{"id":154289,"date":"2022-02-17T08:00:27","date_gmt":"2022-02-17T16:00:27","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=154289"},"modified":"2022-02-28T16:02:57","modified_gmt":"2022-03-01T00:02:57","slug":"inline-deep-learning","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2022\/02\/inline-deep-learning\/","title":{"rendered":"Fundamentally Changing Network Security with Inline Deep Learning"},"content":{"rendered":"<p>When the ILOVEYOU virus hit in 2000, it was a simpler time: organizations knew when they had it and when it was gone. They also knew another attack wouldn\u2019t come around for a year or so because, at that time, that\u2019s generally how long it took bad actors to come up with something new. 20+ years later, we almost long for this type of virus\u2026 <em>almost<\/em>.<\/p>\n<p>In those days, most cyberattacks could be prevented by signatures that detected known attacks. This was quite effective as many attacks tended to be variations of one another. Net-new attacks were rare, and generally only more capable, well-funded groups could launch them. In this landscape, defending against a zero-day attack was a reactive process, set into motion only after the initial target was impacted. Over many years, the industry focused on shortening the time it took to react to a new attack, from weeks to days to hours, and in our case even minutes. But, we need to do more.<\/p>\n<p>The cyberthreat landscape continues to change. This has been true for as long as it has existed, but we\u2019ve reached a new pinnacle. Bad actors of all kinds now have a powerful arsenal of nation state-level attacks at their fingertips. As a result, uniquely advanced (as well as previously rare and highly targeted) attacks are now rampant. Unfortunately, these days, every organization must assume they will be the target of a sophisticated attack.<\/p>\n<p>But, there is good news: this problem is solvable. And, not just in theory. What\u2019s common about these new attacks is that it is actually possible to both detect and stop them <em>before<\/em> they successfully compromise a target \u2013 with inline deep learning.<\/p>\n<h2><a id=\"post-154289-_v5m62htpwows\"><\/a>Inline Deep Learning Stops Zero-Day Threats<\/h2>\n<p>With Nebula (PAN-OS 10.2), the latest upgrade of our industry-leading PAN-OS software, we\u2019ve brought deep learning (one of the most advanced forms of machine learning) inline. In doing so, we are solving a challenge that many thought was unsolvable \u2013 stopping zero day attacks without prior knowledge of the attack.<\/p>\n<p>For context, using deep learning in security is definitely not new. In fact, we\u2019ve been utilizing it for several years, but it was previously limited to out-of-band applications because inline detection and prevention has to be super fast. This is very difficult because it is computationally intensive. We\u2019ve solved this issue by utilizing a unique cloud delivery mechanism. This brand new, industry-first approach to network security fundamentally changes network security. In fact, we believe that this is how all network security will be done in the future. Here are just a couple examples:<\/p>\n<ul>\n<li>Cobalt Strike has become a go-to tool for hackers because of its endless customizability, which also makes it very easy to obscure command-and-control (C2) operations. With inline deep learning, we are able to provide strong protection (nearly 100%) for one of the most difficult to detect Cobalt Strike C2 techniques in use today, in addition to many other types of evasive and unknown C2.<\/li>\n<li>Successful phishing attacks have increased with hybrid work and phishing-as-a-service. 90% of phishing services now come with built-in evasive techniques. With Advanced URL Filtering, we\u2019ve extended real-time analysis to all web content and added additional phishing detectors, enabling us to stop 40% more phishing attacks.<\/li>\n<\/ul>\n<p>And this is just the start. One of the great aspects of deep learning is that the models constantly improve as more and more data is analyzed.<\/p>\n<p>We laid the foundation for this innovation with the introduction of the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/06\/network-pan-os-10-0\/\">ML-Powered Next Generation Firewall<\/a> (NGFW). By taking our machine learning capabilities and bringing them inline as part of the PAN-OS, we were able to prevent up to 95% of never-before-seen malware. Intertwining analytics into network security by pushing protections as deep into the stack as possible for efficiency was a critical, foundational step toward defending against zero-day attacks as they attempt to break in (not afterwards). With the Nebula release, we have even more powerful tools to use against a broader range of attacks. And I bet you thought the term \u201cML-Powered NGFW\u201d was just hype.<\/p>\n<h2><a id=\"post-154289-_6202kfrqcets\"><\/a>Additional Innovations in PAN-OS 10.2 Nebula<\/h2>\n<p>There is a ton of amazing innovation in our new release, including enhancement of the industry\u2019s smartest security for IoT devices and our 10th security service, AIOps, which uses machine learning to predict up to 51% of disruptions to your NGFWs <em>before<\/em> they are impactful. Further, we\u2019ve introduced the fourth generation of our ML-Powered NGFWs with PA-3400 and PA-5400 Series. These new ML-Powered NGFWs join our other fourth generation PA-400 Series and PA-5450 NGFWs to provide unprecedented protection for the data center, campus, branch and enterprise edge.<\/p>\n<p>You can read about what\u2019s new on our <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/whats-new-in-nebula\">PAN-OS 10.2 Nebula page<\/a>, or <a href=\"https:\/\/start.paloaltonetworks.com\/nebula\">register for our live launch event<\/a> to get an in-depth tour of the features and benefits that make Nebula an enormous leap in network security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>These new attacks can both be detected and stopped before they compromise a target with inline deep learning. <\/p>\n","protected":false},"author":208,"featured_media":154292,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6724,6717],"tags":[7933,8329,111,47],"coauthors":[2224],"class_list":["post-154289","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-points-of-view","category-products-and-services","tag-deep-learning","tag-nebula","tag-ngfw","tag-zero-day","net_sec_category-next-generation-firewalls","net_sec_category-zero-trust-security"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/02\/NetSec-Adhoc-Updated-Blog-Image-Resize-171693378.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/154289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/208"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=154289"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/154289\/revisions"}],"predecessor-version":[{"id":155766,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/154289\/revisions\/155766"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/154292"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=154289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=154289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=154289"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=154289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}