This resource is no longer available
Security operations demand massive scale to collect, process, analyze and act upon massive amounts of data.
Early XDR was anchored to 2 primary data sources: endpoints and networks. While this was an improvement on disconnected EDR and NDR tools, threat detection and response across enterprise organizations demands a wider aperture.
In order to gain insight into relevant security operations trends and the evolving role of XDR, ESG surveyed 376 IT and cybersecurity professionals at organizations in North America. Read the analyst report to explore its 6 key findings.