<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Sherweb</provider_name><provider_url>https://www.sherweb.com/blog</provider_url><author_name>The Sherweb Team</author_name><author_url>https://www.sherweb.com/blog/author/the-sherweb-team/</author_url><title>EDR vs. XDR vs. MDR: Which is best for MSPs? | Sherweb</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="NcOaOOoj1E"&gt;&lt;a href="https://www.sherweb.com/blog/security/edr-vs-xdr-vs-mdr/"&gt;EDR vs. XDR vs. MDR: Which is best for MSPs?&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.sherweb.com/blog/security/edr-vs-xdr-vs-mdr/embed/#?secret=NcOaOOoj1E" width="600" height="338" title="&#x201C;EDR vs. XDR vs. MDR: Which is best for MSPs?&#x201D; &#x2014; Sherweb" data-secret="NcOaOOoj1E" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.sherweb.com/blog/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.sherweb.com/blog/wp-content/uploads/MDRvsXDR-1200x480-1.jpg</thumbnail_url><thumbnail_width>2400</thumbnail_width><thumbnail_height>920</thumbnail_height><description>Cybersecurity solutions are quickly becoming a staple in any managed service offering. In an increasingly competitive market, however, it can be difficult to make informed decisions about which solutions best fit client needs. This is especially true for &#x201C;detection and response&#x201D; solutions; endpoint detection and response (EDR), extended detection and response (XDR), managed detection and [&hellip;]</description></oembed>
