This is the fourth in a five-part blog series on managed detection and response as it drives strategic security outcomes for businesses.

More and more managed detection and response (MDR) providers need to recognize their place among multicloud platforms. Today’s businesses often have data scattered among different cloud providers. Most vendors offer cloud-based services, after all. Therefore, it’s important for a multicloud MDR services platform to provide a way to pull in all relevant data sources when hunting for potential threats, regardless of the cloud provider.

Read on to learn about how modernizing is key to your MDR services platform.

And, catch up with the other parts of this series: We discuss alignment in Part 1; in Part 2, we focus protection; and in part 3, we highlight management.

How MDR Services Mesh With an Open, Multicloud Platform

More endpoint detection and response (EDR) platforms are becoming available. Therefore, it’s up to the MDR service provider to evaluate its usefulness for threat hunting as well as general endpoint detection capabilities. Some of the important questions to answer while evaluating a new EDR platform are:

  • Does the platform give the entire picture with regards to a process execution?
  • Can it look at file modifications, network connections, registry changes and more?
  • Does the platform allow custom threat intelligence to be included?
  • Can you easily add data from the EDR solution into a platform that can search across all data types in a multicloud environment?

The EDR platform an enterprise chooses to deploy is not an issue when working with an MDR service provider who is agnostic to which technology you use. This viewpoint allows you to pick the right solution for you with guidance from the MDR services provider. It also provides the option to switch platforms if the one you choose first does not perform as expected.

An arsenal of EDR platform offerings allows an MDR services provider to hit the ground running. Threat hunters are already trained on how to use the platform, which enables quicker responses to potential threats. This is even more important for an enterprise that may have just suffered an attack or breach that prompted the hiring of the MDR service provider.

Modernizing Threat Hunting

Endpoint data is only one of the pieces you can use during a threat hunt or incident response. Other resources such as proxy logs, firewall logs and intrusion detection system/intrusion prevention system logs help to better paint the entire picture. However, the process of gathering these additional logs can be tedious and inefficient.

A platform that allows a threat hunter to search across all logs, including EDR data, can solve this problem. It reduces the amount of data collection needed and allows the threat hunter to begin looking at the data sooner. This platform should also allow for custom threat intelligence across all data sources and automated responses to high-fidelity threats to prevent more damage. It goes beyond what a SIEM solution can do.

The streamlined process of data collection and analysis allows MDR services providers to spot threats quicker. As a result, it may reduce the damage caused by malware. Adopting and creating new tools and techniques is an indicator that the MDR services provider is forward-focused and constantly looking for ways to improve its service to benefit its clients.

MDR Services for the Modern World

The use of cloud platforms is increasing, which requires MDR service providers to adapt in order to remain relevant and effective. Four important questions to keep in mind when picking MDR services are:

1. First, how many EDR platforms does the MDR services provider support?

2. Next, can the MDR services provider continue to provide the same level of service if the organization switches EDR platforms?

3. Does the service also correlate the endpoint data with other relevant sources?

4. Lastly, is the service forward-focused and looking to improve how it protects you?

In part five of this series, we will summarize the key takeaways from these discussions. We’ll explain specific questions to ask MDR services providers and learn more about IBM Security Managed Detection and Response Services.

More from Intelligence & Analytics

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Web injections are back on the rise: 40+ banks affected by new malware campaign

8 min read - Web injections, a favored technique employed by various banking trojans, have been a persistent threat in the realm of cyberattacks. These malicious injections enable cyber criminals to manipulate data exchanges between users and web browsers, potentially compromising sensitive information. In March 2023, security researchers at IBM Security Trusteer uncovered a new malware campaign using JavaScript web injections. This new campaign is widespread and particularly evasive, with historical indicators of compromise (IOCs) suggesting a possible connection to DanaBot — although we…

Accelerating security outcomes with a cloud-native SIEM

5 min read - As organizations modernize their IT infrastructure and increase adoption of cloud services, security teams face new challenges in terms of staffing, budgets and technologies. To keep pace, security programs must evolve to secure modern IT environments against fast-evolving threats with constrained resources. This will require rethinking traditional security strategies and focusing investments on capabilities like cloud security, AI-powered defense and skills development. The path forward calls on security teams to be agile, innovative and strategic amidst the changes in technology…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today