[](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Cortex Cloud logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/cortexcloud-logo-dark.svg)](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * Use Cases ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Use Cases Use Cases * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) Real-time cloud security powered by unified data, AI and automation * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) Prevent risks at the source * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) Rapidly prioritize and remediate risks across any cloud * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) Stop cloud attacks before they become breaches * [Security Operations](https://www.paloaltonetworks.com/cortex?ts=markdown) Detect, investigate and respond to threats across enterprise and cloud * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [IaC Security](https://www.paloaltonetworks.com/cortex/cloud/infrastructure-as-code-security?ts=markdown) * [Software Composition Analysis](https://www.paloaltonetworks.com/cortex/cloud/software-composition-analysis?ts=markdown) * [Secrets Security](https://www.paloaltonetworks.com/cortex/cloud/secrets-security?ts=markdown) * [Open Partner Ecosystem](https://www.paloaltonetworks.com/cortex/cloud/appsec-partner-ecosystem?ts=markdown) [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Vulnerability Management](https://www.paloaltonetworks.com/cortex/cloud/vulnerability-management?ts=markdown) * [Cloud Attack Surface Management (ASM)](https://www.paloaltonetworks.com/cortex/cloud/attack-surface-management?ts=markdown) [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Cloud Detection and Response (CDR)](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Container \& Kubernetes Security](https://www.paloaltonetworks.com/cortex/cloud/container-security?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [API Security](https://www.paloaltonetworks.com/cortex/cloud/api-security?ts=markdown) * [Web Application Security](https://www.paloaltonetworks.com/cortex/cloud/web-application-security?ts=markdown) [Security Operations](https://www.paloaltonetworks.com/cortex/?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Government](https://www.paloaltonetworks.com/cortex/cloud/government?ts=markdown) * [Product Tours](https://www.paloaltonetworks.com/cortex/cloud/product-tours?ts=markdown) * Resources ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Resources Learn * [Blog](https://www.paloaltonetworks.com/blog/cloud-security?ts=markdown) * [Cloud Research](https://www.paloaltonetworks.com/cortex/cloud/research?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Live Community](https://live.paloaltonetworks.com/) * [Interactive Workshops](https://www.paloaltonetworks.com/cortex/cloud/interactive-workshops?ts=markdown) Product Information * [Technical Documentation](https://docs.paloaltonetworks.com/) * [Open Source Projects](https://www.paloaltonetworks.com/cortex/cloud/open-source-projects?ts=markdown) * [Support](https://support.paloaltonetworks.com/Support/Index) Resources * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Customer Success Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Resource Center](https://www.paloaltonetworks.com/resources?ts=markdown) * [Events](https://events.paloaltonetworks.com) * * [Request a Demo](https://www.paloaltonetworks.com/cortex/cloud/demo?ts=markdown) ![palo alto networks logo icon](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-default.svg) ![white arrow icon pointing left to return to main Palo Alto Networks site](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-white.svg) [](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) Search Close search modal *** ** * ** *** # Data Security Posture Management (DSPM) ## Discover, classify and protect data in cloud environments. Prevent exfiltration and compliance violations. * [Request a demo](https://www.paloaltonetworks.com/cortex/cloud/trial?ts=markdown) **inherit** ![Data Security Hero Front Image](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cortexcloud/usecases/dspm/dspm-Overview-Hero-R2.png) ![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-white.svg) ![Data Security Hero Front Image](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cortexcloud/usecases/dspm/dspm-Overview-Hero-R2.png) WHY IT MATTERSOUR APPROACHCAPABILITIES * [WHY IT MATTERS](#why) * [OUR APPROACH](#approach) * [CAPABILITIES](#modules) {#why} ## Data is an organization's most important digital asset and the focal point of security and compliance. But growing data volumes, increased regulation and the shift toward AI make it difficult to effectively monitor and protect data in the cloud. ### Visibility into sensitive data is limited Cloud data is spread between multiple cloud providers and dozens of datastores -- including managed, unmanaged, structured and unstructured storage. Organizations struggle to understand which sensitive data they hold, who can access it, and where it's exposed. ### Prioritization is paramount Security teams can get overwhelmed due to the volume of misconfigurations and alerts that need their attention. Prioritizing threat vectors based on the risk they pose to sensitive data is key to efficiently allocating limited security resources. ### Data protection and compliance requires context To mitigate data risk, organizations need to look beyond misconfigurations. Data lineage, exposure risk analysis, usage patterns and data flow monitoring are needed to contextualize and effectively respond to incidents. ## Discover, classify, protect and govern data in cloud environments Cortex^®^ Cloud Data Security Posture Management (DSPM) allows organizations to securely scale their data and AI infrastructure. Building on unique data discovery, classification and monitoring capabilities, Cortex Cloud puts data at the center of Code to Cloud™ security. * Support for AWS, Azure, GCP and Snowflake * Find shadow data and misconfigured datastores * Continuously monitor data at rest and in transit * ![icon Data visibility](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cortexcloud/icons/cloud-data-security-data-visibility-object.svg) Data discovery and classification * ![Icon Data risk analysis](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cortexcloud/icons/threat-detection-network-anomaly-monitoring.svg) Data risk analysis * ![Icon Data privacy and compliance](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cortexcloud/icons/vcg-compliance-reporting.svg) Data privacy and compliance * ![Icon Data access governance](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cortexcloud/icons/ico-access-control.svg) Data access governance * ![Icon Data detection and response](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cortexcloud/icons/iam-security-investigate-Entitlements.svg) Data detection and response * ![Icon Malware prevention](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cortexcloud/icons/cloud-data-security-malware-prevention.svg) Malware prevention {#approach} SOLUTION ## Our approach to Cloud Data Security ### Data discovery and classification Cortex Cloud automatically finds and contextualizes sensitive data. Eliminate data blind spots, find shadow data and bolster your security and compliance posture with automated data classification. Cortex Cloud DSPM protects your datastores (including database and object storage) across the four major public cloud providers. * #### Comprehensive coverage Find all sensitive or regulated data, regardless of where data resides -- infrastructure as a service (IaaS), platform as a service (PaaS), and database as a service (DBaaS) assets. \* #### Automated data classification Use 100+ pre-built classifiers to identify PII, financial information, health records, developer secrets and compliance-related data. Customize any classifier or build your own from scratch. \* #### Fast, agentless scanning and classification Cortex Cloud DSPM provides a full mapping of your sensitive data and risk in 24 hours, no connectors required. \* #### Sensitive data stays in your account Data is scanned and classified in your cloud account, ensuring data residency compliance. Cortex Cloud DSPM relies on metadata and cloud logs to minimize impact on performance. [![Data discovery and classification](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cortexcloud/usecases/dspm/dspm-Overview-Hero-R2.png)](#prismastickyimagecomapproach1_prisma-custom-background_prismacustombackgrou_14379965_cleanParsys_data-security-posture-management_cloud_cortex_en_US_pan_content_) ### Data risk analysis Misconfigured cloud resources can lead to data breach and compliance violations. Publicly exposed assets, over-permissive access control and violations of data residency or privacy regulations can have costly consequences. Cortex Cloud continuously monitors, identifies and prioritizes vulnerabilities in cloud data resources. * #### Visibility into data at risk Get visibility into your data in complex, multicloud environments. Understand where sensitive information is exposed across structured and unstructured data in storage, analytics and database services. \* #### Prebuilt and custom policies Use templates or define your policies to find data flows and misconfigurations that put your organization at risk: publicly-exposed storage, violations of residency requirements, excessive access permissions and more. \* #### Unified policy engine Apply the same security policies wherever your data lives, based on a continuously updated threat model and the unique characteristics of data environments -- data movement, lineage and regulatory considerations. [![Data risk analysis](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/prisma/usecases/2-Data-risk-analysis.png)](#prismastickyimagecomapproach2_prisma-custom-background_prismacustombackgrou_14379965_cleanParsys_data-security-posture-management_cloud_cortex_en_US_pan_content_) ### Data privacy and compliance Cortex Cloud DSPM helps you strengthen your privacy and compliance posture by understanding how sensitive data is replicated or consumed across your cloud environments. See how regulated data travels through different cloud services and environments to detect issues, such as violations of data residency requirements or non-compliant replication between environments. * #### Identify sensitive data at rest, in use and in motion Cortex Cloud DSPM monitors data flows between storage locations and environments (e.g., between production and development), allowing you to see the full path leading to a compliance issue. \* #### Get notified when data falls out of compliance See when specific data flows put you at risk of compliance violation, such as PII moved into non-compliant regions, or healthcare records moved into unencrypted storage. \* #### Prevent data breach and insider threats Find out if data is moving into an unauthorized location by seeing who has access at source and target. Ensure that data stays in monitored storage and doesn't leave your cloud account. [![Data privacy and compliance](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/prisma/usecases/3-Data-privacy-and-compliance.png)](#prismastickyimagecomapproach3_prisma-custom-background_prismacustombackgrou_14379965_cleanParsys_data-security-posture-management_cloud_cortex_en_US_pan_content_) ### Data access governance Preventing unauthorized access to data is a core aspect of cybersecurity -- but many organizations struggle with complex IAM policies, cross-account permissions and cloud service sprawl. Cortex Cloud DSPM gives you the tools to see who has access to your critical data assets, assign data owners and create accountability for security and compliance. * #### Visual map of access holders Get a clear visual representation of your sensitive data and a mapping of identities and accounts with access permissions. Make sense of myriad managed permissions granted to consultants, vendors and employees. \* #### Notifications for high-priority data access risks Cortex Cloud DSPM alerts you to significant incidents such as cross-account access to sensitive data, over-privileged permissions and application, and unused or out-of-date permissions. \* #### Continuous data access monitoring Cortex Cloud DSPM tracks all data interactions including changes to permissions across the data lifecycle, so you can rightsize permissions according to actual access and activity patterns. [![Data access governance](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/prisma/usecases/4-Data-access-governance.png)](#prismastickyimagecomapproach5_prisma-custom-background_prismacustombackgrou_14379965_cleanParsys_data-security-posture-management_cloud_cortex_en_US_pan_content_) ### Data detection and response (DDR) Cloud data remains in flux. Responding to changes days or weeks after they happen might not prevent critical incidents. Cortex Cloud DSPM allows you to detect and respond to high-priority incidents in minutes by monitoring your environment and alerting you on important changes with full context and prioritization. * #### Agentless, dynamic monitoring for cloud environments Cortex Cloud DSPM analyzes cloud logs to detect potentially damaging scenarios, such as large-scale data downloads or regulated data copied into an insecure environment. \* #### Alerts in near real time Get notifications on matters that need your attention at this moment, including high-risk data movement, exfiltration or severe compliance violations. Enable effective incident response and remediation. \* #### Multiple integrations with your security stack Get alerts in the ticketing and messaging tools you're using today, such as Jira and Slack. Integrate with SOAR and SIEM tools to activate automated and manual response workflows. [![Data detection and response (DDR)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/prisma/usecases/5-Data-detection-and-response.png)](#prismastickyimagecom_prisma-custom-background_prismacustombackgrou_14379965_cleanParsys_data-security-posture-management_cloud_cortex_en_US_pan_content_) ### Malware prevention Some IT applications allow users to upload data, which are then stored as files in your object storage account (e.g. Amazon S3, Azure Blob). These files can contain malware that could later "detonate" and put your organization at risk. Cortex Cloud DSPM helps you detect malware with automated discovery and scanning for files in cloud storage. * #### WildFire^®^ integration Use the WildFire malware analysis engine, seamlessly integrated into Cortex Cloud DSPM, to quickly and easily identify malware hidden in your stored data. No separate, siloed security product required. \* #### Compliance with malware scanning requirements Compliance frameworks (e.g., PCI, NIST, GDPR), due diligence processes and RFI responses may require the scanning of certain data for malware. Cortex Cloud DSPM simplifies your path to compliance. \* #### Integrated dashboard for malware and other data risk Use a single UI for comprehensive cloud data security. The Cortex Cloud DSPM dashboard displays all malware detected and analyzed to facilitate an audit or forensic investigation. [![Malware prevention](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/prisma/usecases/6-Malware-prevention.png)](#prismastickyimagecom_1630575280_prisma-custom-background_prismacustombackgrou_14379965_cleanParsys_data-security-posture-management_cloud_cortex_en_US_pan_content_) {#modules} ## Additional Cloud Posture Security capabilities ### Cloud Security Posture Management Remove your most critical risk across public and multicloud environments with Cortex Cloud. [Learn more](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) ### Cloud Infrastructure Entitlement Management Cortex Cloud gives you control over permissions across multicloud environments. [Learn more](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) ### AI Security Posture Management Identify and address vulnerabilities in the AI supply chain. [Learn more](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) ### Vulnerability Management Ruthlessly prioritize and remediate vulnerabilities with code to cloud to SOC context. [Learn more](https://www.paloaltonetworks.com/cortex/cloud/vulnerability-management?ts=markdown) {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language