Palo Alto
Green linesGreen lines
Just now
Email

Email from supply chain partner SecOps/IT team

You see the Ivanti CVEs? Any worries per our supply chain?

Just now
News

Cyber News

2 vulnerabilities in Ivanti VPN used by federal agencies

Just now
Slack

Slack message from #triage-group

New high sev 0-day vulnerability to check ASAP

Just now
Slack

Direct Slack message from Eric/CISO

Are we impacted by this 0-day? Any exposure across our network?

Just now
Email

Email from supply chain partner SecOps/IT team

You see the Ivanti CVEs? Any worries per our supply chain?

Just now
News

Cyber News

2 vulnerabilities in Ivanti VPN used by federal agencies

Just now
Slack

Slack message from #triage-group

New high sev 0-day vulnerability to check ASAP

Just now
Slack

Direct Slack message from Eric/CISO

Are we impacted by this 0-day? Any exposure across our network?

Just now
Email

Email from supply chain partner SecOps/IT team

You see the Ivanti CVEs? Any worries per our supply chain?

Just now
News

Cyber News

2 vulnerabilities in Ivanti VPN used by federal agencies

Just now
Slack

Slack message from #triage-group

New high sev 0-day vulnerability to check ASAP

Just now
Slack

Direct Slack message from Eric/CISO

Are we impacted by this 0-day? Any exposure across our network?

Just now
Email

Email from supply chain partner SecOps/IT team

You see the Ivanti CVEs? Any worries per our supply chain?

Just now
News

Cyber News

2 vulnerabilities in Ivanti VPN used by federal agencies

Just now
Slack

Slack message from #triage-group

New high sev 0-day vulnerability to check ASAP

Just now
Slack

Direct Slack message from Eric/CISO

Are we impacted by this 0-day? Any exposure across our network?

Just now
Email

Email from supply chain partner SecOps/IT team

You see the Ivanti CVEs? Any worries per our supply chain?

Just now
News

Cyber News

2 vulnerabilities in Ivanti VPN used by federal agencies

Just now
Slack

Slack message from #triage-group

New high sev 0-day vulnerability to check ASAP

Just now
Slack

Direct Slack message from Eric/CISO

Are we impacted by this 0-day? Any exposure across our network?

Just now
Email

Email from supply chain partner SecOps/IT team

You see the Ivanti CVEs? Any worries per our supply chain?

Just now
News

Cyber News

2 vulnerabilities in Ivanti VPN used by federal agencies

Just now
Slack

Slack message from #triage-group

New high sev 0-day vulnerability to check ASAP

Just now
Slack

Direct Slack message from Eric/CISO

Are we impacted by this 0-day? Any exposure across our network?

Just now
Email

Email from supply chain partner SecOps/IT team

You see the Ivanti CVEs? Any worries per our supply chain?

Just now
News

Cyber News

2 vulnerabilities in Ivanti VPN used by federal agencies

Just now
Slack

Slack message from #triage-group

New high sev 0-day vulnerability to check ASAP

Just now
Slack

Direct Slack message from Eric/CISO

Are we impacted by this 0-day? Any exposure across our network?

Just now
Email

Email from supply chain partner SecOps/IT team

You see the Ivanti CVEs? Any worries per our supply chain?

Just now
News

Cyber News

2 vulnerabilities in Ivanti VPN used by federal agencies

Just now
Slack

Slack message from #triage-group

New high sev 0-day vulnerability to check ASAP

Just now
Slack

Direct Slack message from Eric/CISO

Are we impacted by this 0-day? Any exposure across our network?

Cortex Xsoar

An Empowered SecOps Analyst in Action

Your day as a SecOps Analyst is just getting started when you find out that Ivanti, a VPN solution provider, has announced two 0-day vulnerabilities. Are you impacted?

Use Cortex XSOAR® to find out whether your network and supply chain are impacted.

Swipe to begin

Metrics derived from Palo Alto Networks SOC.

See All The Actions In One Place

Upon logging into your XSOAR Incident Overview dashboard, you notice several critical incidents, raising concerns about a potential data breach in your environment.

Let's delve deeper.

play icon
play icon

Metrics derived from Palo Alto Networks SOC.

Gain Immediate Insights Into Threats

The Ivanti CVEs and incidents appear on the Threat Landscape Overview dashboard, highlighting concerns about their potential business impact due to recent zero-day vulnerabilities in the news.

play icon
play icon

Metrics derived from Palo Alto Networks SOC.

Quickly Assess Impact

The Incidents page offers a summary of the incident's type, severity, and status, allowing you to easily report when it occurred to your manager.

Click on the incident ID number to explore further.

play icon
play icon

Metrics derived from Palo Alto Networks SOC.

Get All Relevant Information

Here, you can see every indicator linked to the incident.

The Playbook Description outlines how XSOAR automatically extracted 23 indicators and analyzed them for valuable insights.

With these insights, you can make quick decisions on whether to block them from spreading across your network.

play icon
play icon

Metrics derived from Palo Alto Networks SOC.

Access Actionable Threat Intelligence

For a more thorough analysis of the indicators, visit the Threat Intel page. Here, you will find additional context about the indicators, including external threat reports, Unit 42 analyses, and uncover the broader scope of the attack—like whether it’s connected to other incidents.

play icon
play icon

Metrics derived from Palo Alto Networks SOC.

Respond on the Fly With Quick Action Buttons

Go to the Analyst Tools tab for customizable quick-action buttons that simplify and accelerate incident response, allowing you to perform critical actions with just a click, saving time and reducing manual effort.

play icon
play icon

Metrics derived from Palo Alto Networks SOC.

Complete Your Investigation in the War Room

The War Room tab centralizes communication, investigation, and real-time actions, enabling you to tag evidence, collaborate with peers, and manage incidents seamlessly without the need to switch between multiple tools or consoles.

play icon
play icon

Metrics derived from Palo Alto Networks SOC.

Review Any Playbook Actions

The Work Plan tab displays the playbook triggered by this incident. Playbooks can conduct threat-hunting queries and take remedial actions like blocking indicators and preventing lateral movement, saving time and reducing manual effort while ensuring a thorough response.

play icon
play icon

Metrics derived from Palo Alto Networks SOC.

Collect Evidence in One Place

The Evidence Board tab consolidates flagged evidence in one place, making it easier to track critical details and create comprehensive reports for stakeholders. This ensures clarity and accountability throughout the incident investigation process.

play icon
play icon

Metrics derived from Palo Alto Networks SOC.

Simplify Communications

The Email Threads button lets you collaborate and provide timely updates to stakeholders, ensuring transparency and alignment without leaving XSOAR.

play icon
play icon

Metrics derived from Palo Alto Networks SOC.

Close Incident Tickets With Ease

Finally, it's time to close the incident.

You can open, edit, and close incident tickets directly within XSOAR, eliminating the need to switch to ServiceNow, Jira, Remedy, Slack, or other tools.

play icon
play icon

Metrics derived from Palo Alto Networks SOC.

Explore Automation Possibilities for Your SOC

Head over to the Cortex XSOAR Marketplace to discover new automation ideas amongst the 1000+ packs contributed by SecOps experts and the world’s largest SOAR community.

play icon
play icon

Metrics derived from Palo Alto Networks SOC.

Get More Security Done. With Cortex XSOAR.

Let your security analysts focus on what they do best. Let automation handle the rest.

Transform your SOC with Cortex XSOAR.

play icon
play icon
pattern

Metrics derived from Palo Alto Networks SOC.

Schedule Your Cortex XSOAR Demo

Talk to you soon!

We'll reach out to schedule your personal 30-minute demo. We'll explore how to find fewer alerts, build end-to-end automation and enable smarter security operations with the Cortex portfolio.