{"id":305548,"date":"2023-10-04T06:00:56","date_gmt":"2023-10-04T13:00:56","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=305548"},"modified":"2023-10-23T13:55:01","modified_gmt":"2023-10-23T20:55:01","slug":"ai-and-ml-the-keys-to-better-security-outcomes","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2023\/10\/ai-and-ml-the-keys-to-better-security-outcomes\/","title":{"rendered":"AI and ML: The Keys to Better Security Outcomes"},"content":{"rendered":"<p><span style=\"font-family: georgia, palatino, serif;\"><em>\u201cCybersecurity is the only industry with active adversaries. Those adversaries are using the power of AI and ML, and attacks are getting more and more sophisticated.\u201d<\/em><\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif;\">\u2013 Anand Oswal, SVP and GM of Network Security, Palo Alto Networks.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif;\">From reducing complexity in the architecture to supercharging risk posture, building cyber resilience is top-of-mind for every organization. But, what does it take to achieve true cyber resilience in today\u2019s rapidly changing cybersecurity landscape? How do you stay ahead of the latest threats while defending against zero-day attacks?<\/span><a href=\"https:\/\/start.paloaltonetworks.com\/forrester-ztp-wave-2023\"><div style=\"max-width:100%\" data-width=\"1000\"><span class=\"ar-custom\" style=\"padding-bottom:50.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-305562 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2023\/10\/word-image-305548-2.png\" alt=\"Headline of Forrester ZTP Report reveals Zero Trust platform leaders. \" width=\"1000\" height=\"508\" \/><\/span><\/div><\/a><\/p>\n<p><span style=\"font-family: georgia, palatino, serif;\">I had the pleasure of speaking with <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/04\/anand-oswal\/\">Anand Oswal<\/a>, SVP and GM of Network Security at Palo Alto Networks. He shares his thoughts on the direction of enterprise security and how organizations can prepare for what\u2019s next.<\/span><\/p>\n<h2><a id=\"post-305548-_79447lw02otj\"><\/a><span style=\"font-family: georgia, palatino, serif;\"><strong>3 Major Trends in Cybersecurity<\/strong><\/span><\/h2>\n<p><span style=\"font-family: georgia, palatino, serif;\">Cybersecurity is constantly evolving, but the present landscape is undergoing a distinct transformation. Anand shares the three trends he\u2019s seeing in the industry:<\/span><\/p>\n<h3><a id=\"post-305548-_3f46g3eqk2l6\"><\/a><span style=\"font-family: georgia, palatino, serif;\"><strong>1. The Move to the Cloud<\/strong><\/span><\/h3>\n<p><span style=\"font-family: georgia, palatino, serif;\">Anand mentions that more workloads are rapidly moving to the cloud, with network and cloud security architects rethinking how to secure their shifting infrastructures. Migrating from on-premise data centers to the cloud often leaves critical security gaps, and misconfigurations open organizations to attack.<\/span><\/p>\n<h3><a id=\"post-305548-_wqycwwmr380f\"><\/a><span style=\"font-family: georgia, palatino, serif;\"><strong>2. Remote and Hybrid Work<\/strong><\/span><\/h3>\n<p><span style=\"font-family: georgia, palatino, serif;\">Despite recent return-to-office initiatives across the industry, flexible work arrangements are here to stay. Anand notes that organizations are grappling with securing applications and users wherever they are located.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif;\">\u201cEnsuring that we\u2019re able to secure a hybrid workforce in a consistent manner with best-in-class security \u2013 and also have consistent policies for users no matter where they are \u2013 is going to be very critical.\u201d<\/span><\/p>\n<h3><a id=\"post-305548-_eio0yxif4lmh\"><\/a><span style=\"font-family: georgia, palatino, serif;\"><strong>3. The Changing Threat Landscape<\/strong><\/span><\/h3>\n<p><span style=\"font-family: georgia, palatino, serif;\">Anand explains that adversaries are using artificial intelligence (AI) and <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-machine-learning\">machine learning (ML) <\/a>to launch sophisticated cyberattacks. These malicious actors can generate attacks at scale and overwhelm traditional cyber defenses.<\/span><\/p>\n<h2><a id=\"post-305548-_c3rbwkmabcde\"><\/a><span style=\"font-family: georgia, palatino, serif;\"><strong>The Role of Data in AI<\/strong><\/span><\/h2>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"padding-top: 56.25%;\"><iframe style=\"position: absolute; top: 0px; right: 0px; bottom: 0px; left: 0px; width: 100%; height: 100%;\" src=\"https:\/\/players.brightcove.net\/1050259881001\/default_default\/index.html?videoId=6337832675112\" allowfullscreen=\"allowfullscreen\" allow=\"encrypted-media\"><\/iframe><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 14pt;\">Our discussion goes deeper into the impacts of AI and ML on cybersecurity \u2013 an area where Palo Alto Networks leads the industry. Anand emphasizes how traditional approaches to cybersecurity can\u2019t keep up with today\u2019s threats.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 14pt;\">Take <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/advanced-url-filtering\">URL filtering<\/a> as an example, where policies were created based on URLs labeled and stored in a database. Today, malicious actors can easily activate and deactivate URLs, making databases obsolete before security teams can respond.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 14pt;\">Anand emphasizes that AI and ML are key to analyzing data and recognizing attack patterns. This requires large amounts of data from across your infrastructure \u2013 network, endpoint, cloud and other critical enforcement points. When stitched together, this data provides key insights into your infrastructure, drives attack recognition and enables rapid incident response in the event of a breach.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 14pt;\">\u201cYou can only have good cybersecurity through AI and ML. It\u2019s almost impossible to do it manually.\u201d<\/span><\/p>\n<h2><a id=\"post-305548-_2pik4pmp64oc\"><\/a><span style=\"font-family: georgia, palatino, serif;\"><strong>Why Security Consolidation Is Key to Better Outcomes<\/strong><\/span><\/h2>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"padding-top: 56.25%;\"><iframe style=\"position: absolute; top: 0px; right: 0px; bottom: 0px; left: 0px; width: 100%; height: 100%;\" src=\"https:\/\/players.brightcove.net\/1050259881001\/default_default\/index.html?videoId=6337833553112\" allowfullscreen=\"allowfullscreen\" allow=\"encrypted-media\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><\/div>\n<\/div>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<p>&nbsp;<\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 14pt;\">Pulling data from across your entire infrastructure for AI is challenging when your products and services are siloed. They use different datasets, contexts, logging conventions and UIs, hindering the AI\u2019s ability to recognize patterns. But with <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-cybersecurity-consolidation\">security consolidation<\/a>, your security products work seamlessly together to share intelligence and defend against sophisticated attacks.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 14pt;\">Consolidation is more than using AI to detect threats, as Anand explains. It also reduces \u201cthe overall complexity of your environment.\u201d Today\u2019s organizations employ <a href=\"https:\/\/start.paloaltonetworks.com\/whats-next-in-cyber-report\">31.5 security tools<\/a> on average \u2013 each with its own procurement, implementation and maintenance requirements.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 14pt;\">By consolidating your detection tools, you can significantly reduce the resources needed to manage these processes, build strategic relationships with your vendors, and achieve better security outcomes.<\/span><\/p>\n<h2><a id=\"post-305548-_fnq2bvpr3pk8\"><\/a><span style=\"font-family: georgia, palatino, serif; font-size: 18pt;\"><strong>Securing Your Organization Starts with Consolidation<\/strong><\/span><\/h2>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 14pt;\">Before we wrapped up our conversation, Anand shared advice for security leaders in today\u2019s changing cyber environment:<\/span><\/p>\n<p style=\"padding-left: 80px;\"><span style=\"font-family: georgia, palatino, serif; font-size: 14pt;\"><em>\u201cAs you look at consolidation, an important factor is: how do you ensure enterprise-wide Zero Trust? How do you get consistent security for users accessing applications and data from any device, on any network, from any location? How do you get consistent best-in-class security? How do you ensure the most optimal user experience? And, how do you ensure the best experience for NetSec admins? All of this is only possible when you have a platform-centric approach.\u201d<\/em><\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 14pt;\">Security leaders have a tremendous opportunity to rethink their defenses and build an AI-driven risk posture. That starts with choosing a partner that combines best-of-breed security with a platform approach.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 14pt;\">Get a copy of the report where Forrester names Palo Alto Networks a leader in <a href=\"https:\/\/start.paloaltonetworks.com\/forrester-ztp-wave-2023\">Zero Trust Platform Providers, Q3 2023<\/a>. Learn why we were named a Leader.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 14pt;\">Gain more insights from an authority figure in network security; watch the <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/videos\/achieving-cyber-transformation-through-network-security-consolidation\">full interview<\/a> with Anand Oswal here.<\/span><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>AI and ML are key to analyzing data and recognizing attack patterns. This requires large amounts of data from across your infrastructure.<\/p>\n","protected":false},"author":723,"featured_media":307155,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6724],"tags":[6613,9320,8876,73],"coauthors":[7013],"class_list":["post-305548","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-points-of-view","tag-ai","tag-interview","tag-ml-powered","tag-zero-trust"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2023\/10\/anand-interview_featured-blog-image_1440x1080_v2.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/305548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=305548"}],"version-history":[{"count":16,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/305548\/revisions"}],"predecessor-version":[{"id":305653,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/305548\/revisions\/305653"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/307155"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=305548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=305548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=305548"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=305548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}