* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [Cybersecurity](https://www2.paloaltonetworks.com/blog/category/cybersecurity-2/) * 3 Ways to Counter Multi-V... # 3 Ways to Counter Multi-Vector Attacks [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2016%2F02%2F3-ways-to-counter-multi-vector-attacks%2F) [](https://twitter.com/share?text=3+Ways+to+Counter+Multi-Vector+Attacks&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2016%2F02%2F3-ways-to-counter-multi-vector-attacks%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2016%2F02%2F3-ways-to-counter-multi-vector-attacks%2F&title=3+Ways+to+Counter+Multi-Vector+Attacks&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2016/02/3-ways-to-counter-multi-vector-attacks/&ts=markdown) \[\](mailto:?subject=3 Ways to Counter Multi-Vector Attacks) Link copied By [Karin Shopen](https://www.paloaltonetworks.com/blog/author/karin-shopen/?ts=markdown "Posts by Karin Shopen") Feb 08, 2016 5 minutes [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) [cyber attack lifecycle](https://www.paloaltonetworks.com/blog/tag/cyber-attack-lifecycle/?ts=markdown) [Multi-Vector Attacks](https://www.paloaltonetworks.com/blog/tag/multi-vector-attacks/?ts=markdown) [Ponemon Institute](https://www.paloaltonetworks.com/blog/tag/ponemon-institute/?ts=markdown) [Proofpoint](https://www.paloaltonetworks.com/blog/tag/proofpoint/?ts=markdown) [WildFire](https://www.paloaltonetworks.com/blog/tag/wildfire/?ts=markdown) Attackers are creative and persistent. They look for effective ways to get into your organization, and invest more time and resources in the reconnaissance, weaponization and delivery stages of the attack lifecycle\*\*.\*\* Threat intelligence sharing is more important now than ever before. [According to the new research from the Ponemon institute](http://media.paloaltonetworks.com/lp/ponemon/report.html), 39 percent of attacks can be thwarted by threat intelligence sharing, which is why our partnerships around this initiative with leading security, endpoints and networking vendors including our recent [partnership with Proofpoint](https://www.paloaltonetworks.com/company/press/2016/palo-alto-networks-and-proofpoint-partner-to-extend-threat-prevention-capabilities.html) is significant. In this post, I'll go over what attackers look for, the tactics they use, and the advantages they gain in each of the first three stages of an attack. Then, I'll provide information on how our partnership with Proofpoint helps you counter these multi-vector attacks. ### The first three stages of the Attack Lifecycle **Reconnaissance Stage:** In this stage, cyberattackers try to learn as much as possible about the systems you're running, as they scan for services and applications they can exploit and identify vulnerabilities to target. They research, identify, and select targets, often using phishing tactics or extracting public information from LinkedIn profiles and corporate websites. **W** **eaponization Stage:** Attackers create tailored exploits, and combine them with malicious payloads, to leverage weaknesses they've found during the reconnaissance stage. **Delivery** **Stage:** Attackers determine how to send weaponized threats into the organization, using methods such as phishing via email or social media platforms, watering holes, etc. They may choose to embed malicious code within a seemingly innocuous file, like a PDF, Word document or email message, as part of a multi-stage download attack. In highly targeted attacks, attackers may craft deliverables to catch the specific interests of an individual. New forms of sophisticated cybersecurity threats continually emerge, targeting enterprises, utilizing multiple attack vectors, and aiming at the target's data through employees and partners. Infrastructure that is fragmented and patchy, built over time with multiple isolated systems and management tools, provide attackers with a huge advantage: gaps that may make their activities invisible. ### What can you do to take that advantage away? Make them visible again. 1. **Gain total visibility** by inspecting all data and traffic and cutting through the overwhelming volume of alerts and manual processes associated with operating many discrete security products designed for singular functions. 2. **Efficiently correlate information**to identify infected systems and weaknesses throughout the network, cloud, and endpoints and then execute protection across the organization. 3. **Reduce the gaps between detection, analysis, and protection**while keeping up with new threats composed of various tools, technologies and vectors. We've designed our next-generation security platform to do just that, and we're constantly working to add more threat intelligence and technology partners with the goal of reducing the gaps between different products across your organization and sharing actionable threat data globally. This becomes essential when you prevent secondary downloads and data from leaving your organization and counter the next four stages of the attack life cycle, exploitation, installation, command and control and action on the objective. ### New: Palo Alto Networks and Proofpoint Counter Multi-Vector Attacks With the recent [announcement of our partnership with Proofpoint](https://www.paloaltonetworks.com/company/press/2016/palo-alto-networks-and-proofpoint-partner-to-extend-threat-prevention-capabilities.html), we're able to deliver unprecedented threat intelligence and protection from cyberattacks targeting users, data and content via email and social media. Prior to our partnership, files analyzed by Proofpoint were held and not shared with sandboxes. By combining our technologies, Proofpoint is able to share email attachments with WildFire, a key component of our security platform, in real time. Additionally, the joint development combines WildFire's ability to analyze potentially malicious links with Proofpoint SocialPatrol's ability to scan and, if necessary, remove malicious links throughout an organization's social presence, including on platforms like Facebook, Twitter, LinkedIn and Instagram. This gives our platform unique access to Proofpoint's threat intelligence and provides amplified visibility with an enriched blend of threat intelligence spanning the network, endpoints, cloud, email, and social media platforms. As new threats are discovered, WildFire automatically generates new protections and distributes them to all WildFire-subscribed customers globally, immediately preventing those threats from spreading. ### Key Benefits By coordinating threat information across different attack vectors we are delivering: * Coordinated detection and protection throughout the network, endpoint, cloud, email and social media platforms. * Unified threat intelligence across different attack vectors. * Easy implementation at no additional cost. With real-time, shared threat intelligence and coordinated protection between Palo Alto Networks and Proofpoint, a cyberthreat can quickly be detected and prevented, regardless of the attack vector. If you are both a Proofpoint and Palo Alto Networks customer, you can immediately benefit from this integration simply by turning it on. ### For more information * [Palo Alto Networks technology partner page](https://www.paloaltonetworks.com/partners/alliance/technology-partner-program.html) * [Cybersecurity Buyer's Guide](https://www.paloaltonetworks.com/resources/whitepapers/cybersecurity-buyers-guide.html) * [Palo Alto Networks and Proofpoint Partner to Extend Threat Prevention Capabilities](https://www.paloaltonetworks.com/company/press/2016/palo-alto-networks-and-proofpoint-partner-to-extend-threat-prevention-capabilities.html) * [\[Webinar\] Proofpoint and Palo Alto Networks: Delivering Advanced Threat Protection](https://www.brighttalk.com/webcast/13513/191507) [](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/02/Ignite-2016-register-now.png) [![Ignite 2016 register now](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/02/Ignite-2016-register-now-500x167.png)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/02/Ignite-2016-register-now.png) *** ** * ** *** ## Related Blogs ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Lightboard](https://www.paloaltonetworks.com/blog/category/lightboard/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) [#### Watch: Prevention Against Targeted Phishing Attacks](https://www2.paloaltonetworks.com/blog/2016/06/watch-prevention-against-targeted-phishing-attacks/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### When Scripts Attack, WildFire Protects](https://www2.paloaltonetworks.com/blog/2019/01/scripts-attack-wildfire-protects/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Secure the Future](https://www.paloaltonetworks.com/blog/category/secure-the-future/?ts=markdown) [#### Machine Learning: Your Unfair Advantage Against Attackers](https://www2.paloaltonetworks.com/blog/2018/10/machine-learning-unfair-advantage-attackers/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) [#### Available Now: Custom App-ID for FIFA World Cup 2018](https://www2.paloaltonetworks.com/blog/2018/06/available-now-custom-app-id-fifa-world-cup-2018/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) [#### The Best Ideas In Security, Faster and Easier Than Ever Before](https://www2.paloaltonetworks.com/blog/2018/05/best-ideas-security-faster-easier-ever/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) [#### Digital Transformation Gets Easier When Security Just Works](https://www2.paloaltonetworks.com/blog/2018/04/digital-transformation-gets-easier-security-just-works/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language