โ€œWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ€

IT Operations Manager
Simon Darley
Trusted by industry leaders

Let's Talk

Call us on one of the numbers below, we cover the whole of the UK, so call the nearest office.

BriSTOL HQ & The South West

London & Surrounding Areas

Manchester & the North

โ€œWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ€

IT Operations Manager
Simon Darley
Trusted by industry leaders

Request a Call-back.

First we need a few details.

ENQUIRY - Contact Popup DEPRECIATED (#3)

Keep up to date with the experts

Get insights directly to your email inbox

MAIL LIST - Newsletter, Exit Intent Popup (#13)

Follow us on social

โ€œWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ€

IT Operations Manager
Simon Darley
Trusted by industry leaders

Request a Call

First we need a few details.

ENQUIRY - Popup w/ Captcha for light backgrounds (#21)

MDR, EDR, NDR, XDRโ€ฆ Cyber Security Jargon Explained

Published: January 3, 2021
Updated: May 29, 2024
In a nutshell:
Our experts have decoded some essential security acronyms to help you cut through the jargonโ€ฆ
How many do you know?

With large scale cyber-attacks regularly making mainstream headlines, it is undeniable that todayโ€™s digital landscape has changed almost beyond recognition. As such, the need for threat detection and incident response capabilities has become a must for all businesses โ€“ regardless of size or industry.

As a result, everyday users now find themselves with increased responsibility and heightened awareness surrounding cyber-security, regardless of how IT-savvy they are. Technology, particularly the cyber-security sphere, is abundant with technical jargon and complex acronyms. Being aware of what these acronyms stand for can be difficult enough for individuals with basic security knowledge, let alone being aware of what they subsequently meanโ€ฆ

As experts in cyber security, our professionals have decoded some of the essential security acronyms to help you cut through the jargonโ€ฆ

SOC โ€“ Security Operations Centre

Aย SOCย consists of a team of cyber security professionals, responsible for continuously monitoring and managing an organisationโ€™s cyber-security posture. With a focus on threat detection and prevention, an effective SOC will utilise a range of cutting-edge technologies and tools to secure the business and its assets.

SIEM โ€“ Security Information & Event Management


SIEM
 is essentially the combined power of two security systems. It is a software solution combining the functionalities of Security Information Management (SIM) and Security Event Management (SEM) into one primary security management system (SIEM).

SIEM tools are used by analysts within a SOC to monitor infrastructures and subsequently identify and report security related events.

IAM โ€“ Identity Access Management

IAM refers to a business framework that controls user access within the infrastructure to essentially protect sensitive information and ensure that data is accessed only by the relevant parties. An IAM framework can be controlled by implementing IAM tools such as MFA (Multi-Factor Authentication), or following a model of Zero Trust.

DLP โ€“ Data Loss Prevention

DLP is a set of tools and techniques that aim to prevent sensitive information from leaving the business โ€“ whether that be through misuse of data or access from unauthorised users. DLP solutions follow rules powered by regulatory compliance such as GDPR (General Data Protection Regulation) to monitor, detect and prevent any unauthorised transfer of information โ€“ whether accidental or intentional. DLP can include actions such as the encryption of data in transit.

EDR โ€“ Endpoint Detection Response

The primary function of an EDR solution is to provide continuous monitoring for the endpoints (physical devices at an end point of a network), rather than the network. Through collecting and analysing activity data from the endpoints, an EDR solution is able to recognise device and user patterns and consequently identify and respond to threats. Utilising EDR allows organisations to protect themselves against any activity deemed as suspicious.

NDR โ€“ Network Detection Response

Working closely with SIEM and EDR, NDR software is responsible for continuously monitoring and analysing the network traffic in a business. Through vast amounts of data analysis, an NDR solution generates a standard of โ€˜normalโ€™ network behaviour which then allows it to detect any deviations. NDR tools can then quickly alert your SOC about potential threats.

XDR โ€“ Extended Detection Response

XDR solutions provide holistic visibility by consolidating and analysing security data from multiple sources such as emails, cloud environments, servers, endpoints and networks. The complete visibility XDR provides complements EDR and NDR software through allowing the XDR solution to authenticate security alerts, therefore lowering the false positive and negative rates of your SOC.

MDR โ€“ Managed Detection Response

MDR refers to a combination of EDR, NDR and XDR solutions managed by an outsourced cyber-security provider. Utilising an MDR service will provide a business with 24/7 monitoring, analysis and response capabilities, in addition to threat intel and hunting. Outsourcing a SOC to manage MDR essentially provides end-to-end coverage of fundamental security solutions to protect against cyber-attacks.

The above acronyms are some of the fundamental cyber security terms used by our SecOps team on a day to day basis, in addition to some of the terms you might need to know if youโ€™re looking to monitor your own security.

However, if youโ€™re looking for a cyber security partner with the all the expertise needed to protect your organisation, get in touch.