{"id":103470,"date":"2019-11-15T06:00:32","date_gmt":"2019-11-15T14:00:32","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=103470"},"modified":"2019-11-15T05:53:07","modified_gmt":"2019-11-15T13:53:07","slug":"cortex-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2019\/11\/cortex-threat-intelligence\/","title":{"rendered":"When Will Threat Intelligence Deliver on Its Promise?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Adversaries are getting more sophisticated, but also more pragmatic. For them, simplicity is the best way to get the job done. Unfortunately, organizations are in the opposite position, struggling with ever-increasing complexity in their security processes. Organizations now realize that they cannot block adversaries by using traditional event, alerting and monitoring solutions. Their security teams are already stretched thin and overburdened by the tsunami of alerts that is drowning them daily. Threat intelligence holds the promise of rescuing them and restoring their sanity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unfortunately, over the years, threat intelligence has not delivered on this promise. There are too many intel feeds that provide little to no value to security operations because the methods are so complicated. Teams must manually collect and incorporate multiple low-value and limited-visibility feeds into the tools they use for investigation and response, which slows them down.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There must be a better way. We believe in threat intelligence that supercharges detection, investigation and response efforts and stops attacks before they happen; threat intelligence that gives your security team instant access to high-fidelity intel based on real-world attacks embedded in the tools they already use, eliminating manual labor and the swivel-chair effect.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks is tackling this challenge with a bold new vision for AutoFocus, our industry-leading threat intelligence platform that already delivers the highest-fidelity expert-backed intel. We are greatly expanding the range of data types that AutoFocus can ingest, allowing customers to tap into the full breadth of a massive threat intelligence repository that Palo Alto Networks has built over 10 years with more than 65,000 customers. Security analysts get unique insight into real-world attack intel from the world\u2019s largest footprint of sensors. Every indicator is enriched with the deepest context from world-renowned Unit 42 threat researchers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security teams can simply consume this intel as a standard feed or embed custom feeds into the tools they already use through a flexible API framework. Analysts will finally have comprehensive, trustworthy and easy-to-use threat intelligence at their fingertips, allowing them to focus on what matters most: stopping breaches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This will change the game on how we consume threat intelligence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks threat <\/span><span style=\"font-weight: 400;\">intelligence is driven by the insights of Unit 42 threat researchers, security operations center (SOC) experts and product leaders.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We're hosting a candid discussion led by these experts comparing today\u2019s threat intelligence offerings, and describing what needs to change.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You\u2019ll find out:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The three ways to protect your enterprise using threat intelligence.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">How to embed threat intel into the tools you\u2019re already using.<\/span><\/li>\n<li style=\"font-weight: 400;\">The future of threat intelligence, including our bold new innovations.<\/li>\n<\/ul>\n<p><b>Join<\/b><span style=\"font-weight: 400;\"> our Nov. 20 webinar, \"<a href=\"https:\/\/www.paloaltonetworks.com\/campaigns\/brighttalk.html?commid=367300\">3 Ways to Speed Up Response with Threat Intel.<\/a>\"<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have a bold new vision for AutoFocus, our industry-leading threat intelligence platform that delivers the highest-fidelity expert-backed intel.<\/p>\n","protected":false},"author":627,"featured_media":103471,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6770],"tags":[922],"coauthors":[6718],"class_list":["post-103470","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-future","tag-threat-intelligence"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/11\/Cortex.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/627"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=103470"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103470\/revisions"}],"predecessor-version":[{"id":103526,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103470\/revisions\/103526"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/103471"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=103470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=103470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=103470"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=103470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}