The added value of Artificial Intelligence for your firewall

A traditional firewall, even with automated response features, can only act on the bad rating of a threat. Sometimes, individual behaviors may seem non-malicious, but if they are seen over time, they might be part of a multi-step intrusion. They are often used by attackers to perform automatic reconnaissance with the goal of finding valuable resources.

A Next-Generation Firewall with AI protects you against:

  • Silent, stealth usage of compromised endpoints;

  • Risky behavior leading to intrusions because of human errors;

  • Malicious insiders having months of low profile damageable activity, after a sudden change of behavior;

  • Targeted attacks typically multi-staged and looking for valuable data, and the costliest at the end;

  • Slow investigation, with manual endpoint forensics, takings days or weeks to block threats;

  • Detection and response solutions just don’t work because they are not based on big data that depend on fast software release cycles and because they are based on manually defined correlation rules, hard to develop and giving high rates of false positives

AI automates and orchestrates security analysis by:

  • Integrating metadata of collected logs of the firewalls and applying attack detection algorithms to them to uncover risky behaviors;

  • Defining device and user profile in order to have a baseline which is specific enough;

  • Automating investigation steps by automatically gathering more information, using Wildfire to analyze suspect executables implied and hunting the impacted systems in the customer environment;

  • Automating response to Palo Alto Networks’ firewalls by blocking compromised devices and restricting access to uncovered malicious sites.

Palo Alto Networks Magnifier – Behavioral Analytics based on AI

Palo Alto Networks’ Magnifier is an application framework allowing for hunting down and stopping attacks quickly with cloud-delivered analytics and machine learning.

Magnifier uncovers malicious actions by identifying anomalies that indicate active attacks. This is done through user and device behavior analytics. The rich data that is collected from the Next-Generation Security Platform, which has attack detection algorithms, allows you to detect post-intrusion activity with precision.

Features of Magnifier Behavioral Analytics:

  1. Collect the rich network, endpoint and cloud data needed for behavioral analytics without deploying new network appliances or agents with Palo Alto Networks’ Logging Service.
  2. Accurately identify advanced targeted attacks, malware, malicious insiders and compromised endpoints with supervised and unsupervised machine learning.
  3. Rapidly confirm threats by reviewing actionable alerts with investigative detail and leverage the Next-Generation Firewall to block threats before the damage is done.

As depicted above, once a malware has been installed, the next stages of the attack might consist of allowed operations that look innocent individually.

However, machine learning can help detect those changes in behavior (e.g. more connections to more servers, or much bigger traffic to the same server), and fire an alert while automatically analyzing which elements are used for that attack and remediating it on the firewall level.

Is your firewall configured according to current security best practices?

Palo Alto Networks developed a Best Practice Assessment tool to verify this.

Read more

Your Next-Generation firewall as Zero-Trust framework enabler?

How do you transfer your security policies to the cloud? Do you have a ‘single pane of glass’ for your entire perimeter?

Read more

Does your firewall already have an extension to the cloud?

Palo Alto Networks developed a Best Practice Assessment tool to verify this.

Read more

Is your firewall Artificially Intelligent?

Can you automatically detect whether your users or IoT devices have strange behavior? Do you know when your network undergoes a cyberattack?

Read more

Are all security functionalities active on your firewall?

Have you activated all software licenses?

Read more

Does your firewall support PAN-OS9.0 or higher?

Do you know the latest features for your Palo Alto Networks firewall? Can your Palo Alto Networks firewall support the latest PAN-OS version?

Read more

What information does your firewall have for your CISO?

Which questions from your CISO can you easily answer?

Read more