[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [AppSec](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security?ts=markdown) 4. [How The Next-Generation Security Platform Contributes to GDPR Compliance](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology?ts=markdown) Table of Contents * [What Is AppSec?](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security?ts=markdown) * [AppSec Explained](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#appsec?ts=markdown) * [The Fundamentals of AppSec](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#fundamentals?ts=markdown) * [Building Security into the Development Lifecycle](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#building?ts=markdown) * [Implementing Secure Coding Practices](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#implementing?ts=markdown) * [Application Security Testing](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#testing?ts=markdown) * [Implementing Security in CI/CD Pipelines](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#pipelines?ts=markdown) * [Securing Application Architecture](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#architecture?ts=markdown) * [Access Control and Authentication](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#access?ts=markdown) * [Monitoring and Incident Response](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#monitoring?ts=markdown) * [Managing AppSec in Production](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#managing?ts=markdown) * [Training and Building a Security-First Culture](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#training?ts=markdown) * [AppSec Trends](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#trends?ts=markdown) * [AppSec FAQs](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#faqs?ts=markdown) * [What Is Sandboxing?](https://www.paloaltonetworks.com/cyberpedia/sandboxing?ts=markdown) * [Sandboxing Explained](https://www.paloaltonetworks.com/cyberpedia/sandboxing#sandboxing?ts=markdown) * [Sandboxing in Email Security](https://www.paloaltonetworks.com/cyberpedia/sandboxing#security?ts=markdown) * [Endpoint Sandboxing and EDR](https://www.paloaltonetworks.com/cyberpedia/sandboxing#endpoint?ts=markdown) * [Browser Isolation and Web Sandboxing](https://www.paloaltonetworks.com/cyberpedia/sandboxing#browser?ts=markdown) * [Sandboxing in Cloud-Native Workflows](https://www.paloaltonetworks.com/cyberpedia/sandboxing#workflows?ts=markdown) * [Sandbox Evasion and Threat Actor Tradecraft](https://www.paloaltonetworks.com/cyberpedia/sandboxing#tradecraft?ts=markdown) * [Real-World Case Studies in Sandboxing Effectiveness](https://www.paloaltonetworks.com/cyberpedia/sandboxing#effectiveness?ts=markdown) * [Feeding Sandboxed Intelligence into XDR and SOC Pipelines](https://www.paloaltonetworks.com/cyberpedia/sandboxing#feeding?ts=markdown) * [Sandboxing FAQs](https://www.paloaltonetworks.com/cyberpedia/sandboxing#faqs?ts=markdown) * [Application Security: A Practitioner's Guide](https://www.paloaltonetworks.com/cyberpedia/application-security?ts=markdown) * [Application Security Explained](https://www.paloaltonetworks.com/cyberpedia/application-security#application?ts=markdown) * [Types of Applications Organizations Need to Secure](https://www.paloaltonetworks.com/cyberpedia/application-security#types?ts=markdown) * [Whose Job Is It -- Developers or Security?](https://www.paloaltonetworks.com/cyberpedia/application-security#security?ts=markdown) * [A Pragmatic Guide for Security-Minded Developers](https://www.paloaltonetworks.com/cyberpedia/application-security#developers?ts=markdown) * [Types of Application Security Testing](https://www.paloaltonetworks.com/cyberpedia/application-security#testing?ts=markdown) * [Application Security Tools and Solutions](https://www.paloaltonetworks.com/cyberpedia/application-security#solutions?ts=markdown) * [Compliance Is Not Security, But It's Not Optional Either](https://www.paloaltonetworks.com/cyberpedia/application-security#compliance?ts=markdown) * [Application Security FAQs](https://www.paloaltonetworks.com/cyberpedia/application-security#faqs?ts=markdown) * [What Is Cloud Detection and Response (CDR)?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr?ts=markdown) * [Cloud Detection and Response (CDR) Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#explained?ts=markdown) * [How CDR Works](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#how?ts=markdown) * [Key Features of CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#key?ts=markdown) * [CDR and Other Detection and Response Approaches](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#vs?ts=markdown) * [How CDR and XSIAM Work Together](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#work?ts=markdown) * [How CDR Addresses Unique Challenges in Cloud Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#addressing?ts=markdown) * [Key Capabilities of CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#capabilities?ts=markdown) * [How CDR Bridges SOC and Cloud Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#bridging?ts=markdown) * [Challenges of Implementing CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#potential?ts=markdown) * [CDR Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#practices?ts=markdown) * [Cloud Detection and Response FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#faqs?ts=markdown) * [How to Transition from DevOps to DevSecOps](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops?ts=markdown) * [Initiate a Security-First Culture](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#initiate-a-security-first-culture?ts=markdown) * [Incorporate Secure DevOps Practices](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#devops-practices?ts=markdown) * [Automate and Monitor Security](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#automate-and-monitor-security?ts=markdown) * [Evaluate and Maintain Security Posture](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#maintain-security-posture?ts=markdown) * [Ensure Compliance and Effective Incident Response](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#effective-incident-response?ts=markdown) * [Continuous Improvement in Security](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#improvement-in-security?ts=markdown) * [DevOps to DevSecOps FAQs](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#faq?ts=markdown) * Cloud Security Service, Cloud Storage and Cloud Technology * [Cloud and Platform as a Service](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#cloud-and-pass?ts=markdown) * [Infrastructure as a Service -- The Public Cloud](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#information-as-a-service?ts=markdown) * [Comprehensive, Scalable Cloud Security with Flexible Licensing Options](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#scalable-cloud-security?ts=markdown) * [Cloud Security Service, Storage and Technology FAQs](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#faq?ts=markdown) * [How Does VMware NSX Security Work](https://www.paloaltonetworks.com/cyberpedia/how-does-vmware-nsx-security-work?ts=markdown) * [What Is the Software Development Lifecycle (SDLC)?](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle?ts=markdown) * [Software Development Lifecycle Explained](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#software?ts=markdown) * [Why the SDLC Matters](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#why?ts=markdown) * [Foundational Phases](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#phases?ts=markdown) * [Common SDLC Models](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#common?ts=markdown) * [Security and Compliance Integration](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#security?ts=markdown) * [SDLC in Context](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#context?ts=markdown) * [SDLC Challenges](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#challenges?ts=markdown) * [Choosing or Tailoring an SDLC Model](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#choosing?ts=markdown) * [SDLC Tooling and Automation](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#automation?ts=markdown) * [Version Control and CI/CD Pipelines](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#version?ts=markdown) * [Value-Stream Metrics and Visibility](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#visibility?ts=markdown) * [Cloud, On-Premises, and Hybrid Considerations](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#cloud?ts=markdown) * [Best-Practice Guidelines for High-Velocity Delivery](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#best?ts=markdown) * [Next Steps Toward Lifecycle Maturity](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#next?ts=markdown) * [Software Development Lifecycle FAQs](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#faqs?ts=markdown) * [What Is SDLC Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle?ts=markdown) * [SDLC Security Overview](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#sdlc?ts=markdown) * [Security Across the Classic SDLC Phases](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#security?ts=markdown) * [Common Vulnerabilities and Attack Vectors in the SDLC](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#common?ts=markdown) * [Foundational Secure-SDLC Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#practices?ts=markdown) * [Tooling and Automation Layers](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#tooling?ts=markdown) * [Frameworks and Standards for Secure SDLC](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#frameworks?ts=markdown) * [DevSecOps Integration](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#devsecops?ts=markdown) * [Metrics and Continuous Improvement](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#metrics?ts=markdown) * [Advancements in Software Supply Chain Defense](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#advancements?ts=markdown) * [Roadmap to Secure-SDLC Maturity](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#roadmap?ts=markdown) * [SDLC Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#faqs?ts=markdown) # How The Next-Generation Security Platform Contributes to GDPR Compliance 2 min. read Table of Contents * * [Cloud and Platform as a Service](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#cloud-and-pass?ts=markdown) * [Infrastructure as a Service -- The Public Cloud](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#information-as-a-service?ts=markdown) * [Comprehensive, Scalable Cloud Security with Flexible Licensing Options](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#scalable-cloud-security?ts=markdown) * [Cloud Security Service, Storage and Technology FAQs](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#faq?ts=markdown) 1. Cloud and Platform as a Service * * [Cloud and Platform as a Service](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#cloud-and-pass?ts=markdown) * [Infrastructure as a Service -- The Public Cloud](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#information-as-a-service?ts=markdown) * [Comprehensive, Scalable Cloud Security with Flexible Licensing Options](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#scalable-cloud-security?ts=markdown) * [Cloud Security Service, Storage and Technology FAQs](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#faq?ts=markdown) As [data center](https://www.paloaltonetworks.com/cyberpedia/what-is-a-data-center?ts=markdown) managers face a burgeoning population of mobile users, the distributed workforce -- with multiple [endpoints](https://www.paloaltonetworks.com/cyberpedia/what-is-an-endpoint?ts=markdown) and cloud applications -- is forcing organizations to evolve both their in-house and cloud cybersecurity infrastructures. The traditional approach of backhauling traffic to the corporate network or using multiple point products to extend security to remote networks and mobile users proves difficult to manage, costly, and prone to introducing inconsistencies in security policies and protections. When hundreds or thousands of devices must be delivered, deployed and maintained across all remote locations, the result is too often a limited security solution with a heavy footprint and gaps in security that expose organizations to breaches and cyberattacks. The topic is further complicated by various environments in cloud computing and storage, including public, private, and hybrid cloud adoption scenarios, each of which pose unique opportunities, challenges, and risks. ## Cloud and Platform as a Service For these reasons, cloud providers and organizations have found it effective to implement a next-generation security platform approach for comprehensive [data security](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security?ts=markdown) in the cloud, with shared, on-demand, ubiquitous, and convenient access to local SAN and NAS. Platform as a service, or [PaaS](https://www.paloaltonetworks.com/cyberpedia/platform-as-a-service-paas?ts=markdown), is a category of cloud computing services that provides customers with an integrated system in which to store, develop, run, back up, and manage applications and data, but avoids the complexity of building and maintaining the infrastructure typically associated with developing and launching apps. PaaS is delivered as a public cloud service from a provider, where the consumer controls software deployment with minimal configuration options, and the provider provides the infrastructure -- the networks, servers, storage, operating systems and middleware. The organization creates and deploys applications onto the [cloud service provider's](https://www.paloaltonetworks.com/cyberpedia/cloud-service-provider?ts=markdown) platform using the cloud service provider's programming tools and services. The cloud service provider controls the underlying infrastructure and operating system, but doesn't manage the applications. By extending and enforcing existing enterprise security tools and encryption policies across the cloud, including authentication, encryption and other prevention strategies, companies can mitigate risk, ensure compliance and avoid data exposure. ## Infrastructure as a Service -- The Public Cloud [IaaS](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-a-service?ts=markdown), also called the public cloud, is the most impactful computing paradigm to emerge since the internet boom of the early 2000s and the increase in software as a service, or [SaaS](https://www.paloaltonetworks.com/cyberpedia/what-is-saas?ts=markdown), technology resources. Just as the nascent days of the internet boom changed the way we do business, so too has the public cloud. According to IDC^®^ Research, of the more than 11,000 enterprises that participated in the firm's CloudView survey, 80 percent are embracing or moving toward AWS^®^, Microsoft^®^ Azure^®^ or some other public cloud platform. The size and type of projects these organizations are migrating are equally significant. This shows how the public cloud is no longer an "exploration exercise." Full production workloads are being moved, with some organizations stating that more than 50 percent of their [workloads](https://www.paloaltonetworks.com/cyberpedia/what-is-workload?ts=markdown) will be public-cloud-based within the next five years. Others are making bold statements that they will no longer have any data centers within five years. The move to the public cloud is driven strongly by the business groups, and the velocity is such that security becomes a secondary consideration in some cases, solely because security moves in a purposeful manner while cloud environments move at light speed. However, no one would dispute the fact that applications and data in the private cloud, the public cloud or accessed through a cloud storage service need to be protected with as much diligence as private networks and on-premises software, hardware, applications, and data. ## Comprehensive, Scalable Cloud Security with Flexible Licensing Options In response to concerns about [cloud security](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security?ts=markdown) risks, including data loss and intrusion, Palo Alto Networks^®^ \[GlobalProtect^™^ cloud service\](https://www.paloaltonetworks.com/resources/datasheets/globalprotect-datasheet ?ts=markdown) makes next-generation security infrastructure available to customers in a cloud-based offering with cloud storage and preventive capabilities, including safe enablement of applications, threat prevention, URL filtering, and WildFire^®^ threat analysis service. This complete cloud system delivers powerful security services that secure remote networks and mobile users, helping widely distributed and global organizations reduce the management complexity of costly, time-consuming cloud deployments. Palo Alto Networks provides a multi-tenant, cloud-based security infrastructure at a predictable cost, with a pay-as-you-go subscription model and pay-per-use licensing options. This allows managers to quickly and easily add or remove remote locations and users, as well as create or adjust security policies. With this flexible, on-demand cloud security service, data centers of any size have scalable options to accommodate growth demands and achieve consistent security throughout their computing environments, regardless of users' locations or devices. ## Cloud Security Service, Storage and Technology FAQs ### What is security as a service (SECaaS)? SECaaS is a cloud-based security model that offers organizations advanced and comprehensive protection by outsourcing cybersecurity services. It enables businesses to access cutting-edge security solutions without the need for in-house expertise or infrastructure. Key components of SECaaS include threat intelligence, vulnerability scanning, intrusion detection and prevention, data loss prevention, and encryption. By leveraging a subscription-based model, organizations can scale security measures as needed, reduce costs, and maintain compliance with industry regulations. Additionally, SECaaS providers ensure up-to-date protection against emerging threats, allowing IT teams to focus on core business tasks. ### What is public cloud storage? Public cloud storage is a service model in which data is stored on shared infrastructure owned and operated by a third-party provider. These providers offer scalable storage solutions accessible via the internet, typically on a pay-as-you-go basis. Customers benefit from the flexibility, cost-effectiveness, and ease of use offered by public cloud storage services. While security measures are provided by the cloud provider, the [shared nature of the infrastructure](https://www.paloaltonetworks.com/cyberpedia/cloud-security-is-a-shared-responsibility?ts=markdown) may pose potential risks for sensitive data. ### What is private cloud storage? Private cloud storage refers to a dedicated storage infrastructure designed exclusively for a single organization. It offers greater control over data security and privacy, as well as customization options tailored to the organization's specific requirements. Private clouds can be hosted on-premises or externally by a third-party provider, but the underlying infrastructure isn't shared with other customers. While private cloud storage typically incurs higher upfront costs compared to public cloud storage, it provides increased flexibility, scalability, and security, making it suitable for organizations with strict data privacy and compliance requirements. ### What is hybrid cloud storage? Hybrid cloud storage is a combination of public and private cloud solutions, designed to optimize the benefits of both approaches. Organizations can store sensitive data and mission-critical applications on a private cloud, while leveraging the cost-effectiveness and elasticity of public cloud storage for less sensitive data and workloads. The hybrid approach enables businesses to maintain control over their data, comply with regulatory requirements, and achieve cost savings by strategically distributing workloads across both environments. ### What is multicloud storage? Multicloud storage allows organizations to leverage the unique features, services, and pricing models of each provider, enabling them to create a tailored solution that meets their specific needs. Successful multicloud storage implementation requires robust data management, seamless integration, and effective monitoring to ensure consistent performance and security across all platforms. ### What is object storage? Object storage is a scalable data storage architecture that manages data as discrete units called objects. Each object comprises data, metadata, and a unique identifier, enabling efficient and flexible storage and retrieval. Unlike file or block storage, object storage doesn't use hierarchical file systems or fixed-size blocks, making it ideal for handling large volumes of unstructured data. With built-in redundancy and the ability to distribute data across multiple geographic locations, object storage ensures high availability and durability. ### What is file storage? File storage is a data storage method that organizes and stores data in a hierarchical file system using folders and files. It's suitable for storing structured data and allows users to easily navigate, search, and retrieve files based on their file paths. File storage is commonly used in network-attached storage (NAS) systems, enabling multiple users to access and share files over a network. Although less scalable than object storage, file storage is user-friendly and well-suited for collaboration and document management. ### What is block storage? Block storage is a data storage approach that divides data into fixed-sized blocks, each with a unique address. It's designed for low-latency, high-performance storage and is commonly used in storage area networks (SANs) and cloud-based block storage services. Block storage excels in handling structured data, such as databases and virtual machine file systems, where consistent and fast access to data is crucial. It may require more management overhead compared to file or object storage, but block storage offers high performance and granular data control. ### What is data redundancy? Data redundancy refers to the process of duplicating and storing data across multiple locations or systems to ensure its availability and integrity. By creating multiple copies of data, organizations can safeguard against data loss due to hardware failures, human error, or other unforeseen events. Data redundancy can be achieved through various techniques, such as RAID configurations, erasure coding, and backups. Implementing data redundancy is essential for maintaining business continuity, minimizing downtime, and ensuring data reliability. ### What is data replication? Data replication is the process of copying and synchronizing data across multiple storage systems or locations to ensure data consistency, availability, and fault tolerance. It enables organizations to distribute data to geographically dispersed sites, reducing latency and improving user experience. Data replication can be synchronous, where data is written simultaneously to the primary and secondary storage systems, or asynchronous, where data is written to secondary systems after a short delay. ### What is storage as a service (STaaS)? Storage as a Service (STaaS) is a cloud-based storage model that enables organizations to rent storage capacity from a third-party provider on a subscription basis. STaaS providers manage the underlying infrastructure, ensuring scalability, reliability, and performance for their customers. Organizations benefit from reduced expenditure, decreased management overhead, and on-demand storage provisioning. Related Content [Data security posture management (DSPM) Explained DSPM solutions provide visibility into data security risks and assist in implementing appropriate controls to protect critical data stored in cloud environments.](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm?ts=markdown) [Use Data Policies to Scan for Data Exposure or Malware Detect malware and prevent inadvertent or malicious exposure of sensitive data with predefined data profiles and data patterns.](https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-data-security/monitor-data-security-scan-prisma-cloud/data-policies) [5 Orgs Achieve 360° Visibility and Compliance Learn how organizations achieve centralized visibility across cloud environments to remediate vulnerabilities and eliminate threats.](https://www.paloaltonetworks.com/resources/ebooks/customer-spotlight-visibility-and-compliance?ts=markdown) [Data Visibility and Classification Many organizations don't have enough visibility of critical data types such as personal identifiable information. This becomes problematic when facing audits and prioritizing data ...](https://www.paloaltonetworks.com/prisma/cloud/cloud-data-security?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=Cloud%20Security%20Service%2C%20Cloud%20Storage%20and%20Cloud%20Technology&body=Learn%20how%20cloud%20providers%20and%20organizations%20are%20adopting%20next-generation%20security%20platforms%20to%20implement%20comprehensive%20data%20protection%20in%20the%20cloud.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops?ts=markdown) How to Transition from DevOps to DevSecOps [Next](https://www.paloaltonetworks.com/cyberpedia/how-does-vmware-nsx-security-work?ts=markdown) How Does VMware NSX Security Work {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language