{"id":138706,"date":"2021-08-23T05:00:46","date_gmt":"2021-08-23T12:00:46","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=138706"},"modified":"2021-08-26T08:51:14","modified_gmt":"2021-08-26T15:51:14","slug":"third-generation-xdr-has-arrived","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2021\/08\/third-generation-xdr-has-arrived\/","title":{"rendered":"The Third Generation of XDR Has Arrived!"},"content":{"rendered":"<p><i><span style=\"font-weight: 400;\">Announcing Cortex XDR 3.0, the <\/span><\/i><i><span style=\"font-weight: 400;\">third-generation XDR platform that allows security teams to identify and investigate attacks across all endpoint, network, cloud and identity sources from a single console.<\/span><\/i><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">When we launched Cortex XDR in 2019, it was the first XDR product in the industry. We wanted to provide a modern cloud-based platform leveraging the latest in machine learning, analytics and automation to fight the many cyber attacks businesses face every day. We were driven by the principle that you can identify and stop the most sophisticated cyber attacks <\/span><b>if and only if <\/b><span style=\"font-weight: 400;\">you can integrate the right set of security data sources and analyze them in real-time. Since Cortex XDR\u2019s inception, our approach has continually proven itself to be the most effective means of preventing and detecting sophisticated cyber attacks, like <\/span><a href=\"https:\/\/unit42.paloaltonetworks.com\/solarstorm-supply-chain-attack-timeline\/\"><span style=\"font-weight: 400;\">SolarStorm<\/span><\/a><span style=\"font-weight: 400;\"> and those emulated by the <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/cortex-xdr\/mitre\"><span style=\"font-weight: 400;\">MITRE ATT&amp;CK Evaluations<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today, we released Cortex XDR 3.0, taking a significant step in our mission to know about and stop all cybersecurity attacks. XDR 3.0 extends the key tenets of our XDR platform to cloud environments, ensuring SOC teams can run prevention, detection and response on their cloud assets. The new platform also integrates a rich set of identity data sources and built-in analytics to address a variety of identity-based threats.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Importantly, the third generation of XDR will provide utmost flexibility to security teams by allowing them to ingest data from any third-party source and correlate with other native data sources for richer, deeper investigations.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And that\u2019s not all! We are also very excited to bring security teams a set of forensic investigation capabilities as an add-on module to XDR 3.0. This offering makes generally available the advanced tools we have been using within Palo Alto Networks\u2019 <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/unit42\"><span style=\"font-weight: 400;\">Unit 42 Security Consulting Group<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Read on for more details!\u00a0<\/span><\/p>\n<h2><a id=\"post-138706-_heading=h.hpjytqj3mt27\"><\/a>New Capabilities in XDR 3.0<\/h2>\n<p><b>Cortex XDR Extends Native Analytics to Cloud Data, Enabling SOC Teams to Prevent, Detect and Respond to Threats Across Hybrid and Multi-Cloud Environments<\/b><\/p>\n<p><span style=\"font-weight: 400;\">SOC threat monitoring teams rely on threat detection and response platforms for holistic visibility and investigations, but are often left in the dark when it comes to cloud security. Cortex XDR 3.0 integrates cloud telemetry (including host data, traffic logs, audit logs and data from the Palo Alto Networks Prisma Cloud solution) with non-cloud endpoint, network and identity data, delivering organization-wide threat detection and response. We\u2019ve added dozens of cloud-specific detection rules targeting common cloud-threat vectors, like cloud escape and cloud-jacking.\u00a0<\/span><\/p>\n<figure id=\"attachment_140233\" aria-describedby=\"caption-attachment-140233\" style=\"width: 1920px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"1920\"><span class=\"ar-custom\" style=\"padding-bottom:56.25%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-140233 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/08\/word-image-19.png\" alt=\"Cortex XDR third generation screen shot monitoring charts of various alerts \u2014 incidents by severity, cloud caller locations, top 10 downloaders.\" width=\"1920\" height=\"1080\" \/><\/span><\/div><figcaption id=\"caption-attachment-140233\" class=\"wp-caption-text\"><i><span style=\"font-weight: 400;\">With Cortex XDR 3.0 you have the confidence that your cloud assets are protected, and when a threat is detected, you will have more context into the scope of the attack to ensure a more complete response.<\/span><\/i><\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">XDR 3.0 also delivers endpoint detection and response (EDR)-level protection for cloud assets, including Windows and Linux virtual machines and Kubernetes containers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These new cloud capabilities in Cortex XDR 3.0 complement our industry-leading Prisma Cloud solution. Together, they address the unique requirements of both cloud security teams requiring DevOps speed and SOC analysts requiring visibility across their entire enterprise.<\/span><\/p>\n<h2><a id=\"post-138706-_heading=h.crd37qm96he7\"><\/a>Cortex XDR Expands UEBA Capabilities with Deeper Identity Analytics to Combat Malicious User Activity<\/h2>\n<p><span style=\"font-weight: 400;\">Almost all cyber attacks involve compromised identities, which is why analyzing user authentication and access is critical to stopping attacks early in their lifecycle. With Cortex XDR 3.0, we are leveraging ML-based threat detectors against an extensive set of identity data sources, including Active Directory, Identity and Access Management products (including Okta, Ping and Azure AD), human resources (HR) platforms (like Workday) and SASE gateways. Our HR integration with Workday is particularly important \u2014 XDR 3.0 adds valuable context to identity-related investigations including a user\u2019s department, manager, phone number, hire date and other details tied into broader multi-dataset incident and causality views.\u00a0<\/span><\/p>\n<figure id=\"attachment_140246\" aria-describedby=\"caption-attachment-140246\" style=\"width: 824px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"824\"><span class=\"ar-custom\" style=\"padding-bottom:92.48%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-140246 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/08\/word-image-20.png\" alt=\"Screenshot showing the third generation Cortex XDR chart of risk score trends and incidents.\" width=\"824\" height=\"762\" \/><\/span><\/div><figcaption id=\"caption-attachment-140246\" class=\"wp-caption-text\"><i><span style=\"font-weight: 400;\">With a 360-degree user view and historical risk scores, analysts can prioritize investigations on high-risk users and monitor user behavior trends over time.<\/span><\/i><\/figcaption><\/figure>\n<p><strong>Cortex XDR\u2019s Third-Party Data Engine Now Delivers the Ability to Ingest, Normalize, Correlate, Query and Analyze Data <b>from Virtually Any Source<\/b><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">When it comes to investigations, the more context, the better. Many customers\u2019 logging efforts run into scalability and efficiency issues, and SOC analysts often need to look into multiple consoles for an investigation to span their various security data. XDR 3.0 offers new functionality for users to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ingest and normalize any data source, including databases, files, FTP, CSV, Syslog, Windows Event Collection (WEC) and more.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Allow any data to be correlated with threat activity and tagged with MITRE ATT&amp;CK TTPs to help provide a more detailed picture of adversarial movement.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Facilitate ad-hoc searching across all third-party data sources using XDR\u2019s native query language (XQL), designed and optimized specifically for investigations and threat hunting.<\/span><\/li>\n<\/ul>\n<h2><a id=\"post-138706-_heading=h.y532o48cgzh7\"><\/a>Built-In Forensics Module Brings Native Forensics Capabilities Used by \u200bPalo Alto Networks Unit 42 Elite Incident Responders to Customers and Partners<\/h2>\n<p><span style=\"font-weight: 400;\">The ability to perform forensic analysis in-house is critical to fully understand the attack and speed remediation. The XDR Forensics Module eliminates the need for deploying, managing and integrating a separate forensics toolkit for collecting and analyzing historical artifacts from endpoints. XDR 3.0 collects program execution, file access, browsing activity, event logs, network sessions and other forensic artifacts, and integrates them into the XDR user interface. The Forensics Module also facilitates data collection for offline endpoints, which is important because network isolation is often one of the first response actions to an attack.<\/span><\/p>\n<figure id=\"attachment_140259\" aria-describedby=\"caption-attachment-140259\" style=\"width: 1920px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"1920\"><span class=\"ar-custom\" style=\"padding-bottom:56.25%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-140259 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/08\/word-image-21.png\" alt=\"Example of the Cortex XDR 3.0 interface display with notifications and charts.\" width=\"1920\" height=\"1080\" \/><\/span><\/div><figcaption id=\"caption-attachment-140259\" class=\"wp-caption-text\"><i><span style=\"font-weight: 400;\">A newly designed incident management interface provides the complete story, surfacing all related artifacts, hosts and users with an interactive one-click UI. An at-a-glance view of correlated alerts, mapped to the MITRE ATT&amp;CK framework, enables fast incident scoping.<\/span><\/i><\/figcaption><\/figure>\n<h2><a id=\"post-138706-_heading=h.iq480sltchrm\"><\/a>Committed to Creating a Safer, More Secure Future<\/h2>\n<p><span style=\"font-weight: 400;\">With these innovations, XDR continues to redefine how security operations teams address complex modern threats and drive greater efficiencies. By tackling the system integration problem of gathering, integrating and analyzing data (and coupling that with the ability to kick off highly optimized and automated workflows), XDR helps solve the challenges of detection, investigation and response at scale in a consolidated manner.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Learn more by registering for our \u201c<\/span><a href=\"https:\/\/start.paloaltonetworks.com\/xdr-next-has-arrived.html?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=7014u000001kW7VAAU\"><span style=\"font-weight: 400;\">Next Has Arrived\u201d launch event<\/span><\/a><span style=\"font-weight: 400;\"> in September to hear about this monumental release:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>A fireside chat from the attacker\u2019s view \u2014<\/b><span style=\"font-weight: 400;\"> Hear the adversary perspective from Chris Tarbell, former FBI team member who brought down Silk Road, and Hector Monsegur, former \u201cBlack Hat\u201d who led the hacker collective Anonymous\/LulzSec.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>An industry panel discussing the defender\u2019s view \u2014<\/b><span style=\"font-weight: 400;\"> Hear what tools, processes and strategies defenders are prioritizing.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>An overview and demo of Cortex XDR 3.0 \u2014<\/b><span style=\"font-weight: 400;\"> See the new capabilities first-hand and discover how our third-generation XDR innovations equip defenders to level the playing field.<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Cortex XDR 3.0, our third generation Extended Detection and Response (XDR) solution for cloud environments automates and optimizes how SOC teams monitor and respond to threats.<\/p>\n","protected":false},"author":645,"featured_media":140179,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,6717],"tags":[161,109,6737,4321,5109,6735],"coauthors":[7731],"class_list":["post-138706","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","category-products-and-services","tag-automation","tag-cloud","tag-cortex-xdr","tag-machine-learning","tag-multi-cloud","tag-xdr","sec_ops_category-must-read-articles","sec_ops_category-news-and-events","sec_ops_category-product-features"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/08\/cortex-xdr-3.0-product-launch-blog-400x300-2.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/138706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/645"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=138706"}],"version-history":[{"count":11,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/138706\/revisions"}],"predecessor-version":[{"id":140472,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/138706\/revisions\/140472"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/140179"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=138706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=138706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=138706"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=138706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}