From Exposure to Agentic Investigation: Mastering the Next-Generation of XDR
By Business Infopro
Summary
## Key takeaways - **Agentics Accelerates Triage to Minutes**: In a traditional SOC, investigating a Medusa ransomware report takes 4 hours of manual scraping IoCs and queries, but with Agentic Assistant, you paste the blog link and it summarizes, checks impact, finds matches, and isolates hosts via 1,000+ integrations in minutes. [10:53], [13:50] - **Immersive AI Guides Analysts Autonomously**: The in-context AI agentic assistant acts as a digital partner that guides analysts, suggesting next steps, providing instant breakdowns of complex incidents, and handling triage, enrichment, and containment so humans focus on strategy. [03:25], [04:42] - **Endpoint DLP Works Offline, Privacy-First**: The endpoint DLP module classifies and prevents exfiltration at the source using a single agent with 100% on-device classification, protecting data even when offline and bridging security with privacy via user-empowered real-time education. [06:12], [07:13] - **Exposure Management Cuts Noise 99%**: Unified exposure management integrates agent assessments and network visibility with AI-driven prioritization to reduce thousands of low-priority CVEs by up to 99%, pinpointing only exploitable risks across managed and unmanaged assets. [09:11], [09:22] - **CVRS Evolves Unlike Static CVSS**: Cortex Vulnerability Risk Score (CVRS) dynamically evolves based on exploits, threat intel, EPSS, and your compensating controls, unlike static CVSS, advising actions like deploying XDR agent for immediate protection. [15:21], [15:49]
Topics Covered
- AI Agents Replace Manual SOC Triage
- Endpoint DLP Works Offline
- Unified Exposure Cuts Noise 99%
- Agentics Resolves Ransomware Minutes
Full Transcript
Welcome everyone. Thank you for joining our session. My name is Yang Le Young
our session. My name is Yang Le Young and I am the director of product marketing for Cortex XDR. I'm thrilled to be joined by Yohai Katan, director of
XDR product management, and Imran Mazund, senior technical marketing manager. And together, we're exploring a
manager. And together, we're exploring a new milestone for Cortex XDR that sets a new standard for investigation efficiency, data protection, and
cross-platform defense. Our session
cross-platform defense. Our session focuses on mastering the next generation of XDR. We didn't just join the XDR category, we
pioneered it. Cortex XDR delivers a
pioneered it. Cortex XDR delivers a prevention first approach to modern endpoint defense. While our six-year
endpoint defense. While our six-year track record of continuous innovation is unmatched, we remain focused on the future, which is building the foundation
for tomorrow's AIdriven sock. Our
development is threatled. Moving from
real world intelligence to active coverage in hours, not days. We're not
just keeping pace, we're defining the future. This is the next chapter of
future. This is the next chapter of Cortex XDR. Speaking of the next chapter of Cortex XDR, you just heard from our chief product and technology officer,
Lee Clarage, and the co-founder and CEO of Koi, Amit Aserof, talked about how Cortex XDR and Koi are reinventing endpoint security. We're excited about
endpoint security. We're excited about this partnership to help our customers improve the security posture of their endpoints and more. Introducing endpoint
security that's evolved to a new standard. Cortex XDR 5.0 provides a
standard. Cortex XDR 5.0 provides a re-imagined user experience. Natively
embedded Cortex Agentics alongside advanced endpoint DLP and exposure management for Cortex XDR customers.
This helps customers accelerate time to resolution with an AI enhanced analyst experience, streamline risk prioritization with unified exposure
management, and safeguard web and endpoint activity from data leakage.
Now, I'm going to turn it over to my colleague Yohai to dive deeper into these innovations. Thanks, Yang, for
these innovations. Thanks, Yang, for this great overview and for getting us started. Now, let's dive into the actual
started. Now, let's dive into the actual new and exciting capabilities that we have introduced as part of Cortex XDR 5.0. We have been hard at work building
5.0. We have been hard at work building features that don't just add incremental value, but fundamentally change the way security teams operate from how they
investigate threats to how they manage their overall risk. A great place to start is with the evolution of the day-to-day analyst experience. With
Cortex XDR 5.0, O, we're introducing immersive AI to fundamentally accelerate time to resolution. We know analysts are often stretched thin by the sheer
complexity of modern data navigation.
We've always led the market with our ability to group issues into cases, but in 5.0, we have completely redesigned the case view to make those relationships even more visual and
intuitive. The standout feature here is
intuitive. The standout feature here is our in context AI agentic assistant. It
doesn't just provide a static summary.
It acts as a digital partner that guides the analyst, suggesting next steps and providing instant breakdowns of complex incidents. It ensures that every
incidents. It ensures that every analyst, regardless of experience level, can shut down attacks faster than ever before. But providing a better view is
before. But providing a better view is only half the battle. To truly scale the sock, we need to change how the work itself gets done. And that brings us to
the Agentics platform. This shift in workflow is embodied in the new Agentics platform which represents a move from a simple automation to a truly autonomous
workforce.
Think of this as adding a team of specialized AI agents to your sock. Our
goal is to solve the operational efficiency gap by offloading the manual repetitive tasks that consume your team's day. You cannot command these
team's day. You cannot command these agents to perform complex workflows autonomously.
Everything from initial triage and deep data enrichment to host containment.
This allows your human analysts to focus on highle strategy and threat hunting.
While agentics handles the heavy lifting of incident response at machine speed.
To understand how these agents can operate across your entire environment so effectively, let's look under the hood of the architecture. To see the brains behind this workforce, we need to
look at the underlying architecture. The
strength of Agentics lies in its connectivity.
It isn't a silo tool. It's based on a foundation of over a thousand integrations. Using a native multimodel
integrations. Using a native multimodel control plane, Agentics can execute actions across your entire stack.
Whether that's a deep email investigation or complex crossplatform forensics, these agents follow dynamic plans with built-in guard trails, allowing them to
proactively enrich cases with context or respond instantly to an analyst command.
It's about moving from searching for answers to having the solution prepared and ready for your review. While we're
automating the response to threats, we're also tightening the net around the most sensitive asset in your organization, your data. Protecting that
data is the core focus of our new endpoint DLP module, where data security becomes a native part of your detection response workflow. We've achieved this
response workflow. We've achieved this by using our existing single agent architecture, which means you get robust data protection without adding any agent
bloat to your endpoints.
This module actually classifies and prevents data excfiltration directly at the source. Because the classification
the source. Because the classification engine lives on your device, your sensitive data remains protected even when a laptop is offline or off the
corporate network. It bridges the gap
corporate network. It bridges the gap between traditional security and data privacy.
You might be wondering why we chose to integrate DLP so deeply in in the XDR console. It comes down to visibility and
console. It comes down to visibility and reducing the friction for your team. The
reason we took this integrated approach is that traditional DLP typically requires a massive amount of management overhead. Between managing cyber agents
overhead. Between managing cyber agents and constantly tuning complex policies, it can become a major administrative burden. Our approach is privacy first
burden. Our approach is privacy first and efficiency focused. By performing
100% of the classification on the endpoint, we keep sensitive data local and ensure maximum privacy.
We've also introduced user empowered controls that educate employees in real time. If a user tries to move a
time. If a user tries to move a sensitive file, they're prompted with a policy reminder, reducing accidental leaks without actually stopping business
productivity. It's one unified platform
productivity. It's one unified platform that eliminates the need for a separate clunky DLP management stack.
While protecting data is critical, true resilience starts with understanding where you are vulnerable before attack even begins. By transitioning from
even begins. By transitioning from active threats to proactive defense, we're fundamentally evolving how we handle risk. We're moving away from
handle risk. We're moving away from legacy isolated endpoint vulnerability assessments toward a unified exposure management framework. Today's security
management framework. Today's security teams are often buried in vulnerability noise because they're forced to juggle disconnected tools.
To solve this, we are integrating exposure management directly into XDR. This creates a single source of truth that combines deep agent-based
assessments from our unified cortex agent with broad network visibility. By
transitioning from active threats to proactive defense, we're fundamentally evolving how we handle risk. We are
moving away from legacy isolated endpoint vulnerability assessments toward a unified exposure management framework.
Today's security teams are often buried in vulnerability noise because they're forced to juggle disconnected tools. To
solve this, we're integrating exposure management directly into the XDR workflow.
This creates a single source of truth that combines deep agent-based assessments from our unified cortex agent with broad network visibility.
This shift allows us to move beyond an endpoint only view to provide total visibility across all vectors.
surfacing exposures on both managed and unmanaged assets. By leveraging AIdriven
unmanaged assets. By leveraging AIdriven prioritization, we can cut through the noise of thousands of low priority CVEEs and reduce that volume by up to 99%,
pinpointing only the risks that are actually exploitable. While exposure
actually exploitable. While exposure management hardens your environment, we're also continuing to push the boundaries of core detection for every operating system. Finally, we look at
operating system. Finally, we look at our major protection updates for Linux and Mac OS designed to neutralize multiffactor threats the moment they touch your systems.
New onright protection automatically scans ELF PE and macro files using local analysis and wildfire blocking malicious binaries before they can even be stored
in your environment. We're also making it easier to identify stealthy command and control behavior by spotting unusual network connections. This new detection
network connections. This new detection suite profiles network baselines for Linux and Mac OS to identify abnormal communication patterns that deviate from the norm.
Lastly, we're focused on stopping attackers from harvesting system secrets and user credentials. Using enhanced
behavioral analytics, Cortex XDR now highlights and blocks unauthorized attempts to access sensitive files or execute brute force attacks.
These updates ensure that no matter the OS, your environment is guarded by the most advanced analytics in the industry.
To see all that in action, I want to invite Enron to walk you through a demo.
>> Today, I'm going to show you the Cortex Agentex demo on XDR. It's 8:00 a.m. on a
Monday. You have barely opened your laptop when a link hits your inbox from the CISO. It's a breaking report on the
the CISO. It's a breaking report on the Medusa ransomware group. The latest
campaign is shredding through the industry and the question is already waiting for you. Are we hit? In a
traditional sock, your next 4 hours are gone. You would be manually scrapping
gone. You would be manually scrapping IoC's from blocks, writing complex queries and jumping between different consoles just to see if a specific file
hash exist in your environment. But
today with Agentic Assistant, you can accomplish that task and more in just a few minutes. Let me show you how. For
few minutes. Let me show you how. For
this demo, we configure the XDR agent in monitor mode. You open the Agentic
monitor mode. You open the Agentic Assistant and paste the blog link. Ask
the agent to summarize the medicine of block and tell you if you're impacted.
Watch the threat intel agent go to work.
It doesn't just give you a summary. It
builds a dynamic plan. You can see its reasoning process in real time. The
agent finishes its scan and the news isn't good. It found a match. One of the
isn't good. It found a match. One of the medal link hashes is currently active in an open incident. You pivot into the
case details immediately. The AI smart score hits you. 98. Smart Score is our AIdriven case prioritization engine that intelligently combines insights from
your specific environment with all the global thread data that we see to determine the appropriate risk score.
You see that the user WhatsApp has access multiple resources via SSO within a short period of time from a country where the user doesn't work. In any
other tool, this would be nine different cases. But here, it's one clear battle
cases. But here, it's one clear battle plan. Now, you need to know how far
plan. Now, you need to know how far Medusa has spread. You switch to the endpoint investigation agent. Because
this agent has elevated permissions, it can perform the deep dive forensics that used to take you hours. You ask, find every unique host this user tried to
access today. This is immersive AI. The
access today. This is immersive AI. The
agent queries the data and reports back.
Watson's account attempted to access over 250 host in the last 30 minutes.
That's not a user. That's Medusa looking for a place to drop their encrypted payload. You need to kill this attack
payload. You need to kill this attack before this start exfiltrating data to the leak site. You don't need to open your identity or EDR consoles. You tell
the assistant, "Isolate the host and disable the user." Because Cortex has over 1,000 deep integrations, the agent knows exactly what to do. It reaches out
to Octa to revoke Watson sessions and triggers the XDR agent to isolate the infected machine from the network. What
used to be a half a day crisis was resolved in just minutes. You have moved from reactive hunting to autonomous resolution with Agentics.
Now I'm going to show you the Cortex exposure management demo on XDR. Security teams today aren't suffering from a lack of data. They're suffering
from a lack of focus. You have got cloud logs in one place, scanner reports in another, and a parameter that's constantly shifting. Cortex exposion
constantly shifting. Cortex exposion management collapses those silos, gives you a unified view of your cloud, on-prem, endpoint, and perimeter risk.
Welcome to the exposion management command center. Think of this as your
command center. Think of this as your mission control. At a glance, you can
mission control. At a glance, you can see exactly where your exposure is trending and more importantly, which specific areas require your immediate attention to reduce the risk with the
least amount of effort. Now, when you move into the issues view, you're looking at your team's strategic to-do list, it's a curated queue based on
built-in best practices and your own custom internal policies. From here, you can manage vulnerabilities, and orchestrate a response. You can assign
owners, trigger automated workflows to fix the problem before an attacker even knows it's there. Now, let's look under the hood of a single issue. The
vulnerability intelligence feed enriches the issue. We don't just tell you a
the issue. We don't just tell you a vulnerability exist. We tell you its
vulnerability exist. We tell you its context. Notice the Cortex vulnerability
context. Notice the Cortex vulnerability risk score, CVRS. Unlike a common vulnerability scoring system, CVSS score
that stays the same for years. CVRS
evolves as threat actors develop new exploits or as your internal environment changes. If your team needs to defend
changes. If your team needs to defend their priorities to leadership, the why is right here. We combine CVSS, exploit
prediction scoring system, EPSS, exploit maturity, real world threat intelligence, and crucially your own compensating controls. The reality is
compensating controls. The reality is you can't always patch a server the second a vulnerability is found, but you can protect it. So in this example, the
asset is exposed because it has no protection. You are advised to deploy
protection. You are advised to deploy the XDR agent that immediately wraps the asset in a layer of prevention while your team schedules the permanent patch.
For managed assets, Cortex XDR prevents attacks in real time. If an agent is installed, but a specific prevention policy isn't toggled on to stop this specific exploit, Cortex will tell you
exactly how to flip the switch. Finally,
you might ask, is this vulnerability actually exploitable? To answer that, we
actually exploitable? To answer that, we have attack surface testing, a while other tools guess, a validates. It runs
safe benign tests based on real world attacker techniques to see if they can actually reach the target and parameter control is behaving as expected. We have
evidence of a successful test because we have proven this can be exploited. The
CVRS score automatically jumps to the top of the list. We have removed the guesswork, giving your team the absolute certainty they need to act fast. Cortex
exposure management is about giving you the clarity to see your environment through the eyes of an attacker and the tools to shut them out before
they ever get a foot in the door. Now
I'm going to talk about Cortex endpoint DLP and I will do a demo of that.
The modern workspace has evolved but legacy DLP hasn't kept up.
It is failing the sock because it's blind to the tools users actually use today like generative AI apps and P2P
encrypted private instant messaging tools like Telegram.
Let me show you how Cortex endpoint DLP is uniquely architected to secure this modern workflow. Let's get right into a
modern workflow. Let's get right into a DLP issue on Cortex XDR. Instead of hunting through logs, you get the full story immediately. You can see the major
story immediately. You can see the major assets related to this issue. Instantly
identifying the specific user involved and the exact file in question. And
looking at the user activity, we can see exactly how the prevention played out.
The user was presented with a data leak violation dialogue. the action was
violation dialogue. the action was blocked and they accepted that notification meaning the education loop is working. Below that you see precisely
is working. Below that you see precisely why it was blocked. You can view the specific data profiles that triggered the detection and the exact indicators
found within the file. In this case, it is sensitive email address. You can even see the mask snippet of the data right here in the console for instant verification. And if you need to go
verification. And if you need to go further, you have the option to retrieve the full file for a deeper forensic analysis. You have all the context
analysis. You have all the context needed to understand the attempted data leak. Let's look at another issue. A
leak. Let's look at another issue. A
user attempted to upload sensitive data to a private cloud drive such as their iCloud drive in violation of the organization data policy. We can clearly see the specific data patterns that
triggered the blog. financial report
containing banker routing numbers. As
before, this action was blocked instantly and the user was notified immediately. Now that you have seen the
immediately. Now that you have seen the issue, let's look at the rule behind it.
This is where our solution really stands out. Our robustness in terms of data
out. Our robustness in terms of data profile and our extensive catalog of web applications make policy creation incredibly powerful. Take a look at this
incredibly powerful. Take a look at this rule here. The summary tells you exactly
rule here. The summary tells you exactly what it does in plain English. It's
simple, intuitive, and gives you complete clarity on your security posture without needing to decipher complex logic. Now, let's see what the
complex logic. Now, let's see what the end user actually experiences. When they
attempt to upload sensitive data, for example, to iCloud Drive, the response is instant. They receive a block message
is instant. They receive a block message that explicitly explains why the action violates the organization's policy, turning a security block into a
teachable moment. But we also know
teachable moment. But we also know businesses need to move fast. Let's look
at a scenario involving chat GPT. When
the user attempts to upload a document, they receive the educational notification. However, we prioritize
notification. However, we prioritize business continuity. If this is a
business continuity. If this is a legitimate task, the user has the option to overwrite the block and provide a justification and complete the upload,
ensuring that the security never becomes a bottleneck.
Cortex endpoint DLP secures the modern workflow where legacy tools fail. From
blocking risky gen AI apps to unify investigations with XDR and educating users in real time, we give you complete visibility and control without slowing
down the business.
To learn more about XDR, reach out to the sales representative for a P.
Thank you for watching.
Loading video analysis...