The leading financial investment company wanted to secure the endpoints within their environment by following security guidelines for Palo Alto Networks Cortex XDR.

As a trusted partner, Infosys developed, provisioned, built, configured and deployed the the security architecture across environments, networks, infrastructure, software, and tools. Thereby providing security services for the modernized environment to comply with client’s security policies and standards.

Key Challenges

  • Absence of tools to secure endpoints from behavior-based, signature-based, ML-based threats and exploits
  • Lack of a real time verdict update mechanism and integration with cloud-based malware analysis service
  • Unable to identify malicious activities in client’s environment due to no threat detection engine updates
Line

The Solution

Best-in class endpoint detection

  • Deployed Cortex XDR agent, that fulfilled the most rigorous endpoint security needs, including EDR, next-generation AV, and legacy AV replacement
  • Cortex XDR natively integrated endpoint data lake in client’s environment
  • Analyzed the data with machine learning-based behavioral analytics and with custom rules to generate high-signal alerts
  • Integration of Cortex XDR solution with Palo Alto Networks Wildfire to automatically prevent threats found on the network/ endpoint (from tens of thousands of customers) across the globe
  • Deployed Cortex XDR agent, part of Cortex XDR, to detect and response to security threats across network, endpoint, and cloud
  • Established a secure connection with XDR, routed endpoints from Airgap Subnet, collected and forwarded logs and files for analysis
Line

Benefits

Detecting stealthy threats with Cortex XDR

Prevented malware, exploits and suspicious activities across multiple systems

Prevented malware, exploits and suspicious activities across multiple systems

Uncovered attacks by implementing Palo Alto Network Cortex XDR

Uncovered attacks by implementing Palo Alto Network Cortex XDR

Protected critical stages of the attack lifecycle for online and offline users

Protected critical stages of the attack lifecycle for online and offline users