autofocus - boll engineering ag · pdf fileway to prioritize, analyze, and correlate threat...

2
Palo Alto Networks | Datasheet 1 Priorize alerts for advanced aacks that require immediate aenon. Understand context around aacks, adversaries, and campaigns; including targeted industries. Respond proacvely to threats and prevent future aacks. The current state of threat intelligence has turned into a perpetual cycle of adding more and more detecon-focused data, inundang security teams with alerts and clogging an organizaon’s abil- ity to quickly respond to the most crical aacks. We are entering a new era where idenfying unique, targeted aacks requires priorizing threat intelligence and making it aconable, versus simply adding more of it. Priority Alerts With security teams oſten stretched thin, it isn’t possible to follow up on every aack. AutoFocus allows you to disnguish the most important threats from everyday commodity aacks with priority alerts based on indicators associated with adversaries, campaigns, malware family, or tool set via “tags”. These tags are created by Unit 42, the Palo Alto Networks threat intelligence team, and by your own organizaon and the global community of AutoFocus researchers. Tags Tags enrich your visibility into the most crical threats with contextual intelligence on aribuon, campaign, malware family, and tool sets used. They can be created for any host or network-based indicator in AutoFocus, alerng you when a specific threat has been observed in your organizaon or industry. In addion to priority alerts, all tags are searchable, allowing you to instantly pivot to associated malicious samples. Three AutoFocus tag types are avail- able: Unit 42 tags: The Palo Alto Networks Unit 42 research team connuously idenfies new threats, campaigns, and adversary groups, providing you priorizaon and context without any addional effort. Private tags: Sets of indicators cre- ated by your team based on original research or your own threat intelli- gence, alerng you to events crical to your network, and only visible to your team. Public tags: Security teams can create, share, and use tags from the AutoFocus community, leveraging the collecve insight of researchers and incident responders around the world and within your industry. Unit 42 Threat Intelligence Team Unit 42 is the Palo Alto Networks threat intelligence and research team, made up of accomplished cybersecurity researchers and industry experts. Unit 42 gathers, researches, and analyzes new threats, providing insights into the latest adversary groups and campaigns and sharing them with Palo Alto Networks customers and the broader security community. Unit 42 adds expert human intelligence to Auto- Focus by creang tags based on their research and open-source intelligence, providing context and priorizaon for idenfied threats. AutoFocus is one of the primary analysis tools Unit 42 uses to idenfy new threats, correlate global Aconable Intelligence Palo Alto Networks ® AutoFocus threat intelligence service reimagines how security teams protect their organizaons from unique, targeted aacks. The hosted security service provides the intelligence, analycs, and context required to understand which aacks require immediate response, as well as the ability to make indicators aconable and prevent future aacks. AUTOFOCUS

Upload: vucong

Post on 15-Mar-2018

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: AUTOFOCUS - BOLL Engineering AG · PDF fileway to prioritize, analyze, and correlate threat intelligence—they need a way to ... AutoFocus can also export indicators to third-party

Palo Alto Networks | Datasheet 1

• Prioritize alerts for advanced attacks that require immediate attention.

• Understand context around attacks, adversaries, and campaigns; including targeted industries.

• Respond proactively to threats and prevent future attacks.

The current state of threat intelligence has turned into a perpetual cycle of adding more and more detection-focused data, inundating security teams with alerts and clogging an organization’s abil-ity to quickly respond to the most critical attacks. We are entering a new era where identifying unique, targeted attacks requires prioritizing threat intelligence and making it actionable, versus simply adding more of it.

Priority AlertsWith security teams often stretched thin, it isn’t possible to follow up on every attack. AutoFocus allows you to distinguish the most important threats from everyday commodity attacks with priority alerts based on indicators associated with adversaries, campaigns, malware family, or tool set via “tags”. These tags are created by Unit 42, the Palo Alto Networks threat intelligence team, and by your own organization and the global community of AutoFocus researchers.

TagsTags enrich your visibility into the most critical threats with contextual intelligence on attribution, campaign, malware family, and tool sets used.They can be created for any host or network-based indicator in AutoFocus, alerting you when a specific threat has been observed in your organization or industry. In addition to priority alerts, all tags are searchable, allowing you to instantly pivot to associated malicious samples.

Three AutoFocus tag types are avail-able:

• Unit 42 tags: The Palo Alto Networks Unit 42 research team continuously identifies new threats, campaigns, and adversary groups, providing you prioritization and context without any additional effort.

• Private tags: Sets of indicators cre-ated by your team based on original research or your own threat intelli-gence, alerting you to events critical to your network, and only visible to your team.

• Public tags: Security teams can create, share, and use tags from the AutoFocus community, leveraging the collective insight of researchers and incident responders around the world and within your industry.

Unit 42 Threat Intelligence TeamUnit 42 is the Palo Alto Networks threat intelligence and research team, made up of accomplished cybersecurity researchers and industry experts. Unit 42 gathers, researches, and analyzes new threats, providing insights into the latest adversary groups and campaigns and sharing them with Palo Alto Networks customers and the broader security community. Unit 42 adds expert human intelligence to Auto-Focus by creating tags based on their research and open-source intelligence, providing context and prioritization for identified threats. AutoFocus is one of the primary analysis tools Unit 42 uses to identify new threats, correlate global

Actionable Intelligence

Palo Alto Networks® AutoFocus™ threat intelligence service reimagines how security teams protect their organizations from unique, targeted attacks. The hosted security service provides the intelligence, analytics,and context required to understand which attacks require immediate response, as well as the ability to make indicators actionable and prevent future attacks.

AUTOFOCUS

Page 2: AUTOFOCUS - BOLL Engineering AG · PDF fileway to prioritize, analyze, and correlate threat intelligence—they need a way to ... AutoFocus can also export indicators to third-party

data, identify connections between malicious samples, and build adversary or campaign profiles. You can view Unit 42’s latest research found with AutoFo-cus here.

SearchThe Palo Alto Networks platform is the leader in preventing unknown attacks. However, responding to unique, target-ed threats often requires human analy-sis. In the case of an active or ongoing compromise, the speed of investigation and ability to meaningfully correlate data is critical. AutoFocus provides a powerful searching capability down to the artifact level for threats found both within your network and across public global data. AutoFocus allows you to build sophisticated multilayer searches at the host and network-based artifact level, and target your search within industry, time period, and other filters, allowing you to make previously unknown connections between attacks, and pivot across your intelligence.

Statistical Analysis EngineAutoFocus performs an innovative statistical analysis that correlates billions of artifacts across a global data set, bringing forward unique Indicators of Compromise (IOCs) likely associated with targeted attacks. The service automatically applies a unique visual weighting system to identify unique and critical IOCs, guiding analysis and incident response efforts down the most relevant path.

Proactively Respond to Unique, Targeted AttacksSecurity teams require more than a way to prioritize, analyze, and correlate threat intelligence—they need a way to transform it into actionable controls and prevent future attacks. AutoFocus

allows you to create protections by directly exporting IOCs from AutoFo-cus malware analysis into Palo Alto Networks security devices by lever-aging PAN-OS® Dynamic Block Lists. AutoFocus can also export indicators

to third-party security devices via a standard CSV format. Security teams can use AutoFo-cus to identify unique, targeted attacks facing their organiza-tion, and take direct action to mitigate and prevent them.

AutoFocus Architecture and Intelligence SourcesAutoFocus is built on a large-scale, distributed computing environment hosted in the Palo Alto Networks threat intelligence cloud. Unlike other solutions, the service makes threat data accessible and actionable at the IOC-level, going beyond showing summarized logs from multiple sources in a dashboard. AutoFocus has un-precedented visibility into the threat landscape, with the collective insight of thousands of global enterprises, service providers, and governments feeding the service. The service correlates and gains intelligence from:

• WildFire, the industry’s largest net-work sandbox service

• PAN-DB URL filtering service

• Palo Alto Networks global passive DNS network

• Unit 42 threat intelligence and research team

• Third-party feeds, including closed and open-source intelligence

AutoFocus turns hundreds of millions of sessions, hundreds of millions of samples, and billions of artifacts into actionable intelligence that is relevant to your organization.

Maintaining PrivacyAutoFocus is built with strict privacy and security controls in place. The

service only allows authorized users to view data associated with their organization, with an optional “opt-in” mechanism to share data with other users. AutoFocus does not allow access to any customer files within the service, and only provides analysis results for samples observed in your network with-out disclosing the original file content. All access to the service is done over a secure, encrypted connection. AutoFo-cus is hosted in a secure cloud-based environment that is monitored and protected by Palo Alto Networks.

AutoFocus RequirementsAutoFocus is offered as a hosted security service that does not require any configuration changes to your Palo Alto Networks next-generation firewall. In order to use the service, you need to own at least one Palo Alto Networks firewall, and it does not impose any additional performance impact to the device. As AutoFocus is not hardware dependent, and does not require any changes to the device, there is no specific PAN-OS software version or additional hardware needed. We recommend being a WildFire subscriber (PAN-OS 4.1 or higher), in order to take full advantage of AutoFocus.

Licensing InformationAutoFocus is offered as a per-seat annual subscription. Please contact your Palo Alto Networks partner or reseller for additional licensing information.

4401 Great America ParkwaySanta Clara, CA 95054

Main: +1.408.753.4000Sales: +1.866.320.4788Support: +1.866.898.9087

www.paloaltonetworks.com

© 2015 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our trademarks can be found at http://www.paloalto networks.com/company/trademarks.html. All other marks mentioned herein may be trademarks of their respective companies. PAN_DS_USGSS_082115

THOUSANDS OF USERS

MILLIONS OFCATEGORIZED

URLS

MILLIONS OF SAMPLESPER DAY

TENS OF THOUSANDS OF

UNIQUE MALWARE PER DAY

THREAT INTELLIGENCE

CLOUD