New joint solution enhances ability to predict, detect, and respond to cyberattacks at scale across endpoints, networks, identities, cloud, and workspaces. Credit: Matejmo / Getty Images Cybersecurity firm Cybereason and Google Cloud have unveiled a new joint solution to enhance the ability of defenders to predict, detect and respond to cyberattacks at scale. Cybereason XDR, powered by Google Chronicle, is designed to work at speed across the entire enterprise – including endpoints, networks, identities, cloud and workspaces. The partnership may be indicative of the modern threat detection and response market.Joint platform consolidates attack defense, ends solution silosIn today’s environments, organizations typically face the challenge of managing a multi-connected attack surface with siloed solutions that hamper defense processes. With Cybereason XDR powered by Google Chronicle, defenders can leverage Cybereason AI-driven XDR to predict, understand, and end sophisticated attacks with what Cybereason claims is the only solution on the market that delivers planetary-scale protection, operation-centric detection and response, and attacker behavior prediction, according to the two companies.“Together Cybereason and Google Cloud are delivering the industry’s first true XDR platform,” stated Cybereason CEO and co-founder Lior Div in a press release. “Other vendors have simply done an endpoint extension and called it XDR. That’s not good enough. Our AI-driven XDR platform paints one unified story of an attack and it takes one coordinated set of actions to end attacks while predicting and preventing tomorrow’s threats.” Sunil Potti, general manager and vice president of cloud security at Google Cloud, added that, with this XDR solution, organizations can now reverse the adversary advantage and end malicious operations with confidence. New platform indicative of current detection and response trendsSpeaking to CSO, Forrester analyst Allie Mellen reflects what the platform indicates about the current state and future of endpoint protection and threat response. “Many EDR vendors have been partnering with SIEM vendors over the past year to deliver XDR – for example, Devo and EclecticIQ. This is one way EDR vendors can bring in additional log data from other sources without needing the expertise in log management in-house,” she says.These offerings are particularly beneficial for remote work because they give security teams visibility and insight into what is happening on endpoints, Mellen adds. “How much this new partnership will improve protection remains to be seen. However, with other XDR offerings in the space that have been available for over a year, we have seen end users get additional value. Particularly, end users rave about the detection quality with native XDR offerings,” Mellen concludes. Related content brandpost Sponsored by Cyber NewsWire Memcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From Digital Impersonation Fraud By Cyber NewsWire - Paid Press Release May 21, 2024 4 mins Cyberattacks Security opinion Employee discontent: Insider threat No. 1 CISOs who focus only on detection technology — and don’t engage with the human side of the security equation — are missing a key ingredient for insider risk management. By Christopher Burgess May 21, 2024 7 mins CSO and CISO Threat and Vulnerability Management Human Resources how-to Download the hybrid cloud data protection enterprise buyer’s guide From the editors of our sister publication Network World, this enterprise buyer’s guide helps network and security IT staff understand the issues their organizations face around protecting corporate data in a hybrid cloud environment and how to By Neal Weinberg May 20, 2024 1 min Cloud Security Data and Information Security Enterprise Buyer’s Guides news analysis Global stability issues alter cyber threat landscape, ESET reports With conflict on the rise, regional APT groups are increasing activity, altering focus, and putting specific industries in their crosshairs. Here’s what CISOs should know. By Evan Schuman May 20, 2024 4 mins Advanced Persistent Threats Cyberattacks Threat and Vulnerability Management PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe