* [Blog](https://www.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com/blog/corporate) * Threat Detection # Palo Alto Networks ## Threat Detection [![Cortex ITDR: Cyber Threats in Microsoft Teams and Their Detection](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/11/AdobeStock_233494953-scaled.jpeg)](https://www.paloaltonetworks.com/blog/security-operations/cortex-itdr-cyber-threats-in-microsoft-teams-and-their-detection/) [Cortex ITDR: Cyber Threats in Microsoft Teams and Their Detection \-----------------------------------------------------------------](https://www.paloaltonetworks.com/blog/security-operations/cortex-itdr-cyber-threats-in-microsoft-teams-and-their-detection/) A blog that demonstrates how PANW Cortex XSIAM provides detections on attacks within Microsoft Teams [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown) [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) Nov 19, 2025 By [Noam Sala](https://www.paloaltonetworks.com/blog/author/noam-sala/?ts=markdown "Posts by Noam Sala") and [Ofir Shlomo](https://www.paloaltonetworks.com/blog/author/ofir-shlomo/?ts=markdown "Posts by Ofir Shlomo") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** ![The Data Digestion Revolution: Why Cortex XDL is the Foundation of Modern Security](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/NetSec-Adhoc-Updated-Blog-Image-Resize-143071328-4.png) [AI and Cybersecurity](https://www.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) ## [The Data Digestion Revolution: Why Cortex XDL is the Foundation of Modern S...](https://www.paloaltonetworks.com/blog/security-operations/the-data-digestion-revolution-why-cortex-xdl-is-the-foundation-of-modern-security/) Discover how Cortex XDL's intelligence-first approach transforms raw security data into actionable threat intelligence at enterprise scale Oct 22, 2025 By [Brendan Powers](https://www.paloaltonetworks.com/blog/author/brendan-powers/?ts=markdown "Posts by Brendan Powers") ![SIEM Replacement Made Easy (Yes, Really!)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/Man-Working-2-2.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [SIEM Replacement Made Easy (Yes, Really!)](https://www.paloaltonetworks.com/blog/security-operations/siem-replacement-made-easy-yes-really/) Deploy Cortex XSIAM in 3 months or less with AI-powered migration tools. Replace your SIEM faster with automated onboarding and ready-to-use analytics. Oct 15, 2025 By [Brendan Powers](https://www.paloaltonetworks.com/blog/author/brendan-powers/?ts=markdown "Posts by Brendan Powers") ![Stopping Cross-Domain Attacks with Cortex XDL + Cortex XSIAM](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/See-This-3.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) ## [Stopping Cross-Domain Attacks with Cortex XDL + Cortex XSIAM](https://www.paloaltonetworks.com/blog/security-operations/stopping-cross-domain-attacks-with-cortex-xdl-cortex-xsiam/) Siloed security tools miss 75% of threats. See how Cortex XDL's unified data foundation enables AI-powered detection against identity-driven attacks. Oct 02, 2025 By [Dena De Angelo](https://www.paloaltonetworks.com/blog/author/ddeangelo/?ts=markdown "Posts by Dena De Angelo") ![Think You Have Visibility? Think Again.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/07/Man-working-8.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) ## [Think You Have Visibility? Think Again.](https://www.paloaltonetworks.com/blog/security-operations/think-you-have-visibility-think-again/) Discover how Cortex XDR \& XSIAM's Data Stitching and Smart Grouping unify security data, streamline SecOps, and accelerate threat investigations. Jul 29, 2025 By [Greg Smith](https://www.paloaltonetworks.com/blog/author/greg-smith/?ts=markdown "Posts by Greg Smith") ![Demystifying Impossible Traveler Detection](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/02/NetSec-Adhoc-Updated-Blog-Image-Resize-620929423.png) [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ## [Demystifying Impossible Traveler Detection](https://www.paloaltonetworks.com/blog/security-operations/demystifying-impossible-traveler-detection/) Discover how Impossible Traveler Detection in Cortex XDR identifies suspicious logins from distant locations in a short time, and how to address challenges like VPN impacts and reduce false positives in complex... Feb 12, 2025 By [Yaniv Assor](https://www.paloaltonetworks.com/blog/author/yaniv-assor/?ts=markdown "Posts by Yaniv Assor") [](https://www.paloaltonetworks.com/blog/security-operations/detecting-threats-with-microsoft-graph-activity-logs/) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [Detecting Threats with Microsoft Graph Activity Logs](https://www.paloaltonetworks.com/blog/security-operations/detecting-threats-with-microsoft-graph-activity-logs/) Discover how Microsoft Graph API is used as an attack vector by threat actors through a real-world attack scenario. Find out why monitoring Microsoft Graph activity logs is important and how Cortex delivers tai... Feb 02, 2025 By [Eden Elazar](https://www.paloaltonetworks.com/blog/author/eden-elazar/?ts=markdown "Posts by Eden Elazar") ![The Power of AI Assistants and Advanced Threat Detection](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/04/word-image-317205-1.jpeg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) ## [The Power of AI Assistants and Advanced Threat Detection](https://www.paloaltonetworks.com/blog/2024/04/ai-assistants-and-advanced-threat-detection/) Explore predictions on AI in cybersecurity and cultivating a cyber-aware culture. Discover the emergence of AI-powered cybersecurity assistants. Apr 04, 2024 By [Dena De Angelo](https://www.paloaltonetworks.com/blog/author/ddeangelo/?ts=markdown "Posts by Dena De Angelo") ![On Credible and Cyber-Contextual Labeling](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/04/Thinking-Twitter-1.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown) ## [On Credible and Cyber-Contextual Labeling](https://www.paloaltonetworks.com/blog/security-operations/on-credible-and-cyber-contextual-labeling/) Discover how Palo Alto Networks combines customer feedback, expert analysis, deterministic rules, stochastic models, and statistical methods to generate credible labels for training machine learning models in c... Apr 04, 2024 By [Gal Itzhak](https://www.paloaltonetworks.com/blog/author/gal-itzhak/?ts=markdown "Posts by Gal Itzhak") ![Anomaly Detection Policies for Unusual Workload Credential Usage](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/07/word-image-298208-2.jpeg) [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem/?ts=markdown), [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam/?ts=markdown) ## [Anomaly Detection Policies for Unusual Workload Credential Usage](https://www.paloaltonetworks.com/blog/cloud-security/anomaly-detection-policies-workload-credential/) Anomaly policies built into CIEM and designed to detect anomalous use of workload credentials is essential to securing sensitive data and infrastructure. Aug 03, 2023 By [Bar Schwartz](https://www.paloaltonetworks.com/blog/author/bar-schwartz/?ts=markdown "Posts by Bar Schwartz") and [Ruben Torres Guerra](https://www.paloaltonetworks.com/blog/author/ruben-torres-guerra/?ts=markdown "Posts by Ruben Torres Guerra") ![Cracking the Code — How Machine Learning Supercharges Threat Detection](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/06/cortex_how-we-do-it_ep-2_blog_4_3.jpg) [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) ## [Cracking the Code --- How Machine Learning Supercharges Threat Detection](https://www.paloaltonetworks.com/blog/2023/06/cracking-the-code-how-machine-learning-supercharges-threat-detection/) Read about building SOCs, leveraging red teams for pen testing, monitoring threat landscapes and using products like Cor... Jun 01, 2023 By [Dena De Angelo](https://www.paloaltonetworks.com/blog/author/ddeangelo/?ts=markdown "Posts by Dena De Angelo") ![Azure-Specific Policies to Detect Suspicious Operations in the Cloud Environment](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/05/Cloud-Building-440x280.jpg) [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [Azure-Specific Policies to Detect Suspicious Operations in the Cloud Enviro...](https://www.paloaltonetworks.com/blog/cloud-security/anomaly-detection-policies-azure/) Exploiting privileged operations for malicious intent is one of the biggest threats in the public cloud. Such operations allow bad actors to perform a... Apr 20, 2023 By [Venkatesh Pappakrishnan](https://www.paloaltonetworks.com/blog/author/venkatesh-pappakrishnan/?ts=markdown "Posts by Venkatesh Pappakrishnan"), [Alok Tongaonkar](https://www.paloaltonetworks.com/blog/author/alok-tongaonkar/?ts=markdown "Posts by Alok Tongaonkar"), [Praveen Herrur](https://www.paloaltonetworks.com/blog/author/praveen-herrur/?ts=markdown "Posts by Praveen Herrur") and [Farid Arbai](https://www.paloaltonetworks.com/blog/author/farid-arbai/?ts=markdown "Posts by Farid Arbai") ![Prisma Cloud Provides New Extensive Use Cases for Azure Customers](https://www.paloaltonetworks.com/blog/wp-content/uploads/2022/11/iStock-938605236-edit-1280x1280-1.jpeg) [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Prisma Cloud Provides New Extensive Use Cases for Azure Customers](https://www.paloaltonetworks.com/blog/cloud-security/prisma-cloud-provides-new-extensive-use-cases-for-azure-customers/) Microsoft Azure customers can now secure their data and networks and gain broader governance across their cloud assets. Nov 10, 2022 By [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") ![Prisma Cloud Now Detects Threats Using the TOR Network](https://www.paloaltonetworks.com/blog/wp-content/uploads/2022/06/Cityscape.jpg) [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security/?ts=markdown), [Cloud Security Posture Management](https://www.paloaltonetworks.com/blog/category/cloud-security-posture-management/?ts=markdown) ## [Prisma Cloud Now Detects Threats Using the TOR Network](https://www.paloaltonetworks.com/blog/cloud-security/threat-detection-using-tor-networks/) Prisma Cloud extends its CSPM threat detection capabilities to surface threats and unusual behavior coming from the TOR network. Jun 06, 2022 By [Rachel Deng](https://www.paloaltonetworks.com/blog/author/rachel-deng/?ts=markdown "Posts by Rachel Deng"), [Venkatesh Pappakrishnan](https://www.paloaltonetworks.com/blog/author/venkatesh-pappakrishnan/?ts=markdown "Posts by Venkatesh Pappakrishnan") and [Alok Tongaonkar](https://www.paloaltonetworks.com/blog/author/alok-tongaonkar/?ts=markdown "Posts by Alok Tongaonkar") ![Three Great Reasons to Get Started with Now-Available Google Cloud IDS](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/12/NetSec-Adhoc-Updated-Blog-Image-Resize-666009646.png) [Hybrid Cloud Data Center](https://www.paloaltonetworks.com/blog/network-security/category/hybrid-cloud-data-center/?ts=markdown), [Network Perimeter](https://www.paloaltonetworks.com/blog/network-security/category/network-perimeter/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Zero Trust Security](https://www.paloaltonetworks.com/blog/network-security/category/zero-trust-security/?ts=markdown) ## [Three Great Reasons to Get Started with Now-Available Google Cloud IDS](https://www.paloaltonetworks.com/blog/network-security/google-cloud-ids-now-available/) Google Cloud IDS (Intrusion Detection System), the first network threat detection system delivered as a native Google Cl... Dec 08, 2021 By [Mukesh Gupta](https://www.paloaltonetworks.com/blog/author/mukesh-gupta/?ts=markdown "Posts by Mukesh Gupta") ![Enhancing UEBA with Compute Provisioning Anomaly Detection](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/06/Coding.jpeg) [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown) ## [Enhancing UEBA with Compute Provisioning Anomaly Detection](https://www.paloaltonetworks.com/blog/cloud-security/compute-provisioning-anomaly-detection/) While we tend to talk about them as if they were a single entity, cloud environments are typically composed of multiple accounts across different global regions, with many users th... Jun 10, 2021 By [Rachel Deng](https://www.paloaltonetworks.com/blog/author/rachel-deng/?ts=markdown "Posts by Rachel Deng") ![Network-Based Data Exfiltration Detection Extends Visibility of Threats](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/05/Aerial-Sunset-on-City-1.jpg) [Cloud Network Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-network-security/?ts=markdown), [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown) ## [Network-Based Data Exfiltration Detection Extends Visibility of Threats](https://www.paloaltonetworks.com/blog/cloud-security/network-based-data-exfiltration-detection/) By analyzing a combination of network flow logs and user behavior, Prisma Cloud can help identify potential malicious data exfiltration attempts befor... Jun 09, 2021 By [Rachel Deng](https://www.paloaltonetworks.com/blog/author/rachel-deng/?ts=markdown "Posts by Rachel Deng") ![New CSPM Functionality Frees Teams from Alert Noise and Blind Spots](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/06/Woman-Working-at-Computer.jpg) [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/cloud-security/category/partners/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) ## [New CSPM Functionality Frees Teams from Alert Noise and Blind Spots](https://www.paloaltonetworks.com/blog/2021/06/new-cspm-functionality/) The June 2021 release for Prisma Cloud delivers new CSPM functionality to help reduce blind spots and detect advanced attacks. Jun 08, 2021 By [Jonathan Bregman](https://www.paloaltonetworks.com/blog/author/jonathan-bregman/?ts=markdown "Posts by Jonathan Bregman") ![How to Set Up Prisma Cloud Threat Detection in 6 Steps](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/05/Aerial-Sunset-on-City-1.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) ## [How to Set Up Prisma Cloud Threat Detection in 6 Steps](https://www.paloaltonetworks.com/blog/cloud-security/how-to-set-up-prisma-cloud-threat-detection/) We'll outline how to set up Prisma Cloud for threat detection, which is an important aspect of a strong security posture. Jun 01, 2021 By [Rachel Deng](https://www.paloaltonetworks.com/blog/author/rachel-deng/?ts=markdown "Posts by Rachel Deng") ![Unveiling a Comprehensive Attack Explorer for Cloud Native Apps](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/04/Monitor-blog.png) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown), [Cloud Workload Protection Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection-platform/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) ## [Unveiling a Comprehensive Attack Explorer for Cloud Native Apps](https://www.paloaltonetworks.com/blog/cloud-security/comprehensive-attack-explorer-for-cloud-native-apps/) Prisma Cloud maps security audits to tactics and techniques within our Attack Explorer, providing a quick overview of threats to your environment. Apr 28, 2021 By [Yuval Avrahami](https://www.paloaltonetworks.com/blog/author/yuval-avrahami/?ts=markdown "Posts by Yuval Avrahami") ![How The MITRE ATT\&CK For Cloud Framework Can Improve Threat Detection](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/03/Man-Using-Computer-Twitter.jpg) [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/cloud-security/category/partners/?ts=markdown) ## [How The MITRE ATT\&CK For Cloud Framework Can Improve Threat Detection](https://www.paloaltonetworks.com/blog/cloud-security/mitre-attck-for-cloud-improve-threat-detection/) Prisma Cloud CSPM utilizes the MITRE ATT\&CK for Cloud framework to identify and mitigate risks effectively, and detect attack incidents quickly. Apr 22, 2021 By [Rachel Deng](https://www.paloaltonetworks.com/blog/author/rachel-deng/?ts=markdown "Posts by Rachel Deng") Load more blogs Load more blogs ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language