Alphabet Soup: Making Sense of XDR, EDR, NDR and SIEM

LogRhythm's Hollister and Zulberg on Matching Platform to Portfolio
Andrew Hollister, deputy CISO and VP; Jonathan Zulberg, VP, field engineering - UK, EMEA, META, APJ, LogRhythm Labs

XDR, EDR, NDR and SIEM. They are among the most prominent acronyms in cybersecurity. But what do they all mean, how do they work and how do the technologies fit into your security portfolio? Andrew Hollister and Jonathan Zulberg of LogRhythm share insights and strategies.

See Also: Webinar | Prevent, Detect & Restore: Data Security Backup Systems Made Easy

In this video interview with Information Security Media Group, Hollister and Zulberg discuss:

  • The differences among the platforms;
  • How you might journey from one to another;
  • Which product fits best in your security portfolio.

Hollister oversees the LogRhythm Labs team to research threats and deliver world-class security, compliance, intelligence, and operational risk content to protect LogRhythm customers from damaging cyberthreats, help them to meet their compliance needs, and reduce the risk to their organizations.

For over 12 years, Zulberg has worked with and advised a large number of Fortune 500 and government organizations on global security improvement programs. He specializes in information security policy, SIEM, encryption, endpoint security and email security. His current interests in the field include mitigating methods of data exfiltration.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.