Open XDR vs. SIEM

    2592

    Matching Resources and Business Risk with the Right Solution

    Gaining visibility and responding to attacks across the entire enterprise infrastructure (endpoints, servers, applications, SaaS, cloud, users, etc.) is a very tall order in todayā€™s cybersecurity environment. Enterprises are forced to create complex security stacks consisting ofĀ SIEM,Ā UEBA, SOAR, EDR,Ā NDR,Ā TIPĀ and other tools in order to meet this challenge. For many enterprises,Ā SIEMĀ is the main tool for aggregating and analyzing data from the infrastructure. Nearly half of enterprises report that they are not satisfied with theirĀ SIEMsĀ [1], but all enterprises will be quick to point out the amount of capital, time and resources they have poured into standing up and maintaining their SIEMs.Ā Open XDRĀ is emerging as a new approach addressing the challenge of gaining visibility and responding to attacks across the entire enterprise infrastructure. In this article, weā€™ll look at howĀ Open XDRĀ and SIEM measure up as security solutions.

    Defining Open XDR

    Gartner defines XDR, or eXtended Detection and Response, as ā€œa unified security incident detection and response platform that automatically collects and correlates data from multiple proprietary security components.ā€ This definition, dating back to 2020, does not captureĀ Open XDRĀ as an emerging category ofĀ XDRĀ that collects and correlates data from all existing security components, not justĀ proprietaryĀ or single-vendor ones. So,Ā Open XDRĀ is defined the same as Gartnerā€™sĀ XDRĀ definition except that it ends withĀ ā€œall existing security components, delivered via an open architectureā€. TheĀ Open vs. Native XDRĀ difference is discussed in detail in another article. In this article, we focus on Open XDR as it compares to SIEM. So Open XDR has the following technical requirements to fulfill the promise of the above definition:

    • Deployability ā€“Ā Cloud-native microservice architecture for scalability, availability and deployment flexibility
    • Data Fusion ā€“Ā Centralize, normalize and enrich data across the entire attack surface, including network, cloud, endpoints, applications and identity
    • Detection ā€“Ā Ā Built-in automated detections throughĀ Machine LearningĀ 
    • Correlation ā€“Ā High-fidelity correlated detections across multiple security tools
    • Intelligent Response ā€“Ā One-click or automated response from the same platform.

    Sound similar toĀ SIEMĀ plus a littleĀ SOAR? Thatā€™s because it is. However, there are major architectural differences that allowĀ Open XDRĀ to deliver on many of the promises ofĀ SIEMsĀ whereĀ SIEMsĀ have fallen short.

    Defining SIEM

    Gartner definesĀ SIEM, or Security Information and Event Management, as technology that ā€œsupports threat detection, compliance and security incident management through the collection and analysis (both near real time and historical) of security events, as well as a wide variety of other event and contextual data sources.ā€ This definition is notably similar to the definition of XDR. Architecture is where the biggest differences lie, but purely definitionally a SIEM was named after its main purpose ā€“ to manage information and events. XDR was also named after its main purpose ā€“ to detect and respond. This may seem like a minor point, but this difference in business purposes is what drives the architectural approach, and is why SIEMs are so capital-intensive in todayā€™s security environment.

    Architectures Compared

    This comparison focuses only on the differences. There are a number of technical similarities including long-term storage, open integrations with security tools, cloud-nativity, and efficient search and threat-hunting.
    However, Open XDR has five key architectural differences from SIEMs:

    1. Data is forced into a normalized and enriched state, and this is done before the data are stored in a data lake.
    2. Detections and correlation of alerts are automatically driven by AI inĀ Open XDR, not human-written rules as with SIEMs.
    3. Incidents are produced from correlated alerts, from which a single response on the same platform is orchestrated, compared to a SIEM, which sends alerts to a different SOAR platform which then performs downstream correlation and response.
    4. Many tools required for security operations are unified, such asĀ Big Data Lake, UEBA, SOAR, TIP, NDRorĀ EDRĀ on one platform while many SIEMs only include aĀ Big Data Lake, forcing SIEMĀ users to manually combine many complex tools together by themselves.

    Differences 1 and 2 go hand in hand. In order to build and maintain meaningful AI in any industry, the data problem must be solved. In security, that means data must be centralized, normalized and enriched to reduce data complexity. If data is modeled differently at each deployment of a platform, it will be an impossible problem to maintain AI models. XDR forces data to be modeled the same way across each deployment before data lands into a Data Lake; data is only available in its normalized and enriched state. SIEM either provides this as optional functionality or does not provide this feature at all; in the optional case, normalization and enrichment is treated as a post-processing step on raw data that is already stored.

    In summary, on technical differences 1 and 2,Ā Open XDRĀ forces normalization and enrichment on data, so it is capable of building meaningful AI that correlates events and alerts together. For the same reasons,Ā SIEMĀ architecture is not able to produce an AI engine of the same fidelity because of its treatment of data. SIEMs will be able to leverage AI, but it will be difficult to scale.

    Technical difference 3 comes down to anĀ Open XDRĀ performing correlation and response in the same platform. A higher order construct of an incident (multiple related alerts) is automatically produced in anĀ Open XDR platform, and that is responded to holistically. AĀ SIEMĀ must pass alerts to aĀ SOAR, which must correlate alerts together with rules without the deep context of everything happening in the environment.Ā Open XDRĀ produces a response just like a SIEM and SOAR does, but the response fidelity is much greater with XDR because it is orchestrated from the same platform performing detections and AI-driven correlations, where all the data is available.

    The final technical difference is centered around the approach to building and maintaining the overall security stack.Ā Open XDRĀ was designed to unify all key tools for security operations such that they can be orchestrated from one platform. Many SIEMs offer long lists of plugins and deep levels of customization, but that puts the onus on the users to build and configure their system.

    For the enterprise, these technical differences influence the capital, time and resources it takes to run a security platform. SIEMs are open-ended technologies, so they are going to be expensive to operate.Ā Open XDRĀ platforms are security prescriptive technologies, and therefore enterprises will be much more efficient when employing them.

    Finally, while not strictly technical differences, two areas where SIEMs have focused much more are on heavy compliance-related storage and use of the same platform for IT Operations.Ā XDRĀ is designed for the outcome of detection and response. It can still meet compliance requirements, but it was not designed for that from the start. IT Operations in the same platform is something that only SIEM can claim, as Open XDR is strictly focused on security.

    What About NG-SIEMs?

    ā€œNext Genā€ anything signals something that is better, not different.Ā NG-SIEMsĀ are better thanĀ SIEMsĀ in the hypothetical sense.Ā Open XDRĀ is different from both. NG-SIEMs brought huge advancements in many areas where legacyĀ SIEMsĀ were not keeping up with the demands of todayā€™s security environment. Notable improvements are:

    • Use of Big Data technologies (no more SIEM constantly falling over)
    • Some User and Entity Behavior Analysis (UEBA) through various algorithms
    • UI/UX improvements to key workflows like Threat-Hunting
    • Native or open integration withĀ SOARs
    • Data modeling plugins.

    NG-SIEMsĀ certainly close the capability gap between Open XDR and SIEM, but the architectural differences remain the same.

    Some Vendors Say They Offer A SIEM And An XDR Platform ā€“ What Gives?

    There are many similarities between SIEM and Open XDR, as noted above. The technical differences are nuanced, but have major implications on business value and capital required to operate. There are two claims vendors are making if they are using both SIEM andĀ Open XDRĀ to describe their product.

    The first claim vendors may make is that they may useĀ ā€œSIEM Capabilitiesā€Ā to refer to theirĀ Open XDR platformĀ having all the important capabilities of a SIEM ā€“ open collection, storage, search, reporting, cloud-native ā€“ as a way to describe how Open XDR can be deployed in an enterprise security stack, specifically to replace an existingĀ SIEM.

    The second claim vendors may make is to say that their platform is both aĀ SIEMĀ and anĀ Open XDR platform. This is a confusing point likely to ensure that the vendor does not miss out on potential category marketing and can sell a product to customers regardless of whether they are looking for SIEM or Open XDR. As discussed above however, SIEM and Open XDR are different, so the same product cannot be both.

    Navigating The Collision Course Of XDR And SIEM

    XDR is on a collision course withĀ SIEMĀ and SOAR, as noted by Forrester [2]. Enterprises need to approach both technology categories with their long-term business outcomes and available resources in mind. Is high fidelity, automated detection and response out of the box more important? Is the capability of response from the same platform by the same team critical to reduce the attack dwelling time? Is the team short-staffed and/or needs lots of training to run the tool? These are the key questions enterprises must bring to the table when defining their security stack strategy and deciding whether XDR or SIEM is right for them.

    Ad

    No posts to display