New joint solution enhances ability to predict, detect, and respond to cyberattacks at scale across endpoints, networks, identities, cloud, and workspaces. Credit: Matejmo / Getty Images Cybersecurity firm Cybereason and Google Cloud have unveiled a new joint solution to enhance the ability of defenders to predict, detect and respond to cyberattacks at scale. Cybereason XDR, powered by Google Chronicle, is designed to work at speed across the entire enterprise – including endpoints, networks, identities, cloud and workspaces. The partnership may be indicative of the modern threat detection and response market.Joint platform consolidates attack defense, ends solution silosIn today’s environments, organizations typically face the challenge of managing a multi-connected attack surface with siloed solutions that hamper defense processes. With Cybereason XDR powered by Google Chronicle, defenders can leverage Cybereason AI-driven XDR to predict, understand, and end sophisticated attacks with what Cybereason claims is the only solution on the market that delivers planetary-scale protection, operation-centric detection and response, and attacker behavior prediction, according to the two companies.“Together Cybereason and Google Cloud are delivering the industry’s first true XDR platform,” stated Cybereason CEO and co-founder Lior Div in a press release. “Other vendors have simply done an endpoint extension and called it XDR. That’s not good enough. Our AI-driven XDR platform paints one unified story of an attack and it takes one coordinated set of actions to end attacks while predicting and preventing tomorrow’s threats.”Sunil Potti, general manager and vice president of cloud security at Google Cloud, added that, with this XDR solution, organizations can now reverse the adversary advantage and end malicious operations with confidence. New platform indicative of current detection and response trendsSpeaking to CSO, Forrester analyst Allie Mellen reflects what the platform indicates about the current state and future of endpoint protection and threat response. “Many EDR vendors have been partnering with SIEM vendors over the past year to deliver XDR – for example, Devo and EclecticIQ. This is one way EDR vendors can bring in additional log data from other sources without needing the expertise in log management in-house,” she says.These offerings are particularly beneficial for remote work because they give security teams visibility and insight into what is happening on endpoints, Mellen adds. “How much this new partnership will improve protection remains to be seen. However, with other XDR offerings in the space that have been available for over a year, we have seen end users get additional value. Particularly, end users rave about the detection quality with native XDR offerings,” Mellen concludes. Related content feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management news Intel Trust Authority attestation services now in general availability Formerly known as Project Amber, Intel’s attestation services support confidential computing deployments. By Michael Nadeau Sep 20, 2023 3 mins Zero Trust Security Hardware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe