[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/ai-security?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Next-Gen Trust Security](https://www.paloaltonetworks.com/network-security/next-gen-trust-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) [Next-Generation Identity Security](https://www.paloaltonetworks.com/idira?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-security-solution?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection and Response (CDR)](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection and Response (CDR)](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) Identity Security * [Human Identities](https://www.paloaltonetworks.com/idira/human?ts=markdown) * [Machine Identities](https://www.paloaltonetworks.com/idira/machine?ts=markdown) * [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Frontier AI Defense](https://www.paloaltonetworks.com/unit42/ai-advantage?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Introducing Idira, the next-generation identity security platform.](https://www.paloaltonetworks.com/idira?ts=markdown) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Generative AI Security](https://www.paloaltonetworks.com/cyberpedia/what-is-generative-ai-security?ts=markdown) 3. [Implementing Frontier AI Security: A Roadmap](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap?ts=markdown) Table of Contents * [What Is Generative AI Security? \[Explanation/Starter Guide\]](https://www.paloaltonetworks.com/cyberpedia/what-is-generative-ai-security?ts=markdown) * [Why is GenAI security important?](https://www.paloaltonetworks.com/cyberpedia/what-is-generative-ai-security#why-is-genai-security-important?ts=markdown) * [How does GenAI security work?](https://www.paloaltonetworks.com/cyberpedia/what-is-generative-ai-security#how-does-genai-security-work?ts=markdown) * [What are the different types of GenAI security?](https://www.paloaltonetworks.com/cyberpedia/what-is-generative-ai-security#different-types-of-genai?ts=markdown) * [What are the main GenAI security risks and threats?](https://www.paloaltonetworks.com/cyberpedia/what-is-generative-ai-security#gen-ai-risks?ts=markdown) * [How to secure GenAI in 5 steps](https://www.paloaltonetworks.com/cyberpedia/what-is-generative-ai-security#gen-ai-5-steps?ts=markdown) * [Top 12 GenAI security best practices](https://www.paloaltonetworks.com/cyberpedia/what-is-generative-ai-security#gen-ai-best-practices?ts=markdown) * [GenAI security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-generative-ai-security#gen-ai-security-faqs?ts=markdown) * [Frontier AI Security Checklist](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-checklist?ts=markdown) * [Inventory](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-checklist#inventory?ts=markdown) * [Data](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-checklist#data?ts=markdown) * [Identity](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-checklist#identity?ts=markdown) * [Actions](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-checklist#actions?ts=markdown) * [Monitoring](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-checklist#monitoring?ts=markdown) * [Evaluation](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-checklist#evaluation?ts=markdown) * [Governance](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-checklist#governance?ts=markdown) * [Frontier AI Security Checklist FAQs](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-checklist#faqs?ts=markdown) * Frontier Security Implementation Roadmap * [Do You Need a Frontier AI Security Implementation Roadmap?](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap#roadmap?ts=markdown) * [First 30 Days: Establish Visibility and Stop Uncontrolled Action](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap#action?ts=markdown) * [Days 31 to 90: Convert Discovery Into Controls](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap#controls?ts=markdown) * [Months 4 to 12: Mature AI Security into an Operating Capability](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap#capability?ts=markdown) * [Frontier AI Security Implementation Roadmap FAQs](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap#faqs?ts=markdown) * [What Is Frontier AI Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai-security?ts=markdown) * [Why Frontier AI Security Now](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai-security#why?ts=markdown) * [How Frontier Models Work](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai-security#how?ts=markdown) * [Why Architecture Matters for Security](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai-security#security?ts=markdown) * [Frontier AI Threat Model](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai-security#frontier?ts=markdown) * [Core Security Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai-security#core?ts=markdown) * [Frontier AI Security Controls](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai-security#controls?ts=markdown) * [Evaluation, Red Teaming, and Assurance](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai-security#evaluation?ts=markdown) * [Governance and Operating Model](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai-security#governance?ts=markdown) * [Third-Party AI Risk](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai-security#risk?ts=markdown) * [Metrics for Frontier AI Security](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai-security#metrics?ts=markdown) * [Frontier AI Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai-security#faqs?ts=markdown) * [What Is Frontier AI?](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai?ts=markdown) * [Frontier AI Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai#explained?ts=markdown) * [How Do Frontier Models Work?](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai#how?ts=markdown) * [Applications and Use Cases of Frontier Models](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai#models?ts=markdown) * [What Are the Benefits of Frontier Models?](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai#what?ts=markdown) * [Challenges with Frontier AI](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai#challenges?ts=markdown) * [Frontier AI FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai#faqs?ts=markdown) # Implementing Frontier AI Security: A Roadmap 4 min. read [Cloud Security Checklist for Defenders](https://www.paloaltonetworks.com/resources/guides/ultimate-cloud-security-checklist?ts=markdown) Table of Contents * * [Do You Need a Frontier AI Security Implementation Roadmap?](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap#roadmap?ts=markdown) * [First 30 Days: Establish Visibility and Stop Uncontrolled Action](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap#action?ts=markdown) * [Days 31 to 90: Convert Discovery Into Controls](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap#controls?ts=markdown) * [Months 4 to 12: Mature AI Security into an Operating Capability](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap#capability?ts=markdown) * [Frontier AI Security Implementation Roadmap FAQs](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap#faqs?ts=markdown) 1. Do You Need a Frontier AI Security Implementation Roadmap? * * [Do You Need a Frontier AI Security Implementation Roadmap?](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap#roadmap?ts=markdown) * [First 30 Days: Establish Visibility and Stop Uncontrolled Action](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap#action?ts=markdown) * [Days 31 to 90: Convert Discovery Into Controls](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap#controls?ts=markdown) * [Months 4 to 12: Mature AI Security into an Operating Capability](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap#capability?ts=markdown) * [Frontier AI Security Implementation Roadmap FAQs](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap#faqs?ts=markdown) Frontier AI security demands more than isolated controls. It requires a structured roadmap that moves from visibility to enforcement and, ultimately, to continuous operations. As AI systems act, connect, and evolve across environments, unmanaged exposure grows quickly. Security leaders need a clear sequence to identify where AI operates, govern how it behaves, and integrate protections into existing programs. This roadmap outlines how to establish control in the first 30 days, operationalize safeguards by day 90, and mature AI security into a durable, enterprise-wide capability. ## Do You Need a Frontier AI Security Implementation Roadmap? For security leaders, frontier AI isn't merely a stronger chatbot or a new productivity layer. It's a software, data, identity, and control-plane issue. A frontier model can synthesize exploit logic, accelerate vulnerability discovery, generate convincing social engineering, operate across connected tools, and act through delegated credentials. The same capability profile also enables defenders to triage incidents, reverse malware, test controls, summarize telemetry, and automate response with speed that conventional workflows can't match. Frontier AI security begins with one operating premise: Capability growth changes the threat model. New behaviors can emerge unpredictably, model internals remain difficult to interpret, and predeployment tests don't fully predict real-world risk once models interact with users, tools, and live environments. A mature program treats frontier AI as a high-value system with adversarial exposure. It governs model access, protects weights and training data, evaluates dangerous capabilities, monitors runtime behavior, controls tool use, tests for jailbreaks and [prompt injection](/content/pan/en_us/cyberpedia/what-is-a-prompt-injection-attack), and defines escalation paths when AI-driven actions could affect production systems, customers, or regulated data. To implement frontier AI security, organizations need a sequence leaders can fund, staff, and measure. The first phase should establish visibility and stop uncontrolled agentic exposure. The next phase should turn visibility into enforceable controls. The final phase should mature [AI security](/content/pan/en_us/cyberpedia/ai-security) into a standing operating capability connected to the SOC, cloud, identity, data, software, and vendor-risk programs. ## First 30 Days: Establish Visibility and Stop Uncontrolled Action The first 30 days should focus on discovery, ownership, and containment. Security leaders need to know where AI operates, which systems process [sensitive data](/content/pan/en_us/cyberpedia/sensitive-data), which agents can act, and which providers hold enterprise context. Inventory AI use across sanctioned platforms, SaaS copilots, developer tools, embedded AI features, model APIs, browser extensions, agent builders, vector stores, fine-tunes, service accounts, OAuth grants, and unofficial workflows. Use procurement records, [CASB](/content/pan/en_us/cyberpedia/what-is-a-next-generation-casb) and SSE telemetry, endpoint visibility, cloud logs, DNS and egress data, [API gateways](/content/pan/en_us/cyberpedia/what-is-api-gateway), SaaS audit logs, developer platform integrations, and expense data to find what attestations miss. Identify high-risk systems first. Prioritize customer-facing AI, regulated workflows, AI systems that process confidential data, agents with write permissions, developer tools connected to repositories, security tools processing incident data, and AI integrations tied to cloud consoles, ITSM, CRM, email, file stores, or financial systems. Freeze unknown agentic access until each workflow has an owner, purpose, credential scope, tool manifest, logging path, and approval rule. Agents with broad OAuth grants, persistent service tokens, production write access, or unclear business ownership should move to read-only mode or pause until reviewed. Review provider terms for training data use, retention, subprocessors, regional processing, logging access, incident notification, audit support, model-change notification, and termination support. Any provider that can train on enterprise prompts, retain sensitive uploads indefinitely, or deny meaningful incident evidence should receive an immediate risk rating. Collect logs from major AI tools before refining the program. The organization needs prompts, outputs where policy permits, retrieval events, tool calls, connector activity, agent actions, model versions, refusals, blocked actions, approvals, and downstream system changes. Early logging should favor high-risk workflows over broad, indiscriminate collection. ## Days 31 to 90: Convert Discovery Into Controls The next 60 days should turn the inventory into a working control model. By day 90, leaders should know which AI systems can operate, which need remediation, which require executive risk acceptance, and which should be disabled. Implement risk tiering across AI systems. Low-risk assistants, internal copilots, customer-facing systems, regulated workflows, code-writing agents, security automation, financial workflows, production-change agents, and critical-infrastructure use cases need different control levels. Each tier should define required review, logging, testing, approval, and incident response obligations. Deploy DLP, data classification, secrets detection, prompt and output inspection, and retention controls for high-risk AI channels. Extend data protection to prompts, uploads, completions, logs, embeddings, vector stores, memory, retrieval results, and tool outputs. Regulated data, credentials, proprietary code, and customer records need explicit handling rules. Strengthen access controls for users, agents, plugins, connectors, service accounts, and model APIs. Require scoped, time-bound credentials for agentic workflows. Review OAuth grants, API keys, service principals, cloud roles, SaaS tokens, and persistent secrets. Build a rapid revocation path for every AI-connected identity. Establish retrieval governance. High-risk systems should enforce entitlement-aware retrieval at query time, preserve source lineage, rank approved sources above unverified content, monitor sensitive indexes, and block retrieval from unapproved corpora. Vector stores need access control, encryption, retention limits, integrity checks, and documented ownership. Create approval gates for agent actions. Define which actions AI may recommend, draft, execute automatically, or route for approval. Production changes, external communications, customer-impacting actions, financial activity, code commits, security control changes, and privileged identity operations need explicit approval, source lineage, tool-call history, and rollback context. Run red-team tests against high-risk systems. Coverage should include prompt injection, jailbreaks, [data leakage](/content/pan/en_us/cyberpedia/data-leak), excessive agency, [retrieval poisoning](/content/pan/en_us/cyberpedia/what-is-data-poisoning), unsafe tool use, [sandbox](/content/pan/en_us/cyberpedia/sandboxing) escape, model extraction, connector abuse, and human approval manipulation. Failed tests should become release blockers or documented residual risks with compensating controls. Build AI incident playbooks. Response should cover agent shutdown, credential revocation, connector disablement, output quarantine, retrieval rollback, evidence preservation, provider notification, privacy escalation, legal review, customer communication, and postincident evaluation updates. ## Months 4 to 12: Mature AI Security into an Operating Capability The final phase should move frontier AI security from project mode into continuous operation. Leaders should fund tooling, staffing, and governance that connect AI telemetry to existing security and risk programs. Build continuous AI monitoring across prompts, completions, retrieval events, model refusals, tool calls, policy overrides, memory writes, agent plans, approvals, blocked actions, and downstream changes. Monitoring should correlate AI activity with identity, cloud, endpoint, SaaS, API, source-code, [data movement](/content/pan/en_us/cyberpedia/data-movement), and ticketing telemetry. Integrate AI telemetry into the [SOC](/content/pan/en_us/cyberpedia/what-is-a-soc). Analysts should be able to investigate prompt injection, data leakage, unsafe tool calls, agent misuse, connector compromise, suspicious retrieval, and AI-assisted account abuse within the same case workflow used for cloud, identity, endpoint, and application incidents. [SOAR](/content/pan/en_us/cyberpedia/what-is-soar) playbooks should support agent shutdown, credential revocation, connector disablement, and evidence preservation. Expand evaluations into a continuous program. Regression suites should run after model updates, system prompt changes, retrieval corpus changes, tool-schema updates, connector permission changes, and policy revisions. Production monitoring should feed new tests when attackers, users, or agents expose failure modes. Mature vendor governance. Require model-change notification, logging access, breach reporting, training-use restrictions, subprocessor transparency, regional processing commitments, termination support, and incident cooperation for critical AI providers. Map concentration risk across model providers, AI-enabled SaaS platforms, vector databases, orchestration frameworks, and agent platforms. Institutionalize board reporting. Reports should show AI asset coverage, high-risk systems, unapproved AI use, [sensitive data](/content/pan/en_us/cyberpedia/sensitive-data) exposure events, prompt injection attempts, blocked tool calls, agentic actions by class, evaluation failures, unresolved red-team findings, vendor concentration, incident trends, and time to revoke compromised agent credentials. Fund operating ownership. Frontier AI security needs named owners across security architecture, SOC, [IAM](/content/pan/en_us/cyberpedia/what-is-identity-and-access-management), [data security](/content/pan/en_us/cyberpedia/what-is-data-security), [AppSec](/content/pan/en_us/cyberpedia/appsec-application-security), cloud security, privacy, legal, procurement, vendor risk, engineering, and internal audit. The program should have budget for AI discovery, gateways, monitoring, evaluations, red teaming, data controls, identity governance, and incident response integration. ## Frontier AI Security Implementation Roadmap FAQs ### How should leaders decide which AI systems receive funding first? Fund the systems where capability, data sensitivity, and action authority intersect. A low-volume agent that can modify cloud resources deserves more urgent investment than a widely used assistant limited to nonsensitive summarization. Priority should follow risk concentration, not user count. ### Who should lead the roadmap? The CISO should lead the security program, but execution needs shared ownership. IAM, data security, cloud security, AppSec, SOC, legal, privacy, procurement, engineering, and business owners each control part of the AI risk surface. No single team can govern models, data, identities, tools, vendors, and incidents alone. ### What's the most common failure in the first phase? Teams over-index on known AI tools and miss embedded AI features inside SaaS platforms, developer tools, security products, and browser extensions. Discovery should look for AI data flows, API calls, OAuth grants, service accounts, and model-connected workflows, not just named AI applications. ### How should security teams handle shadow AI without blocking the business? Treat shadow AI as a signal of unmet demand. Identify where employees use unsanctioned tools, determine what data they process, and replace high-risk patterns with approved workflows that offer comparable utility. Blanket bans usually drive AI use into personal accounts and unmanaged channels. ### When should an AI system be paused rather than remediated in place? Pause systems that combine unclear ownership, sensitive data access, write permissions, weak logging, and no rollback path. Remediation can proceed after the organization knows who owns the workflow, what data it touches, which credentials it uses, and how to contain failure. ### How much logging is enough? Logging should support security investigation, privacy obligations, and operational troubleshooting without storing unnecessary sensitive content. High-risk systems need model version, user identity, agent identity, retrieved sources, tool calls, approvals, policy decisions, blocked actions, and downstream changes. Full prompt and output capture may require redaction, encryption, retention limits, or selective collection. ### How should leaders evaluate whether the 90-day phase worked? The program should show measurable control over high-risk AI use. By that point, leaders should know which systems are approved, which remain blocked, which need exceptions, which controls are deployed, which tests failed, and how incidents would route through security, privacy, legal, engineering, and vendor channels. ### What's the right balance between central governance and team-level ownership? Central teams should define risk tiers, approved providers, minimum controls, logging requirements, testing standards, and reporting. Product, engineering, and business teams should own their specific AI workflows, data boundaries, tool permissions, and residual risk. Centralized policy without local ownership won't survive operational reality. ### How should teams avoid turning the roadmap into documentation theater? Tie every roadmap milestone to telemetry, enforcement, or response capability. An AI inventory should feed access reviews and monitoring. Risk tiers should trigger control requirements. Provider reviews should change contract terms. Red-team findings should alter release gates, playbooks, and detection logic. ### What should happen when business teams need exceptions? Require a defined owner, business justification, data classification, affected users, permitted model, tool permissions, compensating controls, monitoring plan, expiration date, and approval authority. Exceptions should shrink over time. Permanent exceptions usually signal an architecture problem or a missing enterprise AI capability. ### How should the SOC prepare for frontier AI incidents? The SOC needs AI telemetry, playbooks, and case context. Analysts should be able to investigate prompt injection, data leakage, unsafe tool calls, suspicious retrieval, agent misuse, connector compromise, and AI-assisted account abuse alongside cloud, endpoint, identity, SaaS, API, and data events. ### What skills will the program require? The team needs expertise across AI application security, identity, cloud, data security, secure software delivery, detection engineering, vendor risk, privacy, legal, and incident response. Frontier AI security won't mature through AI specialists alone. It requires security practitioners who understand how AI changes existing control planes. ### How should executives measure progress after the first year? Measure governed coverage, not adoption. Leaders should track high-risk AI systems under control, sensitive data events, blocked unsafe actions, evaluation failure rates, unresolved red-team findings, AI incident response readiness, vendor concentration, time to revoke agent credentials, and time to validate exposure reduction. ### What's the strongest sign the roadmap has matured into an operating capability? AI security signals reach the same operational systems that manage enterprise risk today. AI telemetry flows into the SOC. AI providers sit inside vendor-risk governance. Agent credentials fall under IAM. AI data movement appears in data security workflows. Red-team results shape release gates. Board reporting reflects control effectiveness, not AI enthusiasm. Related Content [State of Cloud Security Report Get the full picture of how cloud risk is evolving. Download the State of Cloud Security Report 2025 to benchmark your strategy and act on what matters most.](https://www.paloaltonetworks.com/state-of-cloud-native-security?ts=markdown) [Frontier AI and the Future of Defense: Your Top Questions Answered What are the next steps for security leaders in this new age of frontier AI? We answer the top 10 questions customers are asking.](https://unit42.paloaltonetworks.com/frontier-ai-top-questions-answered/) [The AI Ecosystem Edge --- Introducing Our Frontier AI Alliance Frontier AI accelerates cyberattacks. Learn how Palo Alto Networks and the Frontier AI Alliance deliver an industry-standard, unified defense for enterprise AI resilience.](https://www.paloaltonetworks.com/blog/2026/04/ai-ecosystem-edge-introducing-frontier-ai-alliance/?ts=markdown) [Defender's Guide to Frontier AI: A Checklist for CISOs Advanced AI models with deep adversarial capabilities will soon become commonplace. Learn how to close your security gaps in this phased approach.](https://www.paloaltonetworks.com/resources/datasheets/defenders-guide-to-frontier-ai-checklist-for-cisos?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=Frontier%20Security%20Implementation%20Roadmap&body=Frontier%20AI%20security%20roadmap%20guides%20teams%20from%20visibility%20to%20control%20and%20continuous%20operations.%20Learn%20how%20to%20govern%20AI%20systems%2C%20data%2C%20identities%2C%20and%20actions%20at%20scale.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/frontier-ai-security-implementation-roadmap) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/frontier-ai-security-checklist?ts=markdown) Frontier AI Security Checklist [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-frontier-ai-security?ts=markdown) What Is Frontier AI Security? {#footer} Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/ai-security?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Next-Generation Identity Security](https://www.paloaltonetworks.com/idira?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![Palo Alto Networks Logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language