Protect Against Russia-Ukraine Cyber Activity
  • Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Network Security
  • Secure Access Service Edge
  • Cloud-Native Security
  • Security Operations
  • Threat Intel & Incident Response
  • More
  • Sign In
    Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
    Language
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Get Started

Palo Alto Networks Delivers Cloud-Based Behavioral Analytics With Introduction of Magnifier

Palo Alto Networks Santa Clara, CA Jan 23, 2018 at 05:00 AM
New Cloud-Delivered Application Based on Application Framework Prevents Successful Cyberattacks With Advanced Precision

SANTA CLARA, Calif., Jan. 23, 2018 /PRNewswire/ -- Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced the availability of Magnifier, a cloud-based behavioral analytics application delivered through Palo Alto Networks Application Framework that allows organizations to rapidly identify and prevent threats.

As part of Palo Alto Networks Next-Generation Security Platform, Magnifier applies machine learning to rich network, endpoint, and cloud data, precisely detecting and preventing targeted attacks, insider abuse, and endpoint compromise.

Attackers who gain access to a network can steal, modify or destroy sensitive data while they blend in with legitimate users. Often, they can infiltrate organizations and dwell inside networks for months or even years without being detected. Simultaneously, the volume of alerts legacy threat monitoring systems generate and the emergence of multiple point products aimed at solving singular security issues both pose serious challenges for cybersecurity teams trying to manually oppose targeted attacks and insider threats.

According to the December 2017 Forrester® Research report "Five Steps to a Zero Trust Network," written by analysts Stephanie Balaouras, Chase Cunningham and Peter Cerrato, "Manual security operations slow breach detection and response, leaving data and systems vulnerable to attacks or giving attackers more time to exfiltrate data and cause lasting damage to the environment."

Palo Alto Networks Magnifier delivers the first easily consumed cloud-based behavioral analytics offering to automatically identify and prevent attackers from dwelling inside networks and successfully executing cyberattacks. Its tight integration with Palo Alto Networks Next-Generation Security Platform, along with Palo Alto Networks Logging Service, enables highly accurate attack detection powered by scalable, agile, cloud-based machine learning.

QUOTES

  • "The addition of Magnifier into the Next-Generation Security Platform provides an effective, scalable approach to behavioral analytics and threat identification. We're now able to find cyberthreats that would have previously gone undetected and prevent them before they are able to materially impact the business."
    -          John Woods, vice president, Information Security, PDX Inc.
  • "Magnifier builds upon the Palo Alto Networks infrastructure to improve threat detection and incident response in an orderly fashion. Magnifier behavioral analytics may be a welcome help for CISOs seeking to introduce advanced analytics and process automation into their security operations, and to gain the benefits of integration without having to do all the integration themselves."
    -          Jon Oltsik, senior principal analyst, Enterprise Strategy Group
  • "Magnifier automates the process of preventing successful cyberattacks by integrating best-of-breed behavioral analytics capabilities into Palo Alto Networks Next-Generation Security Platform. It will enable already stretched security teams to improve their security posture while at the same time saving money and time, leveraging the benefits of machine learning and automatically identifying potential cyberattacks so that they can be prevented."
    -          Lee Klarich, chief product officer, Palo Alto Networks

Magnifier behavioral analytics offers several new, innovative capabilities, including:

  • Accuracy and Efficiency: Magnifier analyzes data from next-generation firewalls and Pathfinder endpoint analysis service to profile user and device behavior. Because its detection algorithms are tailored for the logs sent by the Next-Generation Security Platform, Magnifier can apply precise machine learning and attack detection algorithms compared to inspecting generic log files for threats. As a result, Magnifier generates a small number of highly accurate and actionable alerts.
  • Automated Investigation: Magnifier streamlines threat hunting efforts by automatically interrogating suspicious endpoints to determine which processes are responsible for attack behaviors. It then analyzes the processes, using Palo Alto Networks WildFire® cloud-based threat analysis service, to determine if they are malicious. Magnifier's endpoint analysis and detailed alerts with full investigative detail enable security analysts to immediately review and respond to incidents.
  • Scale, Agility and Ease of Deployment: Palo Alto Networks customers can implement behavioral analytics simply by enabling the Magnifier application with the cloud-based Palo Alto Networks Logging Service, using their existing Palo Alto Networks firewalls as sensors to collect telemetry data from their networks, without a need to purchase and maintain additional networking devices or costly on-premise logging servers.

AVAILABILITY
Magnifier behavioral analytics is a subscription-based service targeted for general availability in February 2018.

RESOURCES

  • Palo Alto Networks Magnifier Behavioral Analytics
  • Palo Alto Networks Application Framework
  • Palo Alto Networks Next-Generation Security Platform
  • Read the Blog: Unveiling Magnifier Behavioral Analytics: Rapidly Hunt Down and Stop the Stealthiest Network Threats
  • Follow Palo Alto Networks online: LinkedIn, Twitter, Facebook

About Palo Alto Networks
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com.

Palo Alto Networks, the Palo Alto Networks logo and WildFire are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

 

 

SOURCE Palo Alto Networks, Inc.

Article

What is a denial of service attack (DoS) ?

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users.
April 4, 2022

White Paper

Architecting The Zero Trust Enterprise

Understand how to become a Zero Trust Enterprise
November 23, 2021

Article

What is a Zero Trust Architecture

Zero Trust has become one of cybersecurity’s most used buzzwords. It’s imperative to understand what Zero Trust is, as well as what Zero Trust isn’t.
May 17, 2022

Datasheet

PA-400 Series

Palo Alto Networks PA-400 series ML-Powered NGFW (PA-460, PA-450, PA-440) brings Next Generation Firewall capabilities to distributed enterprise branch offices, retail locations, and midsize businesses.
March 23, 2022

Article

What Is SASE?

Secure access service edge, or SASE (pronounced “sassy”), is an emerging cybersecurity concept. It is the convergence of wide area networking.
April 13, 2022

Datasheet

PA-3200 Series Datasheet

The PA-3200 Series secures all traffic, including encrypted traffic, using dedicated processing and memory for networking, security, threat prevention and management.
March 23, 2022

Get the latest news, invites to events and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Tech Insider
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Newsroom
  • Careers
  • Contact Us
  • Product Certifications
  • Manage Email Preferences
Report a Vulnerability
Create an account or login

Copyright © 2022 Palo Alto Networks. All rights reserved