New and sophisticated cybersecurity threats are continually emerging to target enterprises, utilizing multiple attack vectors and evolving entry points. In this environment, displaying accuracy and agility during incident analysis and response become critical. Unfortunately, teams are overloaded with myriad security rules and mountains of data from multiple sources. Analysts need a tool stack that primes the organization for centralized visibility over network traffic and scalable, standardized response to threats that spans across security products.
Users can now leverage Demisto’s security orchestration and automation with the network security management capabilities of Palo Alto Networks® Panorama™ for rich insight into network-wide traffic and automated threat response.
- Object handing: Automate actions on Panorama objects including addresses, address groups, services, URLs, and custom URL categories.
- Security rule management: Apply rules to Panorama objects and automate edits/updates to these rules through playbook-driven tasks within Demisto.
- Log and pcap access: Search and query log and packet capture data from Palo Alto Networks firewalls within Demisto.
- Get alerts from Next Generation Firewall (NGFW) using Cortex Data Lake by using a log forward object within Demisto.
- For response, dynamically add IPs to Panorama address groups within Demisto, without needing to commit the instance each time.
- Leverage hundreds of Demisto product integrations to further enrich data from Panorama and coordinate response across security functions.
- Run 1000s of commands (including for Panorama) interactively via a ChatOps interface while collaborating with other analysts and Demisto’s chatbot.
USE CASE #1
Automated Threat Protection and Response
When responding to alerts, time is of the essence. This time constraint is often at odds with the vast array of security products and data sources that analysts have to navigate, making context extraction and incident response a tall order. Many of these product-specific tasks, while essential to incident response, are repetitive and time-consuming, miring analysts in fatigue and preventing them from actual problem-solving.
SOCs can integrate the usage of Demisto Enterprise with Panorama for both alert ingestion and playbook-driven response. Demisto can ingest NGFW alerts through its integration with Cortex Data Lake. Once ingested, these alerts trigger playbooks that orchestrate and automate a variety of critical but repeatable actions during incident response. Highlighting a malware remediation example, Demisto playbooks can dynamically add IPs to Panorama address groups without needing to manually commit the instance each time.
If any of these actions are missed by playbooks, they can also be run in real-time from an incident’s War Room. This ensures that results are stored in a central location for further study and individual product consoles don’t need to be accessed for every task.
Demisto acts as a bridge between Panorama and other security products that a SOC may use to both quicken incident resolution and orchestrate any allied tasks that fall outside the direct purview of incident response. This ensures standardized response and updates, reduced effort and time through automation, and archived documentation for future learning.
USE CASE #2
Real-time Investigation for Complex Threats
The attacks of today are different from the attacks of yesterday, so just playbook orchestration may not be enough for response. Attack investigations usually require additional real-time tasks such as pivoting from one suspicious indicator to another to gather critical evidence, drawing relations between incidents, and finalizing resolution. Running these commands traps analysts in a screen-switching cycle during investigation and a documentation-chasing cycle after investigations end.
After running enrichment playbooks, analysts can gain greater context about the attack by running Panorama commands in the Demisto War Room. For example, running the panorama-query-logs command for an indicator can give new, actionable information that enables security teams to pivot to other indicators and identify larger attack campaigns at play.
Analysts can also run commands from other security tools in real-time using the War Room, ensuring a single-console view for end-to-end investigation. The War Room will document all analyst actions and suggest the most effective analysts and command-sets with time.
The War Room allows analysts to quickly pivot and run unique commands relevant to incidents in their environment from a common window. All participating analysts will have full task-level visibility of the process and be able to run and document commands from a unified console. They will also prevent the need for collating information from multiple sources for documentation.
We hope you found this integration overview useful. To explore Demisto in greater detail, you can download our free community edition below.