[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [DSPM](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm?ts=markdown) 4. [DSPM Vs. CSPM: Key Differences and How to Choose](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm?ts=markdown) Table of Contents * [What is Data Security Posture Management? DSPM Guide](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm?ts=markdown) * [DSPM Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm#dspm-explained?ts=markdown) * [How DSPM Works](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm#works?ts=markdown) * [The Importance of Data Security Posture Management](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm#dspm-importance?ts=markdown) * [DSPM Capabilities](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm#dspm-capabilities?ts=markdown) * [DSPM Vs. CSPM](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm#dspm-vs-cspm?ts=markdown) * [DSPM Use Cases](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm#dspm-use-cases?ts=markdown) * [Data Security Posture Management Tools](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm#dspm-tools?ts=markdown) * [Data Security Posture Management FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm#faq?ts=markdown) * [How DSPM Is Evolving: Key Trends to Watch](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends?ts=markdown) * [From Static Discovery to Dynamic Intelligence](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#static?ts=markdown) * [The Convergence of DSPM with Cloud-Native Security Architectures](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#native?ts=markdown) * [Real-Time Data Detection and Response](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#response?ts=markdown) * [AI Security and Generative AI Data Protection](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#protection?ts=markdown) * [Automation, Policy-as-Code, and DevSecOps Integration](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#automation?ts=markdown) * [DSPM Key Trends FAQs](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#faq?ts=markdown) * [DSPM Market Size: 2025 Guide](https://www.paloaltonetworks.com/cyberpedia/dspm-market?ts=markdown) * [DSPM Market Size and Financial Overview](https://www.paloaltonetworks.com/cyberpedia/dspm-market#dspm?ts=markdown) * [Growth Drivers Reshaping the DSPM Market](https://www.paloaltonetworks.com/cyberpedia/dspm-market#growth?ts=markdown) * [Market Segmentation and Adoption Patterns](https://www.paloaltonetworks.com/cyberpedia/dspm-market#market?ts=markdown) * [Palo Alto Networks DSPM Market Position](https://www.paloaltonetworks.com/cyberpedia/dspm-market#position?ts=markdown) * [DSPM Market Forecast Through 2030](https://www.paloaltonetworks.com/cyberpedia/dspm-market#dspm?ts=markdown) * [DSPM Market FAQs](https://www.paloaltonetworks.com/cyberpedia/dspm-market#faqs?ts=markdown) * [How DSPM Combats Toxic Combinations: Enabling Proactive Data-Centric Defense](https://www.paloaltonetworks.com/cyberpedia/dspm-defense?ts=markdown) * [What Are Toxic Combinations?](https://www.paloaltonetworks.com/cyberpedia/dspm-defense#what?ts=markdown) * [The Role of Attack Path Analysis in Detection](https://www.paloaltonetworks.com/cyberpedia/dspm-defense#role?ts=markdown) * [DSPM Capabilities for Toxic Combination Mitigation](https://www.paloaltonetworks.com/cyberpedia/dspm-defense#dspm?ts=markdown) * [Aligning with Frameworks and Zero Trust](https://www.paloaltonetworks.com/cyberpedia/dspm-defense#aligning?ts=markdown) * [Best Practices for Implementation](https://www.paloaltonetworks.com/cyberpedia/dspm-defense#best?ts=markdown) * [How DSPM Combats Toxic Combinations FAQs](https://www.paloaltonetworks.com/cyberpedia/dspm-defense#faqs?ts=markdown) * [What Is a Data Flow Diagram?](https://www.paloaltonetworks.com/cyberpedia/data-flow-diagram?ts=markdown) * [Data Flow Diagram Explained](https://www.paloaltonetworks.com/cyberpedia/data-flow-diagram#data?ts=markdown) * [What Symbols Are in Data Flow Diagrams?](https://www.paloaltonetworks.com/cyberpedia/data-flow-diagram#what?ts=markdown) * [What Are the Different Levels of DFDs?](https://www.paloaltonetworks.com/cyberpedia/data-flow-diagram#different?ts=markdown) * [What Are the Benefits of Using a Data Flow Diagram?](https://www.paloaltonetworks.com/cyberpedia/data-flow-diagram#benefits?ts=markdown) * [Data Flow FAQs](https://www.paloaltonetworks.com/cyberpedia/data-flow-diagram#faqs?ts=markdown) * [What Is Data Exfiltration?](https://www.paloaltonetworks.com/cyberpedia/data-exfiltration?ts=markdown) * [Data Exfiltration Vs. Data Breach](https://www.paloaltonetworks.com/cyberpedia/data-exfiltration#data?ts=markdown) * [Risks of Data Exfiltration](https://www.paloaltonetworks.com/cyberpedia/data-exfiltration#risks?ts=markdown) * [Examples of Data Exfiltration](https://www.paloaltonetworks.com/cyberpedia/data-exfiltration#examples?ts=markdown) * [Data Exfiltration in Public Clouds](https://www.paloaltonetworks.com/cyberpedia/data-exfiltration#public?ts=markdown) * [Data Exfiltration Warning Signs](https://www.paloaltonetworks.com/cyberpedia/data-exfiltration#warning?ts=markdown) * [Preventing Data Exfiltration](https://www.paloaltonetworks.com/cyberpedia/data-exfiltration#preventing?ts=markdown) * [Data Exfiltration FAQs](https://www.paloaltonetworks.com/cyberpedia/data-exfiltration#faqs?ts=markdown) * [What Is Data Movement?](https://www.paloaltonetworks.com/cyberpedia/data-movement?ts=markdown) * [Data Movement Explained](https://www.paloaltonetworks.com/cyberpedia/data-movement#explained?ts=markdown) * [Data Movement and Cloud Data Security](https://www.paloaltonetworks.com/cyberpedia/data-movement#data-security?ts=markdown) * [5 Types of Data Movement, With Examples](https://www.paloaltonetworks.com/cyberpedia/data-movement#types?ts=markdown) * [The Fragmented Landscape of Data Movement Tools](https://www.paloaltonetworks.com/cyberpedia/data-movement#tools?ts=markdown) * [Data Movements FAQs](https://www.paloaltonetworks.com/cyberpedia/data-movement#faqs?ts=markdown) * [What Is a Data Breach?](https://www.paloaltonetworks.com/cyberpedia/data-breach?ts=markdown) * [Data Breaches Explained](https://www.paloaltonetworks.com/cyberpedia/data-breach#data?ts=markdown) * [The Breach Lifecycle](https://www.paloaltonetworks.com/cyberpedia/data-breach#lifecycle?ts=markdown) * [Why Preventing Data Breaches Matter](https://www.paloaltonetworks.com/cyberpedia/data-breach#why?ts=markdown) * [Data Breach Reporting](https://www.paloaltonetworks.com/cyberpedia/data-breach#reporting?ts=markdown) * [How Do Data Breaches Happen?](https://www.paloaltonetworks.com/cyberpedia/data-breach#how?ts=markdown) * [The Prevalence of Data Breaches](https://www.paloaltonetworks.com/cyberpedia/data-breach#prevalence?ts=markdown) * [Lessons from Headlining Breaches](https://www.paloaltonetworks.com/cyberpedia/data-breach#lessons?ts=markdown) * [‍How to Prevent Data Breaches](https://www.paloaltonetworks.com/cyberpedia/data-breach#prevent?ts=markdown) * [Data Breach FAQs](https://www.paloaltonetworks.com/cyberpedia/data-breach#faqs?ts=markdown) * [DSPM Tools: How to Evaluate and Select the Best Option](https://www.paloaltonetworks.com/cyberpedia/dspm-tools?ts=markdown) * [The Need for Data Security Posture Management (DSPM) Solutions](https://www.paloaltonetworks.com/cyberpedia/dspm-tools#solutions?ts=markdown) * [The Key 7 Components of DSPM Tools](https://www.paloaltonetworks.com/cyberpedia/dspm-tools#key?ts=markdown) * [How to Select the Right DSPM Solution](https://www.paloaltonetworks.com/cyberpedia/dspm-tools#how?ts=markdown) * [Common Challenges in Implementing DSPM](https://www.paloaltonetworks.com/cyberpedia/dspm-tools#common?ts=markdown) * [Data Security Posture Management FAQs](https://www.paloaltonetworks.com/cyberpedia/dspm-tools#faqs?ts=markdown) * [How DSPM Enables XDR and SOAR for Automated, Data-Centric Security](https://www.paloaltonetworks.com/cyberpedia/dspm-xdr-soar?ts=markdown) * [Why Data Context Matters in Modern Security](https://www.paloaltonetworks.com/cyberpedia/dspm-xdr-soar#why?ts=markdown) * [What DSPM Brings to XDR](https://www.paloaltonetworks.com/cyberpedia/dspm-xdr-soar#what?ts=markdown) * [How DSPM Powers SOAR Automation](https://www.paloaltonetworks.com/cyberpedia/dspm-xdr-soar#how?ts=markdown) * [The Synergy of DSPM, XDR, and SOAR](https://www.paloaltonetworks.com/cyberpedia/dspm-xdr-soar#synergy?ts=markdown) * [Best Practices for Implementation](https://www.paloaltonetworks.com/cyberpedia/dspm-xdr-soar#best?ts=markdown) * [How DSPM Enables XDR and SOAR FAQs](https://www.paloaltonetworks.com/cyberpedia/dspm-xdr-soar#faqs?ts=markdown) * [What Is Data Detection and Response (DDR)?](https://www.paloaltonetworks.com/cyberpedia/data-detection-response-ddr?ts=markdown) * [Data Detection and Response Explained](https://www.paloaltonetworks.com/cyberpedia/data-detection-response-ddr#data?ts=markdown) * [Why Is DDR Important?](https://www.paloaltonetworks.com/cyberpedia/data-detection-response-ddr#why?ts=markdown) * [Improving DSPM Solutions with Dynamic Monitoring](https://www.paloaltonetworks.com/cyberpedia/data-detection-response-ddr#improving?ts=markdown) * [A Closer Look at Data Detection and Response (DDR)](https://www.paloaltonetworks.com/cyberpedia/data-detection-response-ddr#ddr?ts=markdown) * [How DDR Solutions Work](https://www.paloaltonetworks.com/cyberpedia/data-detection-response-ddr#how?ts=markdown) * [How Does DDR Fit into the Cloud Data Security Landscape?](https://www.paloaltonetworks.com/cyberpedia/data-detection-response-ddr#landscape?ts=markdown) * [Does the CISO Agenda Need an Additional Cybersecurity Tool?](https://www.paloaltonetworks.com/cyberpedia/data-detection-response-ddr#does?ts=markdown) * [Supporting Innovation Without Sacrificing Security](https://www.paloaltonetworks.com/cyberpedia/data-detection-response-ddr#supporting?ts=markdown) * [DSPM and Data Detection and Response FAQs](https://www.paloaltonetworks.com/cyberpedia/data-detection-response-ddr#faqs?ts=markdown) * [What Is Data-Centric Security?](https://www.paloaltonetworks.com/cyberpedia/data-centric-security?ts=markdown) * [Why a Data-Centric Security Strategy Matters](https://www.paloaltonetworks.com/cyberpedia/data-centric-security#why?ts=markdown) * [When a Data Focus for Security Is Necessary](https://www.paloaltonetworks.com/cyberpedia/data-centric-security#when?ts=markdown) * [Data-Centric Security FAQs](https://www.paloaltonetworks.com/cyberpedia/data-centric-security#faqs?ts=markdown) * [What Is Unstructured Data?](https://www.paloaltonetworks.com/cyberpedia/unstructured-data?ts=markdown) * [Understanding Unstructured Data in the Cloud](https://www.paloaltonetworks.com/cyberpedia/unstructured-data#understanding?ts=markdown) * [Unstructured Data and Challenges with Data Security](https://www.paloaltonetworks.com/cyberpedia/unstructured-data#unstructured?ts=markdown) * [Key Aspects of Data Security for Unstructured Data](https://www.paloaltonetworks.com/cyberpedia/unstructured-data#key?ts=markdown) * [Unstructured Data FAQs](https://www.paloaltonetworks.com/cyberpedia/unstructured-data#faqs?ts=markdown) * [What Is Data Access Governance?](https://www.paloaltonetworks.com/cyberpedia/data-access-governance?ts=markdown) * [Data Access Governance Explained](https://www.paloaltonetworks.com/cyberpedia/data-access-governance#data?ts=markdown) * [Data Access Governance in Compliance and Auditing](https://www.paloaltonetworks.com/cyberpedia/data-access-governance#compliance?ts=markdown) * [Data Governance in Cloud Security](https://www.paloaltonetworks.com/cyberpedia/data-access-governance#cloud-security?ts=markdown) * [Software Used for Data Access Governance](https://www.paloaltonetworks.com/cyberpedia/data-access-governance#software?ts=markdown) * [Data Access Governance FAQs](https://www.paloaltonetworks.com/cyberpedia/data-access-governance#faqs?ts=markdown) * [DSPM for AI: Navigating Data and AI Compliance Regulations](https://www.paloaltonetworks.com/cyberpedia/dspm-data-ai-compliance?ts=markdown) * [How DSPM Secures Data Integrity and Enables Compliance](https://www.paloaltonetworks.com/cyberpedia/dspm-data-ai-compliance#how?ts=markdown) * [Navigating Global AI Compliance with DSPM](https://www.paloaltonetworks.com/cyberpedia/dspm-data-ai-compliance#navigating?ts=markdown) * [Securing the AI Lifecycle with DSPM](https://www.paloaltonetworks.com/cyberpedia/dspm-data-ai-compliance#lifecycle?ts=markdown) * [Integrating DSPM Across the Security Ecosystem](https://www.paloaltonetworks.com/cyberpedia/dspm-data-ai-compliance#ecosystem?ts=markdown) * [The Future of DSPM: Business Value and Responsible AI](https://www.paloaltonetworks.com/cyberpedia/dspm-data-ai-compliance#future?ts=markdown) * [DSPM for AI FAQs](https://www.paloaltonetworks.com/cyberpedia/dspm-data-ai-compliance#faqs?ts=markdown) * [What Is Data Discovery?](https://www.paloaltonetworks.com/cyberpedia/data-discovery?ts=markdown) * [How Data Discovery Works](https://www.paloaltonetworks.com/cyberpedia/data-discovery#how?ts=markdown) * [Data Discovery: The Key to Data Classification](https://www.paloaltonetworks.com/cyberpedia/data-discovery#data?ts=markdown) * [Benefits of Data Discovery](https://www.paloaltonetworks.com/cyberpedia/data-discovery#benefits?ts=markdown) * [Data Discovery FAQs](https://www.paloaltonetworks.com/cyberpedia/data-discovery#faqs?ts=markdown) * [What Is Structured Data?](https://www.paloaltonetworks.com/cyberpedia/structured-data?ts=markdown) * [Structured Data Explained](https://www.paloaltonetworks.com/cyberpedia/structured-data#structured?ts=markdown) * [Benefits of Structured Data](https://www.paloaltonetworks.com/cyberpedia/structured-data#benefits?ts=markdown) * [Challenges with Structured Data](https://www.paloaltonetworks.com/cyberpedia/structured-data#challenges?ts=markdown) * [Internal and External Sources of Structured Data](https://www.paloaltonetworks.com/cyberpedia/structured-data#internal?ts=markdown) * [Structured Data FAQs](https://www.paloaltonetworks.com/cyberpedia/structured-data#faqs?ts=markdown) * [What Is Shadow Data?](https://www.paloaltonetworks.com/cyberpedia/shadow-data?ts=markdown) * [Shadow Data Explained](https://www.paloaltonetworks.com/cyberpedia/shadow-data#shadow?ts=markdown) * [The Dangers of Shadow Data](https://www.paloaltonetworks.com/cyberpedia/shadow-data#the?ts=markdown) * [Mitigating Shadow Data Risks](https://www.paloaltonetworks.com/cyberpedia/shadow-data#mitigating?ts=markdown) * [Shadow IT FAQs](https://www.paloaltonetworks.com/cyberpedia/shadow-data#faqs?ts=markdown) * [How DSPM Enables Continuous Compliance and Data Governance](https://www.paloaltonetworks.com/cyberpedia/dspm-data-governance?ts=markdown) * [Why Traditional Compliance Approaches Fall Short](https://www.paloaltonetworks.com/cyberpedia/dspm-data-governance#why?ts=markdown) * [DSPM as a Foundation for Continuous Compliance](https://www.paloaltonetworks.com/cyberpedia/dspm-data-governance#dspm?ts=markdown) * [Strengthening Data Governance with DSPM](https://www.paloaltonetworks.com/cyberpedia/dspm-data-governance#strengthening?ts=markdown) * [Regulatory Alignment and Business Enablement](https://www.paloaltonetworks.com/cyberpedia/dspm-data-governance#regulatory?ts=markdown) * [Implementation Considerations and Best Practices](https://www.paloaltonetworks.com/cyberpedia/dspm-data-governance#implementation?ts=markdown) * [DSPM for Continuous Compliance and Data Governance FAQs](https://www.paloaltonetworks.com/cyberpedia/dspm-data-governance#faqs?ts=markdown) * [What Is Data Classification?](https://www.paloaltonetworks.com/cyberpedia/data-classification?ts=markdown) * [Data Classification Explained](https://www.paloaltonetworks.com/cyberpedia/data-classification#data?ts=markdown) * [Why Data Classification Matters](https://www.paloaltonetworks.com/cyberpedia/data-classification#why?ts=markdown) * [Data Classification Levels](https://www.paloaltonetworks.com/cyberpedia/data-classification#levels?ts=markdown) * [Data Classification Use Cases](https://www.paloaltonetworks.com/cyberpedia/data-classification#usecases?ts=markdown) * [How Does Data Classification Improve Data Security?](https://www.paloaltonetworks.com/cyberpedia/data-classification#how?ts=markdown) * [Data Classification FAQs](https://www.paloaltonetworks.com/cyberpedia/data-classification#faqs?ts=markdown) * DSPM Vs. CSPM: Key Differences and How to Choose * [Understand the Fundamentals --- What Are CSPM and DSPM?](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#understand?ts=markdown) * [DSPM Vs. CSPM: What's the Difference?](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#difference?ts=markdown) * [Pros and Cons of Each Approach](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#pros-and-cons?ts=markdown) * [Use Cases: When to Use DSPM, CSPM, or Both](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#use-cases?ts=markdown) * [Choosing the Right Approach (or Integrating Both)](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#approach?ts=markdown) * [DSPM Vs. CSPM FAQs](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#faqs?ts=markdown) * [What Is Cloud Data Protection?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-data-protection?ts=markdown) * [Why Companies Need Cloud Data Protection](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-data-protection#why?ts=markdown) * [How Companies Can Better Protect Their Data in Cloud Environments](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-data-protection#how?ts=markdown) * [The Benefits of Cloud Data Protection](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-data-protection#benefits?ts=markdown) * [Cloud Data Protection FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-data-protection#faqs?ts=markdown) # DSPM Vs. CSPM: Key Differences and How to Choose 5 min. read [Download The CNAPP Buyer's Guide](https://start.paloaltonetworks.com/cnapp-buyers-guide.html) Table of Contents * * [Understand the Fundamentals --- What Are CSPM and DSPM?](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#understand?ts=markdown) * [DSPM Vs. CSPM: What's the Difference?](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#difference?ts=markdown) * [Pros and Cons of Each Approach](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#pros-and-cons?ts=markdown) * [Use Cases: When to Use DSPM, CSPM, or Both](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#use-cases?ts=markdown) * [Choosing the Right Approach (or Integrating Both)](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#approach?ts=markdown) * [DSPM Vs. CSPM FAQs](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#faqs?ts=markdown) 1. Understand the Fundamentals --- What Are CSPM and DSPM? * * [Understand the Fundamentals --- What Are CSPM and DSPM?](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#understand?ts=markdown) * [DSPM Vs. CSPM: What's the Difference?](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#difference?ts=markdown) * [Pros and Cons of Each Approach](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#pros-and-cons?ts=markdown) * [Use Cases: When to Use DSPM, CSPM, or Both](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#use-cases?ts=markdown) * [Choosing the Right Approach (or Integrating Both)](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#approach?ts=markdown) * [DSPM Vs. CSPM FAQs](https://www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm#faqs?ts=markdown) CSPM and DSPM represent two distinct approaches to modern cloud security challenges. Cloud security posture management (CSPM) secures infrastructure configurations, while data security posture management (DSPM) protects sensitive information assets. Both enhance cloud visibility and compliance but address different risk vectors, making them complementary rather than competing technologies. ## Understand the Fundamentals --- What Are CSPM and DSPM? Cloud security teams face two distinct but interconnected challenges: securing cloud infrastructure and protecting the data within it. Two approaches have emerged to address these needs --- cloud security posture management and data security posture management. Understanding what CSPM and DSPM is foundational to building effective cloud security strategies. ### Cloud Security Posture Management (CSPM) Let's start with the basics of [cloud security posture management](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management?ts=markdown). CSPM focuses on securing your cloud infrastructure by continuously monitoring and managing cloud resource configurations. Cloud configuration management sits at the heart of CSPM, ensuring your cloud environments maintain proper security settings across [infrastructure-as-a-service](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-a-service?ts=markdown) and [platform-as-a-service](https://www.paloaltonetworks.com/cyberpedia/what-is-pass?ts=markdown) offerings. CSPM solutions work by automatically scanning your cloud infrastructure --- including compute instances, storage systems, and networking components --- to identify security vulnerabilities, misconfigurations, and compliance violations. Advanced CSPM solutions use both automated tools and manual processes to assess security posture and provide recommendations ranked by severity level. The primary goal of CSPM centers on preventing, detecting, and responding to risks within cloud infrastructure. Organizations implementing CSPM gain real-time visibility into their cloud security posture, enabling immediate remediation actions when threats emerge. CSPM objectives include: 1. Maintaining compliance with industry standards 2. Reducing the risk of [data breach](https://www.paloaltonetworks.com/cyberpedia/data-breach?ts=markdown) through infrastructure hardening 3. Optimizing security spending by identifying areas where enhanced protection meets cost efficiency. ### Data Security Posture Management (DSPM) First things first, [what is DSPM](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm?ts=markdown)? DSPM is a discipline and technology that takes a fundamentally different approach to data security by focusing on the data layer rather than infrastructure. Where CSPM secures the foundation, DSPM protects what lives on top of it and within it. [Data discovery](https://www.paloaltonetworks.com/cyberpedia/data-discovery?ts=markdown) and [data classification](https://www.paloaltonetworks.com/cyberpedia/data-classification?ts=markdown) form the cornerstone of DSPM operations, as these functions must first locate and categorize [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data?ts=markdown) before securing it. DSPMs employ advanced scanning techniques to identify sensitive data across diverse storage environments --- from on-premises databases to multicloud deployments. Once discovered, DSPM solutions classify data based on sensitivity levels and business criticality. The technology operates on the principle that not all data requires equal security measures, which allows organizations to apply appropriate controls based on what the data warrants. DSPM works by continuously monitoring data locations, access patterns, and usage behaviors. Advanced DSPMs track who accesses sensitive information, when access occurs, and how data moves. The technology identifies vulnerabilities like excessive permissions, misconfigurations in data storage settings, and unusual access patterns that might indicate security threats. The overarching goal of DSPM involves ensuring comprehensive [data security](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security?ts=markdown) regardless of where information resides. DSPM objectives encompass: 1. Providing visibility into data locations and access rights 2. Implementing appropriate security controls based on data sensitivity 3. Maintaining compliance with data protection regulations like [GDPR](https://www.paloaltonetworks.com/cyberpedia/gdpr-compliance?ts=markdown), [SOC 2](https://www.paloaltonetworks.com/cyberpedia/soc-2?ts=markdown), [HIPAA](https://www.paloaltonetworks.com/cyberpedia/what-is-hipaa?ts=markdown), and [CCPA](https://www.paloaltonetworks.com/cyberpedia/ccpa?ts=markdown). Data discovery and data classification capabilities enable organizations to understand their data landscape, while continuous monitoring ensures security posture remains strong as data environments evolve. ## DSPM Vs. CSPM: What's the Difference? While both DSPM and CSPM strengthen organizational security posture, their methodologies, scope, and protective mechanisms differ. The distinction between data security and cloud configuration approaches shapes how organizations build comprehensive security strategies. ### Focus and Scope Differences The most striking difference in any cloud posture tool comparison lies in the focus areas. CSPM concentrates on cloud infrastructure security and its configurations, focusing on aspects like virtual machines, containers, serverless functions, and cloud storage. While historically distinct, CSPM capabilities are often integrated into broader [cloud-native application protection platforms (CNAPP)](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform?ts=markdown) that offer comprehensive cloud security. In regards to regulatory compliance, CSPM solutions monitor cloud resource settings against established security frameworks like [NIST](https://www.paloaltonetworks.com/cyberpedia/nist?ts=markdown), CIS, and [PCI DSS](https://www.paloaltonetworks.com/cyberpedia/pci-dss?ts=markdown), identifying misconfigurations that could lead to infrastructure vulnerabilities. DSPM takes a data-centric approach that transcends infrastructure boundaries. "Data security versus cloud configuration" thinking becomes apparent here. DSPM solutions track sensitive information regardless of location, whether stored in public cloud, multicloud, or hybrid environments. DSPMs scan both structured and unstructured data. ### Operational Methodology CSPM operates through continuous infrastructure scanning and compliance checking, integrating directly with [cloud service providers](https://www.paloaltonetworks.com/cyberpedia/cloud-service-provider?ts=markdown) like AWS, Azure, and Google Cloud to monitor resource configurations in real-time. When CSPM tools detect misconfigurations, such as publicly accessible S3 buckets or weak authentication settings, they immediately alert security teams and often provide automated remediation options. DSPM employs advanced data discovery and classification engines to locate sensitive information across diverse environments. Rather than focusing on infrastructure settings, DSPM solutions analyze data content, access patterns, and usage behaviors. Cloud posture tools comparison studies show DSPMs leverage artificial intelligence to learn appropriate security postures for different data types, automatically adjusting protection levels based on sensitivity classifications. ### Integration Points and Capabilities Both CSPM and DSPM operate as core components within cloud-native application protection platforms (CNAPP). While CSPM ensures cloud infrastructure configurations comply with security policies and standards as part of a CNAPP platform, DSPM identifies and safeguards sensitive data within the cloud environment, providing visibility into its location across buckets, data volumes, OS and non-OS environments, and managed and hosted databases. When integrated within CNAPP, CSPM and DSPM work together to enhance visibility and cloud security posture. ### Risk Management Approaches CSPM addresses risks associated with cloud infrastructure misconfigurations and compliance violations. These tools focus on preventing security breaches at the infrastructure level by ensuring proper cloud resource settings and adherence to security policies. CSPM excels at detecting configuration drift and maintaining consistent security baselines across cloud environments. DSPM tackles data-centric risks, including unauthorized access, data leaks, and regulatory compliance violations. Cloud posture tools comparison analysis shows that DSPM solutions provide granular visibility into data locations, access patterns, and usage behaviors that CSPM can't deliver. DSPMs can identify shadow data, excessive permissions, and unusual data movement patterns that might indicate security threats. ### Compliance and Regulatory Focus Both approaches support compliance efforts but target different regulatory frameworks. CSPM solutions address cloud security standards and infrastructure compliance requirements. DSPMs focus on data protection regulations like GDPR, HIPAA, and CCPA, ensuring data handling practices meet specific regulatory mandates. | Aspect | CSPM | DSPM | | Primary Focus | Cloud infrastructure security and configurations | Data security and protection across all environments | | Scope | Cloud services, virtual machines, containers, storage configurations | Data assets, data flows, sensitive information regardless of location | | Key Concerns | Misconfigurations, insecure cloud settings, infrastructure compliance | Data breaches, unauthorized access, data privacy compliance | | Integration | CNAPPs, cloud service providers | CNAPPs, cloud service providers | | Risk Management | Infrastructure-centric risks and configuration vulnerabilities | Data-centric risks and information security threats | | Compliance Focus | Cloud security standards (CIS, NIST, PCI CSS, and more) | Data protection regulations (GDPR, HIPAA, CCPA, SOC 2, PCI CSS) | | Visibility | Cloud resource configurations and security posture; CSPM sees data's container. | Data locations, access rights, and usage patterns; DSPM sees the data itself. | |------------------|---------------------------------------------------------------------------------|-------------------------------------------------------------------------------| ## Pros and Cons of Each Approach Organizations evaluating security posture tradeoffs need to assess the strengths and limitations of each technology. Understanding CSPM pros and cons alongside DSPM pros and cons helps security teams make informed decisions about which tools align with their specific requirements and constraints. ### Strengths That Make CSPM Shine CSPM excels at providing comprehensive cloud visibility across multiple providers. Security teams gain centralized oversight of AWS, Azure, and Google Cloud environments through single-dashboard management, eliminating the complexity of navigating different cloud provider interfaces. Real-time monitoring capabilities detect misconfigurations immediately, enabling a rapid threat response that prevents security incidents before they escalate. Automated compliance checking represents another significant advantage. CSPM maps cloud configurations against regulatory frameworks like PCI DSS, SOC 2, and HIPAA, generating audit-ready reports that streamline compliance processes. ### Where CSPM Falls Short Despite robust infrastructure protection, CSPM limitations become apparent when addressing comprehensive security needs. Cloud-focused scope means CSPM tools can't protect on-premises and hybrid environments, creating potential blind spots in organizational security posture. Security posture tradeoffs emerge when organizations rely exclusively on CSPM without addressing data-layer risks. CSPMs lack insight into [workload](https://www.paloaltonetworks.com/cyberpedia/what-is-workload) security and are unable to detect vulnerable applications or infected containers running on properly configured infrastructure. Additionally, CSPM tools can't identify [lateral movement](https://www.paloaltonetworks.com/cyberpedia/what-is-lateral-movement) risks that allow attackers to traverse cloud environments after initial compromise. Multicloud complexity presents operational challenges as each cloud provider requires specialized expertise to configure CSPM effectively. Organizations often struggle with alert fatigue when CSPM solutions generate numerous misconfiguration alerts without risk prioritization context. ### DSPM's Compelling Advantages DSPM delivers comprehensive data protection that transcends infrastructure boundaries. Organizations gain granular visibility into sensitive information across on-premises databases, file servers, and cloud repositories, ensuring no data asset remains unprotected. Data discovery and classification capabilities automatically identify sensitive information, enabling appropriate security controls based on actual data sensitivity rather than storage location. Regulatory compliance becomes significantly easier with DSPM solutions that specifically address data protection requirements. Compliance initiatives benefit from DSPM's ability to track data lineage, access patterns, and usage behaviors. Proactive threat detection identifies unusual data access patterns and excessive permissions before they lead to breaches. DSPMs provide consistent policy enforcement across diverse data environments, ensuring security standards apply uniformly regardless of where information resides. Data lifecycle protection ensures sensitive information remains secure from creation through disposal. ### DSPM's Notable Limitations Implementation complexity represents the primary challenge organizations face with DSPM deployment. Integration across diverse data systems requires substantial resources and specialized expertise, particularly in environments with legacy databases and custom applications. Security posture tradeoffs include the significant time investment needed to properly configure DSPM across complex data landscapes. DSPM solutions focus exclusively on data protection without addressing infrastructure vulnerabilities that could enable data breaches. Organizations can't rely on DSPM alone to secure cloud environments, as infrastructure misconfigurations remain outside DSPM's scope. Management complexity increases with data environment diversity. Organizations with numerous data repositories, varying data formats, and different access control systems face challenging DSPM administration requirements. Performance impacts may occur when DSPMs scan large data repositories, potentially affecting system responsiveness during discovery operations. ## Use Cases: When to Use DSPM, CSPM, or Both Real-world deployment scenarios reveal when organizations should prioritize one approach over another --- or implement both technologies for comprehensive protection. Understanding specific DSPM use cases and CSPM use case applications helps security teams align technology choices with business requirements and regulatory obligations. ### CSPM Use Case Scenarios --- Infrastructure Protection First #### Misconfiguration Detection and Remediation Organizations operating cloud-centric environments benefit most from CSPM when infrastructure misconfigurations pose primary threats. A common CSPM use case involves detecting publicly accessible S3 buckets containing sensitive customer data. CSPMs automatically identify these exposures, map them to compliance frameworks like CIS or NIST, and provide specific remediation steps, including access restriction and encryption enforcement. #### Multicloud Compliance Monitoring Financial services companies exemplify CSPM success stories through cloud data compliance automation. Banks that monitor thousands of cloud resources use CSPMs to generate compliance reports across AWS, Azure, and Google Cloud environments, saving security teams hours of manual verification. #### Container and Kubernetes Security Companies demonstrate compelling CSPM use case scenarios through containerized resource monitoring. CSPM provides deep visibility into [Kubernetes](https://www.paloaltonetworks.com/cyberpedia/what-is-kubernetes) environments, identifying vulnerabilities in container configurations and gathering real-time security intelligence that enables proactive protection against container-specific risks. #### Shadow IT Detection and Management Organizations struggling with unauthorized cloud deployments rely on CSPM for comprehensive discovery. Multiaccount AWS environments with hundreds of instances benefit from CSPM solutions that automatically alert security teams when new workloads appear, ensuring complete hybrid cloud visibility across sanctioned and unsanctioned resources. #### DevOps Integration and Prevention Technology companies integrating security into development pipelines use CSPM to prevent misconfigurations before deployment. CSPM solutions integrate with CI/CD workflows, scanning infrastructure-as-code templates, and blocking deployments that violate security policies, ensuring consistent protection across development lifecycle stages. ### DSPM Use Cases --- Data-Centric Protection #### Data Discovery and Classification Healthcare organizations handling protected health information represent prime DSPM use cases. DSPMs scan diverse data repositories --- from on-premises databases to cloud storage --- automatically classifying patient records according to HIPAA requirements. Granular visibility enables appropriate security controls based on actual data sensitivity rather than storage location assumptions. #### Data Access Governance and Privacy Financial services institutions managing customer financial records demonstrate critical DSPM use case applications. DSPM solutions identify personally identifiable information across multiple datastores, ensuring GDPR and CCPA compliance through automated data classification and access monitoring. Hybrid cloud visibility becomes essential when sensitive data spans both legacy systems and modern cloud platforms. #### Real-Time Data Flow Monitoring Technology companies processing user data benefit from DSPMs that analyze payload data in real-time, detecting unusual access patterns that might indicate insider threats or external breaches. Runtime protection prevents data exfiltration before it occurs, providing immediate threat response capabilities. #### Legal and Professional Services Protection Law firms handling confidential client information leverage DSPM for comprehensive data governance. DSPM solutions enforce zero-trust data protection models, ensuring only authorized personnel access sensitive documents while maintaining detailed audit trails for regulatory compliance and professional ethics requirements. #### Shadow Data Discovery Enterprises with distributed data environments use DSPM to locate unknown data repositories. DSPMs discover sensitive information stored in unauthorized locations --- from personal cloud accounts to forgotten databases --- providing complete data inventory management across complex organizational structures. #### Data Breach Prevention and Response Companies protecting intellectual property rely on DSPM for proactive threat detection. DSPM solutions monitor data access patterns and flag anomalous behaviors that might indicate corporate espionage or insider threats, enabling rapid response before sensitive designs or processes face exposure. ### The Synergistic Approach --- Both Technologies Together Organizations with sensitive customer data in cloud environments often require both CSPM and DSPM for complete protection. Healthcare systems transitioning to cloud infrastructure need CSPM to ensure infrastructure meets HIPAA requirements while DSPM protects patient data regardless of storage location. Financial institutions demonstrate how CSPM detects infrastructure vulnerabilities while DSPM identifies which sensitive data faces exposure from those vulnerabilities, creating comprehensive cloud data compliance strategies that address both infrastructure and data-layer risks. ## Choosing the Right Approach (or Integrating Both) Security leaders evaluating how to choose between DSPM and CSPM must consider organizational priorities, regulatory requirements, and current security gaps. Strategic cloud risk prioritization determines which technology delivers immediate value while supporting long-term cloud security stack strategy objectives. ### Start with Your Primary Risk Exposure Organizations facing infrastructure vulnerabilities should prioritize CSPM deployment. Companies experiencing frequent cloud misconfigurations, compliance violations, or shadow IT challenges benefit from CSPM's automated detection and remediation capabilities. Cloud-centric businesses relying heavily on AWS, Azure, and Google Cloud Platform need CSPM's specialized cloud expertise to maintain security baselines. Data-intensive environments require DSPM prioritization. Healthcare organizations, financial institutions, and legal firms handling sensitive information must secure data assets regardless of storage location. Regulatory obligations make DSPM essential for compliance automation and audit preparation. Companies discovering unknown data repositories or facing [insider threat](https://www.paloaltonetworks.com/cyberpedia/insider-threat) concerns need DSPM's complete data visibility. ### Consider Unified Platform Benefits Enterprises increasingly choose comprehensive cloud security platforms that combine CSPM and DSPM capabilities. Unified platforms eliminate tool sprawl while providing integrated visibility across multicloud environments. Organizations seeking simplified management and consolidated reporting benefit from platforms that align cloud security stack strategy with operational efficiency. Smaller companies often begin with single-technology deployments based on immediate needs and expand to comprehensive platforms as environments grow. The phased approach allows budget-conscious organizations to address critical gaps while building toward holistic security coverage. Understanding how to choose between DSPM and CSPM ultimately depends on threat landscape assessment, regulatory requirements, and resource constraints. Most organizations with significant cloud investments and sensitive data assets achieve optimal protection through coordinated deployment strategies that leverage both technologies. ## DSPM Vs. CSPM FAQs ### What is multicloud security governance? Multicloud security governance is the practice of establishing unified security policies, controls, and oversight across multiple cloud service providers like AWS, Azure, and Google Cloud. It involves creating consistent security standards, compliance frameworks, and risk management processes that work seamlessly across different cloud environments. Multicloud security governance addresses challenges like varying security configurations, regional compliance requirements, and disparate monitoring tools. ### What is shadow data discovery? Shadow data discovery is the process of identifying and cataloging sensitive information that exists outside of an organization's centralized data management systems and security controls. It includes data stored in unauthorized cloud accounts, personal file sharing services, forgotten databases, backup systems, or duplicated across multiple locations without proper oversight. Organizations use shadow data discovery to eliminate blind spots in their data security posture and ensure comprehensive protection of sensitive information. ### What is risk-based vulnerability prioritization? Risk-based vulnerability prioritization is a security approach that ranks vulnerabilities based on the likelihood of successful exploitation and their potential business impact. The methodology considers factors like asset criticality, data sensitivity, threat likelihood, exploitability, and business context to determine which vulnerabilities require immediate attention. ### What is data protection impact assessment (DPIA)? Data protection impact assessment (DPIA) is a systematic evaluation process required under regulations like GDPR to identify and mitigate privacy risks associated with data processing activities. Organizations must conduct DPIAs when processing operations are likely to result in high risks to individual privacy rights, such as large-scale profiling, monitoring public areas, or processing sensitive personal data using new technologies. The DPIA process involves documenting data processing purposes, assessing necessity and proportionality, identifying privacy risks, and implementing measures to reduce those risks. DPIAs help organizations demonstrate compliance with privacy regulations, minimize privacy-related legal exposure, and build privacy protections into systems and processes from the design stage. Related content [Secure Your Data with Data Security Posture Management (DSPM) See how Cortex Cloud DSPM helps security teams identify, prioritize, and remediate risks in real time. By integrating AI-driven insights, automated compliance monitoring.](https://www.paloaltonetworks.com/resources/datasheets/data-security-posture-management?ts=markdown) [DSPM: Do You Need It? Discover five predominant approaches to data security, along with use cases and applications for each data security approach.](https://www.paloaltonetworks.com/resources/datasheets/why-dspm?ts=markdown) [Securing the Data Landscape with DSPM and DDR Stay ahead of the data security risks. Learn how data security posture management (DSPM) with data detection and response (DDR) fills the security gaps to strengthen your security....](https://www.paloaltonetworks.com//resources/guides/dspm-ddr-big-guide?ts=markdown) [The Buyer's Guide to DSPM and DDR Learn what to look for in a cloud data security provider and how DSPM and DDR can significantly enhance your organization's security posture.](https://www.paloaltonetworks.com/guides/data-centric-dspm-ddr-buyers-guide?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=DSPM%20Vs.%20CSPM%3A%20Key%20Differences%20and%20How%20to%20Choose&body=DSPM%20Vs%20CSPM%3A%20Learn%20key%20differences%20between%20data%20and%20cloud%20security%20posture%20management.%20Discover%20when%20to%20use%20each%20approach%20for%20comprehensive%20cloud%20protection.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/dspm-vs-cspm) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/data-classification?ts=markdown) What Is Data Classification? [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-data-protection?ts=markdown) What Is Cloud Data Protection? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language