Multi-source correlation
An enterprise correlates Microsoft 365 + Bitdefender EDR + Cisco firewall logs in XDR to detect lateral movement that spans email, endpoint and network in a single chronology.
XDR unifying endpoint, network, identity and cloud telemetry.
GravityZone XDR is Bitdefender's flagship XDR platform — combining endpoint sensor data with telemetry from Microsoft 365, Microsoft Entra ID, Google Workspace and network sources. Cross-source correlation, automated response and an optional managed XDR (MDR) service are included.
GravityZone XDR is Bitdefender's flagship extended detection and response platform. Where the GravityZone Business Security Enterprise package extends EDR with limited XDR sensors, GravityZone XDR is purpose-built as a standalone XDR with full breadth across Endpoint, Identity, Productivity, Network and Cloud sensors. It is positioned in the same competitive space as Trend Vision One, Microsoft Defender XDR, Palo Alto Cortex XDR and CrowdStrike Falcon Complete — and is engineered around the same principle: that no single security telemetry source provides enough context to detect modern multi-stage attacks, and that the value of detection rises sharply when signals from endpoint, identity, productivity, network and cloud sources are correlated continuously into a single incident timeline.
Sensor architecture. The Endpoint sensor reuses Bitdefender's classic GravityZone single agent — already deployed at hundreds of millions of devices worldwide — sending process, file, registry, network and behavior telemetry into the XDR data lake. The agent supports Windows, macOS and a curated set of Linux distributions, and operates online and offline alike; offline endpoints continue prevention and collect telemetry locally, syncing back to the cloud when connectivity returns. The Identity sensor pulls events from Microsoft Entra ID, on-prem Active Directory and Okta: risky sign-ins, MFA fatigue attempts, brute-force authentication, password spraying, golden-ticket and silver-ticket attempts, Kerberoasting, DCSync, DCShadow, anomalous service-account use, OAuth consent grants to risky apps and impossible-travel patterns. The Productivity sensor connects to Microsoft 365 (Exchange Online, SharePoint, OneDrive, Teams) and Google Workspace via the Microsoft Graph API and the Gmail API: anomalous downloads, mass external file sharing, abnormal mailbox forwarding rules, suspicious OAuth grants, Teams data exfiltration patterns and conversation-hijack detection. The Network sensor processes firewall logs, NetFlow data, DNS query streams and traffic mirror data: C2 beaconing, DNS tunneling, low-and-slow exfiltration, lateral SMB activity, RDP lateral movement and protocol-anomaly detection. The Cloud sensor ingests AWS CloudTrail, AWS Config, AWS GuardDuty, Azure Activity Log, Azure Defender, GCP Audit Log and Kubernetes audit events for control-plane visibility — surfacing IAM misuse, privilege escalation, container compromise and unauthorized resource changes.
Cross-source correlation is the core value. Modern attacks span multiple surfaces — an attacker phishes a user (Productivity), captures credentials (Identity), pivots to an endpoint via remote desktop (Endpoint), moves laterally over SMB (Network), and exfiltrates data to a cloud bucket (Cloud). Single-source detection sees each step at low confidence — a single anomalous sign-in is statistically noisy; a single PowerShell execution is rarely a high-fidelity indicator. XDR correlates them into a single high-confidence incident with the full attack story, MITRE ATT&CK mapping and root-cause traceback. False-positive rates drop dramatically; mean time to detect (MTTD) collapses from hours to minutes; mean time to respond (MTTR) collapses because analysts no longer chase the same incident across three or four separate consoles. The correlation engine itself is informed by Bitdefender Labs threat intelligence — adversary playbooks, indicator-of-compromise (IOC) feeds and MITRE technique heuristics are baked into the correlation rules so that customers benefit from continuous research investment.
Automated response playbooks. GravityZone XDR ships with pre-built response playbooks that execute remediation across sensors when an incident triggers: isolate the affected endpoint, kill the malicious process, disable the compromised user account in Entra ID, force MFA reset, quarantine the phishing email across the entire mailbox tenant, block the C2 domain at the firewall, revoke OAuth tokens and rotate cloud access keys. Playbooks run in two modes — approval-based (a human reviewer confirms before action) or fully automated (immediate execution). High-confidence containment actions typically run fully automated; sensitive actions like user disable or domain-controller isolation typically require approval. Playbooks are fully customizable per-customer and per-incident-class, so a customer can specify that confirmed-malware on standard workstations runs fully automated containment while incidents involving executive accounts or production servers always go through approval flow. Response history is logged immutably for forensic and audit purposes.
Threat hunting is delivered through a dedicated console with BQL (Bitdefender Query Language) and pre-built saved hunts curated by Bitdefender Labs. Analysts hunt over endpoint, identity, productivity, network and cloud data simultaneously — for example: "find PowerShell with base64-encoded commands AND a successful Entra ID sign-in from the same user in the last hour AND outbound traffic to an unknown destination" — a query that requires cross-source telemetry and would be impossible to express against any single source. Saved hunts can be scheduled, parameterized and promoted to detection rules that fire as live alerts going forward. Threat intelligence feeds ingest IOCs from Bitdefender Labs, MISP, STIX/TAXII and customer-supplied custom feeds — automatically matching incoming telemetry against the freshest indicator set. Threat-intel-driven hunt packs (e.g., "latest Lockbit affiliate TTPs", "recent FIN7 campaign indicators") are released by Bitdefender Labs on a recurring cadence and one-click installable into the customer console.
Managed XDR (MDR). Customers without a 24/7 SOC subscribe to Bitdefender MDR on top of GravityZone XDR. The Bitdefender SOC monitors all sensor telemetry, performs triage on every correlated incident, executes containment per pre-agreed runbooks and delivers monthly executive briefings. The 15-minute first-response SLA covers critical incidents; threat-hunting hours are bundled. MDR Plus adds a named analyst, quarterly tabletop exercises and tailored detection-rule development. Sora Yazilim provides the localized bridge to the Bitdefender SOC plus customer-side incident-report translation, escalation coordination and quarterly business reviews. For organizations that need a hybrid model — in-house SOC during business hours, MDR coverage overnight and at weekends — Bitdefender supports the split with full handoff documentation and shared incident state.
Compliance and reporting. GravityZone XDR's MITRE ATT&CK alignment, cross-source incident chronology and retention controls map directly to NIS2 Directive incident-reporting requirements (Article 23: 24-hour early warning, 72-hour incident notification, 1-month final report); GDPR Article 32 (demonstrable security of processing including "the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services"), Article 33 (personal data breach notification to the supervisory authority within 72 hours) and Article 34 (communication to data subjects); HIPAA security incident procedures (45 CFR 164.308(a)(6) — identify and respond to suspected or known security incidents); PCI-DSS v4.0 Requirement 10 (log and monitor all access to system components and cardholder data) and Requirement 12.10 (implement an incident response plan); SOC 2 Common Criteria CC7 (system operations); and ISO/IEC 27001:2022 Annex A controls A.5.24 through A.5.28 (incident-management capability). Default telemetry retention is 30 days; extendable to 90 or 365 days for compliance use cases — typically 365 days where PCI-DSS or NIS2 require long-tail forensic capability. Audit-ready reports — executive summary, technical timeline, MITRE matrix and remediation status — are produced as PDF or CSV directly from the console.
Integrations. SIEM integration ships out of the box for Microsoft Sentinel (native data connector), Splunk Enterprise (technical add-on), IBM QRadar, Elastic SIEM, LogRhythm and Devo via CEF, LEEF and JSON over syslog and HTTPS. SOAR integration via REST API + webhooks allows Splunk SOAR, Microsoft Sentinel Automation, IBM Resilient and Palo Alto XSOAR to call back into GravityZone for response orchestration — so a customer's existing SOAR investment continues to drive cross-vendor playbooks while XDR handles security-domain enrichment and containment. ITSM integration with ServiceNow, Jira and Zendesk automates ticket creation, ownership routing and bidirectional state synchronization. Webhook-based event forwarding supports custom downstream consumers (in-house data lakes, security data platforms, analyst notification systems). Identity-provider integration covers Microsoft Entra ID, Okta, Ping Identity, Duo and ForgeRock.
Licensing model. GravityZone XDR is sold on a per-sensor subscription basis — per endpoint, per Identity user, per Productivity mailbox, per Network gigabit ingested and per Cloud account monitored. Customers buy only the sensors they need at outset; sensor selection can be adjusted at renewal as the environment matures and the SOC takes on more sources. Annual commitment is the default, discounted; monthly billing via the CSP channel is available for organizations that prefer OpEx flexibility. MDR is an additional SKU on top, priced per protected endpoint. Sora Yazilim handles license sizing, renewal management and proactive optimization at every annual cycle — frequently consolidating sensor counts that drifted upward due to seasonal headcount or sunset of disused mailboxes.
Comparison with Trend Vision One: Trend Vision One is the more mature XDR platform — more analyst-experience polish, the Companion AI assistant, the ASRM (Attack Surface Risk Management) module and a recurring Leader position in industry analyst evaluations. GravityZone XDR is newer to standalone XDR (Bitdefender has world-leading endpoint roots and has built XDR breadth more recently) but offers a clear price advantage — typically 30–40% lower TCO at comparable scope — particularly attractive in mixed estates already running GravityZone EPP. Sora Yazilim runs side-by-side POCs to score each product against customer-specific use cases — typically a four-week pilot covering endpoint, identity and productivity sensors with a representative scope of 200–500 users, scored on detection coverage, false-positive rate, analyst time-per-alert, dashboard usability and integration completeness for the customer's SIEM/SOAR/ITSM stack.
Comparison with Microsoft Defender XDR: Defender XDR is deeply integrated into the Microsoft ecosystem (Sentinel, Entra ID, Intune, Defender for Office 365, Defender for Cloud Apps) and is largely bundled with Microsoft 365 E5 licenses — making it cost-attractive for organizations already standardized on Microsoft. GravityZone XDR has the edge for organizations that operate heterogeneous IT stacks (significant Google Workspace, AWS, third-party SaaS presence), for organizations that want a vendor-agnostic SOC perspective independent of the underlying productivity-suite vendor, and for environments where Defender for Endpoint's resource footprint on aging hardware is a practical issue. Sora Yazilim builds the comparison matrix specific to the customer's stack mix.
Comparison with Palo Alto Cortex XDR: Cortex XDR is a strong platform tightly integrated with the broader Palo Alto Networks portfolio (Prisma Cloud, Cortex Xpanse, Cortex XSOAR) and benefits from world-class network-telemetry roots. GravityZone XDR typically wins on price and on endpoint-led architecture where the customer's investment center is endpoint security; Cortex XDR wins where the customer is already deeply standardized on Palo Alto and wants tight portfolio integration. Both are defensible choices; Sora Yazilim positions each based on the customer's incumbent vendor commitments.
Time to value. Pilot deployment for 100–250 users with endpoint + identity + productivity sensors typically completes in one week; the first correlated cross-source incident usually triggers within days of go-live. Full enterprise rollout for 5,000–10,000 users with network and cloud sensors takes 6–10 weeks including SIEM integration, MDR onboarding (if selected) and policy tuning. Sora Yazilim plans, executes and tunes the deployment with certified engineers — pilot scoping, change-management alignment with the customer's CAB, agent rollout sequencing by business unit or risk tier, SIEM connector validation, MDR runbook agreement and three weeks of post-rollout tuning to suppress false positives and tighten correlation rules. For organizations larger than 25,000 endpoints we phase the rollout over a quarter with weekly checkpoint meetings.
Ideal use cases: mid-market and enterprise organizations with a heterogeneous IT stack (Microsoft + Google + AWS + on-prem); regulated industries needing audit-ready cross-source incident chronology (financial services under PCI-DSS and SOC 2; healthcare under HIPAA and EU MDR; energy and utilities under NIS2; public sector under NIS2 and ISO 27001); managed security service providers (MSSPs) using the multi-tenant console to deliver XDR-as-a-service to multiple end customers with per-tenant isolation and consolidated billing; mature SOC teams modernizing detection beyond endpoint-only EDR — particularly teams that have outgrown the alert noise and limited cross-source visibility of SIEM-led detection; organizations purchasing managed XDR (MDR) as the practical alternative to building a 24/7 in-house SOC; manufacturing and OT-adjacent environments that need to correlate IT-network detections with identity and endpoint signals at the IT-OT boundary.
Sora Yazilim engagement model: as an authorized Bitdefender partner, Sora Yazilim leads customers through the full XDR adoption journey — discovery workshop covering the customer's existing detection stack, gaps and compliance scope; cross-source telemetry audit to size sensor counts accurately; license sizing and procurement; console provisioning with environment-specific policy templates aligned to GDPR, NIS2, HIPAA, PCI-DSS or ISO 27001; phased sensor rollout starting with endpoint, then identity, then productivity, then network and cloud; integration testing against Microsoft Sentinel, Splunk or QRadar; MDR onboarding (if selected) with runbook agreement and escalation matrix design; three weeks of post-rollout tuning; SOC team training (administrator, analyst, threat hunter, incident responder personas); operational handoff with documented runbooks; ongoing operations support including monthly health checks, quarterly business reviews, annual policy refresh and proactive license renewal management.
An enterprise correlates Microsoft 365 + Bitdefender EDR + Cisco firewall logs in XDR to detect lateral movement that spans email, endpoint and network in a single chronology.
A SaaS firm monitors AWS CloudTrail + Microsoft 365 events together with GravityZone XDR — IAM access anomalies correlated with mailbox events surface OAuth abuse and key theft.
A brokerage correlates suspicious Entra ID sign-in attempts with endpoint events via the Identity sensor — MFA fatigue and impossible-travel signals upgrade to high-confidence incidents.
Organizations with a heterogeneous IT stack that need cross-source telemetry correlation.
Opens the vendor's original technical documentation and product page in a new tab.
Bitdefender — GravityZone XDR →Entry-level EPP for SMBs — physical and virtual Windows/Mac/Linux protection.
DetailsEPP + risk management + ransomware mitigation.
DetailsEPP + EDR + XDR sensors in a single package.
DetailsOptimized protection for physical, virtual and cloud servers.
DetailsSora Yazılım handles licensing, deployment, training and ongoing management — all from a single team.