{"id":110311,"date":"2020-04-24T15:00:53","date_gmt":"2020-04-24T22:00:53","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=110311"},"modified":"2020-04-27T15:47:47","modified_gmt":"2020-04-27T22:47:47","slug":"cortex-security-and-risk-management","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/04\/cortex-security-and-risk-management\/","title":{"rendered":"XDR Listed as a Top Security and Risk Management Trend by Gartner"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Gartner\u2019s \u201c<\/span><a href=\"https:\/\/start.paloaltonetworks.com\/gartner-top-security-risk-management-trends.html\"><span style=\"font-weight: 400;\">2020 Top Security and Risk Management Trends<\/span><\/a><span style=\"font-weight: 400;\">\u201d report is out. Our takeaway: XDR (extended detection and response) and security process automation \u2013 two cornerstones of Cortex \u2013 will have broad industry impact and significant potential for disruption in the coming year and beyond.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The report describes pressing security challenges that security teams grapple with, which we have summarized as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The need to defend against increasingly powerful and varied attacks.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A growing security skills gap.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cybersecurity complexity brought on by emerging technologies such as containers and Internet of Things (IoT) devices.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Increasing regulations for data protection and privacy.<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/12\/cortex-what-is-xdr\/\"><span style=\"font-weight: 400;\">XDR<\/span><\/a><span style=\"font-weight: 400;\"> helps security teams address these issues by centralizing, normalizing and correlating security data from multiple sources. This increases detection capabilities when compared to siloed tools such as endpoint detection and response (EDR), both because it provides more complete visibility (for example,<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/03\/cortex-busted-by-cortex-xdr\/\"> <span style=\"font-weight: 400;\">using network data to track vulnerable unmanaged endpoints<\/span><\/a><span style=\"font-weight: 400;\"> that can\u2019t be seen by EDR tools), and because it combines softer signals from multiple components in order to detect events that might otherwise be ignored. XDR analyzes data from multiple sources to validate alerts, thus reducing false positives and overall alert volumes. All of this allows XDR to improve the efficiency and the effectiveness of security teams.<\/span><\/p>\n<p><div style=\"max-width:100%\" data-width=\"624\"><span class=\"ar-custom\" style=\"padding-bottom:20.35%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-full wp-image-110312 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/04\/Gartner-quote.png\" alt=\"\u201cIn response to the growing security skills gap and attacker trends, extended detection and response (XDR) tools, machine learning (ML), and automation capability are emerging to improve security operations productivity and detection accuracy.\u201d \u2013 Gartner\" width=\"624\" height=\"127\" \/><\/span><\/div><\/p>\n<p><span style=\"font-weight: 400;\">While EDR and security incident and event management (SIEM) solutions have achieved much wider adoption to date, XDR is expected to cause significant disruption as it addresses some of the shortcomings of those tools. XDR delivers all the functionality of EDR while also offering the opportunity for companies to correlate their endpoint data with other security sensors, either now or in the future, adding significant visibility and value. While many companies have SIEM solutions that aggregate data, the data that a SIEM collects is broader and shallower than what XDR solutions collect, providing less context for investigations and requiring a lot of manual integration and tuning work, thus demanding resources that many companies do not have.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to alert correlation and improved accuracy, XDR solutions<\/span><a href=\"https:\/\/start.paloaltonetworks.com\/rewiring-security-operations?utm_source=blog\"> <span style=\"font-weight: 400;\">improve security team productivity and enable faster and more automated incident response capabilities<\/span><\/a><span style=\"font-weight: 400;\">, another element that we believe to be in line with Gartner\u2019s top security trends. Our belief is that there are numerous opportunities to use security process automation for manual, time-consuming and error-prone tasks that are part of many security workflows. Key use cases include playbook automation and threat intel collection, which are<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/xsoar\"> <span style=\"font-weight: 400;\">core capabilities of security orchestration, automation and response (SOAR) solutions<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks has recognized these market challenges and the technologies required to solve them. Cortex XDR and Cortex XSOAR are helping companies to realize the vision of a more powerful, efficient and connected SOC, earning industry-leading scores in third-party testing (such as from<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/04\/cortex-mitre\/\"> <span style=\"font-weight: 400;\">MITRE<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/cortex-nsslabs.html\"> <span style=\"font-weight: 400;\">NSS Labs<\/span><\/a><span style=\"font-weight: 400;\">), glowing analyst reviews (such as from <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/research\/transforming-detection-and-response-new-cortex-xdr-review-from-sans.html\"><span style=\"font-weight: 400;\">SANS<\/span><\/a><span style=\"font-weight: 400;\">), and most importantly, happy customers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Get a copy of Gartner\u2019s \u201c<\/span><a href=\"https:\/\/start.paloaltonetworks.com\/gartner-top-security-risk-management-trends.html\"><span style=\"font-weight: 400;\">Top Security and Risk Management Trends<\/span><\/a><span style=\"font-weight: 400;\">\u201d today to see all nine of their trends and to learn how XDR and security automation can help your security team improve resilience, better support business objectives and elevate its organizational standing in 2020.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">2020 Gartner Top Security and Risk Management Trends, Peter Firstbrook, Neil MacDonald, Lawrence Orans, Mario de Boer, Katell Thielemann, Bart Willemsen, Akif Khan, Michael Kranawetter, 27 February 2020<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn why XDR and security automation are top security and risk management trends for 2020. <\/p>\n","protected":false},"author":657,"featured_media":109650,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6770],"tags":[6737,117,232,6735],"coauthors":[6810],"class_list":["post-110311","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-future","tag-cortex-xdr","tag-gartner","tag-trends","tag-xdr"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/04\/pan_generic-gtm-social_cortex-350x300-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/110311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/657"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=110311"}],"version-history":[{"count":1,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/110311\/revisions"}],"predecessor-version":[{"id":110325,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/110311\/revisions\/110325"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/109650"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=110311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=110311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=110311"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=110311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}