Story image

Palo Alto Networks takes security logs to the cloud

18 Oct 17

Palo Alto Networks has introduced a new cloud-based logging service for customers who wish to amass large amounts of their own data from the company’s security platform, in a move to push the limited hardware capacity of legacy logging systems to the sidelines.

The company launched the new service to work best with machine learning and advanced analytics – which the company claims can be used to correlate potential threats and prevent cyber breaches.

Palo Alto Networks Next-Generation Security Platform will feed the data to organisations in a way that delivers scalable logging infrastructure without operational overheads.

According to ZK Researcher founder and principal analyst Zeus Kerravala, large overhead costs prevent organisations from efficiently collecting large amounts of data and being able to action it.

He believes that the new technology will able to deploy information quicker and “Share information between different applications and sensors, and scale their capacity on a dime, empowering them with enhanced capabilities to spot and prevent successful cyberattacks.” 

Palo Alto says that large data logs are important for organisations to be able to store, process and analyse as much data as possible in order to improve threat visibility.

The company designed its Logging Service to allow data collection without local compute and storage limitations. The ‘cloud-based approach’ also changes the economics of log data collection, making it easier to collect as much data as required.

·         Central repository for events, traffic and security logs: Logging Service provides a cloud-based central repository for context-rich logs generated by the Palo Alto Networks Next-Generation Platform.

·         Simplified operations: Logging Service simplifies the procurement, deployment and ongoing management of storage and compute infrastructure for event, traffic and security logs, eliminating the complexity of planning and operating logging capacity.

·         Increased business responsiveness: Organizations can procure and deploy logging capacity quickly via a flexible model that allows organizations to become more responsive to changes in logging needs due to unforeseen business circumstances or new compliance requirements.

·         Actionable insights: As part of the Application Framework, customers can use log data within new security applications to apply machine learning and advanced analytics, and can take security enforcement actions in concert with Palo Alto Networks enforcement points to prevent advanced attacks.

Lee Klarich, Palo Alto Networks chief product officer, says the Logging Service is the foundation for the company’s forthcoming Palo Alto Networks Application Framework.

This new offering significantly reduces the complexity and economics of log management, enabling customers to make better correlations, and effectively respond to and prevent successful cyber attacks,” he says.

The Application Framework will be part of the company’s next stage of rolling a range of cloud-based security applications.

Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.
Carbon Black: What does cybersecurity have in store for 2019?
Tom Kellerman has shared five insights for the year ahead, including a particularly bold one.
Hands-on review: The Ekster Wallet protects your cards against RFID attacks
For some time now, I’ve been protecting my credit cards with tinfoil. The tinfoil hat does attract a lot of comments, but thanks to Ekster, those days are now happily behind me.