cortex logo
  • Why Cortex
  • Products
  • Solutions
  • Blog
  • Resources
  • Get In Touch
  • Request a Demo
Palo Alto Networks logo icon white arrow icon pointing left to return to main Palo Alto Networks site
Search
  • Tech Docs
AutoFocus

Tomorrow's operations depend on unrivaled threat intelligence, today

Power up investigation, prevention and response with AutoFocus

View the datasheet Watch the demo

14+

billion

Unique samples collected, processed and analyzed

7+

trillion

Granular artifacts available for analysis, correlation and context

84%


Samples tagged with context from the Unit 42 threat research team

The Bold New Vision for Threat Intelligence
Discover how Threat Intelligence is changing with Cortex XSOAR and AI Ops from Palo Alto Networks. Join us for this incredible discussion on May 25th at 9AM PT
Register Now
How AutoFocus™ works
  • High-fidelity intel sources
  • Researcher-curated context
  • Powerful granular search
  • Embedded intel everywhere
  • Custom dashboards and reporting

High-fidelity intel sources

Instant access to the massive repository of Palo Alto Networks threat intelligence crowdsourced from the largest footprint of network, endpoint and cloud intel sources.

Researcher-curated context

Enrich every threat with the deepest context from world-renowned Unit 42 threat researchers.

Powerful granular search

Rapidly analyze threats by combining more than 130 search dimensions across billions of samples and trillions of artifacts.

Embedded intel everywhere

Power up investigation and response efforts with high-fidelity threat intel, using pre-built integrations for Cortex XDR™, Demisto® and embedded intel cards for any third-party tool.

Custom dashboards and reporting

Get the insight you need with a highly customizable dashboard, reporting and alerting, all effortlessly tailored by you.

Instant access to the massive repository of Palo Alto Networks threat intelligence crowdsourced from the largest footprint of network, endpoint and cloud intel sources.
Enrich every threat with the deepest context from world-renowned Unit 42 threat researchers.
Rapidly analyze threats by combining more than 130 search dimensions across billions of samples and trillions of artifacts.
Power up investigation and response efforts with high-fidelity threat intel, using pre-built integrations for Cortex XDR™, Demisto® and embedded intel cards for any third-party tool.
Get the insight you need with a highly customizable dashboard, reporting and alerting, all effortlessly tailored by you.

AutoFocus threat intelligence architecture

Get a complimentary risk assessment
The AutoFocus Security Lifecycle Review gives you visibility into attacks against your enterprise.
Get your AutoFocus SLR
Use cases
Detection and response Supercharge your detection, investigation and response efforts with AutoFocus™ contextual threat intelligence embedded in Cortex XDR’s game-changing unified incident engine.
See more
SOAR Speed up triage and resolution of security alerts by tightly coupling AutoFocus™ threat intelligence and Cortex™ XSOAR playbooks to get a comprehensive view of the response workflow on a single screen
See more
Third-party tools Enrich any third-party tool with embedded threat intelligence available through flexible API-based intel cards and a custom feed builder.
See more
Previous UC Controls
Next UC Controls

Customer stories

SEGA Europe “The first feedback I got on AutoFocus from the security operations team was ‘I love it’. They could conduct an investigation in a very efficient manner, with the ability to look at the wallet and see what IP address its linked with, then cross-reference that with the global threat intelligence of WildFire.”

Kashif Iqbal - Head of Corporate IT and Cyber Security, SEGA Europe
Continue reading
Telkom Indonesia “We’ve spent more than US $1 million (trillions of Rupiah) upgrading our IT, including a new security operations center. We see Palo Alto Networks as the number one provider of security solutions. It has enabled us to take our security operations to a higher level. I now have complete visibility of threats, the team has become more skilled and we’re better able to focus on the development of new services.”

Sihmirmo Adi - vice president of IT Strategy and Governance, Telkom Indonesia
Continue reading
  • SEGA Europe
  • Telkom Indonesia
We provide you access to professionals
Live community Connect, share and get the latest on our products and ecosytem on our Live community portal.
Join today
Knowledge base Knowledge Base helps with common questions. Explore a wealth of knowledge at your fingertips.
Get informed
Support The Support Center allows you to register & manage your assets, and create or manage your cases.
Get support
Quick links
View the AutoFocus Privacy datasheet
View the AutoFocus Privacy datasheet
Check out Unit 42 Adversary playbooks
Check out Unit 42 Adversary playbooks
See the Utilizing Threat Intelligence Effectively video
See the Utilizing Threat Intelligence Effectively video
Watch Interview with a Threat Hunter
Watch Interview with a Threat Hunter
Listen to the “Don’t Panic” podcast – threat intelligence
Listen to the “Don’t Panic” podcast – threat intelligence

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved