[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Security Operations](https://www.paloaltonetworks.com/cyberpedia/security-operations?ts=markdown) 3. [Endpoint Protection](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-protection?ts=markdown) 4. [Extending Zero Trust To The Endpoint](https://www.paloaltonetworks.com/cyberpedia/extending-zero-trust-to-the-endpoint?ts=markdown) Table of contents * [What Is Endpoint Protection for Enterprises?](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-protection?ts=markdown) * [Why Endpoint Protection Is Essential](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-protection#why?ts=markdown) * [How Endpoint Protection Operates](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-protection#how?ts=markdown) * [The Evolution of Endpoint Protection](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-protection#evolution?ts=markdown) * [Defining Endpoint Protection Platform](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-protection#define?ts=markdown) * [How Endpoint Protection Differs From Endpoint Detection and Response (EDR)](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-protection#edr?ts=markdown) * [Threats Endpoint Protection Defends Against](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-protection#threats?ts=markdown) * [Components of Endpoint Protection](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-protection#components?ts=markdown) * [Endpoint Protection Use Cases](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-protection#use-cases?ts=markdown) * [What to Look for in an Endpoint Protection Platform](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-protection#what?ts=markdown) * [Endpoint Protection FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-protection#faqs?ts=markdown) * [What are the Requirements for Securing Endpoints?](https://www.paloaltonetworks.com/cyberpedia/10-requirements-for-securing-endpoints?ts=markdown) * [Why Endpoint Security is Important](https://www.paloaltonetworks.com/cyberpedia/10-requirements-for-securing-endpoints#why?ts=markdown) * [The 3 Main Steps for Endpoint Security](https://www.paloaltonetworks.com/cyberpedia/10-requirements-for-securing-endpoints#the?ts=markdown) * [10 Requirements for Securing Endpoints](https://www.paloaltonetworks.com/cyberpedia/10-requirements-for-securing-endpoints#endpoints?ts=markdown) * [Securing Endpoints in the Cloud](https://www.paloaltonetworks.com/cyberpedia/10-requirements-for-securing-endpoints#securing?ts=markdown) * [10 Requirements for Securing Endpoint FAQs](https://www.paloaltonetworks.com/cyberpedia/10-requirements-for-securing-endpoints#faqs?ts=markdown) * [What are Endpoint Security Management Challenges?](https://www.paloaltonetworks.com/cyberpedia/what-are-endpoint-security-management-challenges?ts=markdown) * [Why Endpoint Security is Important](https://www.paloaltonetworks.com/cyberpedia/what-are-endpoint-security-management-challenges#why?ts=markdown) * [Main Types of Endpoint Security](https://www.paloaltonetworks.com/cyberpedia/what-are-endpoint-security-management-challenges#main?ts=markdown) * [Common Endpoint Security Challenges](https://www.paloaltonetworks.com/cyberpedia/what-are-endpoint-security-management-challenges#common?ts=markdown) * [Advanced Endpoint Security Threats](https://www.paloaltonetworks.com/cyberpedia/what-are-endpoint-security-management-challenges#advanced?ts=markdown) * [Strategies for Managing Endpoint Security](https://www.paloaltonetworks.com/cyberpedia/what-are-endpoint-security-management-challenges#strategies?ts=markdown) * [Future Trends in Endpoint Security](https://www.paloaltonetworks.com/cyberpedia/what-are-endpoint-security-management-challenges#future?ts=markdown) * [Endpoint Security Management Challenges FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-endpoint-security-management-challenges#faqs?ts=markdown) * [What is the Role of AI in Endpoint Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-ai-in-endpoint-security?ts=markdown) * [The Importance of AI in Endpoint Security](https://www.paloaltonetworks.com/cyberpedia/what-is-ai-in-endpoint-security#importance?ts=markdown) * [How AI is Revolutionizing Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/what-is-ai-in-endpoint-security#how?ts=markdown) * [Implementing AI in Endpoint Security](https://www.paloaltonetworks.com/cyberpedia/what-is-ai-in-endpoint-security#implementing?ts=markdown) * [Enhancing AI Endpoint Security](https://www.paloaltonetworks.com/cyberpedia/what-is-ai-in-endpoint-security#enhancing?ts=markdown) * [Addressing Common Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-ai-in-endpoint-security#addressing?ts=markdown) * [Future Trends in AI Endpoint Security](https://www.paloaltonetworks.com/cyberpedia/what-is-ai-in-endpoint-security#future?ts=markdown) * [AI's Role in Endpoint Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-ai-in-endpoint-security#faqs?ts=markdown) * [3 Ways to Prevent Evasive Threats](https://www.paloaltonetworks.com/cyberpedia/3-ways-to-prevent-evasive-threats?ts=markdown) * [1. Use Purpose-Built Virtual Analysis](https://www.paloaltonetworks.com/cyberpedia/3-ways-to-prevent-evasive-threats#use?ts=markdown) * [2. Employ Bare Metal Analysis](https://www.paloaltonetworks.com/cyberpedia/3-ways-to-prevent-evasive-threats#employ?ts=markdown) * [3. Incorporate Threat Intelligence](https://www.paloaltonetworks.com/cyberpedia/3-ways-to-prevent-evasive-threats#incorporate?ts=markdown) * [Anti-Evasion Analysis and Contextual Threat Intelligence on One Platform](https://www.paloaltonetworks.com/cyberpedia/3-ways-to-prevent-evasive-threats#platform?ts=markdown) * [Why Endpoints Shouldn't Rely Entirely On Scanning?](https://www.paloaltonetworks.com/cyberpedia/why-endpoints-shouldnt-rely-entirely-on-scanning?ts=markdown) * [1. Reliance on Signature Database](https://www.paloaltonetworks.com/cyberpedia/why-endpoints-shouldnt-rely-entirely-on-scanning#reliance?ts=markdown) * [2. Identifies Only Known Threats](https://www.paloaltonetworks.com/cyberpedia/why-endpoints-shouldnt-rely-entirely-on-scanning#threats?ts=markdown) * [3. Performance Impact](https://www.paloaltonetworks.com/cyberpedia/why-endpoints-shouldnt-rely-entirely-on-scanning#impact?ts=markdown) * [4. Files at Rest Not Seen as Threats](https://www.paloaltonetworks.com/cyberpedia/why-endpoints-shouldnt-rely-entirely-on-scanning#files?ts=markdown) * [How Do I Measure Endpoint Security Effectiveness?](https://www.paloaltonetworks.com/cyberpedia/how-to-measure-endpoint-security-effectiveness?ts=markdown) * [Understanding Endpoints and Endpoint Awareness](https://www.paloaltonetworks.com/cyberpedia/how-to-measure-endpoint-security-effectiveness#understanding-endpoints-and-endpoint-awareness?ts=markdown) * [Measuring Endpoint Security Effectiveness](https://www.paloaltonetworks.com/cyberpedia/how-to-measure-endpoint-security-effectiveness#measuring-endpoint-security-effectiveness?ts=markdown) * [Real Time Endpoint Monitoring](https://www.paloaltonetworks.com/cyberpedia/how-to-measure-endpoint-security-effectiveness#real-time-endpoint-monitoring?ts=markdown) * [Measuring Endpoint Security Effectiveness FAQs](https://www.paloaltonetworks.com/cyberpedia/how-to-measure-endpoint-security-effectiveness#faqs?ts=markdown) * [What Is the Impact of Endpoint Security on System Performance?](https://www.paloaltonetworks.com/cyberpedia/what-is-the-impact-of-endpoint-security-on-system-performance?ts=markdown) * [The Importance of Endpoint Security](https://www.paloaltonetworks.com/cyberpedia/what-is-the-impact-of-endpoint-security-on-system-performance#importance?ts=markdown) * [Limitations of Endpoint Security](https://www.paloaltonetworks.com/cyberpedia/what-is-the-impact-of-endpoint-security-on-system-performance#limitations?ts=markdown) * [Impact of Endpoint Security on System Performance](https://www.paloaltonetworks.com/cyberpedia/what-is-the-impact-of-endpoint-security-on-system-performance#impact?ts=markdown) * [Endpoint Security Deployment Challenge](https://www.paloaltonetworks.com/cyberpedia/what-is-the-impact-of-endpoint-security-on-system-performance#endpoint?ts=markdown) * [Best Practices for Implementing Endpoint Security](https://www.paloaltonetworks.com/cyberpedia/what-is-the-impact-of-endpoint-security-on-system-performance#best?ts=markdown) * [Future Trends and Technologies](https://www.paloaltonetworks.com/cyberpedia/what-is-the-impact-of-endpoint-security-on-system-performance#future?ts=markdown) * [Endpoint Security's Impact on System Performance FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-the-impact-of-endpoint-security-on-system-performance#faqs?ts=markdown) * [What Is Endpoint Scanning?](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-scanning?ts=markdown) * [Endpoint Scanning Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-scanning#endpoint?ts=markdown) * [Why Endpoint Scanning Is Crucial for Modern Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-scanning#why?ts=markdown) * [How Endpoint Scanning Works: A Multi-Faceted Process](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-scanning#how?ts=markdown) * [Types of Endpoint Scans](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-scanning#types?ts=markdown) * [Key Steps for Effective Endpoint Scanning](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-scanning#steps?ts=markdown) * [Challenges and Limitations in Endpoint Scanning](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-scanning#challenges?ts=markdown) * [Enhancing Endpoint Scanning with Advanced Technologies](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-scanning#enhancing?ts=markdown) * [Best Practices for Optimizing Endpoint Scanning](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-scanning#best?ts=markdown) * [Endpoint Scanning vs. Other Endpoint Security Solutions](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-scanning#scanning?ts=markdown) * [Future Trends in Endpoint Scanning](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-scanning#future?ts=markdown) * [Endpoint Scanning FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-scanning#faqs?ts=markdown) * Extending Zero Trust To The Endpoint * [5 Ways Endpoint Security and Network Security Work Together](https://www.paloaltonetworks.com/cyberpedia/5-ways-endpoint-security-and-network-security-should-work-together?ts=markdown) * [Deep Dive: 5 Ways Endpoint and Network Security Work Together](https://www.paloaltonetworks.com/cyberpedia/5-ways-endpoint-security-and-network-security-should-work-together#endpoint?ts=markdown) * [Endpoint vs. Network Security: Defining the Defense Perimeter](https://www.paloaltonetworks.com/cyberpedia/5-ways-endpoint-security-and-network-security-should-work-together#vs?ts=markdown) * [Unifying Security in the Zero Trust Era](https://www.paloaltonetworks.com/cyberpedia/5-ways-endpoint-security-and-network-security-should-work-together#unifying?ts=markdown) * [Best Practices for Seamless Endpoint and Network Security Integration](https://www.paloaltonetworks.com/cyberpedia/5-ways-endpoint-security-and-network-security-should-work-together#best?ts=markdown) * [Endpoint and Network Security Integration FAQs](https://www.paloaltonetworks.com/cyberpedia/5-ways-endpoint-security-and-network-security-should-work-together#faqs?ts=markdown) # Extending Zero Trust To The Endpoint 5 min. read ### **Zero Trust on the Network - A Familiar Tune** Zero Trust is an increasingly accepted and celebrated network architecture security model. The phrase "never trust, always verify" rings a familiar tune for those focused on securing networks. Zero Trust focuses on the principle that an organization should not trust anything inside or outside its perimeter and that everything trying to connect to the network should be verified before access is granted. Accomplishing a Zero Trust architecture requires network segmentation and granular enforcement based on user, data and location. All traffic must be logged and inspected at various inspection points that identify and permit traffic based on established rules. This maintains least-privileged access and strict access control that gives you the network visibility and context necessary to limit lateral movement and identify attacks from within your network. As security technologies have advanced, the volume of data to secure has grown immensely. Data moves with endpoints in today's highly mobile world, making endpoints attractive targets for cy- berattacks. Accordingly, security policy must move with users and data and should not be tied to a particular location. With data and applications being accessed from devices all around the world, Zero Trust and its prevention-first approach should expand beyond your network and into endpoints. [![Get the XDR for Dummies Guide](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/XDR-for-dummies-guide-banner-55.png)](https://start.paloaltonetworks.com/xdr-for-dummies.html) ### **Zero Trust on the Endpoint -- A Holistic "Zero Trust" Story** Endpoint security products secure and collect data on the activity that occurs on endpoints, while network security products do the same for networks. To effectively combat advanced threats, both need to work together. An integrated platform approach that combines endpoint and network security is the only way to achieve holistic protection and implement the Zero Trust model across your entire security architecture. This approach must be part of everything we do so that prevention occurs wherever traffic occurs, everywhere data lives. Four criteria must be met to extend Zero Trust to the endpoint: ### 1. Protect Endpoints With Multiple Layers of Security Traditional security measures fail if an attacker finds a way to circumvent the weakest link, such as by delivering malware or exploiting application vulnerabilities. It is more effective to layer network and endpoint protections together so that, if an attacker succeeds in bypassing one measure, they will be confronted with another, making it progressively more difficult for them to succeed. The role of network security is to stop as many attacks as possible -- be they malware, phishing attacks or exploits -- from reaching an endpoint through the network. If an attack reaches the endpoint through a USB drive or other non-network means, the traffic is encrypted, or the user is oThine or off-network, the role of endpoint security is to neutralize an attacker's ability to do damage. Combining these disciplines for a Zero Trust architecture makes integration between endpoint and network security even more effective. ### 2. Integration With Network Security Extending Zero Trust to the endpoint weaves endpoint security with network security for a single, holistic security architecture. Intelligence gained on the endpoint should be fed into the firewall and vice versa. Policies should be set on the firewall such that, if the endpoint experiences an event, that endpoint can be quarantined until it can be fully scanned and cleansed. Additionally, ingesting user and traffic data from firewalls into a network security management tool provides context as to what is happening throughout the network. This allows you to write security policy to reflect such activity appropriately and to be enforced on the endpoint. The Zero Trust model also includes partnering endpoint security with virtual private network, or VPN, security so that global policy moves with the user and endpoint. To ensure endpoints are always protected, the VPN capabilities should be transparent to users and require no manual intervention to log in or connect. When endpoint security and VPNs work in conjunction with one another, endpoints are protected no matter their location, preventing bad traffic from getting to the VPN and firewall. To further enhance this integration, VPNs placed on a next-generation firewall extend policy enforcement into the tunnel. If traffic is encrypted and enters the network through a compromised endpoint, policy remains enforced. The granular visibility delivered by endpoint and network security integration must be augmented with automation for rapid, informed and accurate multivariate decision-making. This integration must also be seamless and lightweight so that it does not negatively affect the user. ### 3. Managing Multiple Kinds of Endpoints All organizations have multiple kinds of endpoints that must be managed, such as servers, workstations, desktops, laptops, tablets and mobile devices. To harden security posture and implement Zero Trust, endpoint protection needs to integrate with a firewall so that security policy follows the endpoints, no matter where they are. Multi-factor authentication, or MFA, should be enforced on a next-generation firewall for scalability and to move the line of exposure farther away from critical applications. This integration must not negatively affect system performance, so that users will not notice security running in the background and potentially try to remove or close security tools. ### 4. Layer 2--7 Access Control When implementing Zero Trust across your security architecture, ensure traffic is being inspected for malicious behavior both as it enters and leaves the endpoint. It's common for endpoints to assess traffic for potential threats as it enters the network. It is less common for traffic to be assessed as it leaves the network, under the assumption that the user and the user's activity are valid. However, if a user is compromised, an attacker could be exfiltrating data or intellectual property from the endpoint or using the compromised device for other nefarious activities. To prevent data or intellectual property from leaving your network, you need visibility into the activity on the endpoint, enabled through integration with a next-generation firewall. Based on policy set on the firewall, if a user or application traffic falls outside the scope of the defined security policy, the firewall can intervene and stop suspicious activity. This policy must enforce threat prevention rules, URL filtering and malware sandboxing features inside the encrypted VPN tunnel. The next-generation firewall also should have SSL decryption capabilities to decrypt encrypted traffic and gain the visibility necessary to determine if the traffic is malicious or not. If malicious traffic is identified, the integration between the firewall and endpoint should allow the firewall to block any command-and-control traffic and isolate the endpoint from your network. #### Palo Alto Networks Approach The Palo Alto Networks portfolio provides the tools, technologies, and products you need in order to turn your Zero Trust strategy into a practical deployment. A key component of Palo Alto Networks portfolio is [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr), the industry's first extended detection and response ([XDR](https://www.paloaltonetworks.com/cyberpedia/what-is-xdr)) platform. The Cortex XDR agent uses multiple methods of protection at critical stages of the attack lifecycle to prevent known and unknown malware, exploits and ransomware, as well as zero-day threats. Cortex XDR performs local analysis to identify malicious and benign files based on file property classification and previously known verdicts. On top of local analysis, Cortex XDR integrates with WildFire® cloud-based threat analysis service. On its own, WildFire performs dynamic and static analysis, machine learning and bare metal analysis to identify even the most evasive threats. As part of the platform, WildFire enables Cortex XDR and the next-generation firewalls to become sensors and enforcement points for your network and endpoints. Palo Alto Networks next-generation firewalls inspect all traffic, including applications, threats and content -- even if it's encrypted -- and tie that traffic to the user. The resulting visibility and data help security policy align with your organization's unique needs and initiatives. Like Cortex XDR, the next-generation firewall works with WildFire to protect against known and unknown threats. When WildFire identifies a new threat anywhere, it automatically creates and disseminates updated protections throughout the platform and to other members of the WildFire community to support a coordinated security infrastructure. These updates include threats newly identified by Cortex XDR for more comprehensive and effective protection across the architecture. Tying the policies from your network to your endpoints is GlobalProtect™ network security for endpoints, which extends your security policy to remote networks and mobile users. GlobalProtect inspects traffic using next-generation firewalls for full visibility of all network traffic, applications, ports and protocols. This visibility allows the seamless enforcement of security policy on endpoints, wherever the user is located. GlobalProtect provides user information to power User-ID™ technology and integrates with MFA protections in the firewall to prevent attackers from moving laterally using stolen credentials.. ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=Extending%20Zero%20Trust%20To%20The%20Endpoint&body=Zero%20Trust%20focuses%20on%20the%20principle%20that%20an%20organization%20should%20not%20trust%20anything%20inside%20or%20outside%20its%20perimeter.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/extending-zero-trust-to-the-endpoint) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-scanning?ts=markdown) What Is Endpoint Scanning? [Next](https://www.paloaltonetworks.com/cyberpedia/5-ways-endpoint-security-and-network-security-should-work-together?ts=markdown) 5 Ways Endpoint Security and Network Security Work Together {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language