is all well and nice \u2013 when an organization has the necessary resources to purchase and maintain such a solution.<\/p><p>Sure, XDR tasks can be made easier by employing effective and intuitive software solutions like the ones offered via ESET Inspect, which makes the lives of security admins easier by coming <a href=\"https:\/\/help.eset.com\/ei_navigate\/1.11\/en-US\/rules.html\" target=\"_blank\" rel=\"noopener\">pre-loaded with certain rules<\/a>, with further enhancement being rather easy to configure thanks to its elegant interface. But that takes time, and it also asks the admin to know their environment enough to recognize which rules need to be configured, customized, and set up in a prioritized manner.<\/p><\/div><div id=\"content-c10483462\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/RulesRansom3.png\" alt=\"\" width=\"700\" height=\"340\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c10483468\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>From there, capabilities like the <a href=\"https:\/\/www.eset.com\/blog\/enterprise\/leveraging-automation-and-ux-to-reduce-admin-decision-fatigue-on-detection-and-response-platforms\/\" target=\"_blank\" rel=\"noopener\">automatic incident creator<\/a> found in ESET Inspect can work wonders to speed up incident remediation, giving the admin more time and room to focus on other important matters.<\/p><\/div><div id=\"content-c10483469\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/ICRansom3.png\" alt=\"\" width=\"700\" height=\"339\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c10483618\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>But is that enough? Can XDR prevent ransomware attacks such as the one that targeted the above-mentioned game studio?<\/p><\/div><div id=\"content-c10483619\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Time to stop ransomware<\/h3><\/header><p>Indeed, while using XDR is one way to stop the execution of ransomware, the admins need to be fast enough to respond on time, stopping the threat in all locations, and killing it as soon as possible by knowing where the breach occurred.<\/p><p>XDR can help with that, as it <a href=\"https:\/\/www.eset.com\/blog\/business\/detection-and-response-means-becoming-an-active-defender\/\" target=\"_blank\" rel=\"noopener\">offers a granular view<\/a> of a company\u2019s environment. During the MOVEit saga, for example, ESET Inspect <a href=\"https:\/\/www.eset.com\/blog\/business\/navigating-the-moveit-transfer-vulnerabilities\/\" target=\"_blank\" rel=\"noopener\">managed to detect the compromise<\/a> and supply admins with logs pertaining to it.<\/p><p>And if that is not enough, or a company requires more professional help to rapidly address mitigation and remediation needs, services including a larger capacity of security experts supplied with professional software \u2013MDR solutions \u2013 are where it\u2019s at.<\/p><p>MDR is a lot like XDR, but it adds another dimension \u2013 it is a service that also employs real-life experts to manage company cybersecurity. While XDR is a great pick for businesses with enough personnel, institutional knowledge, and capacity to tackle complex threats, MDR pushes security to greater heights as it supplies experts with deep knowledge of both the security tool at hand (XDR) and the threat environment.<\/p><p>This means high-level support in case of an incident, be it a random weekday, holiday, or weekend, as MDR is a 24\/7\/365 service. So, in case a ransomware attack happens when most of a business is out, the MDR team can still immediately respond to a threat despite the lack of in-house staff.<\/p><p>This rings true even for small and medium-size businesses (SMBs), which can lack such staff by design, due to limited resources. Regardless,<a href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/resources\/eset_smb_digital_security_sentiment_report.pdf\" target=\"_blank\" rel=\"noopener\"> SMBs face the same threats as large enterprises<\/a>, including ransomware. And in such cases, quick action is always necessary.<\/p><\/div><div id=\"content-c10483620\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Closing time<\/h3><\/header><p>It&#8217;s one thing to stop an ongoing incident, but it&#8217;s an entirely different thing to proactively prevent an incident from happening in the first place.<\/p><p>XDR and MDR are both excellent choices in the fight against ransomware and related threats, as they empower companies to be on the lookout for even the most insidious threats.<\/p><p>And while all the components of a security platform such as <a href=\"https:\/\/www.eset.com\/int\/business\/protect-platform\/\" target=\"_blank\" rel=\"noopener\">ESET PROTECT<\/a> help in protecting specific environments, a detection and response solution, whether in-house or as a service, combines all of this into a single view. It provides a refined and clear understanding of the security apparatus of a company, giving admins the right tools to respond and remediate on time.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Locating XDR and MDR in a prevention-first approach to  [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,40,61],"tags":[41,1272],"class_list":["post-77846","post","type-post","status-publish","format-standard","hentry","category-1273","category-eset","category-press-release","tag-eset","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How XDR and MDR help secure your tomorrow against ransomware - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How XDR and MDR help secure your tomorrow against ransomware - Version 2\" \/>\n<meta property=\"og:description\" content=\"Locating XDR and MDR in a prevention-first approach to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-25T09:46:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/xdr-mdr-blog-250x250.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/04\\\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"How XDR and MDR help secure your tomorrow against ransomware\",\"datePublished\":\"2024-04-25T09:46:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/04\\\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\\\/\"},\"wordCount\":1541,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/xdr-mdr-blog-250x250.png\",\"keywords\":[\"ESET\",\"2024\"],\"articleSection\":[\"2024\",\"ESET\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/04\\\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\\\/\",\"name\":\"How XDR and MDR help secure your tomorrow against ransomware - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/xdr-mdr-blog-250x250.png\",\"datePublished\":\"2024-04-25T09:46:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/xdr-mdr-blog-250x250.png\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/xdr-mdr-blog-250x250.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/enterprise\\\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How XDR and MDR help secure your tomorrow against ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How XDR and MDR help secure your tomorrow against ransomware - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"How XDR and MDR help secure your tomorrow against ransomware - Version 2","og_description":"Locating XDR and MDR in a prevention-first approach to [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/","og_site_name":"Version 2","article_published_time":"2024-04-25T09:46:52+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/xdr-mdr-blog-250x250.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/04\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"How XDR and MDR help secure your tomorrow against ransomware","datePublished":"2024-04-25T09:46:52+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/04\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/"},"wordCount":1541,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/xdr-mdr-blog-250x250.png","keywords":["ESET","2024"],"articleSection":["2024","ESET","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/04\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/","url":"https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/","name":"How XDR and MDR help secure your tomorrow against ransomware - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/xdr-mdr-blog-250x250.png","datePublished":"2024-04-25T09:46:52+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/xdr-mdr-blog-250x250.png","contentUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/xdr-mdr-blog-250x250.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"How XDR and MDR help secure your tomorrow against ransomware"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-kfA","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/77846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=77846"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/77846\/revisions"}],"predecessor-version":[{"id":77850,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/77846\/revisions\/77850"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=77846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=77846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=77846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}