{"id":104676,"date":"2019-12-27T15:00:54","date_gmt":"2019-12-27T23:00:54","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=104676"},"modified":"2020-08-10T20:38:20","modified_gmt":"2020-08-11T03:38:20","slug":"cybersecurity-trends","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/12\/cybersecurity-trends\/","title":{"rendered":"Palo Alto Networks Cybersecurity Trends: Insights, Visionary Products"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The cybersecurity industry changes constantly and rapidly, and those working to defend organizations from breaches must adapt and stay abreast of the latest cybersecurity trends. Palo Alto Networks is always focused on staying ahead of the curve. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">As we begin a new year, we look back on what our industry experts have said and done about cybersecurity trends, both through thought leadership and by building advanced cybersecurity products.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This compilation of some of our top blogs from 2019 gives us a chance to highlight the contributions of our thought leaders, review our focus on innovation and celebrate industry recognition of our products.\u00a0\u00a0<\/span><\/p>\n<h2><b>Cybersecurity Thought Leadership<\/b><\/h2>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/11\/cloud-next-generation-network-security\/\"><b>The Next Generation of Network Security Is Cloud-Delivered<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">The cybersecurity industry has worked hard to convince customers that they need to work with dozens of vendors and use dozens of point products and technologies. Yet the future of network security is in the cloud, and security vendors must evolve in order to effectively secure customers anywhere and everywhere.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/09\/cloud-default-aggressive-cloud-security\/\"><b>Default: Aggressive \u2013 Navy SEAL Principles for Cloud Security<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Matthew Chiodi, chief security officer, public cloud, writes that it\u2019s time for organizations to face the challenges of cloud security with the mindset of a U.S. Navy SEAL special operations force.<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/12\/cortex-what-is-xdr\/\"><b>What Is XDR?<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Our visionary CTO and co-founder Nir Zuk <\/span><a href=\"https:\/\/www.youtube.com\/watch?v=c71uPTimW_A&amp;feature=youtu.be&amp;t=2677\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">coined this category<\/span><\/a><span style=\"font-weight: 400;\"> in 2018, recognizing that the existing detection and response tools on the market were too narrowly focused to serve security teams\u2019 evolving needs. XDR products are designed to detect and stitch together all the available information on any threats that have evaded prevention to provide security analysts with detailed analysis of any attack that is underway.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/06\/network-zero-trust-debunking-misperceptions\/\"><b>Zero Trust: Debunking Misconceptions<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">John Kindervag, creator of Zero Trust and field CTA at Palo Alto Networks, explained <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/webcasts\/debunking-the-myth-around-implementing-zero-trust\"><span style=\"font-weight: 400;\">in a recent webinar<\/span><\/a><span style=\"font-weight: 400;\">, \u201cThere are no Zero Trust products. There are products that work really well in Zero Trust environments, and there are products that don\u2019t.\u201d<\/span><\/p>\n<h2><b>Cybersecurity Innovations<\/b><\/h2>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/12\/network-pan-os-9-1\/\"><b>New Innovations in PAN-OS 9.1: SD-WAN and More<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">PAN-OS 9.1 helps our customers securely connect to their branch offices, apply contextual security policy to users, and provide better visibility into mobile users connecting to the network.<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/11\/cloud-native-security-platform\/\"><b>Complete Cloud Native Security Is Here<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks set out to create the most complete Cloud Native Security Platform in the industry. While we knew the importance of solving the needs of different business teams by offering a wide breadth of security capabilities (i.e. DevSecOps has different needs from SOC analysts), we also knew it would be crucial to make sure that everything we offer is best-in-class.<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/11\/cortex-announcing-cortex-xdr-2\/\"><b>Introducing Cortex XDR 2.0<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Cortex XDR 2.0 includes groundbreaking enhancements that further fulfill the promise of XDR to increase visibility and simplify security operations, including a unified management UI, powerful new endpoint features and ingestion of third-party data and alerts.<\/span><\/p>\n<h2><b>Industry Recognition<\/b><\/h2>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/09\/network-gartner-magic-quadrant-leader\/\"><b>Palo Alto Networks an Eight-Time Gartner Magic Quadrant Leader\u00a0<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">In any high tech industry, it\u2019s not often that a company gets to define a new market, and then continue to expand and reshape it for more than a decade. It\u2019s even less common in our highly competitive cybersecurity space. Maybe that\u2019s why this year\u2019s Gartner Magic Quadrant for Network Firewalls feels like a milestone to us.<\/span><span style=\"font-weight: 400;\">\u00a0\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/10\/network-forrester-ztx-wave\/\"><b>Palo Alto Networks Named a Leader in The Forrester Wave&#x2122;: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">As a company recognized for being one of the first vendors to embrace Zero Trust, we\u2019re proud to be seen as a leader among Zero Trust eXtended Ecosystem Platform Providers.<\/span><\/p>\n<h2><b>Inclusion and Diversity in Cybersecurity<\/b><\/h2>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/06\/todo-es-posible\/\"><b>Todo Es Posible<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">When it comes to career aspirations, <\/span><i><span style=\"font-weight: 400;\">todo es posible<\/span><\/i><span style=\"font-weight: 400;\">, which means <\/span><i><span style=\"font-weight: 400;\">everything is possible<\/span><\/i><span style=\"font-weight: 400;\">. It\u2019s time that we don\u2019t ask individuals to come to us but,\u200a rather, meet them where they are.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/11\/cc-women-succeed-in-technology\/\"><b>3 Tips for Women Aspiring to Succeed in Cybersecurity<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Women should know that their skills and perspectives <\/span><i><span style=\"font-weight: 400;\">are wanted and needed<\/span><\/i><span style=\"font-weight: 400;\"> in technology, and although it can be challenging at times, it also can be very rewarding.<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/11\/policy-second-watch\/\"><b>Second Watch: An Initiative to Help Veterans Find a New Mission in Cybersecurity<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">When we look at veterans, we see people who have already shown their ability to answer the call when challenges and threats emerge. That\u2019s why we launched Second Watch, an initiative to help veterans find a new mission in cybersecurity by providing no-cost online cybersecurity training and certification opportunities.<\/span><\/p>\n<h2><b>Public Opinion on Cybersecurity Trends<\/b><\/h2>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/07\/survey-americans-want-protect-information-unsure-start\/\"><b>Survey: Americans Want to Protect Their Information, But Unsure Where to Start<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks partnered with YouGov and <\/span><a href=\"https:\/\/cyber.uk\/dr-jessica-barker\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Dr. Jessica Barker<\/span><\/a><span style=\"font-weight: 400;\">, an expert in the human nature of cybersecurity, to poll over 1,300 American adults to explore human behavior as it relates to cybersecurity. The discrepancy between consumers\u2019 belief that they\u2019re already doing all they can to stay safe, despite their lack of security knowledge, highlights a major need for businesses to do more to keep their customers protected <\/span><i><span style=\"font-weight: 400;\">and<\/span><\/i><span style=\"font-weight: 400;\"> educated.\u00a0\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/12\/network-data-center\/\"><b>And the Survey Says\u2026 Upcoming Trends That Will Transform the Data Center<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">We surveyed 170 of our top enterprise customers to get their thoughts on the <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/videos\/demystifying-data-center-security\"><span style=\"font-weight: 400;\">growing complexity<\/span><\/a><span style=\"font-weight: 400;\"> of data centers and what\u2019s driving some of the change. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Key moments in our year in cybersecurity provide insight into the cybersecurity trends to come in 2020, for products, users and the workforce. <\/p>\n","protected":false},"author":663,"featured_media":104679,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768,6765,6770],"tags":[120,232],"coauthors":[6844],"class_list":["post-104676","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-cloud","category-secure-the-enterprise","category-secure-the-future","tag-cybersecurity","tag-trends"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/Screen-Shot-2019-12-27-at-3.22.12-PM.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=104676"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104676\/revisions"}],"predecessor-version":[{"id":117426,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104676\/revisions\/117426"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/104679"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=104676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=104676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=104676"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=104676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}