{"id":103452,"date":"2019-11-13T05:10:06","date_gmt":"2019-11-13T13:10:06","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=103452"},"modified":"2020-07-30T20:08:54","modified_gmt":"2020-07-31T03:08:54","slug":"cortex-announcing-cortex-xdr-2","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/11\/cortex-announcing-cortex-xdr-2\/","title":{"rendered":"Introducing Cortex XDR 2.0"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\"  class=\"alignleft size-full wp-image-103453 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/11\/image1-min.gif\" alt=\"Demonstration of Cortex XDR 2.0, from Palo Alto Networks\" width=\"1440\" height=\"810\" \/><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p>Today at our annual Ignite Europe conference, chief product officer Lee Klarich unveiled Cortex XDR 2.0 \u2013\u00a0the next bold evolution of the industry\u2019s first XDR product, which launched a new category of tools delivering threat detection and response across siloed data sources.<\/p>\n<p><span style=\"font-weight: 400;\">Cortex XDR 2.0 includes groundbreaking enhancements that further fulfill the promise of XDR to increase visibility and simplify security operations, including a <\/span><b>unified management UI<\/b><span style=\"font-weight: 400;\">, <\/span><b>powerful new endpoint features<\/b><span style=\"font-weight: 400;\"> and <\/span><b>ingestion of third-party data and alerts<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Watch founder and CTO Nir Zuk and chief product officer Lee Klarich at the Ignite Europe conference on Nov. 13 in Barcelona. They explain how the modern security operations center must become more data-driven, and how Cortex XDR 2.0 can help.<\/span><\/p>\n<p><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"4dU7dIfQ0Ic\" ><\/lite-youtube><\/div><\/p>\n<p><span style=\"font-weight: 400;\">The debut of <\/span><a href=\"http:\/\/www.paloaltonetworks.com\/cortex\/cortex-xdr\"><span style=\"font-weight: 400;\">Cortex XDR<\/span><\/a><span style=\"font-weight: 400;\"> earlier this year continued our tradition of category creation, resetting the bar for detection and response with the introduction of the XDR category. In less than a year, Cortex XDR proved it can <\/span><span style=\"font-weight: 400;\">deliver <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/detection-response\/xdr\/mitre\"><span style=\"font-weight: 400;\">the most comprehensive threat detection<\/span><\/a><span style=\"font-weight: 400;\"> in the industry, reduce alert volumes by 50x and accelerate investigation times by 8x.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since that debut, we\u2019ve seen industry analysts, customers and even our own competitors welcoming the new category, some of them even naming products as different flavors of XDR. These signals confirm we are leading the industry in the right direction, and it\u2019s already time to move the goalposts with the introduction of Cortex XDR 2.0.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This new release adds:<\/span><\/p>\n<ul>\n<li><b>Third-party Data Ingestion.\u00a0<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Every organization has a multi-vendor security landscape \u2014 sometimes including more than one type of firewall. By ingesting third-party firewall logs, Cortex XDR 2.0 is now delivering on its vision of comprehensive behavioral analytics that extends to all network data. In addition to firewall logs, Cortex XDR 2.0 has the ability to ingest a wide range of network alerts into our unique incident view, stitching together all alert types to reveal the root cause of a single incident.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This all means that you don\u2019t have to be an exclusive Palo Alto Networks shop to take advantage of Cortex XDR\u2019s powerful data-stitching, machine learning and simplified investigation capabilities across your entire network.<\/span><\/p>\n<ul>\n<li><b>A Unified User Interface for Endpoint Protection and XDR.<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Management and UI capabilities for prevention, detection, investigation and response have been unified into a single platform, with a complete rebuild of the Traps management service into Cortex XDR. The new management console has end-to-end support for all capabilities that were previously part of either Traps or Cortex XDR, integrating endpoint policy management, security events review and endpoint log analysis with detection, investigation and response.<\/span><\/p>\n<ul>\n<li><b>Powerful New Endpoint Protection Capabilities.<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">These include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>AI-driven malware prevention on the endpoint: <\/b><span style=\"font-weight: 400;\">Our revamped local analysis engine can deliver a verdict right on the endpoint, without requiring any internet connectivity. Based on a comprehensive curated data set and a state-of-the-art machine learning framework, the XDR local analysis engine is built for continuous learning and prevention. Powered by <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/wildfire\"><span style=\"font-weight: 400;\">WildFire<\/span><\/a><span style=\"font-weight: 400;\">, which boasts the world\u2019s most expansive training set, the engine includes a unique agile framework for rapid model updates to all endpoints to stay ahead of attackers\u2019 evolving techniques.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>A new device control module: <\/b><span style=\"font-weight: 400;\">This is one of the top endpoint features that our customers have been asking for. The new Device Control capability, first in a series of new EPP modules that will be released in the coming months, will give organizations granular USB access management on the endpoint to prevent malware and data loss caused by unsanctioned devices. You may not ever be able to stop users from plugging in strange USB sticks that they find in the parking lot, but now you can prevent the rubber ducky type attack and control whether people can copy data out to USB devices.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">We are delighted to share these developments, and proud to be extending the functionality of the industry\u2019s most comprehensive prevention, detection and response platform to help you <\/span><b>expedite investigations, uncover advanced attacks anywhere in your organization and simplify security operations.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Get ready, because Cortex XDR 2.0 will be available to customers in December. For all the additional details you need to know, watch \"<a href=\"https:\/\/start.paloaltonetworks.com\/the-future-of-enterprise-security-starts-here\">The Future of Endpoint Security Starts Here<\/a>.\"\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cortex XDR 2.0 includes groundbreaking enhancements that further fulfill the promise of XDR to increase visibility and simplify security operations.<\/p>\n","protected":false},"author":663,"featured_media":103535,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6770],"tags":[6737,6884],"coauthors":[6886],"class_list":["post-103452","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-future","tag-cortex-xdr","tag-third-party-data-ingestion","sec_ops_category-product-features"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/11\/Screen-Shot-2019-11-13-at-9.32.11-AM.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=103452"}],"version-history":[{"count":11,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103452\/revisions"}],"predecessor-version":[{"id":104301,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103452\/revisions\/104301"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/103535"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=103452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=103452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=103452"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=103452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}