{"id":2739,"date":"2025-04-11T17:09:34","date_gmt":"2025-04-11T17:09:34","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=2739"},"modified":"2025-04-11T17:09:34","modified_gmt":"2025-04-11T17:09:34","slug":"how-cloud-native-security-makes-xdr-more-powerful-in-2025","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=2739","title":{"rendered":"How Cloud-Native Security Makes XDR More Powerful in 2025"},"content":{"rendered":"<div class=\"elementor elementor-35987\">\n<div class=\"elementor-element elementor-element-1edc6f6 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-c4de7f7 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW15534571 BCX0\"><span class=\"NormalTextRun SCXW15534571 BCX0\">As businesses move to the cloud, security approaches need to move at the same pace. By 2023, 70% of workloads will be running in cloud environments\u2014but traditional defenses <\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW15534571 BCX0\">lag behind<\/span><span class=\"NormalTextRun SCXW15534571 BCX0\">. With an average of 1,427 cloud services in use and cloud security expenditures projected to explode past <\/span><span class=\"NormalTextRun SCXW15534571 BCX0\">$48.9 billion<\/span><span class=\"NormalTextRun SCXW15534571 BCX0\"> by 2026, the risks have never been greater. Extended Detection and Response (XDR) is stepping up as an unstoppable force, particularly when being driven by cloud-native architecture. In this weblog, we lay out how cloud-native security enriches XDR, delve into significant innovations, and provide hard-won <\/span><span class=\"NormalTextRun SCXW15534571 BCX0\">know-how<\/span><span class=\"NormalTextRun SCXW15534571 BCX0\"> to make a future-<\/span><span class=\"NormalTextRun SCXW15534571 BCX0\">proofs<\/span><span class=\"NormalTextRun SCXW15534571 BCX0\"> security position.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-83d566b e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-a4ea91c elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Cloud-Native Security Architecture for Modern XDR<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-15f4366 elementor-blockquote--skin-boxed elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\">\n<div class=\"elementor-widget-container\">\n<p class=\"elementor-blockquote__content\">\n\t\t\t\t&#8220;Extended detection and response (XDR) delivers security incident detection and automated response capabilities for security infrastructure. XDR integrates threat intelligence and telemetry data from multiple sources with security analytics to provide contextualization and correlation of security alerts.&#8221;\t\t\t<\/p>\n<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\tGartner, Leading global research and advisory firm\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ca674af elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW14992905 BCX0\"><span class=\"NormalTextRun SCXW14992905 BCX0\">Cloud-native security architecture changes how <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/xdr-security\/what-is-xdr-extended-detection-and-response\/\">Extended Detection and Response (XDR)<\/a> systems work in modern enterprise environments. Businesses now adopt distributed computing models at a rapid pace. Traditional security approaches have become obsolete, which creates an urgent need for adaptive and integrated solutions.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7698c75 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-0d8a1b6 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Key Components of Cloud-Native Security<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0296d0f elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Cloud-native security architecture has several interconnected parts built specifically for cloud environments. Traditional security relied on network-based protection. The new approach focuses on identity and applications instead.<\/span><span>\u00a0<\/span><\/p>\n<p><span>These essential components are the foundations:<\/span><span>\u00a0<\/span><\/p>\n<p><span>Network Security:<\/span><span> Core network access controls, firewall policies, and network flow logs<\/span>\u00a0<span>Identity and Access Management (IAM):<\/span><span> The most crucial part that controls service communication and user access policies<\/span>\u00a0<span>Data Security:<\/span><span> Covers encryption, key management, and continuous monitoring for storage of all types<\/span><span>Workload Security:<\/span><span> VM\/container images and approved package repositories<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1d66282 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Cloud providers and customers share security responsibilities. Providers protect the infrastructure while customers safeguard their applications and data.<\/span><span>\u00a0<\/span><\/p>\n<p><span>The 2025 Cloud-Native Security Report shows workloads running AI or ML packages have grown by 500%. Organizations have also cut critical and high vulnerabilities at runtime to less than 6%, which shows better security hygiene.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-bef9deb e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-8e9baa3 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How Containerization Transforms XDR Capabilities <\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-135bdfc elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Containerization is a fundamental technology in cloud native environments that facilitates effective deployment and scaling of applications onto various cloud infrastructures.<\/span><span>\u00a0<\/span><\/p>\n<p><span>As security products such as XDR evolve to meet today\u2019s IT environments, they need to be capable of securing and observing containerized workloads, which are becoming more prevalent in cloud native environments. The convergence of containerization, cloud native, and XDR is the never-ending challenge of having strong security (through XDR) in highly dynamic and distributed environments (facilitated by containerization and cloud native strategies). Let\u2019s dissect how containerization redefines XDR capabilities:<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0014fbe elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">1. Better Visibility and Control<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1fa0e71 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW124897760 BCX0\"><span class=\"NormalTextRun SCXW124897760 BCX0\">Containerization enhances the visibility and control capabilities of <a href=\"https:\/\/fidelissecurity.com\/fidelis-elevate-extended-detection-and-response-xdr-platform\/\">Extended Detection and Response (XDR) solutions<\/a> significantly. XDR solutions provide end-to-end visibility into containerized environments, including container images, runtime environments, and network traffic among containers. With enhanced visibility, security teams can detect and investigate security incidents more efficiently, especially in dynamic and fast-evolving containerized infrastructures.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-93733d1 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">2. Improved Threat Detection<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-154a493 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Containerization enables XDR systems to incorporate more sophisticated threat detection techniques. With the use of containerization, XDR solutions can employ a variety of techniques.<\/span><span>\u00a0<\/span><\/p>\n<p><span><a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/signature-based-detection\/\">Signature-based detection<\/a><\/span><span>\u00a0<\/span><span>Behavioral analysis<\/span><span>\u00a0<\/span><span><a href=\"https:\/\/fidelissecurity.com\/threatgeek\/xdr-security\/xdr-machine-learning\/\">Machine learning<\/a> algorithms<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-40c2098 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW118163686 BCX0\"><span class=\"NormalTextRun SCXW118163686 BCX0\">These advanced methods enable organizations to detect and respond to known and unknown threats against containerized environments. The capability to <\/span><span class=\"NormalTextRun SCXW118163686 BCX0\">identify<\/span><span class=\"NormalTextRun SCXW118163686 BCX0\"> anomalies in container behavior or communication patterns improves the overall security posture of containerized applications.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4213da2 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">3. Automated Incident Response<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e55ed1c elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>One of the key transformations that containerization brings to XDR capabilities is the automation of incident response processes. XDR solutions can automate many steps involved in incident response, including incident triage, investigation and remediation<\/span><span>\u00a0<\/span><\/p>\n<p><span>This automation enables organizations to respond to security incidents more quickly and effectively in containerized environments. The speed and efficiency of <a href=\"https:\/\/fidelissecurity.com\/use-case\/incident-response\/\">automated responses<\/a> are crucial in containing and mitigating threats in the fast-paced world of containerized applications.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d62aaee elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">4. Seamless Integration<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-05396e6 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW122395707 BCX0\"><span class=\"NormalTextRun SCXW122395707 BCX0\">Containerization allows XDR systems to integrate seamlessly with container orchestration platforms like Kubernetes. This integration enables XDR solutions to provide real-time monitoring and protection for running containers. By <\/span><span class=\"NormalTextRun SCXW122395707 BCX0\">leveraging<\/span><span class=\"NormalTextRun SCXW122395707 BCX0\"> the native APIs and features of container orchestration tools, XDR systems can offer more granular and context-aware security controls, enhancing their ability to <\/span><span class=\"NormalTextRun SCXW122395707 BCX0\">identify<\/span><span class=\"NormalTextRun SCXW122395707 BCX0\"> and manage unusual activities, potential exploits, and various security risks while containers are in use.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-46aebb2 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">5. Scalability and Flexibility<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-78619e7 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW33699350 BCX0\"><span class=\"NormalTextRun SCXW33699350 BCX0\">The lightweight nature of containers enables XDR solutions to scale effortlessly alongside growing containerized environments. This scalability ensures that security measures can keep pace with the rapid deployment and scaling of containerized applications. Additionally, the flexibility of containerization allows XDR systems to adapt to various deployment models, including on-premises, cloud, and hybrid environments, providing consistent security across diverse infrastructures.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0abcb86 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-7b7afc1 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How Does Cloud-Native Design Improve XDR Performance?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ac1963b elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW61319687 BCX0\"><span class=\"NormalTextRun SCXW61319687 BCX0\">Cloud-native technologies have transformed Extended Detection and Response (XDR) platforms technically. This change has boosted threat detection capabilities and simplified security operations while enabling better incident response.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9aa0a89 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Real-Time Threat Detection with Cloud-Native Data Processing<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1713504 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Cloud-native XDR identifies threats quickly through non-stop data monitoring and analysis. Traditional systems detect attacks after damage occurs, but live threat detection shows suspicious activities immediately. Security teams can spot and respond to cyber threats right away, which reduces potential damage.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Stream detection stands out as the main advantage. This non-stop process collects, analyzes, and reports on moving data. Cloud-native XDR examines logs live instead of sending them to a central repository. The system spots unexpected permission changes and unusual activity that might signal an intrusion.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Cloud-native security solutions use behavioral analytics, context-aware risk scoring, and automated policy enforcement. These features filter out noise and highlight the most urgent threats.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f1aabbf elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Microservices-Based XDR Architecture<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8e94e5b elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Modern XDR platforms now use microservices architecture that ensures flexible scaling and high performance. Organizations can adjust their resources based on needs while keeping the system running efficiently.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Kaspersky NEXT XDR Expert runs on microservices architecture powered by Kubernetes technology. The platform specifically uses the lightweight k0s distribution. This design supports elastic scaling and flexible deployment on any computing infrastructure\u2014public cloud, on-premises, or hybrid models.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-be5ec38 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">API-First Integration Capabilities<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f6fcf18 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Cloud-native XDR platforms break down traditional security silos through API-first design. These solutions create a unified security architecture where data flows continuously across endpoints, networks, and applications. A threat detected in one area updates the entire security infrastructure immediately.<\/span><span>\u00a0<\/span><\/p>\n<p><span>API-first design makes integration with existing security tools smooth. Cisco XDR offers complete API integration features that let users customize and extend the platform\u2019s capabilities.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e655bd5 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Scalability Improvements in Cloud-Native XDR<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6a0b38f elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Cloud-native XDR grows easily with an organization\u2019s changing security needs. Cloud-based options handle large data volumes better than traditional solutions. The cloud-native architecture supports flexible storage and deployment options.<\/span><span>\u00a0<\/span><\/p>\n<p><span>XDR solutions need this scalability to collect and analyze data from multiple sources\u2014endpoints, networks, cloud environments, and applications. The architecture keeps latency low when connecting data across these environments. This speed ensures quick detection and response to threats.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-dfb854a e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-8798786 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Advanced Threat Detection in Cloud-Native XDR Environments<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f3798ca elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Cloud-native XDR platforms detect sophisticated threats that traditional security tools miss. These platforms showcase the most important developments in how organizations detect and respond to emerging cyberthreats in distributed environments.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a757dda elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Anomaly Detection at Cloud Scale with XDR<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6a8c6e3 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Modern cloud-native XDR solutions use machine learning algorithms to spot advanced threats in multiple domains. These systems analyze big security data from endpoints, networks, cloud environments, and identity solutions. This creates a complete detection framework that works at cloud scale.<\/span><span>\u00a0<\/span><\/p>\n<p><span>XDR\u2019s strength in cloud-native environments comes from knowing how to identify unknown threats without predefined attack signatures. This makes it vital for catching zero-day exploits and sophisticated attacks that bypass traditional defenses. XDR platforms watch behavioral patterns and enable early threat identification through up-to-the-minute data analysis.<\/span><span>\u00a0<\/span><\/p>\n<p><em><strong>Key anomaly detection capabilities include:\u00a0<\/strong><\/em><\/p>\n<p><span>Spotting unusual file changes and unauthorized privilege increases at endpoints<\/span><span>Finding abnormal network data transfers and unusual server connections<\/span><span>Watching cloud resource usage patterns and suspicious API calls<\/span><span>Following workload patterns in containerized environments<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2d97d6f elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Behavioral Analytics in Distributed Environments<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-59db71a elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Behavioral analytics are the foundations of effective threat detection in cloud-native XDR. These systems set baselines for normal activity across users, devices, and applications. They then flag any unusual behavior that might indicate security problems. This approach works well in distributed cloud environments where traditional perimeter-based security falls short.<\/span><span>\u00a0<\/span><\/p>\n<p><span>User and Entity Behavior Analytics (UEBA) within XDR solutions offers ready-to-use detection features that start identifying potential threats right away. These systems look at over 30 different risk indicators grouped by risky IP addresses, login failures, admin activity, and location data.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Machine learning algorithms make detection mechanisms better by learning from past data. This cuts down false positives and helps security teams focus on real threats. The result is a dynamic defense system that adapts to new threats while maintaining visibility across distributed cloud environments.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Cloud-native XDR has become a powerful tool that identifies and stops sophisticated attacks before they cause major damage.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-59b6385 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-9c08233 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Implementing Zero Trust Within Cloud-Native XDR Frameworks<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b63d54e elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW237990590 BCX0\"><span class=\"NormalTextRun SCXW237990590 BCX0\">XDR\u2019s detection capabilities combined with zero trust principles create a powerful security model. This combination helps organizations deal with the challenges of distributed cloud environments. Zero trust <\/span><span class=\"NormalTextRun SCXW237990590 BCX0\">operates<\/span><span class=\"NormalTextRun SCXW237990590 BCX0\"> on a simple principle \u2013 \u201c<em><strong>never trust, always verify<\/strong><\/em>\u201c.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c28a75d elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Identity Verification in Distributed Cloud Environments<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0f2678f elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Identity verification is the life-blood of <a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/xdr-security\/xdr-and-zero-trust\/\">zero trust implementation<\/a> in cloud-native environments. Organizations no longer trust users based on username and password credentials alone. XDR platforms make use of strong endpoint controls to build trust. These controls give a detailed view of potential threats and endpoint activities.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Multi-factor authentication (MFA) stands as a vital part of this verification process. Users must provide two or more forms of authentication to gain access. This prevents unauthorized access even if someone steals the passwords.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-86e36c9 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Continuous Authentication and Authorization<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-23d7715 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>User sessions now require continuous authentication that confirms identity throughout the session. This replaces the old one-time verification approach. XDR supports this zero trust pillar by collecting and connecting data from the entire IT infrastructure.<\/span><span>\u00a0<\/span><\/p>\n<p><span>The system keeps reviewing and reassessing endpoints after the original access approval to make sure they stay secure. The security teams receive notifications to cut off access if an endpoint shows suspicious behavior. Suspicious activities might include multiple logins from different locations within impossible timeframes.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5c9e53f elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Microsegmentation to reduce attack surface<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-fbe66f0 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Microsegmentation creates secure zones in cloud environments. These zones isolate and protect application workloads individually. This method substantially reduces attack surfaces and stops threats from moving laterally.<\/span><span>\u00a0<\/span><\/p>\n<p><span>XDR frameworks use microsegmentation to enable precise firewall policy controls. Host workload firewalls act as enforcement points for workloads of all types \u2013 virtual machines, servers, and containers. Each workload gets its own secure perimeter that stays consistent across different environments.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ac4d521 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Least Privilege Access Implementation <\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8a180bb elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Least privilege ensures users and services can only access resources they need for their specific tasks. Organizations can manage permissions from a single location through XDR\u2019s role-based access control (RBAC).<\/span><span>\u00a0<\/span><\/p>\n<p><span>Security teams can now avoid using broad administrative roles that give too many permissions. In fact, custom roles in XDR RBAC deliver true \u201cleast privilege\u201d by splitting access to specific products. These roles limit permissions to only what users need.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-70a482a e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-c9dea46 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Limitations of Cloud-Native XDR<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-af5fbf8 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW235094282 BCX0\"><span class=\"NormalTextRun SCXW235094282 BCX0\">Cloud-native XDR solutions offer powerful capabilities, but several major obstacles prevent their successful implementation. Organizations need to understand these limitations to create realistic adoption strategies for 2025 and beyond.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f9aa52f elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Skills Gap in Cloud-Native Security Operations<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-97052b8 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>A critical roadblock to cloud-native XDR implementation is the shortage of qualified cybersecurity professionals. The global cybersecurity skills gap now reaches nearly 3 million workers. To cite an instance, 53% of surveyed organizations report troubling shortages of cybersecurity skills. The problem becomes worse in cloud environments, where 76% of organizations don\u2019t have enough cloud security expertise and personnel resources.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Companies find it extremely difficult to hire security professionals with cloud expertise. This shortage creates situations where cloud security remains disconnected from on-premises infrastructure. One in four companies point to insufficient expertise and training as their biggest problem when implementing cloud security.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-827966b elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Related Reading: <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/xdr-security\/addressing-security-gaps-using-xdr\/\">Addressing Security Gaps Using XDR: Enhance Threat Detection &amp; Response<\/a><\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-96debbc elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Integration Challenges with Legacy Systems<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2989c73 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Older systems create major technical problems when combining them with cloud-native XDR. Industry reports show 72% of corporate architectures still depend on legacy systems. These existing platforms don\u2019t have the flexibility and scalability that cloud-native XDR deployments need.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Legacy systems don\u2019t work well with modern tools used in cloud-native environments, such as container orchestration and configuration management systems. Companies recreate their old security problems in cloud networks by treating security as an afterthought.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-397e4d0 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Addressing Multi-Cloud Complexity<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-739e86c elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>XDR implementations face substantial challenges in multi-cloud environments. About 81% of enterprises now use a multi-cloud strategy. This creates problems in coordinating security policies between different providers. Security teams struggle to maintain visibility over different cloud environments while reducing shadow IT instances.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Each cloud service provider uses unique terminology, interfaces, and services. This reduces a company\u2019s ability to utilize new services and manage them well. Such complexity often results in operational inefficiency and higher cloud costs.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-de74bd2 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Overcoming Data Volume and Velocity Issues<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c69126d elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>The enormous data volumes that cloud-native XDR solutions must process create serious performance challenges. Security teams ignore or don\u2019t address 62% of SOC alerts due to alert fatigue. Even large companies with resources often avoid investing in long-term data maintenance.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Data retention presents another serious challenge \u2013 most vendors keep data for less than 90 days by default. This falls nowhere near the average 280 days needed to identify and contain a data breach. The challenge of interpreting high-volume data across multiple cloud platforms makes it hard for organizations to learn anything useful from their XDR implementations.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-07a9443 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-345f2fe elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Implementing Cloud-Native with Fidelis Elevate<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9df3e15 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW99419591 BCX0\"><span class=\"NormalTextRun SCXW99419591 BCX0\"><a href=\"https:\/\/fidelissecurity.com\/fidelis-elevate-extended-detection-and-response-xdr-platform\/\">Fidelis Elevate<\/a>\u00ae is a unified Extended Detection and Response (XDR) platform designed to enhance security operations across hybrid and multi-cloud environments. Below is a detailed breakdown of its key features:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-119e897 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Integrated Network, Endpoint, and Cloud Visibility<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e32078d elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW14868280 BCX0\"><span class=\"NormalTextRun SCXW14868280 BCX0\">Fidelis Elevate provides comprehensive visibility by integrating network, endpoint, and cloud analyses. This unified approach allows organizations to automatically map their cyber terrain, evaluate asset risks, and detect threats that might be missed by other tools.\u00a0<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b81c27f elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Dynamic Cyber Terrain Mapping<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-044c2d4 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW138406503 BCX0\"><span class=\"NormalTextRun SCXW138406503 BCX0\">The platform continuously maps the cyber terrain across on-premises and cloud networks, offering real-time inventory with risk profiling. This proactive stance enables security teams to <\/span><span class=\"NormalTextRun SCXW138406503 BCX0\">identify<\/span><span class=\"NormalTextRun SCXW138406503 BCX0\"> and prioritize critical assets and potential attack paths.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-24e2fd3 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Deep Session Inspection<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a384d10 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW83404785 BCX0\"><span class=\"NormalTextRun SCXW83404785 BCX0\">With patented Deep Session Inspection technology, Fidelis Elevate inspects traffic across all ports and protocols. This capability allows for the detection of threats in nested files, encrypted traffic, and ephemeral containerized workloads, ensuring thorough analysis of network traffic.\u202f<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9ecae63 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Asset Discovery and Classification<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-08fd944 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW206964557 BCX0\">Fidelis Elevate automates the discovery and classification of IT assets across Infrastructure as a Service (IaaS), Platform as a Service (PaaS), servers, and containers. This comprehensive asset awareness aids in mitigating risks and <\/span><span class=\"NormalTextRun SCXW206964557 BCX0\">maintaining<\/span> <span class=\"NormalTextRun SCXW206964557 BCX0\">an accurate<\/span><span class=\"NormalTextRun SCXW206964557 BCX0\"> security posture.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-dff81a7 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Cloud Security Posture Management (CSPM)<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c347c12 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW259188538 BCX0\">The platform offers CSPM capabilities for major cloud service providers, including AWS, Azure, and GCP. It provides continuous assessments to ensure compliance with security policies and best-practice configurations, helping organizations <\/span><span class=\"NormalTextRun SCXW259188538 BCX0\">maintain<\/span><span class=\"NormalTextRun SCXW259188538 BCX0\"> robust cloud security.\u202f<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-90a2ef0 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Extended Detection and Response (XDR) Capabilities<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-cb615d3 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW34122623 BCX0\">Fidelis <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW34122623 BCX0\">Elevate\u2019s<\/span><span class=\"NormalTextRun SCXW34122623 BCX0\"> XDR functionality unifies visibility and automates threat detection across complex environments. This <\/span><span class=\"NormalTextRun SCXW34122623 BCX0\">holistic approach<\/span><span class=\"NormalTextRun SCXW34122623 BCX0\"> enables rapid detection and remediation of threats, enhancing the organization\u2019s overall security posture.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0686beb elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Deception Technology Integration<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6c2f774 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>The platform integrates <a href=\"https:\/\/fidelissecurity.com\/solutions\/deception\/\">deception technology<\/a> to detect, investigate, and respond to threats across networks, endpoints, and cloud environments. This proactive defense mechanism helps in identifying and mitigating threats before they can cause significant harm. <\/span><span>\u00a0<\/span><\/p>\n<p><span>By leveraging these cloud-native capabilities, Fidelis Elevate empowers organizations to achieve comprehensive security visibility and control, effectively safeguarding their digital assets in today\u2019s complex and dynamic environments.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7c4cee30 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-1ee3a847 elementor-cta--skin-cover elementor-widget elementor-widget-call-to-action\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-cta\">\n<div class=\"elementor-cta__bg-wrapper\">\n<div class=\"elementor-cta__bg elementor-bg\"><\/div>\n<div class=\"elementor-cta__bg-overlay\"><\/div>\n<\/div>\n<div class=\"elementor-cta__content\">\n<div class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tReady to take your threat detection to the next level?\t\t\t\t\t<\/div>\n<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item \">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/fidelissecurity.com\/get-a-demo\/\"><br \/>\n\t\t\t\t\t\tSchedule a demo\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5aaa04b4 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-1187ea14 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Frequently Ask Questions<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5eb1c048 elementor-widget elementor-widget-eael-adv-accordion\">\n<div class=\"elementor-widget-container\">\n<div class=\"eael-adv-accordion\">\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header active-default\">\n<h3 class=\"eael-accordion-tab-title\">What does cloud-native security bring to XDR?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix active-default\">\n<p><span class=\"TextRun SCXW167288347 BCX0\"><span class=\"NormalTextRun SCXW167288347 BCX0\">It enriches XDR with smarter analytics, scalable deployment, and multi-domain threat detection\u2014enabling faster detection, extended visibility, and effective response.<\/span><\/span><\/p>\n<\/div><\/div>\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header\">\n<h3 class=\"eael-accordion-tab-title\">What are some fundamental constructs of 2025 cloud-native XDR?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix\">\n<p><span class=\"TextRun SCXW103801047 BCX0\"><span class=\"NormalTextRun SCXW103801047 BCX0\">Containerization, microservices-based detection, and data lake integration\u2014these deliver consistent security, greater analysis, and faster threat response.<\/span><\/span><\/p>\n<\/div><\/div>\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header\">\n<h3 class=\"eael-accordion-tab-title\">How does cloud-native XDR enhance operational efficiency?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix\">\n<p><span class=\"TextRun SCXW136105817 BCX0\"><span class=\"NormalTextRun SCXW136105817 BCX0\">By automating processes, minimizing false positives, and unifying incident management\u2014liberating teams to concentrate on strategic response.<\/span><\/span><\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>The post <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/xdr-security\/cloud-native-technologies-and-xdr\/\">How Cloud-Native Security Makes XDR More Powerful in 2025<\/a> appeared first on <a href=\"https:\/\/fidelissecurity.com\/\">Fidelis Security<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>As businesses move to the cloud, security approaches need to move at the same pace. By 2023, 70% of workloads will be running in cloud environments\u2014but traditional defenses lag behind. With an average of 1,427 cloud services in use and cloud security expenditures projected to explode past $48.9 billion by 2026, the risks have never [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-2739","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2739"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2739"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2739\/revisions"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}