[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-security-solution?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Network Security](https://www.paloaltonetworks.com/cyberpedia/network-security?ts=markdown) 3. [Brief: Cryptographically Relevant Quantum Computers (CRQC)](https://www.paloaltonetworks.com/cyberpedia/crqcs-cryptographically-relevant-quantum-computers?ts=markdown) Table of contents * [How is a CRQC different from the quantum computers we have today?](#how-is-a-crqc-different-from-the-quantum-computers-we-have-today) * [What would a quantum computer need to become cryptographically relevant?](#what-would-a-quantum-computer-need-to-become-cryptographically-relevant) * [Which encryption methods would a CRQC break?](#which-encryption-methods-would-a-crqc-break) * [Why does the CRQC threat matter now?](#why-does-the-crqc-threat-matter-now) * [What are common misconceptions about CRQCs?](#what-are-common-misconceptions-about-crqcs) * [CRQC FAQs](#crqc-faqs) # Brief: Cryptographically Relevant Quantum Computers (CRQC) 4 min. read Table of contents * [How is a CRQC different from the quantum computers we have today?](#how-is-a-crqc-different-from-the-quantum-computers-we-have-today) * [What would a quantum computer need to become cryptographically relevant?](#what-would-a-quantum-computer-need-to-become-cryptographically-relevant) * [Which encryption methods would a CRQC break?](#which-encryption-methods-would-a-crqc-break) * [Why does the CRQC threat matter now?](#why-does-the-crqc-threat-matter-now) * [What are common misconceptions about CRQCs?](#what-are-common-misconceptions-about-crqcs) * [CRQC FAQs](#crqc-faqs) 1. How is a CRQC different from the quantum computers we have today? * [1. How is a CRQC different from the quantum computers we have today?](#how-is-a-crqc-different-from-the-quantum-computers-we-have-today) * [2. What would a quantum computer need to become cryptographically relevant?](#what-would-a-quantum-computer-need-to-become-cryptographically-relevant) * [3. Which encryption methods would a CRQC break?](#which-encryption-methods-would-a-crqc-break) * [4. Why does the CRQC threat matter now?](#why-does-the-crqc-threat-matter-now) * [5. What are common misconceptions about CRQCs?](#what-are-common-misconceptions-about-crqcs) * [6. CRQC FAQs](#crqc-faqs) A cryptographically relevant quantum computer is one capable of breaking widely used public-key encryption by running algorithms like Shor's at scale. It requires fault-tolerant operation, stable logical qubits, and enough coherence to complete deep quantum circuits. While no such machines exist today, their eventual arrival poses a direct threat to current cryptographic infrastructure. ## How is a CRQC different from the quantum computers we have today? Not all quantum computers are cryptographically relevant. That's an important distinction---because the machines available today are fundamentally limited. Most current systems fall into a category called NISQ, or noisy intermediate-scale quantum. These machines can run small-scale experiments. They can demonstrate quantum behavior. But they aren't stable or powerful enough to run cryptographic attacks. Not even close. ![A large, vertically suspended quantum computing apparatus hangs at the center of a metallic laboratory frame, with multiple stacked circular tiers made of copper and gold-colored components connected by intricate wiring and cooling structures. The surrounding environment is dim, with structural beams, cables, and equipment framing the system. To the right, dark green text on a white background reads 'A current quantum computer at Google's quantum research lab in Santa Barbara, California.'](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/crqcs-cryptographically-relevant-quantum-computers/A-current-quantum-computer.png "A large, vertically suspended quantum computing apparatus hangs at the center of a metallic laboratory frame, with multiple stacked circular tiers made of copper and gold-colored components connected by intricate wiring and cooling structures. The surrounding environment is dim, with structural beams, cables, and equipment framing the system. To the right, dark green text on a white background reads 'A current quantum computer at Google's quantum research lab in Santa Barbara, California.'") Why not? Because NISQ devices are error-prone. They can't correct those errors in real time. And they don't maintain coherent operations long enough to run large, structured algorithms. That means they're great for research, but not useful for breaking [encryption](https://www.paloaltonetworks.com/cyberpedia/data-encryption). A cryptographically relevant quantum computer---also called a CRQC---represents a completely different threshold. It's not just a bigger version of today's machines. It's a future class of hardware capable of performing complex, fault-tolerant quantum computations at scale. ![Bold black text at the top reads 'Cryptographically relevant quantum computer (CRQC).' Beneath it, a paragraph in dark green explains that a CRQC is a future quantum computer capable of breaking public-key cryptography by running fault-tolerant quantum algorithms at scale. On the left, a section titled 'KEY TRAITS:' in purple lists bullet points describing fault-tolerant computation, logical rather than physical qubits, deep stable quantum circuits, long coherent runtime, and the ability to run Shor's algorithm at RSA/ECC scales. Below the list, a rounded gray box contains a lock icon and the text stating that CRQCs do not yet exist but will render current public-key encryption insecure once they do. On the right side, a stylized illustration shows a futuristic quantum computing platform with a circular purple quantum processor displaying a glowing atomic symbol, surrounded by digital panels, stacked purple server-like units, flowing data streams, and graphical interface screens.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/crqcs-cryptographically-relevant-quantum-computers/crqc.png "Bold black text at the top reads 'Cryptographically relevant quantum computer (CRQC).' Beneath it, a paragraph in dark green explains that a CRQC is a future quantum computer capable of breaking public-key cryptography by running fault-tolerant quantum algorithms at scale. On the left, a section titled 'KEY TRAITS:' in purple lists bullet points describing fault-tolerant computation, logical rather than physical qubits, deep stable quantum circuits, long coherent runtime, and the ability to run Shor's algorithm at RSA/ECC scales. Below the list, a rounded gray box contains a lock icon and the text stating that CRQCs do not yet exist but will render current public-key encryption insecure once they do. On the right side, a stylized illustration shows a futuristic quantum computing platform with a circular purple quantum processor displaying a glowing atomic symbol, surrounded by digital panels, stacked purple server-like units, flowing data streams, and graphical interface screens.") In other words: A CRQC doesn't exist yet. But it's the point where quantum computers stop being experimental and start becoming a real-world security threat. ## What would a quantum computer need to become cryptographically relevant? The term *cryptographically* relevant isn't about hype. It's about thresholds. For a quantum computer to break today's public-key cryptography, it would need to reach a very specific level of maturity. And that bar is higher than most people think. Here's why: It's not enough to increase the number of qubits. **The machine also needs to be fault-tolerant.** That means it can detect and correct its own errors during a computation. Without that, deeper algorithms like Shor's simply don't work. Plus, fault tolerance requires another step: Logical qubits. ***Note:*** *A qubit is the quantum version of a bit. Unlike classical bits, which are either 0 or 1, a qubit can exist in multiple states at once. A logical qubit is a stable, error-corrected version created by encoding one qubit's information across many physical qubits.* **A CRQC would likely need thousands of logical qubits.** Achieving that could take millions of physical qubits. Because each logical qubit demands error correction across dozens or hundreds of physical qubits, depending on error rates. Then there's runtime. **A CRQC would need to maintain coherent, error-corrected operation long enough to finish the full circuit depth required to factor an RSA key or solve an elliptic-curve discrete log problem.** To put it more simply: it would need to run complex quantum calculations cleanly and reliably---without drifting off course or breaking down. That means running cleanly across billions of quantum gate operations. Possibly for hours. Important: We're not just waiting for more power. We're waiting for stability, precision, and time. Those are the real barriers. Until a quantum system can meet all three, it's not cryptographically relevant. It may be useful for other things. But it won't threaten encryption at scale. Yet. | ***Further reading:** [What Is Q-Day, and How Far Away Is It---Really?](https://www.paloaltonetworks.com/cyberpedia/what-is-q-day)* ## Which encryption methods would a CRQC break? A cryptographically relevant quantum computer wouldn't disrupt everything. But it would break the cryptographic foundations that most digital systems rely on today. ![Bold black text at the top center reads 'What a CRQC would break — and what it would weaken.' Two rounded rectangular panels are positioned side by side. The left panel has an orange circle at the top containing a prohibition symbol and is labeled 'Fully broken' in bold orange text with a subheading 'Via Shor's algorithm.' Below it, three items appear with small orange key icons: 'RSA,' 'ECC / ECDSA,' and 'DSA, ElGamal.' The right panel has an orange circle at the top containing an unlocked padlock icon and is labeled 'Weakened but still secure' in bold orange text with a subheading 'Via Grover's algorithm.' Three items follow with orange key icons: 'AES (128-bit),' 'AES (256-bit),' and 'SHA-2, SHA-3.' Beneath both panels, centered gray text with a warning icon reads 'Retrospective impact:' followed by the statement 'Any data encrypted with broken algorithms — even years ago — becomes vulnerable the moment a CRQC exists.'](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/crqcs-cryptographically-relevant-quantum-computers/What-a-CRQC-would-break.png "Bold black text at the top center reads 'What a CRQC would break — and what it would weaken.' Two rounded rectangular panels are positioned side by side. The left panel has an orange circle at the top containing a prohibition symbol and is labeled 'Fully broken' in bold orange text with a subheading 'Via Shor's algorithm.' Below it, three items appear with small orange key icons: 'RSA,' 'ECC / ECDSA,' and 'DSA, ElGamal.' The right panel has an orange circle at the top containing an unlocked padlock icon and is labeled 'Weakened but still secure' in bold orange text with a subheading 'Via Grover's algorithm.' Three items follow with orange key icons: 'AES (128-bit),' 'AES (256-bit),' and 'SHA-2, SHA-3.' Beneath both panels, centered gray text with a warning icon reads 'Retrospective impact:' followed by the statement 'Any data encrypted with broken algorithms — even years ago — becomes vulnerable the moment a CRQC exists.'") Let's start with what would be directly compromised. **All widely deployed public-key cryptography would be broken.** **That includes RSA, which is used for secure connections and key exchanges. It also includes elliptic-curve cryptography**, which underpins modern authentication, digital signatures, and encryption schemes. These algorithms rely on mathematical problems---like factoring and discrete logarithms---that quantum algorithms could solve efficiently at scale. In other words: Once a quantum computer can run Shor's algorithm against real-world key sizes, public-key cryptography as we know it becomes insecure. **Symmetric encryption is a different story.** **It wouldn't be broken outright. But it would be weakened.** A quantum computer could use Grover's algorithm to reduce the effective security level. That means 128-bit symmetric keys could offer just 64 bits of security in a quantum scenario. Hash functions would see similar reductions in collision or preimage resistance. Critical point: These changes don't happen gradually. The moment a CRQC exists, this impact becomes real. And it applies retroactively to any encrypted data that's already been captured. Which is why [quantum security](https://www.paloaltonetworks.com/cyberpedia/what-is-quantum-security) has become such a critical initiative. | ***Further reading:** [Quantum Readiness: What It Means and How to Achieve It](https://www.paloaltonetworks.com/cyberpedia/quantum-readiness)* ## Why does the CRQC threat matter now? According to [NIST IR 8547, Transition to Post-Quantum Cryptography Standards](https://csrc.nist.gov/pubs/ir/8547/ipd), encrypted data is already at risk because it can be captured today and decrypted later using quantum computers. Since many types of sensitive data remain valuable for years, this threat model is a key reason to begin migrating to post-quantum cryptography now. It's easy to assume this is a future problem. After all, cryptographically relevant quantum computers don't exist yet. But the threat is already active. Just in a different way. The risk comes from what's called *harvest now, decrypt later.* Encrypted data can be intercepted and stored today. That data might not be readable now. But once a CRQC becomes available, any old traffic encrypted with broken algorithms can be decrypted. The threat is delayed, not prevented. ![Horizontal process diagram titled 'Harvest now, decrypt later (HNDL)' showing five sequential steps connected by arrows. Step 1, in a blue square, reads 'Data exfiltration' with subtext 'Steals encrypted traffic or files.' Step 2, in a lighter blue square, reads 'Cold storage' with subtext 'Keeps ciphertext for years.' Step 3, in an orange square, reads 'Advances in quantum computing' with subtext 'Waits for quantum systems.' Step 4, in a white square with a blue lock icon, reads 'Decrypt later' with subtext 'Shor's breaks RSA/ECC.' Step 5, in a purple square, reads 'Use the plaintext' with subtext 'Read, sell, or forge identities.' Small text under several steps notes 'Years can pass' to indicate elapsed time between stages.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/crqcs-cryptographically-relevant-quantum-computers/harvest-now-decrypt-later.png "Horizontal process diagram titled 'Harvest now, decrypt later (HNDL)' showing five sequential steps connected by arrows. Step 1, in a blue square, reads 'Data exfiltration' with subtext 'Steals encrypted traffic or files.' Step 2, in a lighter blue square, reads 'Cold storage' with subtext 'Keeps ciphertext for years.' Step 3, in an orange square, reads 'Advances in quantum computing' with subtext 'Waits for quantum systems.' Step 4, in a white square with a blue lock icon, reads 'Decrypt later' with subtext 'Shor's breaks RSA/ECC.' Step 5, in a purple square, reads 'Use the plaintext' with subtext 'Read, sell, or forge identities.' Small text under several steps notes 'Years can pass' to indicate elapsed time between stages.") This matters most for long-lived data. Think government records, medical histories, trade secrets, or source code. Anything with value that extends beyond a few years is at risk. Here's why: Even if the quantum threat is ten years away, the damage could already be done by then. And some secrets---like private keys or firmware signatures---don't expire. If they're ever compromised, the effect is permanent. Digital signatures have the same issue. Once forged, trust breaks down. And you can't go back and revalidate the past. In short: The CRQC threat doesn't begin the day one gets built. It begins the moment your [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data) gets captured---if it's protected by cryptography that won't hold up when quantum finally arrives. | ***Further reading:*** * [*Harvest Now, Decrypt Later (HNDL): The Quantum-Era Threat*](https://www.paloaltonetworks.com/cyberpedia/harvest-now-decrypt-later-hndl) * [*8 Quantum Computing Cybersecurity Risks \[+ Protection Tips\]*](https://www.paloaltonetworks.com/cyberpedia/what-is-quantum-computings-threat-to-cybersecurity) ## What are common misconceptions about CRQCs? There's growing interest in quantum computing. But there's also confusion. Especially around what a cryptographically relevant quantum computer actually is. So let's clear a few things up. ![Bold black text at the top center reads 'Common misconceptions about cryptographically relevant quantum computers.' Below, three horizontal rows compare misconceptions on the left with realities on the right, separated by arrow icons inside dark circular buttons. Each row contains a white rounded rectangle for the misconception and a pale gray rounded rectangle for the reality. The first row lists the misconception 'CRQCs are just bigger versions of today's quantum computers,' followed by smaller text explaining that today's systems are small, noisy, not fault-tolerant, and that lab devices cannot maintain stable states long enough for cryptanalysis. The corresponding reality on the right states that CRQCs require thousands of logical qubits, deep error correction, and long coherent runtime, accompanied by an icon of interconnected circuit elements. The second row lists the misconception 'Quantum supremacy = cryptographic threat,' with subtext describing how supremacy demos show raw power but solve synthetic, not cryptanalytic, problems. The reality panel explains that a CRQC must run complex algorithms like Shor's at scale to break encryption and includes an icon of a chip running algorithms. The third row lists the misconception 'QKD replaces the need for post-quantum cryptography,' with subtext noting that QKD only secures communication channels, does not protect stored data or digital signatures, and requires specialized infrastructure. The reality panel states that post-quantum cryptography is still needed and that QKD does not replace it, alongside an icon showing binary code and a secure document.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/crqcs-cryptographically-relevant-quantum-computers/Common-misconceptions-about-cryptographically-relevant-quantum-computers.png "Bold black text at the top center reads 'Common misconceptions about cryptographically relevant quantum computers.' Below, three horizontal rows compare misconceptions on the left with realities on the right, separated by arrow icons inside dark circular buttons. Each row contains a white rounded rectangle for the misconception and a pale gray rounded rectangle for the reality. The first row lists the misconception 'CRQCs are just bigger versions of today's quantum computers,' followed by smaller text explaining that today's systems are small, noisy, not fault-tolerant, and that lab devices cannot maintain stable states long enough for cryptanalysis. The corresponding reality on the right states that CRQCs require thousands of logical qubits, deep error correction, and long coherent runtime, accompanied by an icon of interconnected circuit elements. The second row lists the misconception 'Quantum supremacy = cryptographic threat,' with subtext describing how supremacy demos show raw power but solve synthetic, not cryptanalytic, problems. The reality panel explains that a CRQC must run complex algorithms like Shor's at scale to break encryption and includes an icon of a chip running algorithms. The third row lists the misconception 'QKD replaces the need for post-quantum cryptography,' with subtext noting that QKD only secures communication channels, does not protect stored data or digital signatures, and requires specialized infrastructure. The reality panel states that post-quantum cryptography is still needed and that QKD does not replace it, alongside an icon showing binary code and a secure document.") **A CRQC isn't just a bigger version of today's quantum devices.** It's not the same as what researchers use in labs now. Those systems are still noisy, limited, and experimental. CRQCs require something entirely different: stability, scale, and fault tolerance. **They also aren't the same as quantum-supremacy machines.** Demonstrating quantum advantage on a narrow task doesn't mean a system can run cryptographic attacks. That's a much higher bar. **Another common misconception? That quantum key distribution (QKD) replaces the need for post-quantum cryptography.** It doesn't. QKD is a communication protocol. It doesn't protect stored data or signatures. And it requires specialized infrastructure, not just a software update. To sum up: Not every quantum breakthrough is a cryptographic threat. CRQCs are real, but they're specific. And understanding the distinction is what helps organizations prepare, without overreacting. | ***Further reading:** [What Is Post-Quantum Cryptography (PQC)? A Complete Guide](https://www.paloaltonetworks.com/cyberpedia/what-is-post-quantum-cryptography-pqc)* ![Icon of an ebook](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/crqcs-cryptographically-relevant-quantum-computers/icon-ebook.svg) ## INTERACTIVE EXPERIENCE: IS YOUR ORGANIZATION QUANTUM SAFE? Dive into an overview of quantum threats, post-quantum cryptography, and NIST's new standards. [Launch experience](https://www.paloaltonetworks.com/cortex/cloud/demo) ## CRQC FAQs ### What is a cryptographically relevant quantum computer? A cryptographically relevant quantum computer (CRQC) is a fault-tolerant quantum system capable of breaking widely used public-key cryptography, such as RSA and ECC, by running algorithms like Shor's at practical key sizes. ### What makes a quantum computer "cryptographically relevant"? A CRQC requires thousands of stable logical qubits, deep circuit execution, and long-duration fault-tolerant computation. It must support quantum algorithms at scales sufficient to break current public-key encryption. ### Can today's quantum computers break encryption? No. Current devices are NISQ-class: noisy, small-scale, and not fault-tolerant. They cannot run cryptographic attacks at meaningful key sizes. ### How close are we to building a CRQC? No one knows for certain. Estimates vary, but most suggest CRQCs are at least a decade away. Hardware, error correction, and system reliability remain major barriers. ### Which cryptographic algorithms would a CRQC break? CRQCs would break RSA, Diffie--Hellman, and elliptic curve cryptography. These rely on problems that Shor's algorithm can solve efficiently at scale. ### Would a CRQC also break symmetric encryption? No. Symmetric encryption would be weakened but not broken. Grover's algorithm reduces its effective strength, but increasing key sizes can mitigate that. ### Why does the CRQC threat matter now, even though none exist? Data encrypted today can be stored and decrypted later. Long-lived information and digital signatures are already at risk if protected by quantum-vulnerable algorithms. ### What is "harvest now, decrypt later"? It's the practice of intercepting and storing encrypted data now, with the intent to decrypt it later once CRQCs become available. ### Does QKD eliminate the need for post-quantum cryptography? No. QKD only protects live communication channels. It does not secure stored data or digital signatures and requires special infrastructure. ### How are CRQCs different from quantum-supremacy or quantum-advantage machines? Supremacy or advantage refers to solving narrow tasks faster than classical computers. CRQCs must support deep, error-corrected quantum circuits that target cryptographic problems---an entirely different capability. ### Are CRQCs already being built in secret? There's no evidence of that. While governments are investing in quantum research, CRQCs remain beyond current engineering capabilities. ### What should organizations do to prepare for CRQCs? Inventory quantum-vulnerable systems, monitor cryptographic dependencies, and develop migration plans. Transitioning to quantum-resistant algorithms takes time and should begin before CRQCs emerge. Related content [YouTube playlist: A CISO's Guide to Quantum Security Binge a 6-video series breaking down why quantum computing is closer than you think but not as difficult.](https://www.youtube.com/playlist?list=PLqATPiC_Bcl8ZGx_EAxQHq0PKa2ii6pNE) [Podcast: Threat Vector | Is the Quantum Threat Closer Than You Think? Hear how to start your transition to quantum-resistant cryptography now.](https://www.paloaltonetworks.com/resources/podcasts/threat-vector-is-the-quantum-threat-closer-than-you-think) [Podcast: Packet Pushers | The Why and How of Making Your Infrastructure Quantum-Safe Get the facts on making your organization post-quantum safe.](https://packetpushers.net/podcasts/heavy-networking/hn796-the-why-and-how-of-making-your-infrastructure-quantum-safe-sponsored/) [Blog: Palo Alto Networks Announces New Quantum Security Innovations Learn about the new crypto inventory tool, quantum-optimized firewalls and PAN-OS 12.1 enabled quantum readiness.](https://www.paloaltonetworks.com/blog/2025/08/securing-the-quantum-age/) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=Brief%3A%20Cryptographically%20Relevant%20Quantum%20Computers%20%28CRQC%29&body=A%20cryptographically%20relevant%20quantum%20computer%20is%20one%20capable%20of%20breaking%20widely%20used%20public-key%20encryption%20by%20running%20algorithms%20like%20Shor%E2%80%99s%20at%20scale.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/crqcs-cryptographically-relevant-quantum-computers) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language