Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by EM360Tech. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by EM360Tech or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

EDR, XDR, or MDR - What’s the Real Difference and Why Does It Matter?

29:52
 
Share
 

Manage episode 523285488 series 2948336
Content provided by EM360Tech. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by EM360Tech or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In the recent episode of The Security Strategist podcast, Jim Waggoner, VP of Product Strategy at N-able, and Joe Ferla, one of N-able’s Head Nerds, speak to host Chris Steffen, Vice President of Research at Enterprise Management Associates (EMA). They addressed one of cybersecurity’s biggest misconceptions – while organizations might be getting better at spotting threats, most still struggle to respond to them in real time.

“We live in a time where the threat landscape is changing instantly,” Steffen said. With threat actors speeding up their tactics, Waggoner and Ferla insist that the only way forward is constant reassessment.

When the ‘Response Action’ Doesn’t Deliver

Steffen began by asking the IT leaders about a key challenge faced by many CISOs. He says that the industry often talks about “EDR, MDR, XDR,” yet the promise of real-time response frequently remains unfulfilled.

Ferla identified a major problem here: the wrong people are making purchasing decisions. “In the small to mid market, I often see decision-makers who aren’t security experts, and they’re the ones driving the purchasing,” he explained. These executives “trust that the product works as they want, but they don’t know what they really need in the field,” which leads organizations to buy advanced tools they cannot actually use.

Even more troubling, Ferla noted that many customers request capabilities that no MDR could or should handle. “I have people at N-able coming to me thinking that we can manage backups as a response. And that's simply not possible.”

Waggoner, who spent years developing incident response tools, sees another side of the issue. Vendors often downplay the “response” aspect. “When it came to the R,” he said, “it was a little R.” True MDR has to go well beyond automated blocking. “Can we disable accounts? Can we prevent ransomware from affecting other systems or stop lateral movement?”

Also Read: N-able Annual Threat Report 2025

Where AI and Cybersecurity Go Next

When asked about the future of detection and response, Ferla shed light on the increasing complexity. He remembered running an MSP alone just a few years ago. “Nowadays, I could not come anywhere near close to doing this,” he said. “It's impossible.”

Waggoner stated that AI will shape the next phase—not just for attackers, but also for defenders who face ongoing staffing shortages. Threat actors are already using AI to change tactics and automate reconnaissance. Defenders need to keep up: “Look at companies like us, using AI for detection models and for responses to address the people shortage.”

Waggoner encouraged IT decision-makers to find ways AI can strengthen their security, not make it more complicated. “Get ahead of it. See how you can truly use AI's capabilities to better protect yourself,” he stated.

Takeaways

  • Detection and response tools are evolving rapidly.
  • Organizations often have unrealistic expectations of their security capabilities.
  • Continuous review of security strategies is essential.
  • MSPs play a crucial role in enhancing security for small to mid-sized businesses.
  • Proactive measures are necessary to stay ahead of threats.
  • AI is transforming the cybersecurity landscape.
  • Maturity in security means recognizing gaps and seeking help.
  • Implementing effective detection requires visibility across all systems.
  • The threat landscape is constantly changing, requiring adaptive strategies.
  • Basic security practices must be done well to mitigate risks.

Chapters

  • 00:00 Introduction to Cybersecurity Strategies
  • 02:54 Understanding Detection and Response Tools
  • 05:52 The Gap Between Expectation and Reality
  • 09:06 The Importance of Continuous Strategy Review
  • 12:11 The Role of Managed Service Providers (MSPs)
  • 15:09 Implementing Effective Detection and Response
  • 17:52 Future Trends in Cybersecurity
  • 20:47 Final Thoughts and Key Takeaways

  continue reading

185 episodes

Artwork
iconShare
 
Manage episode 523285488 series 2948336
Content provided by EM360Tech. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by EM360Tech or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In the recent episode of The Security Strategist podcast, Jim Waggoner, VP of Product Strategy at N-able, and Joe Ferla, one of N-able’s Head Nerds, speak to host Chris Steffen, Vice President of Research at Enterprise Management Associates (EMA). They addressed one of cybersecurity’s biggest misconceptions – while organizations might be getting better at spotting threats, most still struggle to respond to them in real time.

“We live in a time where the threat landscape is changing instantly,” Steffen said. With threat actors speeding up their tactics, Waggoner and Ferla insist that the only way forward is constant reassessment.

When the ‘Response Action’ Doesn’t Deliver

Steffen began by asking the IT leaders about a key challenge faced by many CISOs. He says that the industry often talks about “EDR, MDR, XDR,” yet the promise of real-time response frequently remains unfulfilled.

Ferla identified a major problem here: the wrong people are making purchasing decisions. “In the small to mid market, I often see decision-makers who aren’t security experts, and they’re the ones driving the purchasing,” he explained. These executives “trust that the product works as they want, but they don’t know what they really need in the field,” which leads organizations to buy advanced tools they cannot actually use.

Even more troubling, Ferla noted that many customers request capabilities that no MDR could or should handle. “I have people at N-able coming to me thinking that we can manage backups as a response. And that's simply not possible.”

Waggoner, who spent years developing incident response tools, sees another side of the issue. Vendors often downplay the “response” aspect. “When it came to the R,” he said, “it was a little R.” True MDR has to go well beyond automated blocking. “Can we disable accounts? Can we prevent ransomware from affecting other systems or stop lateral movement?”

Also Read: N-able Annual Threat Report 2025

Where AI and Cybersecurity Go Next

When asked about the future of detection and response, Ferla shed light on the increasing complexity. He remembered running an MSP alone just a few years ago. “Nowadays, I could not come anywhere near close to doing this,” he said. “It's impossible.”

Waggoner stated that AI will shape the next phase—not just for attackers, but also for defenders who face ongoing staffing shortages. Threat actors are already using AI to change tactics and automate reconnaissance. Defenders need to keep up: “Look at companies like us, using AI for detection models and for responses to address the people shortage.”

Waggoner encouraged IT decision-makers to find ways AI can strengthen their security, not make it more complicated. “Get ahead of it. See how you can truly use AI's capabilities to better protect yourself,” he stated.

Takeaways

  • Detection and response tools are evolving rapidly.
  • Organizations often have unrealistic expectations of their security capabilities.
  • Continuous review of security strategies is essential.
  • MSPs play a crucial role in enhancing security for small to mid-sized businesses.
  • Proactive measures are necessary to stay ahead of threats.
  • AI is transforming the cybersecurity landscape.
  • Maturity in security means recognizing gaps and seeking help.
  • Implementing effective detection requires visibility across all systems.
  • The threat landscape is constantly changing, requiring adaptive strategies.
  • Basic security practices must be done well to mitigate risks.

Chapters

  • 00:00 Introduction to Cybersecurity Strategies
  • 02:54 Understanding Detection and Response Tools
  • 05:52 The Gap Between Expectation and Reality
  • 09:06 The Importance of Continuous Strategy Review
  • 12:11 The Role of Managed Service Providers (MSPs)
  • 15:09 Implementing Effective Detection and Response
  • 17:52 Future Trends in Cybersecurity
  • 20:47 Final Thoughts and Key Takeaways

  continue reading

185 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play