Palo Alto Introduces Cortex and Launches Traps 6.0

Cortex is the industry's only open and integrated, AI-based continuous security platform.

UDT’ partner, Palo Alto, has unveiled three new products that harness the power of advanced AI and machine learning to transform managed security today and in the future. Their latest products include Cortex ™, Cortex XDR ™, and Traps 6.0.™.

Cortex is the industry’s only open and integrated, AI-based continuous security platform. Cortex is a significant evolution of the Application Framework designed to simplify security operations and considerably improve outcomes. Deployed on a global, scalable public cloud platform, Cortex allows security operations teams to speed the analysis of massive data sets.

Cortex XDR™ marks the first detection, investigation and response product that breaks silos across multiple data sources. It is the first-of-its-kind detection, investigation and response product that natively integrates network, endpoint and cloud data. Cortex XDR uncovers threats using behavioral analytics, accelerates investigations with automation, and stops attacks before damage is done through tight integration with existing enforcement points.

Traps™ 6.0, Palo Alto’s endpoint security solution, preemptively blocks attacks that leverage both known and unknown malware and exploits before they can compromise your systems. The endpoint is one of the most common targets of advanced cyberattacks. Traditional endpoint protections, such as AV, cannot effectively stop the initial breach and subsequent spread of infection rendering your organization at serious risk to advanced threats.

Palo Alto Networks and UDT are staying on the forefront of cybersecurity products to ensure that customers are protected. As cyberthreats evolve, older technology allows for data to be vulnerable. Each of the products mentioned here are available now. If you would like more information on Palo Alto and how UDT can these new products into your existing network, fill out the form below!

Focus time, money, and effort on what really matters

Let’s build success together. 

More to explore

Experiencing a security breach?

Get immediate assistance from our security operations center! Take the following recommended actions NOW while we get on the case:


  1. Determine which systems were impacted and immediately isolate them. Take the network offline at the switch level or physically unplug the systems from the wired or wireless network.
  2. Immediately take backups offline to preserve them. Scan backups with anti-virus and malware tools to ensure they’re not infected
  3. Initiate an immediate password reset on affected user accounts with new passwords that are no less than 14 characters in length. Do this for Senior Management accounts as well.

Just one more step

Please fill out the following form,