Home SecurityOS Security Recognizing and responding to cyber threats: What differentiates NDR, EDR and XDR