{"id":6848,"date":"2023-01-19T17:34:52","date_gmt":"2023-01-19T15:34:52","guid":{"rendered":"https:\/\/heliview.com\/urity-leadership\/?p=6848"},"modified":"2023-01-19T17:34:52","modified_gmt":"2023-01-19T15:34:52","slug":"untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr","status":"publish","type":"post","link":"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/","title":{"rendered":"Untangling the Cybersecurity Alphabet Soup From EDR, SIEM, and SOAR to XDR."},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<strong>Wat betekenen de afkortingen EDR, XDR en MXDR?<\/strong><\/p>\n<p>Cybersecurity-artikelen zijn vaak doorspekt met jargon en afkortingen. In het artikel leggen we een aantal van deze afkortingen uit. Cyberaanvallen worden steeds geavanceerder, wat betekent dat organisaties ook nieuwe beschermingmethoden moeten aanwenden om deze complexe dreigingen tegen te gaan. Denk bijvoorbeeld aan Extended Detection and Response (EDR), de voorloper van nog een andere afkorting: XDR.<\/p>\n<p>Hoewel XDR het afgelopen jaar veel aandacht heeft gekregen, is het nog steeds een concept waar verwarring over bestaat. Daarom leggen we in het whitepaper uit hoe de detectie- en response-oplossingen EDR, XDR, MXDR, SIEM en SOAR zich tot elkaar verhouden.[\/vc_column_text]        <div class=\"lgx-subscriber-area\" >\n            <form class=\"vc-whitepaper-form\">\n                <h3>Download the whitepaper<\/h3>\n                <p class=\"nieuwsbrief-validation-error nieuwsbrief-validation-error--message hidden\">\n                    One or more fields have not been filled in or have been filled in incorrectly.\n                <\/p>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        First name*<br>\n                        <input type=\"text\" name=\"firstname\" maxlength=\"50\" autocomplete=\"given-name\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Last name*<br>\n                        <input type=\"text\" name=\"lastname\" maxlength=\"50\" autocomplete=\"family-name\">\n                    <\/label>\n                <\/div>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Company name*<br>\n                        <input type=\"text\" name=\"companyname\" value=\"\" size=\"50\" autocomplete=\"organization\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Role*<br>\n                        <input type=\"text\" name=\"workdescription\" value=\"\" size=\"100\" autocomplete=\"organization\">\n                    <\/label>\n                <\/div>\n                <label>\n                    Business email address*\n                    <input type=\"email\" id=\"EmailAddressNewsletter\" name=\"email\" \/>\n                <\/label>\n                <p>By clicking on sign up you give permission to be emailed, you will receive the whitepaper in your mailbox.<\/p>\n                <input onclick=\"Website.SubscribeToNewsletter('851292295237', '273bc32f-3859-4b35-8b88-22b787e45a9d ')\" type=\"button\" class=\"lgx-btn\" value=\"Sign up\">\n                <div id=\"NewsletterSuccess\" class=\"nieuwsbrief-succes hidden\">Thank you, you will receive an email within a few minutes to download the whitepaper.<\/div>\n                <div id=\"NewsletterError\" class=\"nieuwsbrief-error hidden\">Unfortunately something went wrong; your request was not successful. Please try again later.<\/div>\n            <\/form>\n        <\/div>[vc_empty_space][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_wp_search][vc_wp_posts number=&#8221;5&#8243;]<div class=\"wpb-content-wrapper\">[vc_row][vc_column][vc_raw_html css=&#8221;&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row]\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"Wat betekenen de afkortingen EDR, XDR en MXDR? Cybersecurity-artikelen zijn vaak doorspekt met jargon en afkortingen. In het artikel leggen we een aantal van deze afkortingen uit. Cyberaanvallen worden steeds geavanceerder, wat betekent dat organisaties ook nieuwe beschermingmethoden moeten aanwenden om deze complexe dreigingen tegen te gaan. Denk bijvoorbeeld aan Extended Detection and Response (EDR), [...]","protected":false},"author":16,"featured_media":6849,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,3,16],"tags":[],"class_list":["post-6848","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-branche-nieuws","category-congres-update","category-home"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Untangling the Cybersecurity Alphabet Soup From EDR, SIEM, and SOAR to XDR. - Security Leadership<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_GB\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Untangling the Cybersecurity Alphabet Soup From EDR, SIEM, and SOAR to XDR. - Security Leadership\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Security Leadership\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:published_time\" content=\"2023-01-19T15:34:52+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/WHITEPAPER.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\r\n\t<meta property=\"og:image:height\" content=\"350\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"miki\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"miki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/\",\"url\":\"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/\",\"name\":\"Untangling the Cybersecurity Alphabet Soup From EDR, SIEM, and SOAR to XDR. - Security Leadership\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/WHITEPAPER.png\",\"datePublished\":\"2023-01-19T15:34:52+00:00\",\"author\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d\"},\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/#primaryimage\",\"url\":\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/WHITEPAPER.png\",\"contentUrl\":\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/WHITEPAPER.png\",\"width\":1140,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/security-leadership\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Untangling the Cybersecurity Alphabet Soup From EDR, SIEM, and SOAR to XDR.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#website\",\"url\":\"https:\/\/heliview.com\/security-leadership\/\",\"name\":\"Security Leadership\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/security-leadership\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d\",\"name\":\"miki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g\",\"caption\":\"miki\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Untangling the Cybersecurity Alphabet Soup From EDR, SIEM, and SOAR to XDR. - Security Leadership","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/","og_locale":"en_GB","og_type":"article","og_title":"Untangling the Cybersecurity Alphabet Soup From EDR, SIEM, and SOAR to XDR. - Security Leadership","og_url":"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/","og_site_name":"Security Leadership","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_published_time":"2023-01-19T15:34:52+00:00","og_image":[{"width":1140,"height":350,"url":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/WHITEPAPER.png","type":"image\/png"}],"author":"miki","twitter_card":"summary_large_image","twitter_creator":"@HeliviewConf","twitter_site":"@HeliviewConf","twitter_misc":{"Written by":"miki","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/","url":"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/","name":"Untangling the Cybersecurity Alphabet Soup From EDR, SIEM, and SOAR to XDR. - Security Leadership","isPartOf":{"@id":"https:\/\/heliview.com\/security-leadership\/#website"},"primaryImageOfPage":{"@id":"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/#primaryimage"},"image":{"@id":"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/#primaryimage"},"thumbnailUrl":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/WHITEPAPER.png","datePublished":"2023-01-19T15:34:52+00:00","author":{"@id":"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d"},"breadcrumb":{"@id":"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/#primaryimage","url":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/WHITEPAPER.png","contentUrl":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/WHITEPAPER.png","width":1140,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/security-leadership\/untangling-the-cybersecurity-alphabet-soup-from-edr-siem-and-soar-to-xdr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/security-leadership\/"},{"@type":"ListItem","position":2,"name":"Untangling the Cybersecurity Alphabet Soup From EDR, SIEM, and SOAR to XDR."}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/security-leadership\/#website","url":"https:\/\/heliview.com\/security-leadership\/","name":"Security Leadership","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/security-leadership\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d","name":"miki","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g","caption":"miki"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts\/6848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/comments?post=6848"}],"version-history":[{"count":1,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts\/6848\/revisions"}],"predecessor-version":[{"id":6850,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts\/6848\/revisions\/6850"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/media\/6849"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/media?parent=6848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/categories?post=6848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/tags?post=6848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}