Palo Alto Networks launches Unit 42 MDR service

New MDR service uniquely combines Cortex XDR technology with Unit 42’s advanced threat intelligence and threat hunting.

The need for managed detection and response (MDR) is soaring as attack surfaces grow, cloud usage skyrockets and the cybersecurity skills gap widens. Palo Alto Networks has introduced Unit 42 Managed Detection and Response (Unit 42 MDR) to address this need with a new service that can offer continuous 24/7 threat detection, investigation and response. This offering brings together Palo Alto Networks acclaimed Cortex XDR with Unit 42’s industry-leading threat intelligence, which includes insights from incident response cases. Because Unit 42 MDR is built on Cortex XDR, it is optimized to not just prioritize alerts but also to massively reduce the number of alerts customers receive. This helps customers detect more suspicious activity than they would have otherwise.

 

"As cyberattacks continue to rise, many organizations are being asked to handle advanced threats with limited resources and without the right expertise. This will not lead to good results," said Wendi Whitmore, senior vice president, Palo Alto Networks Unit 42. "Palo Alto Networks Unit 42 brings a unique combination of innovative cybersecurity technologies and a world-class threat intelligence team which allows us to provide customers with rapid detection and response to critical cyberthreats.”

 

The new Unit 42 MDR service offers customers cybersecurity experts to help identify and respond to security alerts and potential threats in real time, enabling businesses to focus security operations (SecOps) personnel on other organizational security priorities. The service provides organizations with monitoring, threat hunting and response/remediation capabilities, including: 

Continuous Monitoring & Response: Security experts monitor alerts, events and indicators 24x7x365. The Unit 42 MDR team uses a mix of proprietary processes, infrastructure and enrichment to accelerate detection, response and threat hunting to help quickly stop malicious activity most likely to impact your organization.

Proactive Threat Hunting: World-class threat hunters search environments for complex attacks using deep knowledge of XDR data sources and the latest threat intelligence from Palo Alto Networks. This helps organizations stay ahead of emerging attack campaigns, malware and vulnerabilities.

Security Posture Optimization: Experts provide periodic health checks of an organization’s posture and detailed recommendations on policy changes to help facilitate addressing risks before they become issues.

 

"Cyberattacks are emerging and evolving faster than ever," said Tom Osteen, CIO, Enloe Medical Center. "Intervening and addressing threats at the earliest stage is crucial. With Unit 42 MDR we have confidence that we can quickly identify and stop malicious activity to help keep our organization safe and secure."

 

In a recent report, IDC said, “It is not a surprise to state that organizations continue to struggle with persistent security talent shortages and the rising costs to retain these scarce security resources. Security teams with already limited resources are overwhelmed by the heavy workload and responsibility.” The report also stated, “Organizations are analyzing their current risks and accelerating their security services investments to ease pressure on their teams and strengthen their overall security posture to meet the growing cyberthreats.”*Unit 42

F5 Application Delivery and Security Platform converges high-performance traffic management and...
New report from Drata shows the growing complexity of GRC and mixed sentiments on AI.
CrowdStrike has released its 2025 Global Threat Report, exposing the growing aggression of...
Cynomi’s groundbreaking module simplifies mapping services and products to client needs,...
BlackFog has unveiled its 2024 State of Ransomware Report, a detailed analysis of ransomware...
New managed service improves network visibility and automated threat response.
New research reveals evolving threat tactics, the rising role of business email compromise, and the...
Cyber Assessment Framework promises transformation, but IT leaders demand more organisational...