* [Blog](https://www.paloaltonetworks.com/blog) * [SASE](https://www.paloaltonetworks.com/blog/sase/) * [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/) * The Unified SASE Advantag... # The Unified SASE Advantage: Top 3 Reasons to Converge SD-WAN \& SSE [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fsase%2Fthe-unified-sase-advantage-top-3-reasons-to-converge-sd-wan-sse%2F) [](https://twitter.com/share?text=The+Unified+SASE+Advantage%3A+Top+3+Reasons+to+Converge+SD-WAN+%26%23038%3B+SSE&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fsase%2Fthe-unified-sase-advantage-top-3-reasons-to-converge-sd-wan-sse%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fsase%2Fthe-unified-sase-advantage-top-3-reasons-to-converge-sd-wan-sse%2F&title=The+Unified+SASE+Advantage%3A+Top+3+Reasons+to+Converge+SD-WAN+%26%23038%3B+SSE&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/sase/the-unified-sase-advantage-top-3-reasons-to-converge-sd-wan-sse/&ts=markdown) \[\](mailto:?subject=The Unified SASE Advantage: Top 3 Reasons to Converge SD-WAN \& SSE) Link copied By [Noah Williams](https://www.paloaltonetworks.com/blog/author/noah-williams/?ts=markdown "Posts by Noah Williams"), [Srudi Dineshan](https://www.paloaltonetworks.com/blog/author/sdineshan/?ts=markdown "Posts by Srudi Dineshan") and [Harsha Srinath](https://www.paloaltonetworks.com/blog/author/harsha-srinath/?ts=markdown "Posts by Harsha Srinath") Apr 30, 2026 9 minutes [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown) [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [AI-powered Prisma SASE](https://www.paloaltonetworks.com/blog/tag/ai-powered-prisma-sase/?ts=markdown) [Prisma Access](https://www.paloaltonetworks.com/blog/tag/prisma-access/?ts=markdown) [Prisma SD-WAN](https://www.paloaltonetworks.com/blog/tag/prisma-sd-wan/?ts=markdown) ## The Shift from Piecemeal to Platform: Why Unified SASE Wins At Palo Alto Networks, we see our clients deploy our SASE technologies sometimes all at once, and sometimes piece by piece. These transformations are prioritized based on individual organizational requirements, contract end dates, and all too often, fighting [Conway's Law](https://en.wikipedia.org/wiki/Conway%27s_law) in order to unify networking and security teams. Our clients end up in a piecemeal architecture, under the guise of "defense in depth" or "best of breed", ignoring the lackluster security outcomes and operational inefficiencies incurred along the way. ### Moving Beyond Security Debt In a world of AI-driven threats combined with persistent business needs for digital agility, a piecemeal architecture isn't just inefficient, it is security debt that your organization can no longer afford to carry. The goal shouldn't just be integration, it must be platformization. When examining a secure enterprise branch architecture, the need for a unified SASE solution is even clearer. Gartner® is now approaching their fourth year of defining [Single-Vendor SASE](https://start.paloaltonetworks.com/gartner-sase-mq-2025) as a converged platform, signaling the end of the era where SASE was merely a potpourri of branch capabilities. From an industry adoption standpoint, the majority of organizations are still only beginning their unification journeys. When it comes to modernizing your branch architecture, below are three reasons why you should choose a unified SASE approach. 1. Security: The Foundation of the Zero Trust Branch ---------------------------------------------------- The *network* is the first line of defense of *network security* . A good network engineer can find a way to route, tunnel, or reverse proxy through most security controls. Attackers leverage these same weak points in the network to gain and exploit access to your infrastructure. ### Converging the Security Fabric A unified SASE solution secures all network traffic, protecting every packet from the source to a multitude of destinations. Full security is achieved by converging networking and security into a single, cohesive fabric rather than a series of disconnected checkpoints. Network and security components are pre-integrated and managed centrally, enabling rapid error-free adoption, delivered as a service. Truly unified SASE solutions like [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) leverage common policy constructs across both network and security control points. ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/fig1.png) *Figure 1: Prisma SASE Unified Architecture* ### Strategic Branch Segmentation For most enterprises, their chosen architecture is to deploy intelligent, lightweight controls at remote branches for immediate local protection while leveraging scalable cloud delivered SSE components for more sophisticated security controls (SWG, CASB, and DLP). Below is a high-level outline of this approach. * **Segment the branch:** Intra-branch segmentation is the foundation of branch security, providing segmentation between networks (e.g. Guest and IOT). If needed, application pinholes are built between zones. Baseline path policy is established to dictate which network segments use which WAN paths and associated security control points. * **Implement comprehensive security controls:** Least-privileged access rulesets composed of user, application, and device identities minimize risk across the entire transit path. Below are some common examples: * Guest traffic is sent direct out local internet links, excluding 5G/LTE, at the lowest priority, except for zoom and company website traffic, which receive elevated priority. URL filtering is applied to block objectionable content, and threat prevention, and DNS security are enabled to prevent malicious and C2 traffic. * Authenticated corporate users traffic is sent via redundant tunnels to the closest SSE cloud for full inspection. Traffic is decrypted, CASB/DLP and precision AI controls are applied, and advanced enterprise-grade threat, URL, and DNS prevention takes place * IOT devices are segmented into their own VLANs and [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) is activated to further protect this specialized device class. IOT devices are individually identified and evaluated based on known vulnerabilities against device types and firmware levels. Using a universal IOT catalog, traffic is analyzed and least-privileged access policies are automatically applied based on traffic patterns and known device targets, protecting your enterprise from one of the most vulnerable device classes. * **Continuous inspection:** Once applications, users, and other destinations are permitted, traffic is continuously inspected (including threat prevention, DNS Security and URL Filtering) to ensure that authenticated access is used appropriately, regardless of the user's location. For traffic flows that demand additional inspection, Prisma Access SSE is leveraged, where a scalable suite of comprehensive security protects all traffic flows in your organization. * **Observe and react:** A common data lake for all events is used to further identify anomalies and fine-tune controls, for both network and security use cases. Operators diagnose and monitor events from a common console, covering branch SD-WAN, SSE, and datacenter NGFW infrastructure, locally and globally. 2. Performance: Building a Resilient Network -------------------------------------------- A typical branch SASE architecture today uses one of two approaches, each with their own shortcomings: ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/fig-2.png) *Figure 2: Multi-vendor SASE Tunnels: Manual, Active-backup, and Slow to Converge* ### Multi-vendor standards-based SASE tunnels approach In this architecture, the SD-WAN edge maintains persistent tunnels between the branch and the SASE solution. While the tunnels are easy to turn on and use standard protocols (IPsec and GRE), their keepalive timers are set too generously to respond quickly enough in the event of a tunnel failure, turning them into dumb pipes. Additionally, these tunnels also don't offer any last-mile protections that more robust SD-WAN tunnels provide. The result is an unreliable network, a downgrade when compared with a standard SD-WAN hub-and-spoke architecture. ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/fig-3.png) *Figure 3: Shortcomings of a Client-driven Cafe Model Architecture* ### Client-driven approach In a client driven approach, managed endpoints use locally installed clients and proxy configurations to steer traffic to the SSE. Then, the SD-WAN CPE typically uses IP-based rules to send this traffic directly over local internet connections. With this simple cafe-style design, [drawbacks emerge](https://www.paloaltonetworks.com/blog/sase/examining-the-coffee-shop-model-and-sase/#:~:text=With%20the%20coffee%20shop%20model,%3A%20uncontrolled%2C%20unrestricted%20and%20unreliable.?ts=markdown) as the SD-WAN layer has limited visibility into the end user traffic and all client traffic looks identical. Because of this limited visibility, it can become impossible for the network to prioritize between revenue generating business apps, such as collaboration, ERP, and EHR systems, and low priority streaming traffic, such as YouTube and operating systems updates. Without tunnels in play, the SD-WAN CPE blindly load balances across links. The network path is also less robust; if the SD-WAN layer does change branch Internet paths, the change is disruptive because client tunnels need to be reestablished from new source IP addresses. Finally, this approach doesn't secure all traffic within the branch. Unmanaged, IoT, and headless devices all follow standard network routes, typically to a datacenter hosted firewall. ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/fig-4.png) *Figure 4: Prisma SASE, A Robust Unified Architecture* ### Unified Performance Advantage The solution to an incomplete cafe model is a unified SASE architecture that addresses the shortcomings of the previous SASE branch designs. When clients connect on-site, the clients detect that they are on a customer-managed network, and receive a secure and performant on-premises experience. This architecture auto-creates robust tunnels from the branch to the SSE layer, providing last mile performance protections, rapid failover, zero-touch SSE connectivity, application defined path selection, application performance SLAs, and application acceleration. SD-WAN App-ID and User-ID policy rules drive path selection between direct Internet, SSE, and datacenter bound flows, consistent with business policy, enabling a seamless high performance experience for users and endpoints of all types. The result is performant control over every application session, enabling seamless and scalable operations that align to dynamic business needs. ## **3. Efficiency: Precision AI and Autonomous Operations** Operationally, managing disparate SASE components is clunky on the best of days and a revenue impacting outage nightmare on the worst of days. Differing policies, vendors, control points, and data sources all snowball into an unmanageable mess, impacting the bottom line as well as our nights and weekends. Unified SASE solutions streamline all aspects of the operational lifecycle, even more so with AI. A unified SASE architecture delivers the following operational benefits: ### Total end-to-end observability Native, end-to-end observability eliminates the blind spots and guesswork that cause operational inefficiencies. A unified architecture provides a single dashboard to monitor the entire enterprise footprint. Whether it is a mobile user or a branch-based IoT device, unified SASE delivers visibility to the device, across the last mile, through the SASE fabric, and ultimately to the application itself. ADEM (Autonomous Digital Experience Management) further enables autonomous troubleshooting across each component. We saw one global management consulting firm reduce their troubleshooting workflow from forty-two steps down to just three by enabling built-in ADEM functionality. ### Consistent telemetry and a unified data lake Consistent logging and telemetry collection of network and security events and flow data allows all of your data to be accessible quickly, in one place. By unifying event, performance, user, device, and application identities across all components, the result is a single easy to query structured dataset. A unified data lake is the foundation for operational automation, and is the starting point for any workflow optimization project. ### Unleash your AI-powered optimizations Once you've got a unified data lake, it acts as a springboard for innovation using the latest technologies: * [**AI-powered Copilot Chatbots:**](https://live.paloaltonetworks.com/t5/community-blogs/how-prisma-sd-wan-ai-transforms-network-operations-strata/ba-p/1248705) Chatbots are now fully enriched with diverse and comprehensive datasets, contextualized to each user. These datasets include documentation, alarm data, performance data, configurations, and user history. Natural language queries to chatbots, seeking both simple and complex responses, can now be completed quickly, reducing mean time to resolution. Both novices and experienced team members alike gain immediate insights from previously unwieldy intertwined datasets, reducing time to resolution for a multitude of incident types. * [**AI Canvas**](https://live.paloaltonetworks.com/t5/community-blogs/how-prisma-sd-wan-ai-transforms-network-operations-strata-ai/ba-p/1250293): On-demand AI-built reports, including those from chatbot queries, are instantly generated and composed into real-time dashboards. Now armed with custom dashboards, the C-suite and network practitioners alike are able to customize live SASE data according to their individual job roles. * **AI Agents:** Autonomous AI agents, armed with massive datasets, analyze, gain insights, and act on said insights, reducing burden on support and operational teams. Unified SASE is a reality today. As a three-time Leader in the Gartner® Magic Quadrant™ for Single-Vendor SASE, Prisma SASE transforms your infrastructure by replacing complexity with a streamlined, AI-powered architecture. Don't settle for a SASE potpourri; join the thousands of organizations that have already moved to the industry's leading unified SASE platform. [Contact us today](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) to start your journey. *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [SD-WAN](https://www.paloaltonetworks.com/blog/sase/category/sd-wan/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown), [Zero Trust Security](https://www.paloaltonetworks.com/blog/category/zero-trust-security/?ts=markdown) [#### Introducing the Industry's First SD-WAN with Integrated IoT](https://www.paloaltonetworks.com/blog/sase/introducing-the-industrys-first-sd-wan-with-integrated-iot/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [SD-WAN](https://www.paloaltonetworks.com/blog/sase/category/sd-wan/?ts=markdown) [#### Chart Your SASE Transformation with Prisma SD-WAN](https://www.paloaltonetworks.com/blog/2025/06/chart-sase-transformation-prisma-sd-wan/) ### [Mobile Users](https://www.paloaltonetworks.com/blog/sase/category/mobile-users/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [#### Improve Microsoft Teams Meeting Performance with ADEM](https://www.paloaltonetworks.com/blog/sase/improve-microsoft-teams-meeting-performance-with-adem/) ### [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [#### Use RBI as Your Edge Over Zero-Day Browser Vulnerabilities](https://www.paloaltonetworks.com/blog/sase/use-rbi-as-your-edge-over-zero-day-browser-vulnerabilities/) ### [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [#### Revolutionize User Experiences with App Acceleration](https://www.paloaltonetworks.com/blog/sase/revolutionize-user-experiences-reduce-packet-loss-app-acceleration/) ### [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [#### Prisma Access \& Data Privacy: A Solution for Works Councils](https://www.paloaltonetworks.com/blog/sase/prisma-access-data-privacy-a-solution-for-works-councils/) ### Subscribe to Sase Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language