Extended Detection and Response

Extended Detection and Response (XDR) – for reliable protection of the IT infrastructure

70 percent of all successful cyber attacks start on an endpoint. Preventative protective measures, such as anti-virus software, are therefore not enough on their own. Extended Detection and Response offers a 360° view of documents, identities, endpoints and cloud workloads and reliably detects typical anomalies. It helps protect your IT infrastructure from even the most sophisticated cyber attacks.

Extended and improved security for endpoints and data

By detecting anomalies in the IT infrastructure, XDR can identify sophisticated attacks such as fileless or zero-day attacks. Relevant security incidents on workplace computers, smartphones, tablets, servers and cloud workloads are incorporated into a single central dashboard. Security officers are immediately informed about the attack and can, ideally, respond before the attacker infiltrates the network further. Using the XDR dashboard, the cybersecurity professionals in the Security Operations Center (SOC) can take initial defensive measures, such as quarantining a suspicious file, while advanced threat hunting options also help identify the attacker within the company’s own infrastructure.

Your benefits

Protects user accounts and endpoints from sophisticated attacks using behaviour-based analysis

Reduces the security team’s workload thanks to automated analysis and defence

End-to-end overview of security incidents on endpoints and in cloud workloads

When is it the right solution?

Endpoints in companies are the primary target of cybercriminal attacks. As many recent successful attacks have shown, preventative protective measures, such as anti-virus and firewalls, are no longer sufficient. You therefore have to take additional measures to reliably detect and respond to attacks.

Heterogeneously configured endpoints and cloud workloads provide cybercriminals with a wide range of potential targets. In addition, with the increasing trend towards employees working outside the corporate network, the security department or SOC often lacks an inside view of the endpoints, processes and network activities to detect attacks. What they need, therefore, is a system capable of analysing behaviour over the entire infrastructure, correlating information from a wide range of sources, evaluating suspicious incidents and reporting these to a central hub.

What’s in it for you:

  • Comprehensive protection for endpoints, documents, identities and cloud workloads
  • Automatic analysis and protection from threats right up to threat hunting
  • Central dashboard with correlated overview of relevant events

Why Swisscom?

  • Expertise: we protect you with policies and regulations that are constantly updated.
  • Integration: by being integrated into our SOC, you minimise your security risk.
  • Managed service: you benefit from our proven, in-depth security expertise.

The first step


Request quotation

Would you like to find out more about our XDR solution? We look forward to preparing your no-obligation quotation.


Factsheet: XDR as a Service (by Palo Alto Networks)

Whitepaper: Detecting and protecting against complex endpoint attacks


Endpoints – the cybercriminal’s favourite point of entry

How does Extended Detection and Response (XDR) work?

The service runs on a standardised platform for detecting and responding to security incidents. The platform collects, correlates and evaluates data from multiple security components and sources, including endpoints, identities, apps, e-mails, documents and cloud workloads. Upon detecting unusual behaviour or an attack, the XDR service automatically generates security alerts or incidents. Incidents are centrally visible in the dashboard and can be seen and responded to by the security officers.

How does Endpoint Detection & Response (EDR) work?

Application examples

How Extended Detection and Response supports your security requirements.

Real-time overview

The customer requirement

You want a constant overview of the activities in your IT infrastructure to enable an immediate response to security incidents.

Our solution

The XDR dashboard gives you a real-time, at-a-glance overview of the status of your endpoints and cloud workloads.

Protection against sophisticated cyber attacks

Protection beyond the corporate network

A lack of resources to operate XDR

Our partner

lenovo logo

Still have questions? Our security experts will be happy to advise you.