{"id":28614,"date":"2017-05-01T13:00:09","date_gmt":"2017-05-01T20:00:09","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=28614"},"modified":"2017-04-28T13:49:56","modified_gmt":"2017-04-28T20:49:56","slug":"need-actionable-threat-intelligence","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/05\/need-actionable-threat-intelligence\/","title":{"rendered":"Why You Need Actionable Threat Intelligence"},"content":{"rendered":"<p>Cybersecurity is a hot topic, and there are hundreds of companies selling, buying or promoting their security products and solutions. In today\u2019s world, the cyber challenges are changing constantly in a fast and sophisticated way; most security solutions that work today might be bypassed by threats tomorrow.<\/p>\n<p>In order to keep up with these developments, security needs to be agile too. In the words of Charles Darwin, \u201cIt is not the strongest of the species, nor the most intelligent, but the one most responsive to change that will survive.\u201d<\/p>\n<p>In addition to this required agility, it\u2019s also important to have full visibility into what happens inside and outside your organization that might affect you. If you don\u2019t have full awareness of what\u2019s going on in your corporate network and who is attacking your organization from the outside and\/or from the inside, how can you then protect yourself? In other words: Knowledge about threats, and guidance on how to prioritize your next actions, is essential in today\u2019s world. So, how can you make sure your protective measures and security products are efficient and can provide the necessary security posture? You might have the best firewalls and\/or endpoint protection in place, but if these security tools are not \u201cinformed\u201d about the threats, they won\u2019t be able to protect the organization adequately. Why buy the best binoculars and use them only with one eye?<\/p>\n<p>It\u2019s essential to \u201cfeed\u201d your security tools (e.g., firewalls and endpoint protection products) with intelligence about the threats, so they can cope with these threats. Let me provide a simple example: If a firewall is not aware of a certain threat (e.g., malware) that is built with the intention to \u201cfool\u201d firewalls, it is highly likely that the firewall won\u2019t be able to stop this threat from entering the corporate network. But if the firewall had received threat intelligence about this malware in advance, it most likely would not have been \u201cfooled,\u201d and would have stopped the threat before it could harm the organization.<\/p>\n<p>Palo Alto Networks can do all of this today. Threat intelligence needs to be delivered fast and in an automated way, but it also needs to be accurate in order to prevent false positives or \u2013 even worse \u2013 to miss certain threats. With all the incidences from recent years, we still suffer from too many breaches, which could have been prevented if the security had been informed by an adequate security intelligence platform.<\/p>\n<p>Bottom line: Every organization should understand that security needs an agile and automated threat intelligence platform to prevent security incidents from happening, which are mostly caused by automated and sophisticated threats.<\/p>\n<p><strong><a href=\"https:\/\/www.paloaltonetworks.com\/products\/designing-for-prevention\/security-platform\">Learn about the threat intelligence capabilities available in the Palo Alto Networks Next-Generation Security Platform. <\/a>\u00a0<\/strong><\/p>\n<hr \/>\n<div class=\"quizz-container\" data-width=\"100%\" data-iframe-title=\"QUIZ: What Kind of Ignite Guardian Are You?\" data-height=\"auto\" data-quiz=\"385597\"><\/div>\n<p><script src=\"\/\/dcc4iyjchzom0.cloudfront.net\/widget\/loader.js\" async><\/script><\/p>\n<p class=\"p2\"><span class=\"s2\"><a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\"><b>Register for Ignite \u201917 Security Conference <\/b><\/a><br \/>\n<i>Vancouver, BC June 12\u201315, 2017<\/i><\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">Ignite \u201917 Security Conference is a live, four-day conference designed for today\u2019s security professionals. Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry. Visit the <a href=\"http:\/\/www.paloaltonetworksignite.com\/\" rel=\"nofollow,noopener\" ><span class=\"s3\">Ignite website<\/span><\/a> for more information on tracks, workshops and marquee sessions.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Agility and visibility: why you need actionable threat intelligence. <\/p>\n","protected":false},"author":348,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,108],"tags":[922],"coauthors":[3633],"class_list":["post-28614","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-2","category-threat-prevention-2","tag-threat-intelligence"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/28614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/348"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=28614"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/28614\/revisions"}],"predecessor-version":[{"id":28641,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/28614\/revisions\/28641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=28614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=28614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=28614"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=28614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}