{"id":333192,"date":"2025-01-23T11:56:12","date_gmt":"2025-01-23T19:56:12","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=333192"},"modified":"2025-07-30T11:13:22","modified_gmt":"2025-07-30T18:13:22","slug":"ai-driven-security","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2025\/01\/ai-driven-security\/","title":{"rendered":"AI-Driven Security by Palo Alto Networks and IBM"},"content":{"rendered":"<h1><a id=\"post-333192-_heading=h.zgdwajqqyrv7\"><\/a>Insights to Protect Your Business<\/h1>\n<p>The digital world is transforming at lightning speed, and AI is no longer just an option in cybersecurity; it\u2019s a game-changer. As businesses accelerate their digital journeys, they\u2019re harnessing AI to supercharge decision-making, embracing the cloud for unmatched scalability, and adapting to industry shifts to outpace competitors.<\/p>\n<p>But as it is reported in the latest study from IBM and Palo Alto Networks, <em><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/research\/ibm-study-platforms-deliver-value\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.paloaltonetworks.com\/resources\/research\/ibm-study-platforms-deliver-value&amp;source=gmail&amp;ust=1740763856201000&amp;usg=AOvVaw3BeiV5LagxF_NqGYEonQPx\">Capturing the cybersecurity dividend: How security platforms generate business value<\/a>,<\/em>\u00a0transformation isn\u2019t just about tech; it\u2019s about reshaping how organizations operate and deliver value.\u00a0With these advancements, however, come growing cyber risks. The more businesses expand their digital footprints, the more they open doors to potential vulnerabilities.<\/p>\n<p>To tackle these challenges, enterprises need next-generation security operations that can keep pace with an AI-powered future. That\u2019s why Palo Alto Networks and IBM brought together top industry experts to share their insights on this groundbreaking transformation.<\/p>\n<p>Hosted by Dan Nutburn, IBM Partnership Lead UK at Palo Alto Networks, this compelling video series dives into how cutting-edge security operations can help businesses thrive in the age of AI.<\/p>\n<h2><a id=\"post-333192-_heading=h.246lhznmpeb5\"><\/a>Part 1 \u2014 Strategic Partnership for Transformative Security<\/h2>\n<p>This first installment in our series revealed how the collaboration between Palo Alto Networks and IBM is reshaping cybersecurity.<\/p>\n<p>Duncan Greenwood, VP, NGS Sales EMEA &amp; LATAM at Palo Alto Networks, kicked off the conversation, emphasizing the transformative nature of this partnership:<\/p>\n<blockquote><p>Our partnership with IBM and Palo Alto Networks is more than innovation; it\u2019s a shift in cybersecurity\u2019s core approach \u2013 this isn\u2019t just the next step, it\u2019s the transformation the industry urgently needs.<\/p><\/blockquote>\n<p>Shlomi Kramer, EMEA Sales Lead, IBM Cybersecurity Services, highlighted the proactive power of AI to reshape the security landscape entirely and explained why the right partnerships are now more valuable than ever was:<\/p>\n<blockquote><p>We\u2019re enabling companies to be proactive, not just reactive, against smarter threats. This partnership places power firmly in the hands of defenders, right where it needs to be.<\/p><\/blockquote>\n<p>The strategic value of integrated security solutions can\u2019t be understated either, according to Tim Van den Heede, Vice President Global Services, IBM Cybersecurity Services:<\/p>\n<blockquote><p>Today\u2019s leaders demand security that scales and syncs with digital goals, offering tangible value. We\u2019re making the leap from isolated tools to an integrated, future-ready security strategy that impacts the bottom line.<\/p><\/blockquote>\n<p><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"69N87v7xp3I\" ><\/lite-youtube><\/div><\/p>\n<h2><a id=\"post-333192-_heading=h.5vlwoddfox7b\"><\/a>Part 2 \u2014 Adapting to the Evolving Threat Landscape<\/h2>\n<p>In the second installment, the discussion shifted to focus on how the threat landscape is changing.<\/p>\n<p>Kramer was quick to point out the dual nature of AI, which can be used both to enhance security and to exploit vulnerabilities:<\/p>\n<blockquote><p>AI is making it cheaper and easier than ever to launch cyberattacks, including on supply chains.<\/p><\/blockquote>\n<p>Greenwood expanded on this, pointing out how AI is expanding opportunities for both good and bad:<\/p>\n<blockquote><p>AI can drive competitive advantage, but it also opens up new risks. Leaders must understand and balance this dual impact, and we\u2019re delivering solutions to manage both sides of the equation.<\/p><\/blockquote>\n<p>Shailesh Rao, President of Cortex at Palo Alto Networks elaborated further:<\/p>\n<blockquote><p>Businesses are embracing cloud at breakneck speed. Our focus is on simplifying security for multi-cloud environments \u2013 cutting through complexity and enabling faster, safer scaling.<\/p><\/blockquote>\n<p>As companies adopt multi-cloud strategies, managing risks across platforms becomes essential, and this partnership aims to streamline that process.<\/p>\n<p>\u201c<a href=\"https:\/\/cybersecurityventures.com\/cybercrime-damage-costs-10-trillion-by-2025\/\" rel=\"nofollow,noopener\" >The annual total economic impact of cybercrime<\/a> is now more than $10 trillion,\u201d cited Heede, pointing out how that staggering figure underscores the importance of robust cybersecurity measuring to protect against the growing threat of cybercrime.<\/p>\n<p><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"0FgD1scnRj8\" ><\/lite-youtube><\/div><\/p>\n<h2><a id=\"post-333192-_heading=h.7epvkn4dh347\"><\/a>Part 3 \u2014 Simplifying Multicloud Security<\/h2>\n<p>Greenwood articulated the pressures and complexities of rapid and agile development that is leading to cloud breaches: \u201cThe <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" rel=\"nofollow,noopener\" >average cost of a public cloud breach <\/a>is $4.5 million.\u201d This highlights the financial impact of cloud security breaches and the need for effective security measures.<\/p>\n<p>Kramer offered insights into how more clients are opting to simplify multicloud management using a discover, assess and remediate model to reduce potential exposure: \u201cThis strategy builds resilience and future-proofs organizations against the shifting landscape of global cyber risk.\u201d This approach also helps businesses manage the complexities of multicloud environments and reduce their risk exposure.<\/p>\n<p><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"JWtOaRzO_50\" ><\/lite-youtube><\/div><\/p>\n<h2>Part 4 \u2014 Addressing Client Concerns on Platformization<\/h2>\n<p>Greenwood kicked off the discussion by sharing some of the most common feedback and objections clients have when discussing platformization. These include choosing best-of-breed solutions vs. a platform, balancing security with agile development, avoiding vendor lock-in, and addressing platformization costs.<\/p>\n<p>Interestingly, platformization addresses all these concerns by providing a more secure and cost-effective security platform. According to Rao, the traditional approach to cybersecurity, which involves integrating multiple point solutions, is becoming obsolete. Palo Alto Networks advocates for a single integrated platform, leveraging machine learning and a unified architecture framework. While some may worry about putting all their eggs in one basket, Rao argued that it is better to have a few well-guarded baskets than many vulnerable ones.<\/p>\n<p>Van den Heede closed off by highlighting a significant trend: \"Three out of four organizations, or <a href=\"https:\/\/cybermagazine.com\/articles\/75-of-rganisations-are-pursuing-security-vendor-consolidat\" rel=\"nofollow,noopener\" >75%, are considering security vendor consolidation today<\/a>, compared to only 29% in 2020.\" This shift indicates that organizations are moving from contemplating platformization to executing it. Complex security strategies with a patchwork of solutions can negatively impact performance and increase costs.<\/p>\n<blockquote><p>The partnership between Palo Alto Networks and IBM is timely, as it helps clients execute their platformization strategies efficiently, combining technology with expertise.<\/p><\/blockquote>\n<p><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"aFdXXviDiu0\" ><\/lite-youtube><\/div><\/p>\n<h2><a id=\"post-333192-_heading=h.dxvx2xxg9ay0\"><\/a>Part 5 \u2014 The Future of AI in Security<\/h2>\n<p>Lastly, the group examined how AI is changing the security landscape, what it means for business, and what we\u2019ll see in 2025 and beyond.<\/p>\n<p>AI brings many benefits, but also challenges around data and governance: \u201cAI is reshaping the security landscape entirely. We\u2019re enabling companies to be proactive, not just reactive, against smarter threats,\u201d offered Kramer.<\/p>\n<p>Greenwood shared additional insights about the benefits of AI for employees and the challenges posed by bad actors innovating their attacks. Highlighting the comprehensive approaches of Palo Alto Networks and IBM, he noted, \u201cWe go beyond AI security \u2013 our approach protects the entire digital ecosystem, ensuring every AI-driven insight is reliable, actionable and secure.\u201d<\/p>\n<p>This method helps ensure that AI not only enhances security, but also safeguards against potential vulnerabilities.<\/p>\n<p>Rao closed with a cautionary tale:<\/p>\n<blockquote>\n<p style=\"padding-left: 80px;\">AI is going to change our lives as we know it, not just the security landscape. What AI has done on the positive side cannot be measured. On the downside, someone can now create dangerous malware within a few minutes. We're faced with a world where AI is going to not just improve lives, but also dramatically change how dangerous our systems can be from a cybersecurity perspective.<\/p>\n<\/blockquote>\n<p><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"eoTono9B_sc\" ><\/lite-youtube><\/div><\/p>\n<p>Innovation, integration, impact. It\u2019s all here.<\/p>\n<p>Why not dive into the full discussion to hear industry experts map out a proactive, AI-driven approach to security?<\/p>\n<p>If you\u2019re ready to lead, not just follow, in cybersecurity, see how these transformative solutions can secure your business and shape its future. Discover how the strategic partnership between IBM and Palo Alto Networks can give your organisation a competitive edge. Read the study, <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/research\/ibm-study-platforms-deliver-value\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.paloaltonetworks.com\/resources\/research\/ibm-study-platforms-deliver-value&amp;source=gmail&amp;ust=1740763856201000&amp;usg=AOvVaw3BeiV5LagxF_NqGYEonQPx\">Capturing the cybersecurity dividend:\u00a0<i>How security platforms generate business value.<\/i><\/a><\/p>\n<h4>This series is available via your favourite podcast apps:<\/h4>\n<ul>\n<li><a href=\"https:\/\/eur01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fopen.spotify.com%2Fshow%2F1e3YIObjmVhOJz3PKtWxAB&amp;data=05%7C02%7Cvictoria.sr%40coterie.global%7C9d558ba4c03f45de69db08dd3b09432d%7Cf855f91f778148098252507c4779c7c3%7C0%7C0%7C638731633244913757%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=HaUW6m3xRrBB5ECOTIn1NuS25SXmEuI%2Fz0oRGArxnwQ%3D&amp;reserved=0\" rel=\"nofollow,noopener\" >Spotify<\/a><\/li>\n<li><a href=\"https:\/\/eur01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fmusic.amazon.co.uk%2Fpodcasts%2Fab6b6337-02f8-4d04-92cb-69d077531e5d%2Fsecuring-tomorrow&amp;data=05%7C02%7Cvictoria.sr%40coterie.global%7C9d558ba4c03f45de69db08dd3b09432d%7Cf855f91f778148098252507c4779c7c3%7C0%7C0%7C638731633244932948%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=8AjXqi16c3T1l4O9%2FikCEMnMKgUbI2yROKdvUs8ARBU%3D&amp;reserved=0\" rel=\"nofollow,noopener\" >Amazon<\/a><\/li>\n<li><a href=\"https:\/\/eur01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fpodcasts.apple.com%2Fgb%2Fpodcast%2Fsecuring-tomorrow-vodcast%2Fid1786165687&amp;data=05%7C02%7Cvictoria.sr%40coterie.global%7C9d558ba4c03f45de69db08dd3b09432d%7Cf855f91f778148098252507c4779c7c3%7C0%7C0%7C638731633244946328%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=XXwFWDqprgEEGprfrTZJRUu0SsiP7J5XBxXHQQ5AwT0%3D&amp;reserved=0\" rel=\"nofollow,noopener\" >Apple<\/a><\/li>\n<li><a href=\"https:\/\/eur01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.deezer.com%2Fen%2Fshow%2F1001571231&amp;data=05%7C02%7Cvictoria.sr%40coterie.global%7C9d558ba4c03f45de69db08dd3b09432d%7Cf855f91f778148098252507c4779c7c3%7C0%7C0%7C638731633244961894%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=tTzYbxz3kR8nGXZ6Qgn1QoU%2B3jlrRmuU4xx1IeTkm2Y%3D&amp;reserved=0\" rel=\"nofollow,noopener\" >Deezer<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This compelling video series from IBM and Palo Alto Networks dives into how cutting-edge security operations can help businesses thrive in the age of AI.<\/p>\n","protected":false},"author":723,"featured_media":333221,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9934,9943,112,78],"tags":[],"coauthors":[10068],"class_list":["post-333192","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-governance","category-ai-security","category-interview","category-partners"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/01\/GettyImages-591478735-edit.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/333192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=333192"}],"version-history":[{"count":9,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/333192\/revisions"}],"predecessor-version":[{"id":340317,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/333192\/revisions\/340317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/333221"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=333192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=333192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=333192"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=333192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}