{"id":334105,"date":"2025-02-13T05:05:54","date_gmt":"2025-02-13T13:05:54","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=334105"},"modified":"2025-12-18T07:23:05","modified_gmt":"2025-12-18T15:23:05","slug":"announcing-innovations-cortex-cloud","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2025\/02\/announcing-innovations-cortex-cloud\/","title":{"rendered":"Introducing Cortex Cloud \u2014 The Future of Real-Time Cloud Security"},"content":{"rendered":"<p><em>Cortex<sup>\u00ae<\/sup> Cloud merges the next version of Prisma<sup>\u00ae<\/sup> Cloud with best-in-class CDR for real-time cloud security.<\/em><\/p>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"padding-top: 56.25%;\"><iframe style=\"position: absolute; top: 0px; right: 0px; bottom: 0px; left: 0px; width: 100%; height: 100%;\" src=\"https:\/\/players.brightcove.net\/1050259881001\/default_default\/index.html?videoId=6368659129112\" allowfullscreen=\"allowfullscreen\" allow=\"encrypted-media\"><\/iframe><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>Nearly every organization runs in the cloud, driven by promised outcomes, like <a href=\"https:\/\/www.ibm.com\/cloud-computing\/us\/en\/assets\/power-of-cloud-for-bus-model-innovation.pdf\" rel=\"nofollow,noopener\" >65%<\/a> faster product and service delivery. AI has only accelerated cloud investment, with <a href=\"https:\/\/www.pwc.com\/us\/en\/tech-effect\/cloud\/cloud-ai-business-survey.html\" target=\"_blank\" rel=\"noopener\">63%<\/a> of top-performing companies citing AI for their decision.<\/p>\n<p>But the cloud comes with risks. Up to <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/research\/2023-unit-42-attack-surface-threat-report\" target=\"_blank\" rel=\"noopener\">80%<\/a> of security exposures occur in the cloud, compounded by a recent <a href=\"https:\/\/unit42.paloaltonetworks.com\/unit42-incident-response-report-2024-threat-guide\/\" target=\"_blank\" rel=\"noopener\">66%<\/a> surge in attacks and the reality that cloud-native risks shift regularly.<\/p>\n<p>Security teams struggle to keep up, facing off against adversaries who appear to thrive<a href=\"https:\/\/unit42.paloaltonetworks.com\/cloud-threat-report-expanding-attack-surface\/\" target=\"_blank\" rel=\"noopener\">\u200b\u200b<\/a>. One alert, on average, takes <a href=\"https:\/\/unit42.paloaltonetworks.com\/cloud-threat-report-expanding-attack-surface\/\" target=\"_blank\" rel=\"noopener\">145 hours<\/a> to resolve. Meanwhile, attackers exploit new vulnerabilities <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/research\/2023-unit-42-attack-surface-threat-report\" target=\"_blank\" rel=\"noopener\">within 15 minutes<\/a> of disclosure and exfiltrate data <a href=\"https:\/\/unit42.paloaltonetworks.com\/cloud-threat-report-expanding-attack-surface\/\" target=\"_blank\" rel=\"noopener\">in half the time<\/a> they did last year\u200b\u200b.<\/p>\n<h2><a id=\"post-334105-_sg6it9gqaxym\"><\/a>Peace-Time Cloud Security Isn't Enough<\/h2>\n<p>Traditional security approaches leave organizations exposed. Posture management has been the foundation of cloud security, helping teams identify misconfigurations and enforce compliance. Security risks, however, don\u2019t stop at misconfigurations or vulnerabilities. Organizations need more than \u201cpeace time\u201d security. They need real-time prevention.<\/p>\n<h2><a id=\"post-334105-_4mypybp4k45t\"><\/a>A New Approach<\/h2>\n<p>Palo Alto Networks, the pioneer of Code to Cloud<sup>&#x2122;<\/sup> security, has spent years shaping how organizations protect cloud environments. Prisma Cloud <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2023\/10\/announcing-innovations-cnapp-prisma-cloud\/\" target=\"_blank\" rel=\"noopener\">redefined cloud security posture<\/a>. Cortex transformed AI-driven SecOps. Still, cloud and enterprise security teams remained disconnected, operating in silos with limited visibility, context and response capabilities.<\/p>\n<p>Attackers exploit these gaps \u2013 moving between misconfigurations, runtime vulnerabilities and exposed identities faster than teams can respond. The challenges call for change. Palo Alto Networks set out to address them.<\/p>\n<h3><a id=\"post-334105-_kionmjggfnrm\"><\/a>Introducing Cortex Cloud<\/h3>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/cloud\" target=\"_blank\" rel=\"noopener\">Cortex Cloud<\/a> is the next version of Prisma Cloud merged with best-in-class Cortex CDR to deliver real-time cloud security. Built on Cortex, organizations can seamlessly adopt natively integrated capabilities as part of the world\u2019s most complete enterprise-to-cloud SecOps platform.<\/p>\n<p>Security teams gain a context-driven defense that delivers real-time cloud security \u2013 continuous protection from code to cloud to SOC. Our new Cloud Runtime Security offering includes the world\u2019s leading CNAPP capabilities at no additional cost, maximizing adoption of end-to-end cloud security on a single platform.<\/p>\n<figure id=\"attachment_334550\" aria-describedby=\"caption-attachment-334550\" style=\"width: 964px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"964\"><span class=\"ar-custom\" style=\"padding-bottom:43.46%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-334550 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Screenshot-2025-02-12-at-8.53.55\u202fAM-1-230x100.png\" alt=\"AI automation \u2013 unified data from code to cloud to SOC.\" width=\"964\" height=\"419\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Screenshot-2025-02-12-at-8.53.55\u202fAM-1-230x100.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Screenshot-2025-02-12-at-8.53.55\u202fAM-1-500x217.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Screenshot-2025-02-12-at-8.53.55\u202fAM-1-768x333.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Screenshot-2025-02-12-at-8.53.55\u202fAM-1-1536x667.png 1536w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Screenshot-2025-02-12-at-8.53.55\u202fAM-1-2048x889.png 2048w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Screenshot-2025-02-12-at-8.53.55\u202fAM-1-510x221.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Screenshot-2025-02-12-at-8.53.55\u202fAM-1-92x40.png 92w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Screenshot-2025-02-12-at-8.53.55\u202fAM-1-650x282.png 650w\" sizes=\"auto, (max-width: 964px) 100vw, 964px\" \/><\/span><\/div><figcaption id=\"caption-attachment-334550\" class=\"wp-caption-text\">Cortex Cloud delivers real-time cloud security powered by unified data, <a href=\"https:\/\/www.paloaltonetworks.com\/precision-ai-security\" target=\"_blank\" rel=\"noopener\">Precision AI<sup>\u00ae<\/sup><\/a> and automation.<\/figcaption><\/figure>\n<p>For Prisma Cloud customers, this translates into more power. Your investments are secure, and existing Prisma Cloud customers will experience a seamless upgrade to Cortex Cloud with all the core capabilities you\u2019ve come to expect, enhanced with significant new innovations \u2013 including AI-powered prioritization, automated remediation and a new simplified, powerful user experience.<\/p>\n<p>Additionally, once upgraded, Prisma Cloud customers can add Cortex\u2019s industry-leading CDR capabilities as part of the new Cloud Runtime Security offering. Now available on the single Cortex platform, Cortex XSIAM users can seamlessly adopt industry-leading CNAPP, making it the preferred SOC platform for enterprise and cloud.<\/p>\n<h2>A Formula for Results<\/h2>\n<p>Breaches happen when security teams can\u2019t connect the dots fast enough. Imagine a world, though, where runtime context informs cloud posture decisions during peace time, ensuring vulnerabilities and other risks are prioritized before they become active threats. Automation then closes the loop on critical issues, resolving risks before attackers exploit them.<\/p>\n<p>At the same time, envision SOC teams with the full picture \u2013 seeing not just an attack in progress but the cloud exposures that made it possible. With runtime insights mapped to cloud risk, investigations become faster, more precise and tied to real-world attack paths.<\/p>\n<p>Cortex Cloud changes the equation, setting new benchmarks for simplicity and effectiveness. From smart prioritization that manages millions of security findings to automation that streamlines remediation, organizations can take back control.<\/p>\n<h3><a id=\"post-334105-_56wxvb82xbkx\"><\/a>Unified Data for Complete Security Intelligence<\/h3>\n<p>Security teams aren\u2019t short on data \u2013 quite the opposite. Threat indicators get lost in the vast array of cloud telemetry. Cortex Cloud unifies first- and third-party findings into a unified dataplane, eliminating the need to manually connect dispersed insights. Every signal and event is stitched together, giving teams full, real-time context for every decision.<\/p>\n<p>End-to-end visibility allows organizations to reduce investigation times, prioritize what matters and automate responses, whether strengthening security during peace time, such as application development, or responding to real-time incidents under active attack.<\/p>\n<h3><a id=\"post-334105-_ue8bnnszotr5\"><\/a>AI and Automation \u2014 Smarter Detection, Faster Response<\/h3>\n<p>With over 7,000 detectors and 2,400+ machine learning models, Cortex Cloud identifies high-risk threats with precision using Cortex XDR\u2019s best-in-class CDR agent, which achieved industry-leading results in the most recent MITRE ATT&amp;CK testing. AI-powered recommendations guide teams toward the fastest resolution, while automation accelerates containment, blocking malicious activity and isolating compromised resources.<\/p>\n<p>Security teams no longer need to navigate disconnected tools and siloed workflows. Out-of-the-box and customizable playbooks orchestrate response workflows, automating fixes where possible and streamlining analyst actions when human oversight is required. As Cortex Cloud continually learns from incidents, automation becomes faster, smarter and more effective, keeping defenders ahead of attackers at every turn.<\/p>\n<h3><a id=\"post-334105-_m4msz7lbew8j\"><\/a>Proven Outcomes at Scale<\/h3>\n<p>Cortex Cloud builds on real-world results already achieved by the Cortex platform:<\/p>\n<ul>\n<li><strong>100% detection coverage<\/strong> in <a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/cortex-xdr\/mitre\" target=\"_blank\" rel=\"noopener\">MITRE ATT&amp;CK evaluations<\/a>, the highest prevention rate among vendors with zero false positives.<\/li>\n<li><strong>90% reduction in MTTR<\/strong>, often cutting response times from 4 days to under 1\u20132 hours\u200b\u200b.<\/li>\n<li><strong>75% decrease in analyst workload<\/strong>, reducing manual tasks and alert fatigue\u200b.<\/li>\n<li><strong>Incident close rates improved from 20% to 100%<\/strong>, demonstrating the power of unified workflows and AI-driven automation\u200b\u200b.<\/li>\n<\/ul>\n<h2><a id=\"post-334105-_oav0giehvmt2\"><\/a>Elevating CNAPP\u2019s Core Capabilities<\/h2>\n<h3><a id=\"post-334105-_nktbimsnle9k\"><\/a>Application Security \u2014 Fix Issues at the Source<\/h3>\n<p>Security starts in development. Cortex Cloud natively integrates with engineering ecosystems to prevent risks and secure applications by design. The solution unifies leading AppSec tools with newly added third-party scanners for complete code and runtime context to prevent and prioritize risk. <a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/cloud\/application-security\" target=\"_blank\" rel=\"noopener\">Cortex Cloud Application Security<\/a> centralizes visibility across pipelines and production.<\/p>\n<p>With AI-driven risk prioritization, security teams focus on vulnerabilities and misconfigurations attackers will likely target, while agile security guardrails embed best practices directly into developer workflows. Instead of chasing risks after deployment, organizations achieve protection that scales with growth.<\/p>\n<figure id=\"attachment_334477\" aria-describedby=\"caption-attachment-334477\" style=\"width: 984px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"984\"><span class=\"ar-custom\" style=\"padding-bottom:66.46%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-334477 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/ASPM-Command-Center-2-1-230x153.png\" alt=\"Screenshot of ASPM Command Center's SB Banking.\" width=\"984\" height=\"654\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/ASPM-Command-Center-2-1-230x153.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/ASPM-Command-Center-2-1-500x332.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/ASPM-Command-Center-2-1-768x510.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/ASPM-Command-Center-2-1-1536x1021.png 1536w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/ASPM-Command-Center-2-1-2048x1361.png 2048w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/ASPM-Command-Center-2-1-451x300.png 451w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/ASPM-Command-Center-2-1-60x40.png 60w\" sizes=\"auto, (max-width: 984px) 100vw, 984px\" \/><\/span><\/div><figcaption id=\"caption-attachment-334477\" class=\"wp-caption-text\">The ASPM Command Center combines code, runtime and application context to fix issues at the source.<\/figcaption><\/figure>\n<h3><a id=\"post-334105-_z0iwlzt2xl4y\"><\/a>Cloud Posture Security \u2014 A Connected View of Risk<\/h3>\n<p>It\u2019s not just about more findings. It\u2019s about contextualized insights that drive action. Yesterday\u2019s cloud security teams worked on posture management without knowing how their configurations affect active threats. They\u2019ve only been able to see theoretical risk. With Cortex Cloud, you can now see real-world attack paths, including whether a vulnerability is actively being exploited in runtime.<\/p>\n<p>Cortex Cloud improves multicloud risk management with new AI-powered prioritization, guided fixes to resolve multiple risks with a single action and automated remediation. Now, you can correlate risks \u2013 misconfigurations, vulnerabilities, overly permissive IAM roles, sensitive data exposures \u2013 in cases to reveal exploitable attack paths. AI-powered prioritization and Cases goes further, grouping related risks with a shared issue, allowing teams to remediate at scale instead of tackling risks one by one. Security teams burn down issues faster, reducing manual workflows by up to 25-fold and resolving multiple risks with a single action.<\/p>\n<p>The fully and tightly integrated solution changes the game for Prisma Cloud customers with a single user experience across CSPM, CIEM, DSPM, AI-SPM, KSPM, ASPM, CWP and vulnerability management \u2013 offering complete protection in hybrid and multicloud environments.<\/p>\n<figure id=\"attachment_334421\" aria-describedby=\"caption-attachment-334421\" style=\"width: 2500px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"2500\"><span class=\"ar-custom\" style=\"padding-bottom:62.48%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-334421 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/word-image-334105-4.png\" alt=\"Screenshot of Cloud Security Operations Dashboard.\" width=\"2500\" height=\"1562\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/word-image-334105-4.png 2500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/word-image-334105-4-230x144.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/word-image-334105-4-500x312.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/word-image-334105-4-768x480.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/word-image-334105-4-1536x960.png 1536w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/word-image-334105-4-2048x1280.png 2048w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/word-image-334105-4-480x300.png 480w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/word-image-334105-4-64x40.png 64w\" sizes=\"auto, (max-width: 2500px) 100vw, 2500px\" \/><\/span><\/div><figcaption id=\"caption-attachment-334421\" class=\"wp-caption-text\">The <a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/cloud\/cloud-posture-security\" target=\"_blank\" rel=\"noopener\">Cloud Security Ops<\/a> dashboard provides single pane visibility across your cloud posture and key metrics, such as most critical cases and response time.<\/figcaption><\/figure>\n<h3><a id=\"post-334105-_7v1fjemwe3hp\"><\/a>Cloud Runtime Security \u2014 Stop Attacks in Real Time<\/h3>\n<p>Threats evolve in seconds, and static security approaches can\u2019t keep up. Cortex Cloud prevents known and unknown threats in real time across VMs, containers, Kubernetes clusters and serverless environments. Behavioral threat protection, anomaly detection and risk correlation ensure that attacks are identified and stopped. A <a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/cloud\/runtime-security\" target=\"_blank\" rel=\"noopener\">single, unified agent for runtime security<\/a> consolidates capabilities that previously required multiple agents. Gaining seamless detection, prevention and response across cloud workloads, security teams move from reactive investigation to proactive cloud defense.<\/p>\n<p>Our new Cloud Runtime Security offering includes the world\u2019s leading CNAPP capabilities at no additional cost, maximizing adoption of end-to-end cloud security on a single platform.<\/p>\n<figure id=\"attachment_334492\" aria-describedby=\"caption-attachment-334492\" style=\"width: 993px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"993\"><span class=\"ar-custom\" style=\"padding-bottom:63.95%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-334492 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Runtime-page-Dashboard-lo-res-3-230x147.png\" alt=\"Screenshot of cases showing alerts, automations, artifacts, and assets. \" width=\"993\" height=\"635\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Runtime-page-Dashboard-lo-res-3-230x147.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Runtime-page-Dashboard-lo-res-3-500x320.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Runtime-page-Dashboard-lo-res-3-768x492.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Runtime-page-Dashboard-lo-res-3-1536x983.png 1536w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Runtime-page-Dashboard-lo-res-3-2048x1311.png 2048w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Runtime-page-Dashboard-lo-res-3-469x300.png 469w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/Runtime-page-Dashboard-lo-res-3-62x40.png 62w\" sizes=\"auto, (max-width: 993px) 100vw, 993px\" \/><\/span><\/div><figcaption id=\"caption-attachment-334492\" class=\"wp-caption-text\">Incident cases dramatically improve MTTR by stitching several alerts mapped to the MITRE ATT&amp;CK framework with suggested automation actions.<\/figcaption><\/figure>\n<h3><a id=\"post-334105-_1gyiqtcah5tb\"><\/a>The SOC Advantage \u2014 Integrated Threat Detection, Investigation and Response<\/h3>\n<p>Cortex Cloud is also available on Cortex XSIAM, making it the preferred SOC platform for enterprise and cloud. While cloud threats both evolve and increase, native CNAPP from Cortex Cloud equips teams with deep visibility, real-time threat detection and automated response workflows that turn intelligence into action. Advanced AI powers rapid identification of cloud-specific attack patterns, mapping adversary behaviors to the MITRE framework for immediate, contextualized insights.<\/p>\n<figure id=\"attachment_334505\" aria-describedby=\"caption-attachment-334505\" style=\"width: 993px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"993\"><span class=\"ar-custom\" style=\"padding-bottom:60.83%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-334505 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/XSIAM-230x140.png\" alt=\"Screenshot of XSIAM Command Center showing alerts and incidents.\" width=\"993\" height=\"604\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/XSIAM-230x140.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/XSIAM-500x304.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/XSIAM-768x468.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/XSIAM-1536x935.png 1536w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/XSIAM-2048x1247.png 2048w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/XSIAM-493x300.png 493w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/XSIAM-66x40.png 66w\" sizes=\"auto, (max-width: 993px) 100vw, 993px\" \/><\/span><\/div><figcaption id=\"caption-attachment-334505\" class=\"wp-caption-text\">XSIAM brings together data across the enterprise, including cloud, stitching alerts into prioritized incidents for unprecedented remediation efficiency.<\/figcaption><\/figure>\n<p>Unlike current approaches that rely on disconnected tools and fragmented context, Cortex XSIAM with native CNAPP delivers best-in-class capabilities in a fully integrated solution. Security teams pivot effortlessly between runtime threats, cloud misconfigurations and identity risks. Days spent chasing shadows are finally over. It\u2019s time to go on offense.<\/p>\n<h2>Reclaim Control with Cortex Cloud<\/h2>\n<p>Cloud security moves fast. Attackers move faster. See how Cortex Cloud turns the tables with real-time, end-to-end protection that puts security teams back in command. <a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/cloud#prevent-breaches\">Schedule a demo today<\/a> and join us at <a href=\"https:\/\/start.paloaltonetworks.com\/symphony2025\">Symphony 2025<\/a> to witness the breakthrough that\u2019s redefining how the cloud is secured.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>Forward-Looking Statements<\/em><\/strong><\/p>\n<p><em>This blog contains forward-looking statements that involve risks, uncertainties and assumptions, including, without limitation, statements regarding the benefits, impact or performance or potential benefits, impact or performance of our products and technologies or future products and technologies. These forward-looking statements are not guarantees of future performance, and there are a significant number of factors that could cause actual results to differ materially from statements made in this blog, including, without limitation: developments and changes in general market, political, economic, and business conditions; risks associated with managing our growth; risks associated with new products and subscription and support offerings; shifts in priorities or delays in the development or release of new offerings, or the failure to timely develop, release and achieve market acceptance of new products and subscriptions as well as existing products and subscription and support offerings; failure of our business strategies; rapidly evolving technological developments in the market for security products and subscription and support offerings; our customers\u2019 purchasing decisions and the length of sales cycles; our competition; our ability to attract and retain new customers; and our ability to acquire and integrate other companies, products, or technologies. We identify certain important risks and uncertainties that could affect our results and performance in our most recent Annual Report on Form 10-K, our most recent Quarterly Report on Form 10-Q, and our other filings with the U.S. Securities and Exchange Commission from time-to-time, each of which are available on our website at investors.paloaltonetworks.com and on the SEC's website at www.sec.gov. All forward-looking statements in this blog are based on information available to us as of the date hereof, and we do not assume any obligation to update the forward-looking statements provided to reflect events that occur or circumstances that exist after the date on which they were made.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cortex Cloud brings the world\u2019s leading CNAPP onto the #1 SecOps platform, delivering real-time protection \u2014 for the first time \u2014 from code to cloud to SOC.<\/p>\n","protected":false},"author":723,"featured_media":334106,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,9819,6717],"tags":[8400,10085,10083,9452,635],"coauthors":[10432],"class_list":["post-334105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","category-cloud-security","category-products-and-services","tag-code-to-cloud","tag-cortex-cloud","tag-real-time-cloud-security","tag-runtime-protection","tag-soc","cloud_sec_category-application-security","cloud_sec_category-cnapp","sec_ops_category-news-and-events","sec_ops_category-product-features"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/02\/GettyImages-1014585732-edit.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/334105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=334105"}],"version-history":[{"count":23,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/334105\/revisions"}],"predecessor-version":[{"id":350634,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/334105\/revisions\/350634"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/334106"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=334105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=334105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=334105"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=334105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}