Skip to content

Exabeam Named a Leader in the 2025 Gartner® Magic Quadrant™ for SIEM, Recognized for the Sixth Time — Read More

An XDR Prerequisite; Prescriptive, Threat-Centric Use Cases

  • Apr 15, 2021
  • Gorka Sadowski
  • 3 minutes to read

Table of Contents

    We’ve talked about the rise of the XDR market and why that came to be in our first post of the Exabeam XDR blog series. In this post, we’ll discuss why a use case-based approach is key to an effective XDR platform. This approach is meant to be prescriptive and step-by-step, focused on successful outcomes that can be repeated at scale, by any organization.

    A legacy approach to SOC maturity

    SOCs were historically tasked with assembling a toolset and supporting processes that can help them detect, investigate, and respond to those threats. To do this, most SOCs adhere to a process that looks like the following chart in Figure 1.

    Figure 1: The typical phases of threat detection, investigation and response in SOCs
    Figure 1: The typical phases of threat detection, investigation and response in SOCs

    When SOCs look to mature their capabilities, they typically look to do so via automation, in a “left-to-right” fashion. It starts with trying to bring in all possible data to their SIEM “just in case” so they don’t miss anything that might be security relevant. With (hopefully the right set but usually too much) data in place, attention is turned to automating detection for as many security threats as possible. With the detection mechanisms in place, alerts begin to pile up — both from security products and from the SIEM itself. To handle this glut of alerts, tier-1 triage workflows are automated. This process of left-to-right automation progresses until it ultimately reaches response and case closure. 

    This legacy model of optimizing a SOC tries to automate each phase in the workflow one at a time, but for all threat types at the same time. Unfortunately, not all threats are the same.  They have different relevance, different priorities, require different data, have different detection methods, different investigation needs, and resolution requires different people, processes, and tools.  Not only does a left-to-right approach require a huge amount of heavy lifting and customization, but it’s simply not an efficient way to mature a SOC.  

    Maturing “top-to-bottom” with threat-centric use cases

    Instead of trying to automate all threats at one stage of the SOC workflow, then moving left-to-right, a more efficient path to SOC maturity is to automate the collection and detection through the resolution of a single threat type before moving on to the next. Start with simple yet prevalent use cases and as you automate them, move on to more complicated threats.  Conceptually this maturity path is closer to working “top-to-bottom”, as illustrated in Figure 2 below.

    Figure 2: Top-to-bottom maturity tackles one use case at a time, then moves on to more complex use cases.
    Figure 2: Top-to-bottom maturity tackles one use case at a time, then moves on to more complex use cases.

    In order to easily facilitate the automation of threat detection, investigation, and response (TDIR) processes, vendors need to offer prescriptive guidance and workflows for handling specific threats and tailor their products to deliver successful outcomes for specific threat types. Figure 3 below shows some of the ways vendors can tailor their products with features, processes, and content to focus on threat-centric use cases across the entire TDIR lifecycle. 

    Figure 3: Areas security vendors can tailor their products to address specific threats across the TDIR workflow.
    Figure 3: Areas security vendors can tailor their products to address specific threats across the TDIR workflow.

    Additionally, customers should not be forced to build functional detection, triage, investigation and response content using the “bag of legos” vendors provide them. Instead, vendors should provide prepackaged content at each step of the TDIR process which is directly related to a specific use case.  As shown in figure 1, each use case is limited in scope to the specific data sources, detection types, investigation steps, response actions that  address a specific threat, in this example, lateral movement. The use case content includes everything you need to solve a particular type of threat for repeatable, successful outcomes every time and at scale.

    Figure 4: Prepackaged content for a lateral movement use case
    Figure 4: Prepackaged content for a lateral movement use case

    Effective XDRs must include prescriptive, threat-centric workflows

    XDRs should be able to offer a closed-loop solution that encompasses the entire security operations workflows of threats. XDRs are supposed to be turnkey solutions with immediate time to value and minimum/no configuration, regardless of the expertise level of the SOC — so instead of tuning, SOCs should be able to use XDRs to address immediate concerns from start to finish. By this, we mean focusing on one use case and expanding from thereafter each one is addressed. Without this capability, XDRs will not be able to fulfill their value prop: turn-key TDIR that works immediately, without customization.

    Want to learn more? To find out more about the state of the XDR market, read our earlier post.

    Gorka Sadowski

    Gorka Sadowski

    Chief Strategy Officer | Exabeam | Gorka Sadowski is Chief Strategy Officer at Exabeam. In his role, Gorka assists the executive team and functional leaders across the company with developing, communicating, executing, and sustaining corporate strategic initiatives. Gorka has more than 30 years of security experience spanning leadership roles across product management, sales, marketing, and operations. Most recently, he was senior director and security and risk management analyst at Gartner driving coverage for security information and event management (SIEM), security operation center (SOC), and managed detection and response (MDR), while also leading research for IT leaders on emerging topics. Prior to Gartner, he led business development at Splunk where he established and built the Splunk security ecosystem. Prior to Splunk, he established presence for LogLogic in Southern Europe, ran security activities for Unisys in France and launched the first partner-led intrusion detection and prevention system (IDPS) in the industry as lead for NetScreen’s Emerging Technology efforts. A certified CISSP, he received a computer science degree from Universite de Pau in France before moving to the U.S. as a Ph.D. candidate in network security at the University of Miami.

    More posts by Gorka Sadowski

    Learn More About Exabeam

    Learn about the Exabeam platform and expand your knowledge of information security with our collection of white papers, podcasts, webinars, and more.

    • Guide

      Eight Ways Agentic AI Will Reshape the SOC

    • Blog

      Your SIEM Rules Can’t Keep Up. It’s Time for a Behavior-Based Defense.

    • Blog

      My First Week as CEO

    • Blog

      Exabeam Named a Leader for the Sixth Time in the 2025 Gartner® Magic Quadrant™ for Security Information and Event M...

    • Report

      2025 Gartner® Magic Quadrant™ for SIEM

    • Guide

      Six Reasons Why SIEM May Remain On-Premises to Power Security Operations

    • Show More