Story image

Palo Alto amplifies endpoint platform to tackle credential theft

08 Feb 2017

Palo Alto Networks has included new functionality into its security platform that now prevents theft and abuse of stolen credentials, the company announced today.

The company says credential abuse and theft are two main ways threat actors are able to compromise and move within an organisation to steal valuable assets. The 2016 Verizon Data Breach Incident Report showed that more than two thirds of organisational breaches were, at least in part, the result of stolen credentials.

While most organisations use simple passwords without multi-factor authentication to enable user access to systems, Palo Alto says these are usually the easiest ways to breach an organisation, compared to hacking vulnerable systems or using malware attacks.

The lack of effective approaches to credential phishing also hinder effective cyber protection, as they rely on employee education and classification as a phishing site before an employee encounters it.

Jeff Wilson, IHS Market’s senior research director of cybersecurity technology, says credential theft is still a major challenge worldwide.

"Palo Alto Networks is bringing to market a unique approach to intercepting the problem at the network level. When this feature is tightly integrated with identity access management solutions, organisations can make significant progress towards ending credential theft," he continues.

The new technology, available to customers worldwide, can:

  • Automatically identify and block phishing sites using machine learning
  • Prevent users from submitting credentials to phishing sites
  • Use a policy-based multi-factor authentication framework within the next-generation firewall

"We have too often seen headlines that highlight credential theft as one of the primary methods cyber adversaries use to gain access to networks, systems and assets,” comments Lee Klarich, Palo Alto Networks executive VP, product management.

For years, there has been an absence of an effective and scalable way for organisations to address this challenge. We are pleased to introduce these unique and industry-leading capabilities as part of our Next-Generation Security Platform and to deliver yet another innovation among many designed to help organisations prevent cyber breaches," Klarich concludes.

New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.