Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

How Palo Alto Networks Managed XSIAM Cut Phishing Response Time by 90%

Palo Alto Networks
04/26/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • A security organization handling 1,000+ phishing emails monthly was losing hundreds of analyst hours to manual investigation, with each incident requiring 40 minutes of review time
  • Managed XSIAM automated the entire phishing response workflow—from context enrichment and risk assessment to autonomous deletion of malicious emails across all enterprise inboxes
  • During a 10-day holiday period with the SOC offline, MSIAM autonomously blocked 10 high-severity phishing attacks and processed 400 incidents without human intervention
  • The implementation reduced mean time to resolve (MTTR) by over 90%, dropping per-incident handling from 40 minutes to 3 minutes and freeing analysts to focus on strategic security initiatives
  • The case demonstrates the shift from traditional MDR (detection and escalation) to managed extended detection and response that executes autonomous remediation at machine speed

The Manual Phishing Investigation Bottleneck

This case study examines how a mature security organization struggled with the operational burden of user-reported phishing emails. With approximately 1,000 phishing incidents per month, analysts were spending an average of 40 minutes investigating each email—a process involving header analysis, link verification, attachment detonation, sender history review, and documentation. This manual workload consumed hundreds of analyst hours monthly, preventing the security team from addressing strategic priorities like data loss prevention (DLP) implementation. The volume created not only a resource constraint but also introduced risk through analyst fatigue and the potential for human error when reviewing repetitive tasks at scale.

Automated Response with Managed XSIAM

The organization implemented Palo Alto Networks' Managed XSIAM (MSIAM) to transform phishing response from a manual ticket-based process to an automated, system-driven workflow. Rather than simply detecting and escalating threats, MSIAM executes pre-designed playbooks that pull context from Microsoft 365, evaluate user risk in real time, check IP reputation, and calculate severity automatically. When high-risk emails are identified, the system takes autonomous action—deleting malicious messages from all inboxes across the enterprise without waiting for analyst confirmation. This shift from detection-only MDR to automated response reduced mean time to resolve (MTTR) by over 90%, dropping investigation time from 40 minutes to approximately 3 minutes per incident.

Real-World Validation and Trust Building

The effectiveness of the automation became evident during a critical stress test over the holiday period. While the SOC team was offline for 10-12 days during Christmas and New Year's, MSIAM autonomously processed approximately 400 phishing incidents, identifying and blocking 10 high-severity attacks without any manual intervention. The system deleted malicious emails organization-wide, blocked sender addresses, and prevented potential compromise—all while analysts were out of office. This real-world demonstration established trust in the platform's ability to act independently at enterprise scale, proving that automation could handle both volume and critical decision-making during periods when human oversight was unavailable.

Chapters

0:00 - The 40-Minute Phishing Problem
1:15 - Volume Impact on SOC Teams
2:10 - Real-World Stats: 1,000 Monthly Incidents
3:15 - Five Steps of Manual Investigation
4:45 - Analyst Fatigue and Human Error Risk
6:10 - How MSIAM Automates End-to-End Response
7:50 - Building Trust in Automation
9:40 - Holiday Stress Test Results
11:20 - 90% MTTR Reduction and Key Takeaways

Key Quotes

0:00 "In a mature security organization, the moment you report a phishing email, an issue or some type of ticket gets created from that. That issue is typically assigned to an analyst. From there, that analyst is going to spend, on average, about 40 minutes investigating that one email."
1:48 "Before automation was implemented for the SBM team, they were essentially handling roughly 30 to 40 incidents a day, which would amount to about 1,000 a month. And per their information security team, the fact that they had to manually review 30 to 40 incidents a day actually prevented them from focusing on some of the other security efforts that they deemed as more important."
5:07 "Sometimes, you know, if you're a laptop stack, if you find yourself doing these repetitive tasks, A, you're prone to, you know, more human errors, and B, you know, you can't really get to the projects you really want to do, the stuff you really want to build. And at the end of the day, this doesn't only impact you as a, you know, as a person, right, in terms of making your work tedious and repetitive, it also prevents you from, you know, strengthening or improving the security posture of the organization that you work for."
6:41 "Instead of these user-reported phishing emails being treated as a ticket, it registered it almost as a trigger. When an email got reported, MSIAM started taking a look. They began by pulling context from Microsoft 365. The user risk began to be evaluated in real time. The IP reputation was checked. Based on the collection of all of that information, the severity would be calculated automatically."
10:31 "They came back after a week and a half out of the office and they see, I think it was around 10, 10 high severity incidents that we actually caught and completely been blocked automatically. And they essentially had no, they didn't have to do anything manually. And they went into the office and they see, oh, wow, you guys handle like, I don't know, 400 incidents over the course of a week and a half, 10 of them were true positives. And we didn't have to do anything, right? You performed the enrichment, you performed the response, you blocked the senders from our organization, you deleted the emails across all of the organization."
11:22 "The mean time to resolve dropped by more than 90%. This meant that hundreds of hours a month were being given back to the SOC. This wasn't because analysts were working faster, but because there were no longer doing work that could simply be automated, standardized and enforced at scale."
Categories:
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Email Security
  • Security Operations
  • Security Automation
  • Technical Deep Dive
  • Customer Story
  • Phishing Response Automation
  • SOC Analyst Workload Management
  • Managed Extended Detection and Response
  • MXDR
  • Security Operations Efficiency
  • Email Security Automation
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: How Palo Alto Networks Managed XSIAM Cut Phishing Response Time by 90%

              Upcoming Webinar Calendar

              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights into SaaS Data Protection from the Keepit Annual Data Report 2026
                https://www.truthinit.com/index.php/channel/1868/insights-into-saas-data-protection-from-the-keepit-annual-data-report-2026/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Detecting Cyber Attacks Before They Evolve Into Breaches with AI Insights
                https://www.truthinit.com/index.php/channel/1886/detecting-cyber-attacks-before-they-evolve-into-breaches-with-ai-insights/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implement Effective Strategies for Securing Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/implement-effective-strategies-for-securing-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Spring of Satori: A Deep Dive into 2026's Threat Landscape and Findings
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-a-deep-dive-into-2026s-threat-landscape-and-findings/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Transforming AI from fantasy to purposeful management
                https://www.truthinit.com/index.php/channel/1924/transforming-ai-from-fantasy-to-purposeful-management/

              Upcoming Events

              • Apr
                30

                Insights into SaaS Data Protection from the Keepit Annual Data Report 2026

                04/30/202610:00 AM ET
                • Apr
                  30

                  The New Economics of a VMware Exit

                  04/30/202601:00 PM ET
                  • May
                    06

                    Detecting Cyber Attacks Before They Evolve Into Breaches with AI Insights

                    05/06/202602:00 AM ET
                    • May
                      06

                      World Password Day: Strategies for Managing Your Passwords Effectively.

                      05/06/202610:00 PM ET
                      • May
                        07

                        World Password Day: Strategies for Managing Your Passwords Effectively.

                        05/07/202605:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version