* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [Announcement](https://www2.paloaltonetworks.com/blog/category/announcement/) * What Our Cyvera and Morta... # What Our Cyvera and Morta Acquisitions Mean For Palo Alto Networks and You [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2014%2F03%2Fcyvera-morta-acquisitions-mean-palo-alto-networks%2F) [](https://twitter.com/share?text=What+Our+Cyvera+and+Morta+Acquisitions+Mean+For+Palo+Alto+Networks+and+You&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2014%2F03%2Fcyvera-morta-acquisitions-mean-palo-alto-networks%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2014%2F03%2Fcyvera-morta-acquisitions-mean-palo-alto-networks%2F&title=What+Our+Cyvera+and+Morta+Acquisitions+Mean+For+Palo+Alto+Networks+and+You&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2014/03/cyvera-morta-acquisitions-mean-palo-alto-networks/&ts=markdown) \[\](mailto:?subject=What Our Cyvera and Morta Acquisitions Mean For Palo Alto Networks and You) Link copied By [Rick Howard](https://www.paloaltonetworks.com/blog/author/rick/?ts=markdown "Posts by Rick Howard") Mar 24, 2014 6 minutes [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [CSO](https://www.paloaltonetworks.com/blog/tag/cso/?ts=markdown) [Cyvera](https://www.paloaltonetworks.com/blog/tag/cyvera/?ts=markdown) [Kill Chain](https://www.paloaltonetworks.com/blog/tag/kill-chain/?ts=markdown) [M\&A](https://www.paloaltonetworks.com/blog/tag/ma/?ts=markdown) [Morta](https://www.paloaltonetworks.com/blog/tag/morta/?ts=markdown) [next-generation firewall](https://www.paloaltonetworks.com/blog/tag/next-generation-firewall/?ts=markdown) [NGFW](https://www.paloaltonetworks.com/blog/tag/ngfw/?ts=markdown) [Rick Howard](https://www.paloaltonetworks.com/blog/tag/rick-howard/?ts=markdown) Thanks to the technologies we are acquiring with [Cyvera](https://www.paloaltonetworks.com/blog/2014/03/palo-alto-networks-acquire-cyvera/) and already acquired with [Morta Security](https://www.paloaltonetworks.com/blog/2014/01/palo-alto-networks-acquires-morta-security/), the Palo Alto Networks platform will become the first commercial system to provide network defenders the ability to set policy for detection and blocking all the way down the Kill Chain, including the host, and laterally across the network using one simple interface. What's more, we're doing this at a fraction of the cost to deploy equivalent point products from a conga line of security vendors that is the norm for today's cyber security solutions. Let me share some details of what this means to you. **Introduction** When I began interviewing for the Palo Alto Networks Chief Security Officer position last fall, I made my way around to all the senior leaders in the company. The question I got that was consistent amongst all leaders was whether Palo Alto Networks should be on the desktop. They had been thinking about the proposition for a long time and were ready to make a decision one way or the other. I could not believe my good fortune to get involved with a company like ours at this unique time in cybersecurity history. **Disruptive Change Is Coming** For the past few years I have been advocating the need for the cybersecurity community to change its paradigm regarding how to defend the enterprise. The old perimeter defense concept is a dead idea and the model of tactical signatures deployed on point-based products across multiple vendors has never worked as advertised. Advanced organizations like the [Defense Industrial Base](http://www.dc3.mil/dib-cybersecurity/about-dcise) (DIB) and [the Financial Sector Information Sharing and Analysis Center](https://www.fsisac.com/about) (FS-ISAC) have moved away from that model with great success and moved toward a [Kill Chain Model](http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf) of defense by developing sets of [Indicators of Compromise](http://blog.zeltser.com/post/44795789779/indicators-of-compromise-entering-the-mainstream) for the various adversaries that attack their member companies. These organizations have learned that the tactical discovery and potential blocking of an adversary's actions without any context regarding the ultimate objective and the campaign plan designed to achieve that objective is at best, inefficient, and at worst, an utter failure. Therefore, they are learning a more strategic approach. They have figured out how to determine an adversary's campaign plan by developing sets of Indicators of Compromise across the Kill Chain down-to and including the host, sharing them with its member organizations and looking for multiple signs of activity across the attack surface. One of the reasons the DIB and the FS-ISAC have been successful is that many of the member organizations have dedicated significant resources to this effort. They have thrown money and people at the problem and have been able to harness the massive amounts of raw information generated by dozens of different technologies built by, as my Senior Vice President of Worldwide Field Operations, Mark Anderson, likes to say, a conga line of vendors deployed across their enterprises. That is the good news. The bad news is that despite their expertise and success, the overall process is still too hard, still relies on the well-resourced organization to put all of the pieces together, and still has nothing to say for those organizations that do not have the kind of budget or advanced expertise. **A Shift In Thinking** Our cybersecurity community has passively accepted the notion that using multiple point products that may or may not integrate with each other is the solution that everyone needs to defend the enterprise. As we see it, that could not be further from the truth. The best way to understand the Kill Chain model is that it is a system. Therefore, the defense of it needs to be managed like a system. One of the reasons that I wanted to come to work for Palo Alto Networks is that, out of all the vendors in the cybersecurity community space, we are the only one that offers a true system solution at a reasonable price. Our next-generation enterprise security platform provides visibility at all layers of the Kill Chain, does it with one in-line box designed from the ground up to make defensive decisions with one pass of the data, and does it at a fraction of the cost that it would take to deploy and manage an equivalent set of point products. In my previous job as the CISO to a DIB company, I had lots of point products deployed. It was expensive and complex and I always had the feeling in the back of my brain that such complexity was harming us, not least because it gave the adversary lots of places to hide. The Palo Alto Networks solution reduces that complexity. I was ecstatic that I could work for an organization that "got it." Now comes our next step, and I invite you to learn more about what we've acquired with Cyvera and Morta. Up until now, we've had to infer host adversary activity. In other words, we had no direct contact with the host. With our WildFire service -- the copying of all documents coming through the Palo Alto Networks platform to a sandbox in the cloud or on the customer's premise to discover stage-1 and stage-2 delivery of malicious and executable code -- our platform could infer what the malicious code would do once installed on the host. But it could not watch directly what the malicious code actually did on the host. The Cyvera acquisition changes that equation. As we integrate the Cyvera technology into the Palo Alto Networks platform, we will no longer just infer malicious host activity -- we will be watching it directly. Combine that with technology we acquired through Morta -- simply put, the ability to detect lateral movement in a compromised network -- and the Palo Alto Networks platform becomes the most innovative and disruptive commercial cybersecurity solution designed specifically for threat prevention, not just detection, since the idea of a firewall started to emerge back in the early 1990s. ![palo-alto-networks-next-generation-enterprise-security-platform](https://www.paloaltonetworks.com/blog/wp-content/uploads/2014/03/palo-alto-networks-next-generation-enterprise-security-platform-500x425.png) **Conclusion** It is an exciting time in our cybersecurity community, in our industry, and especially at Palo Alto Networks. I can't tell you how good it feels to belong to an organization that is on the leading edge of deploying these disruptive ideas to the marketplace -- ideas that have been percolating around our best advanced thinkers (organizations like DIB and the FS-ISAC) for the past 10 years. Good things are coming and I can hardly wait to share more. Leave a comment or send me a note at [rhoward@paloaltonetworks.com](mailto:rhoward@paloaltonetworks.com) to let me know what you think. And for more on today's Cyvera acquisition announcement, please head to our [resource page](http://media.paloaltonetworks.com/lp/endpoint-security/index.html). *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Hybrid Cloud Data Center](https://www.paloaltonetworks.com/blog/network-security/category/hybrid-cloud-data-center/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### New: The Industry's Most Flexible Software NGFW Consumption Model](https://www2.paloaltonetworks.com/blog/2021/02/netsec-flexible-firewall-licensing/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [News \& Events](https://www.paloaltonetworks.com/blog/sase/category/news-events/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown) [#### Palo Alto Networks a Nine-Time Gartner Magic Quadrant Leader](https://www2.paloaltonetworks.com/blog/2020/11/netsec-gartner-magic-quadrant-leader-2020/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### Introducing PAN-OS 9.0: Stop Threats Hiding in DNS, Close Security Gaps](https://www2.paloaltonetworks.com/blog/2019/02/introducing-pan-os-9-0-stop-threats-hiding-dns-close-security-gaps/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Enterprise \& Branch Security with Palo Alto Networks New NGFWs](https://www2.paloaltonetworks.com/blog/network-security/enterprise-branch-security-with-palo-alto-networks-new-ngfws/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/category/next-generation-firewalls/?ts=markdown), [Strata Network Security Platform](https://www.paloaltonetworks.com/blog/network-security/category/strata-network-security-platform/?ts=markdown) [#### A Leader in IDC MarketScape for Enterprise Hybrid Firewall Solutions](https://www2.paloaltonetworks.com/blog/network-security/a-leader-in-idc-marketscape-for-enterprise-hybrid-firewall-solutions/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown) [#### PA-7500 Redefines Network Defense: A Paradigm Shift in Cybersecurity](https://www2.paloaltonetworks.com/blog/network-security/pa-7500-redefines-network-defense-a-paradigm-shift-in-cybersecurity/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language