Introducing Advanced Device-ID for Proactive Device Security and Zero Trust
Traditional network segmentation was designed for a time when networks were static, devices were predictable, and security policies rarely changed. Today’s enterprise environments look nothing like that. Attempting to secure modern infrastructure with traditional segmentation is much like asking a CPU to perform the work of a GPU. CPUs are excellent at sequential processing, but they struggle when faced with thousands of simultaneous tasks that require rapid contextual decisions. Just as GPUs revolutionized parallel processing to handle complex workloads, we need contextual intelligence to modern network security. This means moving beyond static, perimeter-based controls toward dynamic, identity- and context-aware segmentation that can adapt in real time. Instead of relying solely on where traffic originates, modern approaches evaluate who is making the request, what they are accessing, and whether the behavior aligns with expected patterns.
Traditional segmentation, however, still operates on rigid constructs such as IP addresses, VLANs, and static access rules implicitly assuming that devices remain fixed and trustworthy. This rigidity creates a dangerous gap between how networks are secured and how they are actually used. Modern threats, including ransomware, wiper malware, credential theft, and lateral movement techniques, are specifically designed to exploit this gap. Once attackers gain a foothold through phishing, credential compromise, or supply-chain vulnerabilities, they can move laterally across flat or poorly segmented networks with alarming speed. Because static controls cannot adapt to changes in device posture, ownership, or risk, compromised endpoints often continue to appear legitimate at the network layer, leaving organizations with limited visibility and delayed response when it matters most.
In an era of unmanaged IoT devices, ephemeral workloads, remote endpoints, and AI-driven attacks, security must become risk-centric continuously evaluating device identity, behavior, and trust level in real time rather than relying on static network attributes. The March 2026 Stryker incident serves as a clear example of why granular visibility and segmentation is foundational to modern resilience. In an environment where a single event can impact thousands of endpoints simultaneously, identity-centric segmentation allows an organization to localize anomalies immediately. By doing so, enterprises can maintain operational continuity across the rest of the network, ensuring that a localized incident does not compromise global uptime.
To combat these evolving threats, Palo Alto Networks is introducing Advanced Device-ID, a breakthrough in proactive risk mitigation and automated Zero Trust enforcement.
The Evolution: Beyond Basic Discovery

- Flexibility and Scalability: We leverage over 3,600 device identity and risk attributes to create tailored policies.
- Contextual Definitions: Security teams can define "Device-ID objects" by combining identity and risk parameters, such as ownership status, location, and compliance state.
- Centralized Management: Manage consistent device behaviors across the entire enterprise from a single pane of glass, reducing operational overhead.
Lessons from the Field: Proactive vs Reactive
Recent high-profile incidents,such as the Stryker breach, highlight a critical reality: attackers are increasingly adept at exploiting “blind spots” in endpoint visibility and management. These gaps often exist in unmanaged devices, stale security agents, or overlooked authentication anomalies areas where traditional reactive controls fall short. Advanced Device-ID empowers organizations to shift from a reactive posture to a proactive defense model, operationalizing these lessons to prevent similar disruptions before they occur. By applying these insights, Advanced Device-ID enables teams to build automated defenses that maintain operational continuity:
- Closing the EDR Gap: Attackers thrive on unmanaged systems. You can now create a policy that automatically grants only limited access to any managed device lacking an active XDR or EDR agent.
- Containing Compromised Credentials: If a device shows signs of credential abuse or suspicious login activity, Advanced Device-ID can automatically restrict its network access before the infection spreads.
- Risk-Adaptive Device Isolation: Automatically isolate or restrict any device flagged with a high risk score or active threat.
Intelligent, ML-Powered Segmentation
Manual rule-writing is too slow for the modern threat landscape. Advanced Device-ID uses machine learning (ML) behavioral insights to provide automated policy recommendations. This "Behavior Baseline" understands what is normal for a specific device type whether it's a corporate laptop or a critical server in the data center and flags deviations instantly.
| Use Case Category | Proactive Security with Advanced Device-ID |
| Compliance Driven | Automatically quarantine loT/OT/IT devices running End-of-Life (EoL) operating systems. |
| Identity Based | Enforce Role-Based Access Control (RBAC) by combining user identity with device identity (e.g., only Admin users on Corp-owned PCs can access the Data Center). |
| Risk Centric | Restrict Network Access and isolate the devices with active threats and exposures. |
| Operational Focused | Apply restricted access to unregistered devices that lack an official asset tag or inventory record. |

20X Efficiency with Automated Policy Acceleration
One of the most effective ways to prevent destructive attacks from spreading is strong network segmentation. In the face of an active attack or rapid lateral movement, speed is your best defense. Advanced Device-ID is designed to reduce policy creation time by 20X through automation.
By shifting from a static, IP-based approach to an Adaptive Contextual Policy model, enterprises can proactively mitigate high-priority risks while ensuring the network remains agile and resilient. Modernizing your segmentation today ensures that when high-velocity events occur, your infrastructure is already prepared to contain them.
From Visibility to Zero Trust Enforcement
Modern enterprises thrive on agility, which requires a security architecture that evolves as quickly as the business itself. As endpoints transition across networks, clouds, and remote environments, having a real-time, high-definition understanding of every asset, its identity, ownership, and security posture, is essential for maintaining a resilient defense.
With Advanced Device-ID, Palo Alto Networks enables enterprises to transform segmentation into an adaptive Zero Trust framework, one that automatically correlates device identity, risk signals, and behavioral intelligence to enforce security policies at scale. Instead of reacting after threats spread, security teams can proactively isolate compromised endpoints, restrict unmanaged devices, and enforce access based on verified device identity and posture.
The result is a faster, more resilient defense model that dramatically reduces operational complexity while strengthening protection across IT, IoT, and OT environments ensuring that every connection is evaluated not just by where it is on the network, but by what it is, how it behaves, and how much risk it introduces.
Don't wait for a disruption to realize your network is vulnerable. Secure your journey to Zero Trust today.
Ready to see what’s on your network? Schedule a Device Security Assessment to gain high-definition visibility into your asset landscape and identify opportunities for automated segmentation.
Resources
About This Document
The information provided with this paper that concerns technical or professional subject matter is for general awareness only, may be subject to change, and does not constitute legal or professional advice, nor warranty of fitness for a particular purpose or compliance with applicable laws.