This is the fourth in a five-part blog series on managed detection and response as it drives strategic security outcomes for businesses.

More and more managed detection and response (MDR) providers need to recognize their place among multicloud platforms. Today’s businesses often have data scattered among different cloud providers. Most vendors offer cloud-based services, after all. Therefore, it’s important for a multicloud MDR services platform to provide a way to pull in all relevant data sources when hunting for potential threats, regardless of the cloud provider.

Read on to learn about how modernizing is key to your MDR services platform.

And, catch up with the other parts of this series: We discuss alignment in Part 1; in Part 2, we focus protection; and in part 3, we highlight management.

How MDR Services Mesh With an Open, Multicloud Platform

More endpoint detection and response (EDR) platforms are becoming available. Therefore, it’s up to the MDR service provider to evaluate its usefulness for threat hunting as well as general endpoint detection capabilities. Some of the important questions to answer while evaluating a new EDR platform are:

  • Does the platform give the entire picture with regards to a process execution?
  • Can it look at file modifications, network connections, registry changes and more?
  • Does the platform allow custom threat intelligence to be included?
  • Can you easily add data from the EDR solution into a platform that can search across all data types in a multicloud environment?

The EDR platform an enterprise chooses to deploy is not an issue when working with an MDR service provider who is agnostic to which technology you use. This viewpoint allows you to pick the right solution for you with guidance from the MDR services provider. It also provides the option to switch platforms if the one you choose first does not perform as expected.

An arsenal of EDR platform offerings allows an MDR services provider to hit the ground running. Threat hunters are already trained on how to use the platform, which enables quicker responses to potential threats. This is even more important for an enterprise that may have just suffered an attack or breach that prompted the hiring of the MDR service provider.

Modernizing Threat Hunting

Endpoint data is only one of the pieces you can use during a threat hunt or incident response. Other resources such as proxy logs, firewall logs and intrusion detection system/intrusion prevention system logs help to better paint the entire picture. However, the process of gathering these additional logs can be tedious and inefficient.

A platform that allows a threat hunter to search across all logs, including EDR data, can solve this problem. It reduces the amount of data collection needed and allows the threat hunter to begin looking at the data sooner. This platform should also allow for custom threat intelligence across all data sources and automated responses to high-fidelity threats to prevent more damage. It goes beyond what a SIEM solution can do.

The streamlined process of data collection and analysis allows MDR services providers to spot threats quicker. As a result, it may reduce the damage caused by malware. Adopting and creating new tools and techniques is an indicator that the MDR services provider is forward-focused and constantly looking for ways to improve its service to benefit its clients.

MDR Services for the Modern World

The use of cloud platforms is increasing, which requires MDR service providers to adapt in order to remain relevant and effective. Four important questions to keep in mind when picking MDR services are:

1. First, how many EDR platforms does the MDR services provider support?

2. Next, can the MDR services provider continue to provide the same level of service if the organization switches EDR platforms?

3. Does the service also correlate the endpoint data with other relevant sources?

4. Lastly, is the service forward-focused and looking to improve how it protects you?

In part five of this series, we will summarize the key takeaways from these discussions. We’ll explain specific questions to ask MDR services providers and learn more about IBM Security Managed Detection and Response Services.

More from Intelligence & Analytics

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today