[ENG] XSIAM 3.0 presentation
By blinkz
Summary
Topics Covered
- Human SOCs Fail Under Alert Overload
- XIM Merges Proactive Reactive Security
- GenAI Weaponizes Personalized Phishing
- Vulnerability Management Wastes on Noise
- Unified Platform Slashes Engineering Burden
Full Transcript
[Music] Hi and welcome to the XIM 3.0 webinar.
My name is Ivon Lee, product marketing manager for Cortex, and I'll be your host today. Cortex XIM has already set a
host today. Cortex XIM has already set a new benchmark for security operations with a unified platform powered by comprehensive data, AI, and automation.
Recently, we announced a major milestone to the platform with the launch of XIM 3.0, introducing the new advanced email security and exposure management
capabilities within XIM. With this
announcement, we're replacing decades old approaches to vulnerability management and email security with cuttingedge AIdriven innovation. In
today's webinar, we'll dive deep into how this announcement is going to change the game, not only for the sock, but for security operations as a whole. With us
today, we have vice president of product management all Corin to discuss why this next phase of XIM is truly revolutionary as we merge shift left proactive
security with shift right realtime reactive prevention. From there, you'll
reactive prevention. From there, you'll get an exclusive first look at XIM 3.0 know and experience it in action for yourself with our product management
team. Finally, we'll sit down with our
team. Finally, we'll sit down with our very own PaloAlto Network's Sock team lead, Matt Melon, as he discusses the importance of having a unified platform
for not only the sock, but across all security teams, including vulnerability management. So, stay tuned. You won't
management. So, stay tuned. You won't
want to miss it.
[Music] Hi everyone. Today we want to talk about
Hi everyone. Today we want to talk about XIM 3.0. We are introducing XIM 3.0
XIM 3.0. We are introducing XIM 3.0 which is a huge innovation for us here in Cortex specifically and generally in PaloAlto networks. But let's take a few
PaloAlto networks. But let's take a few steps backwards. Let's let's remember
steps backwards. Let's let's remember why we are here. The sock probably the most the noisiest area in the uh in the
organization. The sock is where things
organization. The sock is where things happen where attacks need to be blocked.
What we've identified here in PaloAlto network specifically in Cortex a while back is that um the human centered sock architecture just doesn't work. we see
the raise of or the rise in the number of alerts and uh we see the number of tools used in the sock it actually is counterproductive we've seen that and by
the way we've seen that well before the AI and the fact that we've seen AI impacting everything in security this is why we came up with the first
generation of Cortex XIM with the first generation of Cortex XI I am we were able to provide that real-time security operations that
requires that single data platform. We
were able to ingest so much data. We
were able to have internal sources, external sources all combined into one, stitch everything together, combine all the data and have our AI and analytics
run on top of this data. We all know that the result of the AI and the analytics is actually based on the data and the level and the accuracy of the
data that it can ingest with so much data available for the sock. The ability
to use then the right prioritization and to leverage the response and the automation is what made XIM so great. By
the way, it helped us get the uh the basics of XDR, CDR, the SIM, the store use cases, and that helped us really
remove away any silos, right? Take
everything in one platform. Take all the data, that unified data layer for the sock that and the unified secops all in
one tool, one UI, make sure that we can leverage the AI properly and run the automation. The results were astounding,
automation. The results were astounding, right? We were able to take the um the
right? We were able to take the um the socks efficiency MTR from days to an hour, then later on to less than 10
minutes. You know, the the way XIM
minutes. You know, the the way XIM transformed the security operations for the world's largest companies and the results were amazing, which is why we
thought it would make a lot of sense to expand XIM. And earlier this year we
expand XIM. And earlier this year we came out with the second generation of Cortex XIM. We introduced Cortex cloud.
Cortex XIM. We introduced Cortex cloud.
The cloud is a major problem and it makes a lot of sense to have it in one centralized place along with XIM. Let's
take a look for a second, right? You
have more and more applications going into the cloud with every day passing by. You have more and more exposures in
by. You have more and more exposures in the cloud.
And even though there are many many tools out there to solve this problem, you still have more and more attacks every day. Why? Let's ask ourselves what
every day. Why? Let's ask ourselves what is really required to have a good cloud solution. You need to shift left to
solution. You need to shift left to solve things as early as possible. Here
in PaloAlto Networks, it proved to reduce the level of risk in production by 92%. Then you also need to prioritize
by 92%. Then you also need to prioritize everything that you identify in production so that you can be really efficient with solving these things. And
most importantly is to be able to stop sophisticated attacks right then and there. Which is
there. Which is why we came out with Cortex Cloud. As I
mentioned, Cortex Cloud is being able to really taking everything together to that unified platform. We took
everything that we learned throughout the years with Prismacoloud and we really evolved that into a unified Cortex cloud on top of the Cortex
platform as part of XIM to really transform everything in cloud starting with appsec posture runtime protection
and even the sock the sock that never had a native cloud cloud solution to really solve what the sock would need in
the cloud. Later today, you'll hear Matt
the cloud. Later today, you'll hear Matt talk about their experience, our own sock leader, and you'll hear how this is
transformative for them to be able to really see in runtime in the sock what happened from an exposure or cloud level. This is this is the future of
level. This is this is the future of security being able to really tie together and connect all the pieces from
code to cloud to runtime and sock. Now
this in cortex also introduces the best-in-class runtime protection with years of experience and what we've done with XDR now bringing it to the cloud and tying all the pieces together. This
is the key and we are expanding this across the enterprise. We're introducing
Cortex XIM 3.0. With XIM 3.0, we are able to now take everything that we've done in the cloud and combine the peace time and the wartime across the enterprise. Being able to introduce that
enterprise. Being able to introduce that proactive security and combine it with the reactive security that is also required for organizations today. being able to
ingest once all the sources of information, follow that that cortex methodology of richness in data, applying the AI, then running the automation piece and making sure that we
can really be that force multiplier for organizations and be able to provide that holistic view and holistic solution from a platform standpoint. And with XIM
3.0, So, we're introducing the proactive security exposure management piece, being able to look at that risk level management across the enterprise, not
just cloud. extend it to the endpoints
just cloud. extend it to the endpoints and to the network and all around the um the estate of the organization and
combine it with that runtime reactive protection capabilities that email security combined with network that we already have and and the XDR level
protection that really brings everything into that XIM platform to provide organizations with everything they need to protect every single asset out there
including the entrance point, entry point with emails, as well as be able to analyze and peace time all the major threats that they have. You'll soon hear
more about those two from our product managers. Uh, and I'm excited about
managers. Uh, and I'm excited about that. I'm sure you are as well. Thank
that. I'm sure you are as well. Thank
you.
[Music] Hi, I'm G. Mazle, lead product manager for Cordex email security at Pow Auto
Networks. Today I'm going to walk you
Networks. Today I'm going to walk you through how we're redefining email security not as a standalone tool, but as a fully integrated part of the Cordex
platform. Let's start with what has
platform. Let's start with what has changed. We are in a new era where Gen
changed. We are in a new era where Gen AI has weaponized fishing. Attackers now
write emails that look and feel real, fast, targeted, and convincing. These
aren't spam. They are personalized attacks at scale. And most tools just aren't built for it. Traditional
security gateways and built-in protections follow a perimeter mindset.
If the threat gets past the perimeter, they lose visibility. And when they respond, they
visibility. And when they respond, they can only address the email, maybe the identity piece if you are lucky. Because
of that, the market is shifting to address the new gen AI challenges. More
and more customers are shifting away from legacy securement gateways and relying on native email security. It's
simple and builtin, but it still doesn't connect the dots. Modern threats don't stay in email. They move across channels, and that's the real challenge.
Now, let's be fair. Native email
security solutions like Microsoft 365 and Google Workspace do a great job handling the basics. They block spam, stop known malware, catch the obvious
stuff, but attackers have leveled up.
They're using stealth impersonation tactics, contextual language, behavioral tricks, things that don't always trigger the built-in defenses. That's where this
new class of email security comes in.
And it brings in all the he avi eaters, advanced fishing protection, account takeover detection, executive and supply impersonation, and others. And it's not
about replacing the native tools. It's
about adding an extra layer for catching the things they weren't built to see. So
let me show you what that looks like with Cordex email security. Starting
from detection through investigation to response. Beginning with the foundation
response. Beginning with the foundation data, we collect data from four core sources. email, endpoint, network, and
sources. email, endpoint, network, and identity. And here's the best part. If
identity. And here's the best part. If
you're already using Cordex, you already have the data. No duplicate connectors, no extra
data. No duplicate connectors, no extra overhead. We simply build on top of what
overhead. We simply build on top of what you already ingest. Then comes the alert defense,
ingest. Then comes the alert defense, artifact based insights that scan links and attachments, both static and dynamically. behavioral analytics that
dynamically. behavioral analytics that surface abnormal patterns related to the metadata of the emails and lastly NLM powered NLP that
reads between the lines understanding urgency tone and intent and catching the threat. That's just step one. Next comes
threat. That's just step one. Next comes
investigation. We don't just show you issues. We show you the full story of
issues. We show you the full story of the attack. In order to do that, we
the attack. In order to do that, we connect what happened, when, and to whom from different domains, including endpoint and identity. You get a full
timeline of impacted users and devices, and one clear view to work from.
Finally, everything comes together in the email command center, your centralized hub for risk visualization and response. Here, we don't just show
and response. Here, we don't just show you what's happening across users, devices, and communications. We empower
you to act with smartcore driven prioritization. Cordex highlights the
prioritization. Cordex highlights the riskiest activity and recommends the next best step. Whether it's isolating an endpoint, locking an identity, or
pulling an email, you can remediate across every surface automatically or manually all in one place. It's not just visibility. It's connected cross-domain
visibility. It's connected cross-domain defense in motion. So what makes us better you ask? Well, first off, it's built right on top of Cordex platform.
No extra deployment, no separate console. We are using the same data you
console. We are using the same data you already collect in Cordex, email, endpoint, identity, and network without duplicating anything. Second, we're
duplicating anything. Second, we're bringing LM powered analysis to really understand what's happening in the email, the tone, the urgency, the
intent. Third, we stitch everything
intent. Third, we stitch everything together. Instead of siloed issues, you
together. Instead of siloed issues, you get a connected story line from the first demo all the way to lateral movement or expiltration. And when it's time to
expiltration. And when it's time to respond, you are not jumping between tools. You are taking action from one
tools. You are taking action from one place backed by smart score with full visibility. Now, let's bring it to life.
visibility. Now, let's bring it to life.
In this short demo, you will see how Cordex detects, investigates, and responds across email, identity, and device all in one unified platform. We
begin with the email command center. On the left, you will see the
center. On the left, you will see the flow of data coming into Cordex. Whether
it's new email data or existing signals from endpoint, identities or network, we're extending the value of what you already have. From there, Cordex
already have. From there, Cordex automatically surfaces issues using detection engines built specifically for modern email threats. These are grouped
into highfidelity cases, dramatically reducing alert fatigue and helping analysts focus on what matters most. You
will also see how many cases were mediated automatically or manually based on your automation policies and how many are still ceued, fully enriched, and
ready for review. To stay ahead of evolving threats, we highlight threatening attack vectors, identify risky users using smart score, and recommend automated actions to close the
loop on threats with confidence. Now,
let's switch to the second screen, the investigation experience. This view is
investigation experience. This view is built specifically for email threats that may propagate to endpoints or identities. On the left, you get an
identities. On the left, you get an executive summary, campaign details, related issues, affected assets, and timeline context. Analysts can then dive into the
context. Analysts can then dive into the interactive graph, tracing thread propagation, actions taken, and endpoint impact. We also include a social graph
impact. We also include a social graph showing historical interactions between the sender and recipients, making communication anomalies easy to spot.
Want to examine the email itself? You
can. full subject and body, plus LLM powered insights that explain what made it suspicious right there in context. And when it's time to respond,
context. And when it's time to respond, you take action directly from this same screen with Cordex Power Automation at your fingertips. This is what modern email
fingertips. This is what modern email security looks like. Connected,
contextual, and built for the threats of today. Now that we saw what it looks
today. Now that we saw what it looks like, let's see an example of how Cordex Advanced Email Security was able to identify and remediate an email attack.
So, an email was sent to one of our beta customers external mailboxes, a highly targeted address from a previous unseen domain. It used urgency and
domain. It used urgency and impersonation tactics, claiming the recipient's account was about to expire and urging them to upgrade or visit a
support page. On the surface, nothing
support page. On the surface, nothing seem alarming. Proof point market as
seem alarming. Proof point market as safe, Microsoft scheme spam filtering, a URL, our internal static analysis engine classified the URL as benign and virus
total as just 10 out of 94 vendors flagged the link. But by combining multiple weak signals, a new sender domain, suspicious tone, urgency
language, and the fact that it targeted a sensitive role, Cordex recognized the real risk and prevented the threat from manifesting and causing greater impact.
So to wrap it up, a bad email isn't just a bad email. It's often the beginning of something much bigger. Identity
compromise, lateral movement, or even full-blown bridge. Two, legacy tools
full-blown bridge. Two, legacy tools don't see the full picture. They look at email in isolation, missing what happens next. And three, Cordex advanced email
next. And three, Cordex advanced email security changes that with LLM's multi- channelannel insights and unified response. We help you to stop threat
response. We help you to stop threat faster and smarter and it's already been into Cortex. Email is the gateway to
into Cortex. Email is the gateway to your organization. How confident are you
your organization. How confident are you that your current setup is ready to address email attacks in the edge of Gen AI? Reach out to your Palo Alto Networks
AI? Reach out to your Palo Alto Networks representative to level up your email security. Thank you for watching. I
security. Thank you for watching. I
can't wait for you to try it.
What we saw was somebody who was changing the game in terms of reinventing the way we think about the SIM technology. We look at the promise
SIM technology. We look at the promise of what we're seeking for XIM and where we're seeing the benefits. is the
ability to more effectively consolidate the visibility through all that data to make sense of it and the ability to then rapidly accelerate creating runbooks and
use cases out of that data in order to drive our response and our decision-m and the relationship between Palo Alto networks and Cognizant is one that I get to see come into real life in terms of
how we're going to transform and how we're reinvisioning our entire security program.
[Music] [Music] Hey everyone, super excited to talk about exposure management today.
Vulnerability management is very important in keeping your organization secure. It is a hard problem and
secure. It is a hard problem and enterprises put a lot of effort and time into this. The question is why? Now when
into this. The question is why? Now when
we look at what is going on with vulnerability management, it is actually failing, not helping in reducing risk to customers. Tons of vulnerabilities are
customers. Tons of vulnerabilities are published every day. No one is able to keep up with it. Most organizations have more than 100,000 vulnerabilities in
their backlog. Not only that, most of
their backlog. Not only that, most of these don't even matter.
A very few of these are actually exploitable in the wild and far fewer are exposed to internet. We see there are layer defenses that are deployed
which avoid exploitation and we see a lot lot of wasted effort in chasing the risks that don't matter. With AI, vulnerabilities have
matter. With AI, vulnerabilities have become more relevant. Now, attackers are learning to exploit these faster and
faster. The data which was published
faster. The data which was published recently shows that onethird of these vulnerabilities that were exploited in this first quarter were exploited in
less than 24 hours. Manual processes and humans
hours. Manual processes and humans cannot keep up with this pace.
We need to bring in AI and automation to help here. And that is what we have
help here. And that is what we have done. Codeex exposure management gathers
done. Codeex exposure management gathers all the context from native and third party sources, analyzes and prioritizes with
AI to identify the risks that matter to you. Not only that, connect that with
you. Not only that, connect that with existing protections and mitigations that you have deployed. then use
automation to drive full remediation. AI and automation is needed
remediation. AI and automation is needed to do all of this in near real time.
Cortex offers robust set of scanners to assess every asset across environments be it endpoint, cloud,
enterprise or OT and IoT. We also
facilitate bringing in data from third party scanners.
We take all of these data, apply analytics, specifically AI based analytics to understand the risks that matter to you, actively test them to see if they
are actually exploitable and pinpoint at the real risks that need attention today. XIM offers two parts to
today. XIM offers two parts to remediation.
One, how do I leverage automation to identify owners and follow the traditional path of patching and upgrading? This works for most of your
upgrading? This works for most of your backlog. The other path is to provide
backlog. The other path is to provide AIdriven recommendations to mitigate risk. While the traditional processes
risk. While the traditional processes may take days or weeks to patch, deploying compensating controls offers immediate protection against threats.
Let me quickly show you how this looks like in Cortex XIM. What you see here is exposure management command center. We
get data from all the native sources, pal network sources and also the third party sources. We get all of this data in this
sources. We get all of this data in this case 1.2 million vulnerabilities.
We crunch those identify what the risks that matter to you and provide you with the cases that requires your attention.
Today let's look at what goes in in identifying 479 cases from 865k unifi unique
vulnerabilities. What we do is take 1.2
vulnerabilities. What we do is take 1.2 2 million vulnerabilities. Understand
what are those duplicative findings are from various sources. Remove them from basic cases. Then looking at the
basic cases. Then looking at the remaining, we look at hey what's the most important to you? What's exposed to the internet? Look at what's highly
the internet? Look at what's highly exploitable, what has low business impact, unlikely to be exploited again.
We look at what's most important for you based on is it internet exposed, does it have any business impact, is it highly exploitable and so on so forth. And we
also provide you capabilities to dep prioritize by policy. What do we what do we mean? You could actually go back and
we mean? You could actually go back and customize and remove the vulnerabilities which you don't care.
For example, you may have an honeypot on which you don't care about vulnerabilities. You could go back and
vulnerabilities. You could go back and define that piece and remove all those vulnerabilities that don't matter to you. We give you ability to customize
you. We give you ability to customize and remove them from your backlog. When
I say all of these are dropped on the floor, they're actually not out of the system. They are still there, but it's
system. They are still there, but it's out of your view. And you could take these and export it and provide it to an auditor or anyone who wants to look at the backlog of
vulnerabilities. Now the remaining in
vulnerabilities. Now the remaining in this case the 17,000 issues here are the actual risks that matter to you. We
don't stop there. We take a quick look at these things, employ our AI based systems to understand how do we consolidate these, understand
the mitigation controls that may be existing to help provide protections to these vulnerabilities. Once you take
these vulnerabilities. Once you take this into account, we combine them based on what shared fixes they have. That
will consolidate all of your 70,000 issues to mere 500 cases.
And that's where our automation kicks in. Automation will actually put them
in. Automation will actually put them into various buckets based on what decisions it could make and only the top
items that need analysts attention today are put in required attention. What you
see here is an auditor's view where you can quickly audit what are the most important vulnerabilities that you need to take care of. It has all the high important metrics that you care about.
Meantime to triage, meanantime to resolve, how many issues you have, how many assets that are affected, so on so forth. It also provides you at a quick
forth. It also provides you at a quick bird's eye view of what are the recommended actions that you could take on each of these cases. Let's jump into
one of these case. What you see here is a recent vulnerability about Apache Tomcat.
Now our system was able to find this vulnerability. It was 15 instances of
vulnerability. It was 15 instances of them. Instead of creating 15 issues, we
them. Instead of creating 15 issues, we created one case and that case gives you all the required risk information. And not only that, when you
information. And not only that, when you look at the detail, it gives you a full causality chain. The chain tells you
causality chain. The chain tells you that hey, we were able to exploit this vulnerability from the internet using our attack surface testing technology.
Now what we found is that this particular server where the vulnerability was found has an XDR agent
on it but the XDR agent doesn't have a CV exploit protection enabled. Our
system quickly identifies that provides you a recommended action where you could actually deploy this exploit protection.
Click on this. There you go. quickly our
this. There you go. quickly our
automation system goes in deploys this profile on the agent and helps you protect against exploitation. Now at
this point what you see is this particular case has been mitigated but not remediated. The risk is
not remediated. The risk is dropped and you can take your regular steps to go and patch this vulnerability on your cycle. Hope you found this useful. Looking forward to experiencing
useful. Looking forward to experiencing it yourself. Next up, Elad Kuran and
it yourself. Next up, Elad Kuran and Matt
[Music] Mullen. So, I'm so glad that you can uh
Mullen. So, I'm so glad that you can uh be with us today. Today we have Matt with us. Matt. Hi. Hi. Oh, good to have
with us. Matt. Hi. Hi. Oh, good to have you with us. It's great to be here. Oh,
I'm glad. I'm glad. So, why don't you tell us a bit about the Palo Alto Networks sock?
Yeah. So our internal socks mission is to detect and respond to cyber attacks targeting PaloAlto networks. So we have 13 sock analysts who use a lot of automation and highfidelity threat
detections through our Cortex XIM product to run relatively lean given that we're 20,000 person company. And
just for some context, we have a pretty large public-f facing attack surface of about 200,000 public IPs and an even bigger internal attack surface with over
4 million VMs, a million containers growing about 10% every month. So
there's no shortage of interesting challenges for our van management team to tackle.
That's a lot of estate. Indeed. um why
don't you talk to us about the vulnerability management and you know some of the challenges you're facing I assume almost on a daily if not more frequent than that uh basis yeah I mean
our vulnerability management team is a separate team from the sock there's six people in it who report up to me as the senior director of security operations
and their mission is to find and communicate vulnerabilities to the right teams across our business uh so so we can get those remediated and uh bottom
line reduce risk for the company. So
with this kind of scale and vulnerability management the biggest challenges we face are number one prioritizing the right fixes and then number two uh dealing with the huge
amount of engineering work required to run our uh va management operations. So
like prioritization is really important uh to get right when you're dealing with millions of vulnerabilities. Uh and
being able to answer the question which of the vulnerabilities do I need to get fixed first to avoid an incident is really key. uh and then all of the
really key. uh and then all of the engineering uh around the data flows from the different vulnerability sources to get them in the same single repository
dduplicating them enriching them with thread intel identifying which are public facing which ones are exploitable etc is no easy task uh so frankly it's
what my uh sixperson vault management team spends a lot of their time doing you you you were as you were talking I uh all of this with six people. That's
that's pretty amazing. But I assume you have the technologies that you've used that historically um were part of um the way you addressed all this vulnerability
management requirements and and the things for you to manage that. Talk to
us about the technologies that you've been using uh throughout.
Yeah, so our our previous strategy was to basically build lots of custom tools.
So, we built our data pipelines to get all of our VM data from these disperate systems that were finding vulnerabilities into a big GCP database
where we attempted to dduplicate and enrich on the fly. It was a ton of work to build and support that. Um, it was prone to breakage. Uh, and frankly, it
was pretty frustrating that I had to build something so custom. Yeah. Not not
surprising. And you know we talking beyond this one and um one thing that I know you've already started is looking at bringing all of your vulnerability
management piece of work into XIM and kind of focusing on on looking at your best practices around your uh XM and
Cortex platform. Tell us about the
Cortex platform. Tell us about the improvements that you've been seeing in this in this process uh throughout.
Yeah. Well, we've already migrated to Cortex XIM's attack surface testing product for our public facing vulnerability scanning. Uh, it does a
vulnerability scanning. Uh, it does a really good job at identifying exploitable vulnerabilities on our public attack surface. Uh, we found it very accurate as well. We haven't found
a false positive yet, which is something very important to us. Um, and we've started to use XIM playbooks as well to automate some of our vulnerability
triage work. So, for example, our
triage work. So, for example, our playbooks confirm that the exposure is still present, retrieve the owners from the cloud tags and enforce a consistent
process for our uh, vulnerability management engineers to follow. Yeah.
So, by the way, false positives is is is a huge problem and huge pain. So I I hear you on this one and and not even to that extent to a broader extent. Can you
elaborate a bit more of how much is it really important to have everything in a unified platform and and have the vulnerability management be
a really a part of that broader sock view and your entire posture management view.
Yeah, it it is important to have everything on a unified platform because it's a simpler architecture for me and my team to maintain. So I don't want my
team going out and building custom databases and managing scripts to identify the highest priority vulnerabilities. I want a a SAS product
vulnerabilities. I want a a SAS product to handle all that engineering complexity for me. Um so having the the sock and the vulnerability management
teams using the same platform to me makes a lot of sense because number one automation we need to bring the same sort of automation focused philosophy
that's helped sock teams be successful to the vulnerability management teams and there's a lot of work for the vulner management teams to do manually. And
then number two, sock teams often need vulnerability data when they're working an incident. So I mean the first thing
an incident. So I mean the first thing that a sock incident responder needs to do in response to a cloud incident is figuring out how the compromise occurred
which could have been enabled by a vulnerability. So all this to say fewer
vulnerability. So all this to say fewer tools, less engineering and more automation is the way. So I I I hope and
I plan to transition my sixperson van management team from doing lots of data engineering toward doing more actual
vulnerability analysis and and balancing the risk uh and business needs. And to
me that is what a super mature vulnerability management team should be focusing on. And that's why I'm excited
focusing on. And that's why I'm excited about the new exposure management capabilities coming to Cortex. It's
going to bring that automation that we need to our va management operations, reduce the engineering work uh so that we can zero in quickly on what we need
to prioritize. Yeah. Um thanks for this
to prioritize. Yeah. Um thanks for this and I couldn't agree more. It could be a force multiplier for many other organizations and thanks for taking us through the journey and everything you
experience. Naturally the magnitude and
experience. Naturally the magnitude and things we have here it's huge. So many
other organizations can definitely uh learn from your experience here. So
thank you. You're welcome. Thanks.
Using a platform like XIM and the AI tools available with it will allow us to consolidate that information, identify it, respond to it much quicker. What I
love about Palo Alto Networks is they're always constantly innovating and I know that with the 3.0 version for XIM will have some great enhancements like email
security and exposure [Music] management. Well, there you have it. XIM
management. Well, there you have it. XIM
3.0 really is the only security operations platform you need. To learn
more about XIM 3.0 know and learn how it can help your organization. Reach out to Apollo Alto Network's sales representative today. Thank you for
representative today. Thank you for joining us and for trusting Palo Alto Networks to be your security partner of choice. Until next time, stay safe.
choice. Until next time, stay safe.
[Music]
Loading video analysis...