* [Blog](https://www.paloaltonetworks.com/blog) * [Cloud Security](https://www.paloaltonetworks.com/blog/cloud-security/) * [Data Detection and Response](https://www.paloaltonetworks.com/blog/cloud-security/category/data-detection-and-response/) * Rethinking Data Security ... # Rethinking Data Security in the AI Era [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fdata-security-ai-agentic-foundation%2F) [](https://twitter.com/share?text=Rethinking+Data+Security+in+the+AI+Era&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fdata-security-ai-agentic-foundation%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fdata-security-ai-agentic-foundation%2F&title=Rethinking+Data+Security+in+the+AI+Era&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/cloud-security/data-security-ai-agentic-foundation/&ts=markdown) \[\](mailto:?subject=Rethinking Data Security in the AI Era) Link copied By [Sharon Farber](https://www.paloaltonetworks.com/blog/author/sharon-farber/?ts=markdown "Posts by Sharon Farber") May 13, 2026 9 minutes [Data Detection and Response](https://www.paloaltonetworks.com/blog/cloud-security/category/data-detection-and-response/?ts=markdown) [Data Loss Prevention](https://www.paloaltonetworks.com/blog/category/data-loss-prevention/?ts=markdown) [Data Security](https://www.paloaltonetworks.com/blog/cloud-security/category/data-security/?ts=markdown) [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown) Data security was complex before AI came along. Between data sprawl, shadow data, multicloud chaos and legacy environments, security teams were spending most of their energy trying to keep up. Now that AI is rapidly accelerating data creation (while introducing new classes of risk) the question becomes, *How should you respond*? ## Key Takeaways * Most enterprises already use multiple data security tools, each new one adding to maintenance overhead. The answer isn't to add another point solution, It's to build a stronger foundation. * To prepare for AI-powered data security, you need three building blocks -- modern connectivity, metadata context and normalized classification. * Before automating anything, harmonize your data policies so that both humans and AI have the clarity they need to consistently and decisively act. * Agents trip up security models built around human behavior. Instead of monitoring users, apply controls to the data asset. * Agent identities don't fit traditional IAM models (e.g., shared service accounts, borrowed credentials). Ephemeral instances break attribution and least privilege. Identity-based controls, in other words, can't be your primary line of defense. * Once your foundation is in place, AI can automate high-volume, repetitive tasks so your analysts can focus on judgment calls. ## A Longstanding Problem That's Getting Worse Since the arrival of digital transformation and cloud migration initiatives, security teams have been struggling to keep a lid on their data. They have invested significant resources in tackling challenges such as [data sprawl](https://www.paloaltonetworks.com/cyberpedia/data-sprawl?ts=markdown) across clouds and on-prem environments, [shadow data that they can't govern](https://www.paloaltonetworks.com/blog/cloud-security/shadow-data-risk-mitigation/?ts=markdown), and the need for constant tuning of [classification rules](https://www.paloaltonetworks.com/blog/cloud-security/context-aware-data-classification-data-security-posture/?ts=markdown) that never quite keep pace. These efforts, however, have only been partially successful, as evidenced by continuous reports of high-profile data breaches. The arrival of AI, though, is making it even more difficult to resolve these issues. With virtually every business using AI, employees are generating more data than ever -- vibe-coded applications, AI-assisted documents, chatbot conversation logs -- and much of it is unclassified and ungoverned. At the same time, the data that feeds AI systems (e.g., training sets, RAG knowledge bases, fine-tuning datasets) needs to be secured and governed. Existing classification and governance tools weren't designed for these challenges. The current proliferation of AI agents makes matters even more complicated and represents a wild card for security teams. Non-deterministic, highly privileged and highly capable, AI agents are difficult to govern and impossible to predict. They read as well as act on data, often with minimal human oversight. And since they operate within seconds, the volume of data actions they produce dwarfs anything a human user could generate. Moreover, identity needs to be redefined. Agents often inherit human credentials or share service accounts, breaking the attribution on which traditional security models depend. Meanwhile, compliance requirements are tightening in response to these new threat classes. New standards will improve the situation over time, but they add pressure to already overburdened security teams. The sum of all these parts is untenable. ## Why More Data Security Tools Won't Solve the Underlying Problem According to the Cloud Security Alliance, [54% of organizations use four or more tools](https://cloudsecurityalliance.org/artifacts/understanding-data-security-risk-survey-report-2025) to manage data risks. Similarly, our research shows that [60% of security teams cite cloud complexity](https://www.paloaltonetworks.com/state-of-cloud-native-security?ts=markdown) as their top data security challenge. And it's easy to see why. Today, DLP tools cover networks, endpoints, email and browsers, but they require extensive manual policy configuration. DSPM solutions address cloud data risk analysis but lack advanced remediation capabilities. And what about on-premises data? Organizations continue to manage it with legacy tools that haven't kept pace with modern governance and compliance needs. IAM tools were built for human users and static service accounts, not for ephemeral, nonhuman identities that agents introduce. Forced to switch between fragmented solutions, security teams lack visibility and spend too much time maintaining tooling instead of hardening defenses. But AI-powered security tools aren't a silver bullet either. Most of them bolt AI onto the same fragmented architecture, which means they inherit its blind spots. To make matters worse, AI-driven detection without unified policies and normalized data is likely to generate more, rather than fewer, alerts. And if you're running multiple AI-enabled tools, each operating according to its own classification logic and policy definitions, you'll end up with agents that can't agree on what's sensitive, let alone coordinate a response. In the immediate term, that's a recipe for introducing even more noise. ![The multiple disconnected products orgs use to secure their data.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/05/word-image-358747-1.jpeg) Figure 1: Organizations rely on multiple disconnected products to secure their data. Given this starting point, the solution isn't to add more data security tools. While it's true that a new tool might close an important gap, the additional maintenance workload accompanying it would create the potential for other blind spots to emerge. Rather than layering incremental fixes onto an already crowded workflow, it's time to lay the foundation for the next phase of data security, one powered by AI and LLM capabilities that have yet to be fully leveraged. Today's AI capabilities should enable continuous detection of risky data activity along with automated remediation and orchestration. But to make that possible, you need modern data infrastructure, unified policies and assumptions that match today's data security reality. ## 4 Steps to Making Your Data Security Program AI-Ready To prepare your data security program for AI automation, you need a clean, well-ordered foundation. ### 1. Ensure Your Data Infrastructure Is Ready for Automation AI and LLMs leveraged for security can scale data discovery, classification and risk management across continuously shifting environments, but only if they can reach and understand your data. That means your data repositories need to be accessible through modern interfaces, including the shadow IT, departmental SaaS tools and legacy file shares that tend to fall outside of standard governance. If your tooling can't see the data, it can't protect it. But access alone isn't enough. AI also needs metadata context -- who owns the data, where it originated, how it flows between business units. Without this lineage, automated systems can flag risks but can't effectively prioritize or route them. And classification needs to be consistent. If the same sensitive data lacks structural uniformity depending on which tool or system surfaced it, an automated classifier will miss it or double count it. Normalization is what makes the difference between AI that reduces alert fatigue and AI that adds to it. ### 2. Harmonize Your Policies Most organizations maintain an accumulation of data security policies layered on top of each other, adding new rules when a tool is deployed or new regulation takes effect. The result is often a confusing patchwork of overlapping DLP rules, inconsistent classification taxonomies and remediation workflows that differ depending on which platform flagged the alert. Just like people struggle to operate effectively in fragmented environments, so does AI. If one tool classifies a document as "confidential" and another says it's "restricted-internal," an automated system has no way of knowing what response to apply. Security teams may have unwritten rules to help them resolve these conflicts, but AI won't be able to infer them. The goal is to get to a single classification taxonomy, a unified set of remediation actions for each risk level, as well as a clear escalation path. That requires mapping existing rules back to the data types and risk levels they're meant to protect and consolidating where you find overlap or conflict. It takes effort, but it's a prerequisite for any meaningful automation. ### 3. Rethink Your Security Model for Agents This step is more of a mindset shift. Traditional data security models were built around human behavior -- the assumption being that people are the ones performing data actions. AI agents break that assumption. In the current paradigm, agents rarely have clean, dedicated identities of their own. They run under shared service accounts, borrow human credentials through delegated access or spin up as ephemeral instances that existing IAM systems weren't designed to govern. Without a stable identity per agent, you need other solutions to enforce least privilege, attribute actions cleanly or revoke access when something goes wrong. An agent can browse the web, draft and send emails, call APIs, move files between systems, and take multistep actions within seconds. The behavioral patterns that monitoring tools are tuned to detect -- a sensitive document accessed repeatedly at unusual hours, for instance -- lose their meaning when the actor isn't human. To account for this, security controls need to shift from monitoring actors to protecting the data asset. The policies you define in step 2 need to follow the data through every API endpoint, MCP server and agentic workflow regardless of who or what is accessing it. ### 4. Use AI to Scale Automation Once you have accessible data, a unified policy framework and controls that enforce those policies at the data layer, AI can do what it does best. By automating repetitive, high-volume tasks, you free up your security team to focus on the judgment calls that require human expertise. ## Making AI More Than Just Another Tool The combination of fragmented tooling, AI-driven data proliferation, agentic automation and tightening compliance requirements has stretched data security teams thin. At this point, adding another point solution may do more harm than good. But AI doesn't have to be another incremental fix. Given its capabilities, it offers a real opportunity to rebuild the foundation of data security. By unifying policies and modernizing data infrastructure, security leaders can give both AI and their teams the clarity they need to act decisively. The organizations that make these investments will be better positioned to handle a new generation of threats and better able to capture the efficiency gains that AI-powered security delivers. ## Learn More Download the [Cortex Data Security Platform datasheet](https://www.paloaltonetworks.com/resources/datasheets/cortex-data-security?ts=markdown) to see how unified data security works in practice, from AI-driven discovery and classification to automated response across environments. *** ** * ** *** ## Related Blogs ### [Data Detection and Response](https://www.paloaltonetworks.com/blog/cloud-security/category/data-detection-and-response/?ts=markdown), [Data Loss Prevention](https://www.paloaltonetworks.com/blog/category/data-loss-prevention/?ts=markdown), [Data Security Posture Management](https://www.paloaltonetworks.com/blog/cloud-security/category/data-security-posture-management/?ts=markdown) [#### 5 Essential Components of a Cloud DLP Solution](https://www.paloaltonetworks.com/blog/cloud-security/dlp-components-data-loss-prevention/) ### [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [AI-SPM](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-spm/?ts=markdown), [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Data Security](https://www.paloaltonetworks.com/blog/cloud-security/category/data-security/?ts=markdown), [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown) [#### Dissecting Shadow AI to Illuminate Hidden Footprints in Your Workloads](https://www.paloaltonetworks.com/blog/cloud-security/shadow-ai-workloads/) ### [Data Loss Prevention](https://www.paloaltonetworks.com/blog/category/data-loss-prevention/?ts=markdown), [Data Security](https://www.paloaltonetworks.com/blog/category/data-security/?ts=markdown), [Data Security Posture Management](https://www.paloaltonetworks.com/blog/category/data-security-posture-management/?ts=markdown) [#### Data Knows No Boundaries, Neither Should Your Security](https://www.paloaltonetworks.com/blog/sase/data-security/) ### [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [AI-SPM](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-spm/?ts=markdown), [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown), [Identity Security](https://www.paloaltonetworks.com/blog/cloud-security/category/identity-security/?ts=markdown) [#### Is AI a New Challenge for Cloud Security? Yes and No.](https://www.paloaltonetworks.com/blog/cloud-security/ai-security-gap-cloud-models-agents/) ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Data Loss Prevention](https://www.paloaltonetworks.com/blog/category/data-loss-prevention/?ts=markdown), [Data Security](https://www.paloaltonetworks.com/blog/category/data-security/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown) [#### Eight Data Security Problems Finally Solved in the Browser Era](https://www.paloaltonetworks.com/blog/sase/eight-data-security-problems-finally-solved-in-the-browser-era/) ### [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown), [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam-2/?ts=markdown) [#### All Paths Lead to Your Cloud: A Mapping of Initial Access Vectors to Your AWS Environment](https://www.paloaltonetworks.com/blog/cloud-security/aws-initial-access-cloud-perimeter-security/) ### Subscribe to Cloud Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/ai-security?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Next-Generation Identity Security](https://www.paloaltonetworks.com/idira?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language