Logo

Palo Alto Networks launches Cortex XDR for Cloud

Third-generation XDR automates threat detection and investigation across endpoint, network, cloud and identity, from a single console.

  • 4 years ago Posted in

Palo Alto Networks has introduced Cortex® XDR™ 3.0, expanding its pioneering extended detection and response (XDR) solution to cloud- and identity-based threats to give organizations the holistic analytics needed to protect against increasingly sophisticated cyberattacks.

The third generation of Cortex XDR — already delivering top performance in the MITRE ATT&CK® evaluation — now offers security operations center (SOC) teams even broader protections across their attack surface.  By extending detection, monitoring and investigation into cloud environments, and detecting malicious user activities and insider threats through analysis of identity data, SOC teams benefit from security analytics across endpoint, network, cloud and identity for organization-wide detection and response — critical in an era of increasingly interrelated attacks.

In addition, Cortex XDR 3.0 offers security teams forensic investigation features based on the advanced proprietary tools of Palo Alto Networks' world-class Unit 42 Security Consulting group, and supports ingestion and custom correlations for virtually all third-party data sources.

"Palo Alto Networks created the extended detection and response (XDR) category in 2019 — understanding that only by integrating data from across all security sources can we detect complex threats accurately, prevent attacks automatically, and investigate them much faster. We've been innovating against that mission ever since," said Tim Junio, senior vice president of products, Cortex at Palo Alto Networks. "With our third-generation XDR solution expanding to cloud and identity analytics, Cortex XDR 3.0 has taken a large step towards being the most comprehensive platform for the SOC to protect endpoints, entities, assets, workloads, and critical data."

Cortex XDR has delivered top performance for three years running in the MITRE ATT&CK evaluation and achieved the highest overall combined detection and protection rate. As cybersecurity threat actors get faster, more organized and more sophisticated in their tactics, techniques and procedures, the new features of Cortex XDR 3.0 prepare SOC teams to know and stop attacks:

Cortex XDR for cloud allows SOC teams to extend detection, monitoring and investigation into cloud environments. XDR 3.0 brings together and integrates cloud host data, traffic logs, audit logs, data from Palo Alto Networks' industry-leading Prisma® Cloud product, and third-party cloud security data with non-cloud endpoint and network data sources. This provides the best coverage for SOC teams to span on-premises and multicloud environments.

Cortex XDR Identity Analytics further enhances the user behavior analytics capabilities of XDR to detect malicious activities and insider threats by collecting and analyzing an extensive set of identity data.

Cortex XDR Forensics module delivers the advanced forensic investigation tool used by the Palo Alto Networks Unit 42 Security Consulting group directly to Cortex XDR customers. The XDR Forensics module provides the ability to gather historical evidence such as user, file, application, browser and other activities from compromised systems to bring the full analytic potential of XDR to bear during incident response.

Cortex XDR Incident Management Interface provides security analysts with a comprehensive story of an incident in one place, including related malicious artifacts, hosts, users and correlated alerts mapped to the MITRE ATT&CK framework. This helps analysts handle incidents more quickly and completely.

Cortex XDR Third-Party Data Engine offers customers the ability to ingest, normalize, correlate, query and analyze data from virtually any source. This third-party data can be correlated with threat activity and tagged with MITRE ATT&CK tactics, techniques and procedures to help provide a more detailed picture of adversarial movement. This also allows SOC teams to understand the full scope of an incident and respond more completely.

Tenable's 2026 report reveals growing AI exposure and supply chain vulnerabilities, posing serious...
Scale Computing enhances its product offerings with the acquisition of Adaptiv Networks,...
Veeam appoints Nick McAlister as UKI Channel Director to strengthen its channel strategy across...
Pure Storage, now Everpure, expands into cloud data management with the acquisition of 1touch,...
BMC has partnered with AWS to enhance intelligent automation, emphasising data orchestration at a...
Check Point has unveiled an AI-focused security strategy, supported by three acquisitions.
Arrow Electronics teams up with Oaka Studio to offer strengthened support for Microsoft channel...
Phoenix has been recognised as a VMware Pinnacle Partner, reflecting its ongoing collaboration and...