{"id":134458,"date":"2024-06-03T09:00:00","date_gmt":"2024-06-03T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=134458"},"modified":"2025-07-03T05:01:31","modified_gmt":"2025-07-03T12:01:31","slug":"microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/","title":{"rendered":"Microsoft is named a leader in the Forrester Wave for XDR"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">\u201cDefenders think in lists, attackers think in graphs.\u201d<sup>1<\/sup> This remains a reality for the many organizations that operate across siloed security tools, fueling the demand on security operations (SOC) teams, as advanced cyberattacks continue to increase in frequency and speed. That\u2019s where extended detection and response (XDR) solutions play a critical role in overcoming the silos and doing the work of correlating alerts across asset types to not only give defenders the ability to respond faster on their own, but even autonomously respond to some of the most sophisticated cyberattacks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Today, we are excited to announce that Microsoft has been named a leader in The <a href=\"https:\/\/reprints2.forrester.com\/#\/assets\/2\/108\/RES180824\/report\" target=\"_blank\" rel=\"noreferrer noopener\">Forrester Wave: Extended Detection and Response (XDR) platforms, Q2, 2024<\/a>, with the highest scores in the strategy, current offering, and market presence categories. Microsoft Defender XDR was rated the highest possible in 15 out of 22 evaluation criteria, including Endpoint Native Detection, Surface Investigation, Threat Hunting, Analyst Experience, Vision, and Innovation.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow has-quote-default-font-size\">\n<p class=\"wp-block-paragraph\"><em>Forrester states that \u201c<strong>Microsoft is refining the most complete XDR offering in the market today<\/strong>,<strong>\u201d<\/strong> and called out \u201c<strong>its dedication to innovation is demonstrated by its percentage of the R&amp;D budget by revenue, which rivals the most innovative vendors in security<\/strong>.\u201d<\/em><\/p>\n<\/blockquote>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/Picture1-2.webp\" alt=\"Chart graph showing Microsoft as the Leader in the Forrester Wave for extended detection and response platforms. \" class=\"wp-image-134462 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/Picture1-2.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">We believe Forrester\u2019s recognition showcases that <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-xdr\">Microsoft Defender XDR<\/a> is the broadest native XDR solution on the market and that our most recent additions of Microsoft Defender for Cloud data and Microsoft Purview Insider Risk Management data are critical to give the SOC access to end-to-end data. Its incident-level visibility, automatic attack disruption of advanced attacks, and accelerated detection and response now work across endpoints, Internet of Things (IoT), operational technology (OT), on-premises and cloud identities, email and collaboration tools, software as a service (SaaS) apps, cloud workloads, and data insights.<\/p>\n\n\n\n<div class=\"alignwide is-style-vertical wp-block-bloginabox-theme-promotional\">\n\t\n<div class=\"promotional promotional--has-media promotional--media-right\">\n\t<div class=\"promotional__wrapper\">\n\t\t<div class=\"promotional__content-wrapper\">\n\t\t\t<div class=\"promotional__content\">\n\t\t\t\t<h2 class=\"wp-block-heading\">Microsoft Defender XDR<\/h2><p class=\"wp-block-paragraph\">Elevate your security with unified visibility, investigation, and response.<\/p><div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button is-full-width-on-mobile\"><a data-bi-an=\"Global CTA\" data-bi-ct=\"cta link\" data-bi-id=\"cta-block\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-xdr\">Learn more<\/a><\/div><\/div>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"promotional__media-wrapper\">\n\t\t\t\t<div class=\"promotional__media\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"1969\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/CLO24-Azure-Fintech-013-scaled.jpg\" class=\"attachment-full size-full\" alt=\"a person standing in front of a computer\" loading=\"lazy\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/CLO24-Azure-Fintech-013-scaled.jpg 2560w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/CLO24-Azure-Fintech-013-300x231.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/CLO24-Azure-Fintech-013-1024x788.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/CLO24-Azure-Fintech-013-768x591.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/CLO24-Azure-Fintech-013-1536x1181.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/10\/CLO24-Azure-Fintech-013-2048x1575.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"get-end-to-end-protection-with-microsoft-s-unified-security-operations-platform\">Get end-to-end protection with Microsoft\u2019s unified security operations platform<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Native breadth is critical to an industry-leading XDR solution, and with Microsoft Defender XDR coverage, organizations get free data ingestion for more workloads than any other can provide. But we understand that customers need to be able to bring together security signals from many sources. This is why we built the security operations platform\u2014by combining the full capabilities of XDR, security information and event management (SIEM), exposure management, generative AI, and threat intelligence. Having these critical capability sets in a single place and operating across all relevant data defeats security tools silos while empowering security teams with unified, comprehensive features that apply to multiple use cases.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>A unified platform.<\/strong> The <a href=\"https:\/\/www.microsoft.com\/security\/business\/solutions\/ai-powered-unified-secops-platform\">unified security operations platform<\/a> enables customers to reap the benefits of both SIEM and XDR through incident level response, flexible reporting, automated workflows, and hunting across both first- and third-party data sources. In the private preview, customers saw up to an 80% reduction in incidents, leveraging the powerful correlation across both XDR and SIEM data.<sup>2<\/sup> With attack disruption for SAP, the platform will automatically disable access to both the SAP and Microsoft accounts during a financial fraud attack\u2014providing critical protection for a platform that houses extremely sensitive data.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Generative AI embedded.<\/strong> <a href=\"https:\/\/www.microsoft.com\/security\/business\/ai-machine-learning\/microsoft-copilot-security\">Microsoft Copilot for Security<\/a> is an industry-first generative AI solution that enables security teams to simplify processes like incident remediation and guided response, reverse engineer malware code, and even uplevel junior analysts by generating Kusto Query Language (KQL) queries using natural language. Embedded directly into the investigation experience, Copilot for Security enables the SOC to automate repetitive tasks and facilitate more informed decision-making during complex security incidents.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Disrupts advanced attacks faster than any other platform.<\/strong> In a world where AI can be used for both good and evil, the importance of using it to fortify organizational defenses becomes more critical than ever. In the last year, 75% of security professionals witnessed an increase in attacks with 85% attributing this rise to bad actors using generative AI.<sup>3<\/sup> This is why Microsoft Security continues to invest in AI. <a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-xdr\/automatic-attack-disruption?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Automatic attack disruption<\/a> in Defender XDR uses the power of AI and machine learning to detect and disrupt in-progress attacks like ransomware, business email compromise, attacker in the middle, and more with high confidence to limit the impact to an organization. By correlating trillions of signals from the workloads, Defender XDR can recognize the intent of an attacker and disrupts ransomware attacks in just three minutes.<sup>4<\/sup><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">With cyberattackers using AI for their own means, XDR and unified security operations platforms are becoming increasingly critical to modern cybersecurity strategies. We are excited that Forrester recognized Microsoft\u2019s leadership in this space, and we will continue to focus on innovation and AI-capabilities to help organizations future-proof their defenses.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Learn more about <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-xdr\">Microsoft Defender XDR<\/a>.<\/p>\n\n\n\n<div class=\"alignwide is-style-vertical wp-block-bloginabox-theme-promotional\">\n\t\n<div class=\"promotional promotional--has-media promotional--media-right\">\n\t<div class=\"promotional__wrapper\">\n\t\t<div class=\"promotional__content-wrapper\">\n\t\t\t<div class=\"promotional__content\">\n\t\t\t\t<h2 class=\"wp-block-heading\">Cybersecurity and AI news<\/h2><p class=\"wp-block-paragraph\">Discover the latest trends and best practices in cyberthreat protection and AI for cybersecurity.<\/p><div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button is-full-width-on-mobile\"><a data-bi-an=\"Global CTA\" data-bi-ct=\"cta link\" data-bi-id=\"cta-block\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/info.microsoft.com\/ww-landing-integrated-threat-protection-portal.html?ocid=cmm2rzerzep\">Get the latest resources<\/a><\/div><\/div>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"promotional__media-wrapper\">\n\t\t\t\t<div class=\"promotional__media\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/07\/Image_option04.jpg\" class=\"attachment-full size-full\" alt=\"Person typing on laptop with Microsoft cyberthreat protection screen\" loading=\"lazy\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/07\/Image_option04.jpg 1600w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/07\/Image_option04-300x169.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/07\/Image_option04-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/07\/Image_option04-768x432.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/07\/Image_option04-1536x864.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/07\/Image_option04-615x346.jpg 615w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/07\/Image_option04-336x189.jpg 336w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/07\/Image_option04-189x106.jpg 189w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/07\/Image_option04-630x354.jpg 630w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions, visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>1<\/sup><a href=\"https:\/\/thehackernews.com\/2024\/05\/the-fundamentals-of-cloud-security.html#:~:text=%D7%B4Defenders%20think%20in%20lists,who%20try%20to%20compromise%20them\">The Fundamentals of Cloud Security<\/a>, The Hacker News. May 8, 2024.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>2<\/sup>Microsoft internal data, May 2024.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>3<\/sup><a href=\"https:\/\/www.securitymagazine.com\/articles\/99832-study-finds-increase-in-cybersecurity-attacks-fueled-by-generative-ai#:~:text=75%25%20of%20security%20professionals%20witnessed%20an%20increase%20in,this%20rise%20to%20bad%20actors%20using%20generative%20AI.\">Study finds increase in cybersecurity attacks fueled by generative AI<\/a>, Security Magazine. August 29, 2023.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>4<\/sup><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/04\/03\/get-end-to-end-protection-with-microsofts-unified-security-operations-platform-now-in-public-preview\/\">Get end-to-end protection with Microsoft\u2019s unified security operations platform, now in public preview<\/a>, Rob Lefferts. April 3, 2024.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The Forrester Wave\u2122: Extended Detection And Response Platforms, Q2 2024, Allie Mellen, Joseph, Blankenship, Sarah Morana, and Michael Belden. June 3, 2024.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The Forrester Wave\u2122 is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave\u2122 are trademarks of Forrester Research, Inc. The Forrester Wave\u2122 is a graphical representation of Forrester\u2019s call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave\u2122. Information is based on the best available resources. Opinions reflect judgment at the time and are subject to change.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u200bMicrosoft has been named a leader in The Forrester Wave\u2122: Extended Detection and Response (XDR) platforms, Q2, 2024, and received the highest scores in both strategy and current offering categories, as well as in the market presence category.<\/p>\n","protected":false},"author":162,"featured_media":134599,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3768],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[3690,3693],"topic":[3665,3684,3685],"coauthors":[1935],"class_list":["post-134458","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-forrester-waves","content-type-news","product-microsoft-defender","product-microsoft-defender-xdr","topic-analyst-reports","topic-security-operations","topic-siem-and-xdr","review-flag-1694638265-310","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-4-1694638266-512","review-flag-8-1694638266-352","review-flag-disable","review-flag-forre-1694638272-596","review-flag-inter-1694638272-721","review-flag-iot-1694638272-473","review-flag-machi-1694638272-641","review-flag-priva-1694638270-654","review-flag-publi-1694638270-243"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft a Leader in the Forrester Wave for XDR | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"For the second consecutive report, Microsoft has been named the overall leader in the Forrester Wave: Extended Detection and Response (XDR).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft a Leader in the Forrester Wave for XDR | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"For the second consecutive report, Microsoft has been named the overall leader in the Forrester Wave: Extended Detection and Response (XDR).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-03T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-03T12:01:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/MSFT_Security_JUNE3_344923_Blog_Blogheader_2400603_V01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rob Lefferts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/MSFT_Security_JUNE3_344923_Blog_Blogheader_2400603_V01.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob Lefferts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/rob-lefferts\/\",\"@type\":\"Person\",\"@name\":\"Rob Lefferts\"}],\"headline\":\"Microsoft is named a leader in the Forrester Wave for XDR\",\"datePublished\":\"2024-06-03T16:00:00+00:00\",\"dateModified\":\"2025-07-03T12:01:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/\"},\"wordCount\":992,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/MSFT_Security_JUNE3_344923_Blog_Blogheader_2400603_V01.webp\",\"keywords\":[\"Forrester Waves\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/\",\"name\":\"Microsoft a Leader in the Forrester Wave for XDR | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/MSFT_Security_JUNE3_344923_Blog_Blogheader_2400603_V01.webp\",\"datePublished\":\"2024-06-03T16:00:00+00:00\",\"dateModified\":\"2025-07-03T12:01:31+00:00\",\"description\":\"For the second consecutive report, Microsoft has been named the overall leader in the Forrester Wave: Extended Detection and Response (XDR).\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/MSFT_Security_JUNE3_344923_Blog_Blogheader_2400603_V01.webp\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/MSFT_Security_JUNE3_344923_Blog_Blogheader_2400603_V01.webp\",\"width\":1280,\"height\":720,\"caption\":\"Security practitioner working to investigate threats.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft is named a leader in the Forrester Wave for XDR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/2ff2415cead9cfdb4ed02f46f3584c8b\",\"name\":\"Christine Barrett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g83aac17c934e01fa04078f828a81e7db\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g\",\"caption\":\"Christine Barrett\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/christinebarrett\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft a Leader in the Forrester Wave for XDR | Microsoft Security Blog","description":"For the second consecutive report, Microsoft has been named the overall leader in the Forrester Wave: Extended Detection and Response (XDR).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft a Leader in the Forrester Wave for XDR | Microsoft Security Blog","og_description":"For the second consecutive report, Microsoft has been named the overall leader in the Forrester Wave: Extended Detection and Response (XDR).","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/","og_site_name":"Microsoft Security Blog","article_published_time":"2024-06-03T16:00:00+00:00","article_modified_time":"2025-07-03T12:01:31+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/MSFT_Security_JUNE3_344923_Blog_Blogheader_2400603_V01.png","type":"image\/png"}],"author":"Rob Lefferts","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/MSFT_Security_JUNE3_344923_Blog_Blogheader_2400603_V01.png","twitter_misc":{"Written by":"Rob Lefferts","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/rob-lefferts\/","@type":"Person","@name":"Rob Lefferts"}],"headline":"Microsoft is named a leader in the Forrester Wave for XDR","datePublished":"2024-06-03T16:00:00+00:00","dateModified":"2025-07-03T12:01:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/"},"wordCount":992,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/MSFT_Security_JUNE3_344923_Blog_Blogheader_2400603_V01.webp","keywords":["Forrester Waves"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/","name":"Microsoft a Leader in the Forrester Wave for XDR | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/MSFT_Security_JUNE3_344923_Blog_Blogheader_2400603_V01.webp","datePublished":"2024-06-03T16:00:00+00:00","dateModified":"2025-07-03T12:01:31+00:00","description":"For the second consecutive report, Microsoft has been named the overall leader in the Forrester Wave: Extended Detection and Response (XDR).","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/MSFT_Security_JUNE3_344923_Blog_Blogheader_2400603_V01.webp","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/MSFT_Security_JUNE3_344923_Blog_Blogheader_2400603_V01.webp","width":1280,"height":720,"caption":"Security practitioner working to investigate threats."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/03\/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft is named a leader in the Forrester Wave for XDR"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/2ff2415cead9cfdb4ed02f46f3584c8b","name":"Christine Barrett","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g83aac17c934e01fa04078f828a81e7db","url":"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g","caption":"Christine Barrett"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/christinebarrett\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/134458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/162"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=134458"}],"version-history":[{"count":2,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/134458\/revisions"}],"predecessor-version":[{"id":141098,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/134458\/revisions\/141098"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/134599"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=134458"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=134458"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=134458"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=134458"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=134458"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=134458"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=134458"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=134458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}