Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

The Future of MDR: The CTO Vision

By Vinod Vasudevan

Managed detection and response (MDR) is at an inflection point.

Detection and response remain at the core of the offering, but the evolution of threat landscape in combination with rapid digital transformation is expanding the scope of detection and response.

The following are the seven key changes that are transforming this space.

Chat GPT has shown us all that AI works. There is a positive impact across all industries, and MDR is no exception. One use case that is strongly aligned with the use of Generative AI is the automation of response and threat hunting.

Generative AI bots assist security analysts in hunting through large datasets, investigating incidents and automating rapid responses.

It’s a strong use case that is now receiving significant R&D investment.
This will address the widespread shortage of security staff and reduce the burden on overworked security professionals in the security operations center.

Cybersecurity remains fragmented in terms of best-of-breed, niche technologies that address specific aspects of the threat landscape.

Security information and event management (SIEM), MDR, and extended detection and response (XDR) platforms have attempted to solve the problem of leveraging an organization’s various security technologies to achieve security outcomes.

There is still much that can be done to achieve deep integration. But it has been difficult due to the lack of a standard but dynamic architecture in the industry. The emergence of cybersecurity mesh architecture (CSMA) [1] will lead the way to an industry framework for integrating the mess of disparate security products into a mesh of security outcomes.

The AWS Open Cybersecurity Schema Framework (OCSF) initiative is an industry accelerator toward mesh.

[1] Hevesi, P. and Ruddy M. (2022). Gartner Research: The Future of Security Architecture: Cybersecurity Mesh Architecture (CSMA).

Security has gained traction at boardroom level. However, there is still a communication gap between how the board consumes security information and how it is reported by security teams. The need to report security metrics in the context of the business is gaining traction in the industry.

The industry is moving toward a unified real-time business risk visualization approach. For example, if there are operational technology (OT) or Industrial Internet of Things devices in factories that have been affected by a cyberbreach, the board would like to visualize the business impact of production delays and associated financial impacts.

This is a major shift from security dashboards to unified real-time business risk visualization.

Exposure management complements detection.

Understanding the exposures that cybercrime syndicates can exploit has become important for high fidelity detection.

Exposure could be through unmanaged assets, vulnerabilities in externally exposed assets, exposed code on GitHub or customer/card data on the dark web.

Recovery is emerging as a key component of the MDR offering.

To date, the focus has been on response to contain and manage an attack. After response, organizations still need to perform a number of recovery actions to restore business operations.

Therefore, automating common recovery actions such as patching, reimaging and restoring workloads with required data is an integral part of the MDR roadmap.

MDR is also shifting left with preventive features. Policy management and posture management are two areas that work hand-in-hand to proactively improve the security controls.

This is very important in a hybrid, multicloud environment. Take, for example, the ability to centrally push security best-practice policy settings for workloads, containers and storage tiers. It’s important to be able to do this without having to worry about the nuances of implementation across different hyperscalers or datacenters with different flavors of OS and application platforms.

The same capability can be used to centrally push security policies to improve the posture of affected devices in a breach scenario.

MDR becomes vertical with industry-specific use cases.

Attacks are no longer generic, they are industry-specific. We need to secure each industry with its own set of devices, applications and use cases.

Some examples to illustrate are manufacturing with OT, healthcare with Internet of Medical Things, and financial services with financial transaction applications.

Eviden is innovating in all of the above areas and working toward the next-generation MDR offering.

The evolution of our MDR offering with our platform AIsaac and markitecture view of the future is captured below.

Eviden-cybersecurity-DS-magazine-article-MDR-vision-fig1

About the author

Vinod Vasudevan
Global CTO for MDR & Deputy CTO for Cybersecurity services

Vinod Vasudevan

Vinod Vasudevan is currently Global CTO for MDR & Deputy CTO for Cybersecurity services at Eviden.

He brings more than 20 years of cybersecurity leadership and product innovation. He co-founded Paladion in 2000 and has acted in the role of CTO. During his tenure, he has led technology development and made Paladion an industry leader in managed Detection and Response. He currently holds two U.S. patents in AI & Cybersecurity and has directly serviced global enterprises in the U.S., Europe, and the Asia Pacific. Vinod is a prolific writer and has authored multiple books, articles, and presentations in leading cybersecurity forums. Before co-founding Paladion, Vinod worked with Microsoft and helped drive the adoption of Windows 2000 in the Asia Pacific. He is also a CISSP since 2001.

Follow or contact Vinod

Register your Interest

Sign up for early access to our new solution AIsaac Cyber Mesh by Eviden, coming soon!

Thank you for your interest. You can download the report here.
A member of our team will be in touch with you shortly