{"id":78333,"date":"2023-01-30T06:11:47","date_gmt":"2023-01-30T06:11:47","guid":{"rendered":"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/?p=77897"},"modified":"2023-12-26T07:21:53","modified_gmt":"2023-12-26T07:21:53","slug":"a-guide-to-extended-threat-detection-and-response","status":"publish","type":"post","link":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/","title":{"rendered":"A Guide to Extended Threat Detection and Response: What It Is and How to Choose the Best Solutions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"78333\" class=\"elementor elementor-78333\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d55a63f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d55a63f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e02987b\" data-id=\"e02987b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-47efaee elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"47efaee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#form\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"521\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/9-A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Desktop.jpg\" class=\"attachment-full size-full wp-image-78402\" alt=\"A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/9-A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Desktop.jpg 1024w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/9-A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Desktop-300x153.jpg 300w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/9-A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Desktop-768x391.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26eb4f0 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-image\" data-id=\"26eb4f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#form\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"521\" height=\"521\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Mobile.jpg\" class=\"attachment-full size-full wp-image-78393\" alt=\"A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Mobile.jpg 521w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Mobile-300x300.jpg 300w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Mobile-150x150.jpg 150w\" sizes=\"(max-width: 521px) 100vw, 521px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a242ff8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a242ff8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d47524\" data-id=\"7d47524\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ebd3546 elementor-widget elementor-widget-heading\" data-id=\"ebd3546\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">A Guide to Extended Threat Detection and Response: What It Is and How to Choose the Best Solutions<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-971c440 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"971c440\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1dbc424\" data-id=\"1dbc424\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-690297b elementor-widget elementor-widget-post-info\" data-id=\"690297b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a4968b2 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>January 30, 2023<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-5dadb57 elementor-inline-item\">\n\t\t\t\t\t\t<a href=\"#author\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tAnis Pankhania\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-45dc397 elementor-inline-item\">\n\t\t\t\t\t\t<a href=\"\/cybersecurity-exchange\/threat-intelligence\/\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tThreat Intelligence\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98432b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"98432b8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6abf6b0\" data-id=\"6abf6b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6201be8 elementor-widget elementor-widget-text-editor\" data-id=\"6201be8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>EC-Council&#8217;s whitepaper titled &#8220;A Guide to Extended Threat Detection and Response: What It Is and How to Choose the Best Solutions,&#8221; authored by Anis Pankhania, Senior Director, Security Operations and Compliance at Capgemini, provides an in-depth analysis of extended threat detection and response (XDR) solutions and their significance in today&#8217;s cybersecurity landscape.<\/p><p>This whitepaper starts by highlighting the challenges faced by organizations in detecting and responding to cyber threats. Traditional security solutions such as Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) are no longer sufficient to address the sophisticated threats posed by cybercriminals. On the other hand, XDR solutions provide a holistic approach to threat detection and response by aggregating data from multiple sources, such as endpoints, networks, and the cloud, and applying advanced analytics to identify and prioritize threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c065252 elementor-widget elementor-widget-image\" data-id=\"c065252\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1000\" height=\"1500\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/The-best-extended-detection-and-response-solutions-for-2023.jpg\" class=\"attachment-full size-full wp-image-78571\" alt=\"The best extended detection and response solutions for 2023\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/The-best-extended-detection-and-response-solutions-for-2023.jpg 1000w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/The-best-extended-detection-and-response-solutions-for-2023-200x300.jpg 200w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/The-best-extended-detection-and-response-solutions-for-2023-683x1024.jpg 683w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/The-best-extended-detection-and-response-solutions-for-2023-768x1152.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e18c229 elementor-widget elementor-widget-text-editor\" data-id=\"e18c229\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To illustrate the benefits of XDR solutions, this whitepaper includes a case study of a global healthcare organization that leveraged XDR to detect and respond to a ransomware attack. The XDR solution enabled the organization to quickly identify and contain the attack, preventing the ransomware from spreading and minimizing the impact on the organization&#8217;s operations.<\/p><p>Overall, the whitepaper provides valuable insights into the benefits of adopting XDR solutions and the key features that organizations should consider when selecting a solution. Furthermore, the paper delves into the various deployment models for XDR solutions, including cloud-based, on-premises, and hybrid deployments. The advantages and disadvantages of each model are discussed, allowing organizations to make informed decisions based on their unique requirements.<\/p><p>By leveraging XDR solutions, organizations can enhance their security posture, detect and respond to threats quickly, and minimize the impact of cyberattacks. In conclusion, this whitepaper is a helpful guide for organizations looking to enhance their security posture by adopting XDR solutions. It provides an in-depth analysis of XDR solutions, their capabilities, deployment models, and selection criteria, empowering organizations to make informed decisions and choose the best XDR solution.<\/p><p>By downloading the whitepaper, organizations can gain a deeper understanding of the benefits of XDR solutions and how to select the best solution for their needs. To download this whitepaper, please submit your details in the form below and take the first step towards enhancing your organization&#8217;s security posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>EC-Council&#8217;s whitepaper titled &#8220;A Guide to Extended Threat Detection and Response: What It Is and How to Choose the Best Solutions,&#8221; authored by Anis Pankhania, Senior Director, Security Operations and Compliance at Capgemini, provides an in-depth analysis of extended threat detection and response (XDR) solutions and their significance in today&#8217;s cybersecurity landscape. This whitepaper starts&hellip;<\/p>\n","protected":false},"author":52,"featured_media":78393,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12228],"tags":[12303,12270,12272,12259,12260,12278,12304,12305,12248,12250,12264,12306,12307,12308,12309,12310,12311,12280,12312,12267],"class_list":{"0":"post-78333","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-whitepaper","8":"tag-choosethebestsolution","9":"tag-cyberdefense","10":"tag-cybersecuritysolutions","11":"tag-cyberthreats","12":"tag-dataprotection","13":"tag-endpointsecurity","14":"tag-enterprisesecurity","15":"tag-extendedthreatdetection","16":"tag-incidentresponse","17":"tag-itsecurity","18":"tag-networksecurity","19":"tag-riskassessment","20":"tag-securityawareness","21":"tag-securitycompliance","22":"tag-securityoperations","23":"tag-securitystrategy","24":"tag-securitytechnology","25":"tag-threatintelligence","26":"tag-threatresponse","27":"tag-vulnerabilitymanagement"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Analysis and Detection - Application of Threat Intelligence<\/title>\n<meta name=\"description\" content=\"Threats in the cyber environment. Solutions to cybersecurity threats - analysis and management with threat intelligence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Guide to Extended Threat Detection and Response: What It Is and How to Choose the Best Solutions\" \/>\n<meta property=\"og:description\" content=\"Threats in the cyber environment. Solutions to cybersecurity threats - analysis and management with threat intelligence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-30T06:11:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-26T07:21:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Mobile.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anis Pankhania\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anis Pankhania\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/a-guide-to-extended-threat-detection-and-response\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/a-guide-to-extended-threat-detection-and-response\\\/\"},\"author\":{\"name\":\"Anis Pankhania\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/2c56436a96383390ed6c8616ff0178d3\"},\"headline\":\"A Guide to Extended Threat Detection and Response: What It Is and How to Choose the Best Solutions\",\"datePublished\":\"2023-01-30T06:11:47+00:00\",\"dateModified\":\"2023-12-26T07:21:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/a-guide-to-extended-threat-detection-and-response\\\/\"},\"wordCount\":393,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/a-guide-to-extended-threat-detection-and-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Mobile.jpg\",\"keywords\":[\"ChooseTheBestSolution\",\"cyberdefense\",\"cybersecuritysolutions\",\"cyberthreats\",\"dataProtection\",\"endpointsecurity\",\"EnterpriseSecurity\",\"ExtendedThreatDetection\",\"IncidentResponse\",\"ITSecurity\",\"networksecurity\",\"RiskAssessment\",\"SecurityAwareness\",\"SecurityCompliance\",\"SecurityOperations\",\"SecurityStrategy\",\"SecurityTechnology\",\"threatintelligence\",\"ThreatResponse\",\"vulnerabilityManagement\"],\"articleSection\":[\"Whitepaper\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/a-guide-to-extended-threat-detection-and-response\\\/\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/a-guide-to-extended-threat-detection-and-response\\\/\",\"name\":\"Cyber Threat Analysis and Detection - Application of Threat Intelligence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/a-guide-to-extended-threat-detection-and-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/a-guide-to-extended-threat-detection-and-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Mobile.jpg\",\"datePublished\":\"2023-01-30T06:11:47+00:00\",\"dateModified\":\"2023-12-26T07:21:53+00:00\",\"description\":\"Threats in the cyber environment. Solutions to cybersecurity threats - analysis and management with threat intelligence.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/a-guide-to-extended-threat-detection-and-response\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/a-guide-to-extended-threat-detection-and-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/a-guide-to-extended-threat-detection-and-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Mobile.jpg\",\"contentUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Mobile.jpg\",\"width\":521,\"height\":521,\"caption\":\"A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/a-guide-to-extended-threat-detection-and-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Whitepaper\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/whitepaper\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"A Guide to Extended Threat Detection and Response: What It Is and How to Choose the Best Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/2c56436a96383390ed6c8616ff0178d3\",\"name\":\"Anis Pankhania\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Analysis and Detection - Application of Threat Intelligence","description":"Threats in the cyber environment. Solutions to cybersecurity threats - analysis and management with threat intelligence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/","og_locale":"en_US","og_type":"article","og_title":"A Guide to Extended Threat Detection and Response: What It Is and How to Choose the Best Solutions","og_description":"Threats in the cyber environment. Solutions to cybersecurity threats - analysis and management with threat intelligence.","og_url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-01-30T06:11:47+00:00","article_modified_time":"2023-12-26T07:21:53+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Mobile.jpg","type":"image\/jpeg"}],"author":"Anis Pankhania","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anis Pankhania","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/#article","isPartOf":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/"},"author":{"name":"Anis Pankhania","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/2c56436a96383390ed6c8616ff0178d3"},"headline":"A Guide to Extended Threat Detection and Response: What It Is and How to Choose the Best Solutions","datePublished":"2023-01-30T06:11:47+00:00","dateModified":"2023-12-26T07:21:53+00:00","mainEntityOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/"},"wordCount":393,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Mobile.jpg","keywords":["ChooseTheBestSolution","cyberdefense","cybersecuritysolutions","cyberthreats","dataProtection","endpointsecurity","EnterpriseSecurity","ExtendedThreatDetection","IncidentResponse","ITSecurity","networksecurity","RiskAssessment","SecurityAwareness","SecurityCompliance","SecurityOperations","SecurityStrategy","SecurityTechnology","threatintelligence","ThreatResponse","vulnerabilityManagement"],"articleSection":["Whitepaper"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/","name":"Cyber Threat Analysis and Detection - Application of Threat Intelligence","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/#primaryimage"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Mobile.jpg","datePublished":"2023-01-30T06:11:47+00:00","dateModified":"2023-12-26T07:21:53+00:00","description":"Threats in the cyber environment. Solutions to cybersecurity threats - analysis and management with threat intelligence.","breadcrumb":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/#primaryimage","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Mobile.jpg","contentUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions-Mobile.jpg","width":521,"height":521,"caption":"A-Guide-to-Extended-Threat-Detection-and-Response-What-It-Is-and-How-to-Choose-the-Best-Solutions"},{"@type":"BreadcrumbList","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/a-guide-to-extended-threat-detection-and-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test1.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Whitepaper","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/category\/whitepaper\/"},{"@type":"ListItem","position":4,"name":"A Guide to Extended Threat Detection and Response: What It Is and How to Choose the Best Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/2c56436a96383390ed6c8616ff0178d3","name":"Anis Pankhania"}]}},"_links":{"self":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/78333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/52"}],"replies":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=78333"}],"version-history":[{"count":0,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/78333\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/78393"}],"wp:attachment":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=78333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=78333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=78333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}