Beyond EDR: Exploring the rise of XDR for unified threat detection and response

Shewale, Vilas (2025) Beyond EDR: Exploring the rise of XDR for unified threat detection and response. World Journal of Advanced Engineering Technology and Sciences, 15 (2). pp. 380-386. ISSN 2582-8266

[thumbnail of WJAETS-2025-0551.pdf] Article PDF
WJAETS-2025-0551.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download ( 491kB)

Abstract

Extended Detection and Response (XDR) represents a transformative evolution in cybersecurity architecture, addressing critical limitations of traditional Endpoint Detection and Response (EDR) solutions. As organizations face increasingly sophisticated threats across expanded attack surfaces, XDR offers a unified approach by integrating telemetry from multiple security domains including endpoints, networks, cloud infrastructure, and email systems. This integration enables comprehensive visibility across the entire security ecosystem, facilitating faster detection and response to complex threats that traditional siloed approaches often miss. The transition to XDR delivers substantial improvements in threat detection accuracy, false positive reduction, and operational efficiency while simultaneously decreasing response times and security tool sprawl. Despite implementation challenges related to data integration, organizational structures, and process adaptation, organizations can achieve significant security posture enhancements through phased deployment approaches and clear use case prioritization. Looking forward, the XDR market continues rapid expansion as solutions evolve to incorporate advanced AI capabilities, identity-centric security features, and integration with complementary frameworks such as Secure Access Service Edge (SASE), positioning XDR as a cornerstone technology in modern enterprise security architectures.

Item Type: Article
Official URL: https://doi.org/10.30574/wjaets.2025.15.2.0551
Uncontrolled Keywords: Extended Detection and Response; Cybersecurity Integration; Threat Detection; Security Operations Efficiency; Cross-Domain Correlation
Depositing User: Editor Engineering Section
Date Deposited: 04 Aug 2025 16:26
Related URLs:
URI: https://eprint.scholarsrepository.com/id/eprint/3452