{"id":111704,"date":"2020-05-21T05:50:19","date_gmt":"2020-05-21T12:50:19","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=111704"},"modified":"2020-07-30T19:52:01","modified_gmt":"2020-07-31T02:52:01","slug":"cortex-xdr-managed-threat-hunting","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/05\/cortex-xdr-managed-threat-hunting\/","title":{"rendered":"Cortex XDR Managed Threat Hunting Is Available To All Customers"},"content":{"rendered":"<h6><b><i>Get the industry\u2019s first threat hunting service that operates across integrated endpoint, network and cloud data<\/i><\/b><\/h6>\n<p><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:44.56%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-111705 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/05\/Hunter.png\" alt=\"Cortex XDR Managed Threat Hunting combines human expertise with the unique data correlation and detection capabilities built natively into the Cortex XDR platform to help you find hidden attacks with incredible accuracy.\" width=\"900\" height=\"401\" \/><\/span><\/div><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s no secret that security teams rarely have the time to proactively hunt threats. Between triaging alerts, managing security policies and responding to fire drills, teams often lack the time or resources for threat hunting. Plus, threat hunting is complex; doing it well requires a unique combination of security expertise and deep understanding of data sources across the enterprise. Even fully mature security operations centers need help. We\u2019re happy to tell you that the help you need has arrived.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks is proud to announce the upcoming general availability of Cortex XDR Managed Threat Hunting, a round-the-clock threat hunting service powered by our internationally recognized Unit 42 threat research team. The service was originally <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/02\/cortex-managed-threat-hunting\/\"><span style=\"font-weight: 400;\">made available in February <\/span><\/a><span style=\"font-weight: 400;\">as a limited-time Community Access offering, and has already delivered significant value by<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/03\/cortex-ai\/\"><span style=\"font-weight: 400;\"> identifying real-world attacks<\/span><\/a><span style=\"font-weight: 400;\"> for our customers and revealing adversary tactics in <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/cortex-xdr\/mitre\"><span style=\"font-weight: 400;\">third-party testing<\/span><\/a><span style=\"font-weight: 400;\">. In the recent <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/04\/cortex-mitre\/\"><span style=\"font-weight: 400;\">MITRE ATT&amp;CK<\/span><span style=\"font-weight: 400;\">\u00ae<\/span><span style=\"font-weight: 400;\"> APT29 <\/span><\/a><span style=\"font-weight: 400;\">evaluation, the Cortex XDR Managed Threat Hunting service boosted our overall attack coverage, allowing us to detect 90% of all attack techniques \u2013 a mark unsurpassed by any other vendor.<\/span><\/p>\n<figure id=\"attachment_111748\" aria-describedby=\"caption-attachment-111748\" style=\"width: 500px\" class=\"wp-caption alignright\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:61.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-111748 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/05\/mth-find.jpeg\" alt=\"This image illustrates the elements that contribute to new detections in the Cortex XDR Managed Threat Hunting service. This includes Cortex XDR Research, the Cortex XDR Platform and the Managed Threat Hunting Team.\" width=\"500\" height=\"309\" \/><\/span><\/div><figcaption id=\"caption-attachment-111748\" class=\"wp-caption-text\">How Unit 42 analysts unmask attacks<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">With their deeply-rooted expertise in threat hunting, Unit 42 analysts have been known for exposing inner workings of APTs such as Sofacy, OilRig and SilverTerrier, and have recently uncovered a number of threats specific to the COVID-19 pandemic. Cortex XDR Managed Threat Hunting combines their deep expertise with the unique data correlation and detection capabilities built natively into the Cortex XDR platform to help you find hidden attacks with incredible accuracy.\u00a0<\/span><\/p>\n<h6><span style=\"font-weight: 400;\">Cortex XDR Managed Threat Hunting delivers:<\/span><\/h6>\n<ul>\n<li style=\"font-weight: 400;\"><b>Hunting across endpoint, network and cloud: <\/b><span style=\"font-weight: 400;\">Experts watch your back around the clock with top-tier analysis of your critical security data sources across endpoint, network and cloud.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>World-renowned threat hunters:<\/b><span style=\"font-weight: 400;\"> Unit 42 threat hunters leverage emerging threat research to stay ahead of the curve while using the Cortex XDR platform for industry-leading analytics and data exploration.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Actionable Threat Reports:<\/b><span style=\"font-weight: 400;\"> You will know about high-risk threats across your network, endpoint and cloud assets with Threat Reports that help drive actionable next steps.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Informative Impact Reports:<\/b><span style=\"font-weight: 400;\"> You can eliminate risks before they escalate with reports that let you stay ahead of emerging threats affecting multiple organizations.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Your organization can now leverage the best minds and best technology in the business to improve your security posture without additional overhead, gaining confidence that your organization is protected against stealthy attacks.<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/cortex-xdr\"><span style=\"font-weight: 400;\">Cortex XDR Managed Threat Hunting<\/span><\/a><span style=\"font-weight: 400;\"> is expected to be available for all customers in early June.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Want to learn more about threat hunting?<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Join us for<\/span> <span style=\"font-weight: 400;\">our virtual \"<a href=\"https:\/\/start.paloaltonetworks.com\/inside-the-hunt-virtual-summit?utm_source=MTHblog&amp;utm_medium=social&amp;utm_content=MTH_summit&amp;sfdcid=7010g000001JOCxAAO\"><strong>Inside the Hunt<\/strong><\/a>\"<\/span><b>\u00a0<\/b><span style=\"font-weight: 400;\">summit on Tuesday, June 23. We\u2019re gathering industry experts and the world\u2019s preeminent threat hunters to share best practices on security strategies. You\u2019ll learn about the latest techniques and tools to hunt down the most advanced threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">During the summit, you\u2019ll also hear directly from Unit 42 researchers who identify never-before-seen threats, verify attacks and reverse-engineer malware for the Cortex XDR Managed Threat Hunting service.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s an entire conference packed into an hour.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Register for \"<\/span><a href=\"https:\/\/start.paloaltonetworks.com\/inside-the-hunt-virtual-summit?utm_source=MTHblog&amp;utm_medium=social&amp;utm_content=MTH_summit&amp;sfdcid=7010g000001JOCxAAO\"><b>Inside the Hunt<\/b><\/a><span style=\"font-weight: 400;\">\" today!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cortex XDR Managed Threat Hunting operates across integrated endpoint, network and cloud data.<\/p>\n","protected":false},"author":663,"featured_media":111705,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6770],"tags":[6737,7109,586],"coauthors":[6886],"class_list":["post-111704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-future","tag-cortex-xdr","tag-managed-threat-hunting","tag-unit-42","sec_ops_category-product-features"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/05\/Hunter.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/111704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=111704"}],"version-history":[{"count":13,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/111704\/revisions"}],"predecessor-version":[{"id":111811,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/111704\/revisions\/111811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/111705"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=111704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=111704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=111704"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=111704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}