VMware has launched VMware Carbon Black Cloud Managed Detection and Response (MDR), designed to help enterprises with understaffed SOCs (Security Operation Center) fill the gaps arising from rapidly evolving threat landscapes.With a mission statement from VMware that promises to go beyond monitoring threats and validating alerts in order to gain visibility and understanding into various threat environments, the newly launched MDR offers round-the-clock monitoring, alert triage, and threat analyst guidance on policy changes as well as assistance with threat containment in the event of an incident.\u201cOur MDR offering is built for CISOs, CTOs and SOC (Security Operations Center) managers looking to increase visibility within their environments, reduce security staffing pressures, and speed up incident response,\u201d says Kal De, vice president and general manager of security business unit at VMware. \u201cAs our customers take steps to empower their SOC teams amid the increase in cyberattacks, our MDR offering provides critical insight and analyst guidance to SMBs, large enterprises, existing partners, and our government customers.\u201dMDR aims for endpoint, workload protectionVMware Carbon Black Cloud MDR is designed to provide insight into attacks on endpoints and workloads, as well as recommendations for policy changes that customers can take to remediate threats.\u201cThe risk and the cost of a breach is absolutely too huge, especially for a midsized to enterprise size business,\u201d says Constellation Research analyst Liz Miller. \u201cWith VMWare\u2019s expansive network of endpoints that can accelerate the rate of detection, this could be that early warning and awareness system teams are looking for. This is especially interesting for CISOs who are considering and weighing if an MDR or an XDR solution is right for them right now.\u201dAnalyst services enhance threat analysisVMware analysts monitor MDR customer environments, using proprietary machine learning algorithms to offer threat analysis, guidance on policy changes, and help with threat remediation in the event of an incident.As VMWare will need to have access into a client\u2019s network to effectively implement the solution, there is a concern for it to become an attack vector. \u201cAny solution you bring into\/onto\/remotely close to your network and infinite perimeter could become a vulnerability or threat,\u201d added Miller. \u201cThis is why one solution is never going to be the silver bullet. This is about layering smart approaches and not assuming that VMware will take care of it all.\u201dFeatures offered by VMWare Carbon Black Cloud MDR include threat validation, email alerts, root cause analysis, threat advisories, monthly reports, incident response communications with analysts, and threat containment.\u201cBecause of [VMware's] global expertise and knowledge, these services can just see more and see faster than the average in-house team that could be juggling thousands of alerts and issues. This brings focus where it is needed most: giving the in-house security talent the space and the time to address critical alerts and investigations,\u201d added Miller.