• Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Industries
  • Partners
  • Why Palo Alto Networks?
  • Company
  • More
  • Sign In
    Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Explore Zero Trust

Palo Alto Networks Announces Three New Security Advancements

Palo Alto Networks HONG KONG Mar 28, 2019 at 03:00 PM

HONG KONG – March 28, 2019 – Palo Alto Networks, the global cybersecurity leader, has announced the availability of three significant advancements aimed at harnessing the power of advanced AI and machine learning.

 

Wickie Fung, general manager, Hong Kong and Macau at Palo Alto Networks, said: “Cybercriminals continue to utilize ever-increasing sophisticated tactics to launch cyberattacks that result in reputational and financial losses by organizations. We believe the key to building an integral cybersecurity defense is to apply AI and machine learning to automatically detect and quickly respond to threats across enterprises, spanning network, cloud and endpoints.”

 

Key Announcements:

 

Introducing Cortex™

Cortex is the industry’s only open and integrated, AI-based continuous security platform and is a significant evolution of the Application Framework designed to simplify security operations and considerably improve outcomes. Deployed on a global, scalable public cloud platform, Cortex allows security operations teams to speed the analysis of massive data sets. Cortex is enabled by the Cortex Data Lake, where customers can securely and privately store and analyze large amounts of data that is normalized for advanced AI and machine learning to find threats and orchestrate responses quickly.

 

Cortex XDR™ – Breaking Data Silos

Cortex XDR is the first-of-its-kind detection, investigation and response product that natively integrates network, endpoint and cloud data. Cortex XDR uncovers threats using behavioral analytics, accelerates investigations with automation, and stops attacks before damage is done through tight integration with existing enforcement points.

 

Traps™ 6.0 – Great Prevention Gets Even Better

Traps endpoint protection and response now includes a Behavioral Threat Protection engine that stops advanced threats in real time by stitching together a chain of events to identify malicious activity. Traps 6.0 acts as the ultimate data collection sensor for Cortex Data Lake, gathering the most comprehensive endpoint security data in the industry. In conjunction with Cortex XDR, customers can use Traps to extend their prevention capabilities to include detection and response across their entire digital infrastructure with a single agent.

 

Palo Alto Networks Cloud Security Summit, Hong Kong

 

Held in Hong Kong for the first time today, the Palo Alto Networks Cloud Security Summit was attended by over five hundred security professionals hearing from subject matter experts on how to secure the cloud transformation in the Digital Age.

 

Themed ‘A More Secure Everywhere’, the Cloud Security Summit featured keynote presentations by Dave Peranich, executive vice president, Worldwide Sales, Palo Alto Networks, and Dr. Frank Law, senior superintendent of Police, Cyber Security & Technology Crime Bureau, Hong Kong Police Force, The Government of the Hong Kong SAR.

 

There was a chance for the attendees to participate in Cyber Arena; an interactive cybersecurity workshop to learn the very latest security strategies and techniques. There are also informative sessions focused on cybersecurity challenges, cloud-delivered security services and securing the journey through digital transformation.

 

Issued on behalf of Palo Alto Networks by Newell Public Relations

 

For media enquiries, please contact:

Libby Chang
Communications Specialist, Corporate Communications, Asia Pacific
Palo Alto Networks
Tel: +65 6813 2957
libbychang@paloaltonetworks.com

 

Ivan Theodoulou
Newell PR
Tel: +852 2117 5007
ivant@newell.com

Article

What is a denial of service attack (DoS) ?

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users.
April 4, 2022

Datasheet

PA-400 Series

Palo Alto Networks PA-400 series ML-Powered NGFW (PA-460, PA-450, PA-440) brings Next Generation Firewall capabilities to distributed enterprise branch offices, retail locations, and midsize businesses.
March 23, 2022

Article

What is a Zero Trust Architecture

Zero Trust has become one of cybersecurity’s most used buzzwords. It’s imperative to understand what Zero Trust is, as well as what Zero Trust isn’t.
May 17, 2022

Article

What Is SASE?

Secure access service edge, or SASE (pronounced “sassy”), is an emerging cybersecurity concept. It is the convergence of wide area networking.
April 13, 2022

White Paper

Architecting The Zero Trust Enterprise

Understand how to become a Zero Trust Enterprise
November 23, 2021

Datasheet

PA-3200 Series Datasheet

The PA-3200 Series secures all traffic, including encrypted traffic, using dedicated processing and memory for networking, security, threat prevention and management.
March 23, 2022

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2022 Palo Alto Networks. All rights reserved