Managing cyberthreats is one of the most important activities for organizations today. Fortunately, many different techniques and technologies are available to reduce the risk of cyberattacks. The following three widely used approaches are used to identify, assess, manage and resolve threats so that organizations can resume operations:
SIEM, SOAR and XDR technologies are all used to detect and resolve security events. SIEM gathers data and analyzes security incidents; SOAR, which handles automated incident responses, uses information from SIEM to fulfill its functions. XDR, though, may use SIEM data but it's an all-inclusive product that handles security events end to end.
This article compares and contrasts each technology and offers guidance on which approach(es) to use for comprehensive cybersecurity management.
SIEM builds on two fundamental elements: security information management and security event management. One of the important functions of SIEM is to help cybersecurity teams achieve compliance with key security standards and regulations.AI enhances SIEM capabilities by providing greater analytical capabilities for identifying suspected or actual cyberincidents. SIEM also facilitates the launch of security incident response activities.
A key activity of SIEM tools is the collection of security event data for current and future analysis. Each tool has rules for how events are analyzed and can evaluate threats by comparing them with a large database of previous cyberattacks.
The principal output from a SIEM system is intelligence regarding a security event that can be used to formulate and launch a suitable response, mitigation and recovery. Integrated dashboards provide real-time displays of cyberattack data for launching incident responses and establishing priorities for event response activities.
Automation of cyberattack response activities is one of the principal activities of a SOAR system. The addition of SOAR technology in SOCs greatly improves the efficiency of cybersecurity teams. While they may be focusing on a variety of security issues, the SOAR system is actively addressing identified security breaches, providing real-time data on how the mitigation is going. It also supportsthreat hunting, identification of false positives and the creation ofthreat intelligence.
The orchestration element gathers all relevant security tools and centrally manages them, which greatly increases the efficiency of event responses. It typically provides the starting point for launching the automation elements that actively go out and address the incident. The automation element uses numerous playbooks and other response tools to deliver the most effective response.
AI is also increasingly part of SOAR capabilities, as it can streamline the process of evaluating and selecting the best set of responses for a specific event.
Considering the complex environment in use by IT organizations today, various platforms and services -- particularly cloud, multi-cloud and hybrid environments -- are in use. They provide a full scope of detection, analysis and response capabilities that range from office endpoint devices and networks toWAN environments and multiple offices within the IT ecosystem. AI is typically a key component in an XDR platform. XDR systems are quickly becoming a go-to solution for cybersecurity organizations and SOCs.
Similar to SOAR technology, XDR systems perform what may be considered a complete suite of cybersecurity prevention, detection, analysis and response activities. XDR can initiate automated incident response activities and provide end-to-end automated management of all detection, response and mitigation activities. It can also provide return-to-service activities that not only eliminate suspicious code, but also return systems to normal operations.
Each of the three solutions described in this article contributes to the detection and resolution of security events. They differ in their various activities yet can also complement each other in the right configuration. The inclusion of AI capabilities greatly increases the usability of each approach and is likely to be a major component of systems into the latter part of the decade.
In practice, SIEM and SOAR tools complement each other, and XDR is a standalone product. However, the three toolscan complement one another. SIEM gathers and analyzes event data, helps facilitate incident responses and provides data needed by SOAR to launch the automated response. Working together, they provide a solid end-to-end means for managing security breaches.
XDR is a newer, more powerful and all-inclusive solution for end-to-end security event management. But, when preparing for an automated response, it also uses the data that SIEM captures. It may share data with SOAR, but SIEM has the more complementary relationship. XDR's ability to address issues occurring in internal endpoints, as well as distant offices, cloud environments, multiple websites and complex networks, makes it an important go-to solution for SOC teams.
The inclusion of AI capabilities in each approach greatly increases their overall value to cybersecurity teams and SOCs.
Each option offers many benefits and supports cybersecurity teams and SOCs. And, because each system, properly configured, can automate the security event management process, SOC efficiency and productivity are increased.
As noted earlier, the complementary nature of SIEM and SOAR systems means they are often paired. XDR may be a standalone solution, but combining the capabilities of all three tools makes good sense.
Consider the following steps when selecting your tools:
However an organization decides to do it, managing cyberthreats should be one of its highest priorities. Luckily, today, there is a wide variety of techniques and technologies that are available to reduce the risk, including SIEM, SOAR and XDR.
Paul Kirvan is an independent consultant, IT auditor, technical writer, editor and educator. He has more than 25 years of experience in business continuity, disaster recovery, security, enterprise risk management, telecom and IT auditing.
Cloud detection and response: CDR vs. EDR vs. NDR vs. XDR
The differences between open XDR vs. native XDR
EDR vs. SIEM: Key differences, benefits and use cases
The interim standard brings a boatload of major improvements to 5G on the way to 6G's planned release in 2030. Learn what they do...
Utilities increasingly choose private over public 5G for its superior control, flexibility and security, enabling applications ...
Palo Alto Networks acquired observability platform Chronosphere for $3.35 billion. The deal aims to enable AI-driven autonomous ...
Tech conferences are a vital way for CIOs and IT leaders to keep abreast of trends and make real-life connections in a ...
These certifications and courses can help you gain the specialized knowledge you need to bolster your credentials and ...
Enterprises are embracing short-form video for speed and engagement, but its rise brings new complexities. CIOs must establish ...
Firmware, such as BIOS or UEFI, plays a crucial role in how securely a Windows device starts and operates. Organizations need to ...
The battle for desktop agent mindshare heats up. Microsoft is the latest to arm everyday office workers with tools to make their ...
Learn how to set up multifactor authentication in Microsoft 365 to enhance security, prevent unauthorized access and protect ...
Transform manually created AWS resources into manageable, automated infrastructure with CloudFormation's import resource with ...
In today's rapidly changing tech landscape, cloud strategy is more important than ever. This guide explores how to best use your ...
Cloud dominance intensifies as AWS, Microsoft and Google capture 63% of the $107B market. AWS leads at 29%, despite erosion, ...
Acclaim Autism is a US organisation that has increased employee task discretion, with an increase in insurance approvals by using...
The latest Post Office prosecution to be sent to the Court of Appeal involves a third IT system in a 2001 case, after previous ...
Industry and healthcare leaders are concerned that NHS tech funding is too focused on already approved platforms, fails to tackle...

