Cortex XSOAR: Redefining Security Orchestration, Automation, and Response
Cortex XSOAR: Redefining Security Orchestration, Automation, and Response
400+
Third-Party Tools SIEM Tools People API
Playbook-Driven Automation
Marketplace
Threat
Alerts
Intel Feeds
{...} {...} AF
SIEM Cortex XDR Mail Other Sources ISAC Open Source Premium AutoFocus
Table 1: Standardize and Automate Processes for Any Security Use Case
Speed up deployment with hundreds of out-of-the-box (OOTB) playbooks covering a wide range
Scalable, consistent incident
of security use cases (e.g., phishing prevention, IOC enrichment, vulnerability management,
response
cloud security). A powerful software development kit allows you to build your own integrations.
Address simple use cases and complex, custom workflows using a visual drag-and-drop play-
Modular, customizable book editor with thousands of executable actions. Playbook blocks/tasks can be nested and
playbooks reused across playbooks. Real-time editing, a playground for testing playbooks, and YAML-
based sharing make playbook creation quick and easy.
Perfect balance of automation Maintain control over automated processes with manual approval tasks available as part of any
and human response playbook.
Automate incident enrichment and response across more than 400 integrations with data
Orchestration across the
enrichment tools, threat intelligence feeds, SIEMs, firewalls, EDRs, sandboxes, forensic tools,
product stack
messaging systems, and more.
Case Management
Automation of incident response needs to be complemented
by real-time investigations for complex use cases when
human intervention is required. Cortex XSOAR accelerates
incident response by unifying alerts, incidents, and
indicators from any source on a single platform for lightning- Figure 2: Cortex XSOAR phishing playbook
quick search, query, and investigation.
Indicator and incident A central indicator repository enables searches and automated indicator correlation across inci-
correlation dents from multiple sources to spot duplicates, trends, and patterns.
Flexible, customizable reports and Widget-driven dashboards and reports offer unparalleled visibility into metrics so you can cut and
dashboards dice data for your reporting needs.
The Cortex XSOAR mobile application provides dashboards, task lists, and incident actions on the go.
On-the-go incident monitoring
Mirrored connections can be created with other applications so incident updates in Cortex XSOAR
Automated mapping across
will be pushed automatically to third-party applications (ServiceNow, Jira, Slack, etc.) for auto-
integrations
mated ticketing management.
An ML-driven virtual assistant learns from actions taken in the platform and offers guidance on
Machine learning assistance
analyst assignments and commands to execute actions.
Continuous learning Auto-documentation of all investigation actions aids analyst learning and development.
Flexible, widget-driven dashboards and reports eliminate manual reporting and can be fully cus-
Streamlined, automated reporting
tomized to your organization’s needs.
Granular indicator scoring and Take charge of your threat intelligence with playbook-based indicator lifecycle management
management and transparent scoring that can be extended and customized with ease.
Best-in-class operational Boost collaboration and reveal critical threats by layering third-party threat intelligence with
efficiency internal incidents to prioritize alerts and make smarter response decisions.
Supercharge investigations with built-in, high-fidelity threat intelligence from Palo Alto Net-
Powerful native threat intelligence
works AutoFocus™ contextual threat intelligence service.
Hands-free, automated playbooks Take automated action to shut down threats across more than 400 third-party products with
with extensible integrations purpose-built playbooks based on proven SOAR capabilities.
Incident
Management
Security Phishing
Alert Sources Operations Response Enrich & Respond
Cloud Threat
Security Hunting
Vulnerability
Management
Standard Premium
Summary Value Self-Help Optimized Experience
Table 5: The Connective Fabric for Your Security Infrastructure and Teams
Feature Value
MSSPs can create playbooks and enforce policy at both the master and tenant levels, creating
True multitenancy flexibility to quickly onboard new customers, offer different levels of service, and expand into
additional management options.
MSSPs can also build custom playbooks for specific services and service levels. Inside each play-
Modular playbooks book, tool actions can be simply “copied” and reused in other playbooks at both the master and
tenant levels for efficient scaling with new customer additions.
Cortex XSOAR features built-in SLA tracking capabilities to help MSSPs guarantee timely service
SLA and team performance
outcomes to their customers. An MSSP can trigger a notification—via Slack, email, etc.—to the
tracking
analyst team to handle a timely incident before an SLA breach.
MSSPs can leverage all Cortex XSOAR capabilities as a powerful backend automation and orches-
Extensive APIs
tration enabler for their services while maintaining existing customer-facing portals.
For MSSPs, adding threat intelligence to any service to increase customer value is vastly s
implified.
Threat intelligence management Threat intelligence feeds can be compiled at the master and tenant levels to cater to different
customer types and use cases.
Physical or virtual server Linux OS: Ubuntu 16.04, 18.04; RHEL 7.x & 8; Oracle Linux 7.x; Amazon Linux 2; CentOS 7.x & 8
3000 Tannery Way © 2020 Palo Alto Networks, Inc. Palo Alto Networks is a registered
Santa Clara, CA 95054 trademark of Palo Alto Networks. A list of our trademarks can be found at
https://www.paloaltonetworks.com/company/trademarks.html. All other
Main: +1.408.753.4000 marks mentioned herein may be trademarks of their respective companies.
Sales: +1.866.320.4788 cortex-xsoar-ds-100820
Support: +1.866.898.9087
www.paloaltonetworks.com