![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt530eb1f4e672eb44/653a71690e92cc040a3e9d6d/Dark_Reading_Logo_TheEdge_0.png?width=700&auto=webp&quality=80&disable=upscale)
Cybersecurity In-Depth: Getting answers to questions about IT security threats and best practices from trusted cybersecurity professionals and industry experts.
Can I Have XDR Without EDR?Can I Have XDR Without EDR?
Yes, extended detection and response is possible without endpoint detection and response, but here's why having both is helpful.
![Image of a knot Image of a knot](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd594dae0397d7929/64f152363a123163e523726b/knot.jpeg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
Question: Can I have extended detection and response (XDR) without implementing endpoint detection and response (EDR) first?
Al Huger, vice president and general manager of Cisco Security Platform & Response: You can absolutely have XDR without first implementing EDR. Keep in mind that any XDR solution is more useful by leveraging endpoint visibility and the capability to respond. Ultimately, most threats are headed toward an endpoint. However, tying any part of that narrative together, including the network, user, and application, and then acting on it is still very powerful – just more so for an endpoint.
Most security teams find EDR data provides essential visibility to threats, and they correlate network detection data (NDR) to complete their visibility. Hence, it is valuable to begin with EDR. However, EDR covers only managed endpoints, whereas many threats originate on cloud workloads, IoT devices, on-premises servers, and unmanaged devices – places where EDR coverage is often incomplete. Security teams with mature network visibility and response but limited EDR visibility can build their XDR from their network detection and response (NDR) capability and layer in EDR as it matures in their environments. They can manage and respond to threats via dynamic network routing and block lists, a native capability of NDR into XDR.
About the Author
You May Also Like
Uncovering Threats to Your Mainframe & How to Keep Host Access Secure
Feb 13, 2025Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025