Today’s security teams often spend more time testing, integrating and operating disconnected tools than actually stopping threats. This significantly increases business risk decreases efficiency. Moreover, with a greater dispersion of data across multiple locations and devices, deployment seems never ending. Security demands a new approach. Deploying the right security tools with tight integrations and automation can help alleviate the manual lift needed to operate multiple consoles and complete routine tasks. Enter Palo Alto Networks. To understand how Palo Alto Networks products protect your organization through out the attack lifecycle, this brief provides two use cases from the Rocke Group, a Chinese threat actor, first spotted in April 2018, who specializes in crypto jacking.