{"id":16579,"date":"2016-08-08T12:00:10","date_gmt":"2016-08-08T19:00:10","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=16579"},"modified":"2016-08-08T11:48:26","modified_gmt":"2016-08-08T18:48:26","slug":"a-powerful-combination-new-cyber-breach-prevention-offering","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/08\/a-powerful-combination-new-cyber-breach-prevention-offering\/","title":{"rendered":"A Powerful Combination: New Cyber Breach Prevention Offering"},"content":{"rendered":"<p>Palo Alto Networks, Accenture, Splunk, and Tanium have teamed up to create an <a href=\"https:\/\/www.paloaltonetworks.com\/company\/press\/2016\/accenture-splunk-palo-alto-networks-and-tanium-team-on-new-cyber-breach-prevention-and-defense-solution.html\" target=\"_blank\">advanced managed cyber defense offering<\/a> that makes it easier, more efficient and effective to identify, prevent, detect, and respond to attacks.<\/p>\n<p>Accenture has integrated the Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/next-generation-firewall\" target=\"_blank\">Next-Generation Firewalls<\/a> and <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-endpoint\/traps\" target=\"_blank\">Traps Advanced Endpoint Protection<\/a> offering, Tanium\u2019s endpoint visibility software, and Splunk Enterprise Security with its own operating model and cyber defense architecture to construct the new <a href=\"https:\/\/www.accenture.com\/us-en\/service-cyber-defense-platform\" rel=\"nofollow,noopener\" >Accenture Cyber Defense Platform<\/a>.<!--more--><\/p>\n<p>This combination of technologies will help organizations better defend their networks, protect their endpoints, gain insight into the security behaviors within their enterprise, and effectively automate breach detection, prevention, response and recovery efforts.<\/p>\n<p>Incident response is often too little, too late to effectively deal with increasingly sophisticated attackers. This collaboration will help organizations transition to the necessary <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/subscriptions\/threat-prevention\" target=\"_blank\">prevention-minded security approach<\/a>, as well as expand visibility, enhance analytics capabilities, and protect from the latest cyberthreats.<\/p>\n<p>To learn more, please\u00a0visit the\u00a0<a href=\"https:\/\/www.accenture.com\/us-en\/service-cyber-defense-platform\" rel=\"nofollow,noopener\" >Accenture Cyber Defense Platform<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks, Accenture, Splunk, and Tanium have teamed up to create an advanced managed cyber defense offering that makes it easier, more efficient and effective to identify, prevent, detect, and respond &hellip;<\/p>\n","protected":false},"author":179,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,598,5,108],"tags":[2425,2428,166,128,1356,778],"coauthors":[1857],"class_list":["post-16579","post","type-post","status-publish","format-standard","hentry","category-announcement","category-endpoint-2","category-firewall","category-threat-prevention-2","tag-accenture","tag-accenture-cyber-defense-platform","tag-black-hat","tag-splunk","tag-tanium","tag-traps"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/16579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/179"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=16579"}],"version-history":[{"count":8,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/16579\/revisions"}],"predecessor-version":[{"id":16672,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/16579\/revisions\/16672"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=16579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=16579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=16579"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=16579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}