[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [AI in Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-in-security-automation?ts=markdown) 3. [What Is Generative AI in Cybersecurity?](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity?ts=markdown) Table of Contents * [What Is the Role of AI in Security Automation?](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-in-security-automation?ts=markdown) * [The Role and Impact of AI in Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-in-security-automation#role?ts=markdown) * [Benefits of AI in Security Automation](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-in-security-automation#benefits?ts=markdown) * [AI-Driven Security Tools and Technologies](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-in-security-automation#tools?ts=markdown) * [Evolution of Security Automation with Artificial Intelligence](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-in-security-automation#evolution?ts=markdown) * [Challenges and Limitations of AI in Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-in-security-automation#challenges?ts=markdown) * [The Future of AI in Security Automation](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-in-security-automation#future?ts=markdown) * [Artificial Intelligence in Security Automation FAQs](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-in-security-automation#faq?ts=markdown) * [What is the role of AIOps in Digital Experience Monitoring (DEM)?](https://www.paloaltonetworks.com/cyberpedia/what-is-the-role-of-aiops-in-digital-experience-monitoring-dem?ts=markdown) * [What Is AIOps?](https://www.paloaltonetworks.com/cyberpedia/what-is-the-role-of-aiops-in-digital-experience-monitoring-dem#what-is-aiops?ts=markdown) * [What Is DEM?](https://www.paloaltonetworks.com/cyberpedia/what-is-the-role-of-aiops-in-digital-experience-monitoring-dem#what-is-dem?ts=markdown) * [Why AIOps in Digital Experience Monitoring (DEM)](https://www.paloaltonetworks.com/cyberpedia/what-is-the-role-of-aiops-in-digital-experience-monitoring-dem#why-dem?ts=markdown) * [Applications of AIOps in DEM](https://www.paloaltonetworks.com/cyberpedia/what-is-the-role-of-aiops-in-digital-experience-monitoring-dem#applications?ts=markdown) * [Implementing AIOps in SASE Environments](https://www.paloaltonetworks.com/cyberpedia/what-is-the-role-of-aiops-in-digital-experience-monitoring-dem#implementing-aiops?ts=markdown) * [Benefits of AIOps](https://www.paloaltonetworks.com/cyberpedia/what-is-the-role-of-aiops-in-digital-experience-monitoring-dem#benefits?ts=markdown) * [Future of AI-Powered DEM](https://www.paloaltonetworks.com/cyberpedia/what-is-the-role-of-aiops-in-digital-experience-monitoring-dem#future?ts=markdown) * [AIOps in DEM FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-the-role-of-aiops-in-digital-experience-monitoring-dem#faq?ts=markdown) * [AIOps Use Cases: How AIOps Helps IT Teams?](https://www.paloaltonetworks.com/cyberpedia/aiops-use-cases?ts=markdown) * [AIOps Practical Use Cases](https://www.paloaltonetworks.com/cyberpedia/aiops-use-cases#practical?ts=markdown) * [Why Do AIOps Tools Matter?](https://www.paloaltonetworks.com/cyberpedia/aiops-use-cases#why?ts=markdown) * [Benefits of AIOps Solutions](https://www.paloaltonetworks.com/cyberpedia/aiops-use-cases#benefits?ts=markdown) * [AIOps Use Cases FAQs](https://www.paloaltonetworks.com/cyberpedia/aiops-use-cases#faqs?ts=markdown) * [What is an ML-Powered NGFW?](https://www.paloaltonetworks.com/cyberpedia/what-is-an-ml-powered-ngfw?ts=markdown) * What Is Generative AI in Cybersecurity? * [Using Generative AI in Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#using?ts=markdown) * [Benefits of Generative AI in Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#benefits?ts=markdown) * [Generative AI Applications in Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#generative?ts=markdown) * [Generative AI Cybersecurity Risks](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#ai?ts=markdown) * [AI in Cybersecurity: Predictions for the Future](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#cybersecurity?ts=markdown) * [Generative AI for Cybersecurity FAQs](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#faqs?ts=markdown) # What Is Generative AI in Cybersecurity? 3 min. read [Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com/) Table of Contents * * [Using Generative AI in Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#using?ts=markdown) * [Benefits of Generative AI in Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#benefits?ts=markdown) * [Generative AI Applications in Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#generative?ts=markdown) * [Generative AI Cybersecurity Risks](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#ai?ts=markdown) * [AI in Cybersecurity: Predictions for the Future](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#cybersecurity?ts=markdown) * [Generative AI for Cybersecurity FAQs](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#faqs?ts=markdown) 1. Using Generative AI in Cybersecurity * * [Using Generative AI in Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#using?ts=markdown) * [Benefits of Generative AI in Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#benefits?ts=markdown) * [Generative AI Applications in Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#generative?ts=markdown) * [Generative AI Cybersecurity Risks](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#ai?ts=markdown) * [AI in Cybersecurity: Predictions for the Future](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#cybersecurity?ts=markdown) * [Generative AI for Cybersecurity FAQs](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity#faqs?ts=markdown) Generative AI in cybersecurity represents a transformative shift in how security professionals predict, detect, and respond to threats. This technology leverages [machine learning models](https://www.paloaltonetworks.com/cyberpedia/machine-learning-ml?ts=markdown), particularly those based on generative adversarial networks (GANs), to simulate cyberattacks and defensive strategies. The capability of generative AI to produce new data instances that mimic real-world datasets allows cybersecurity systems to evolve rapidly, adapting to new threats as they emerge. As these AI models undergo training, they become increasingly sophisticated in understanding the nuances of security data, enabling them to identify subtle patterns of malicious activity that might elude traditional detection methods. ## Using Generative AI in Cybersecurity Cybersecurity is one of the most critical use cases for generative AI. In cybersecurity, the power of generative AI cuts two ways: It is a powerful tool for those who perpetrate cybercrime and an equally powerful tool for cybersecurity teams responsible for preventing and mitigating the risk of cybercrime. Generative AI in [security operations centers (SOCs)](https://www.paloaltonetworks.com/cyberpedia/what-is-a-soc) and [security event and incident management (SEIM)](https://www.paloaltonetworks.com/cyberpedia/what-is-siem) has become essential in cybersecurity prevention and threat mitigation. In SOCs, AI models can identify patterns indicative of cyberthreats, such as [malware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware), [ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-ransomware), or unusual network traffic, that might elude traditional detection systems. Generative AI contributes to more sophisticated data analysis and anomaly detection in SIEM systems. By learning from historical security data, AI models can establish a baseline of normal network behavior and then flag deviations that may signify security incidents. ## Benefits of Generative AI in Cybersecurity Generative AI in cybersecurity significantly bolsters the ability to identify and neutralize cyberthreats efficiently. By leveraging [deep learning models](https://www.paloaltonetworks.com/cyberpedia/what-is-inline-deep-learning), this technology can simulate advanced attack scenarios crucial for testing and enhancing security systems. This simulation capability is essential for developing strong defenses against known and emerging threats. Additionally, generative AI streamlines the implementation of security protocols by automating routine tasks, allowing cybersecurity teams to focus on more complex challenges. It also plays a pivotal role in training, providing realistic and dynamic scenarios that help improve the decision-making skills of IT security professionals. As cyberthreats become more sophisticated, generative AI's adaptive and proactive nature becomes increasingly critical in maintaining the integrity and resilience of cybersecurity infrastructures. ### Enhancing Threat Detection and Response Generative AI can create sophisticated models that predict and identify unusual patterns indicative of cyberthreats. This capability allows security systems to respond more rapidly and effectively than traditional methods. By continuously learning from data, generative AI adapts to new and evolving threats, ensuring that detection mechanisms are always several steps ahead of potential attackers. This proactive approach mitigates the risks of [breaches](https://www.paloaltonetworks.com/cyberpedia/data-breach) and minimizes the impact of those that may occur. Security teams benefit from these advanced analytics by receiving detailed insights into threat vectors and attack strategies. This enables them to devise targeted responses and strengthen their defense mechanisms against future attacks. This dynamic interplay between detection and response fortifies [cybersecurity frameworks](https://www.paloaltonetworks.com/cyberpedia/ai-risk-management-framework), making them resilient against the increasingly sophisticated landscape of cyberthreats. ### Automating Security Measures Generative AI streamlines cybersecurity by [automating routine security tasks](https://www.paloaltonetworks.com/cyberpedia/what-is-security-automation), such as configuring firewalls or scanning for vulnerabilities, freeing human resources for more complex issues. This technology also customizes security protocols by analyzing vast amounts of data to predict and enforce the most effective measures for each unique threat scenario. As a result, organizations can deploy dynamic security solutions that are both scalable and adaptable to changing threat landscapes. This automation enhances operational efficiency and significantly reduces the likelihood of human error, often a significant vulnerability in cybersecurity defenses. ### Scenario-Driven Cybersecurity Training Generative AI elevates cybersecurity training by creating realistic, scenario-based simulations that challenge professionals to respond to dynamic cyberthreats. These AI-generated scenarios adapt in real-time, reflecting the evolving nature of cyberthreats, thus providing a practical, immersive experience. Trainees can engage with various attack vectors and defense strategies, enhancing their ability to think critically and react swiftly under pressure. This hands-on approach builds deep technical expertise and improves decision-making skills, crucial for defending against sophisticated cyberattacks. ## Generative AI Applications in Cybersecurity Generative AI's ability to produce and utilize synthetic data enhances training protocols without compromising absolute data integrity. Its integration into cybersecurity operations transforms traditional defensive measures into proactive, adaptive strategies that keep pace with the rapidly changing digital threats. ### Detecting and Creating Phishing Attacks The use of generative AI has opened up new possibilities in both detecting and creating phishing attacks. While traditional anti-malware solutions focus on identifying known malicious code, generative AI can potentially identify more sophisticated and complex [phishing attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-phishing). By analyzing patterns in legitimate communications, such as email messages, generative AI can identify subtle signs of phishing emails that may otherwise go undetected. This can help individuals and organizations stay one step ahead of cybercriminals and protect themselves from potentially devastating attacks. ### Data Masking and Privacy Preservation Generative AI has the remarkable ability to create synthetic data that closely resembles real data sets. This is particularly useful when working with [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data) that needs to be protected. By generating data that mimics the real thing, organizations can avoid the risks of using actual data sets that may contain confidential or [personally identifiable information](https://www.paloaltonetworks.com/cyberpedia/pii?ts=markdown). This synthetic data can be used to train security models and algorithms without compromising the privacy of individuals or exposing sensitive data. In other words, generative AI can help organizations preserve [data privacy](https://www.paloaltonetworks.com/cyberpedia/data-privacy?ts=markdown) and protect against security breaches while leveraging machine learning and data analysis benefits. ### Automated Security Policy Generation Automated security policy generation can assist organizations in creating security policies customized to their specific context and needs. Analyzing an organization's environment and security requirements allows for generating optimized policies to provide an appropriate level of security while also considering the organization's unique characteristics. This approach ensures that the security policies are effective, relevant, and applicable to the organization's goals and objectives. ### Incident Response Generative AI has the potential to revolutionize [incident response](https://www.paloaltonetworks.com/cyberpedia/what-is-incident-response) by providing an automated approach to handling security incidents. One of the key benefits of generative AI is its ability to generate appropriate actions or scripts based on the nature of the incident. Cyber teams can then automate the initial steps of the response process, generating immediate responses to standard threats, categorizing incidents based on severity, and recommending mitigation strategies. With generative AI, cyber teams can quickly isolate affected systems to minimize the damage of a security breach. Generative AI can simulate various response strategies, enabling teams to evaluate the effectiveness of different approaches in real time and strengthening decision-making during a cybersecurity incident. By automating incident response in this way, organizations can save time, reduce costs, and improve overall security posture. ### Behavior Analysis and Anomaly Detection [Behavior analysis](https://www.paloaltonetworks.com/cyberpedia/what-is-user-entity-behavior-analytics-ueba) and anomaly detection are essential techniques used in cybersecurity to detect potential security threats. Generative AI can play a significant role in this process by generating models of normal user or network behavior and identifying deviations from the expected behavior. These deviations, also known as anomalies, may indicate a security breach or unauthorized access to the system. By analyzing these anomalies and comparing them to the expected behavior, security professionals can identify potential threats and take appropriate measures to prevent any security incidents. ### Reporting Generative AI streamlines the creation of comprehensive, understandable cybersecurity reports. It can synthesize data from various sources into coherent reports, highlighting key findings, trends, and potential vulnerabilities. This saves time and ensures the reports are more accurate and informative, providing valuable insights for decision-makers. Generative AI can identify and highlight patterns of interest or anomalies in the data, providing a more profound analysis that can be crucial for understanding the nuances of cybersecurity threats and defenses. AI-generated reports can be tailored to different audiences, from technical teams requiring in-depth analysis to executive summaries for leadership, enhancing communication of cybersecurity issues across an organization. ## Generative AI Cybersecurity Risks While generative AI has become an increasingly valuable tool for cybersecurity teams, it is also becoming a powerful weapon for cybercriminals. The same capabilities that make generative AI powerful for threat detection and incident response can be used maliciously. For example, cybercriminals can exploit the ability of generative AI to analyze and understand complex patterns to find vulnerabilities in cybersecurity systems. As generative AI models become more sophisticated, cybercriminals could reverse-engineer them to bypass security protocols. ### Adversaries and generative AI [Adversaries](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning) are already using generative AI to launch more sophisticated attacks. Their use of the technology will continue rising because it effectively brings speed, insight, automation, and imitation to their cybercrime weapons. Typical uses of generative AI by cybercriminals include the following: #### Phishing and Social Engineering Generative AI generates personalized content that mimics legitimate communication, tricking recipients into divulging sensitive information or downloading malware. #### Deepfakes Audio or video powered by generative AI can impersonate individuals, manipulate public opinion, or conduct sophisticated [social engineering attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-social-engineering). #### Malware Development Generative AI can create malware that adapts and evolves to evade detection by traditional antivirus and malware detection tools. #### Exploiting Vulnerabilities Generative AI can analyze individuals, systems, and software for vulnerabilities to launch more targeted attacks. #### Automated Hacking Generative AI can automate certain aspects of hacking, allowing cybercriminals to launch large-scale attacks that are more complex and difficult to detect and counter. #### Bypassing Security Measures AI models can be trained to mimic user behavior or generate inputs that can trick biometric security systems, CAPTCHAs, and other AI-based security solutions. ### Securing the AI Pipeline Securing the AI pipeline means safeguarding the entire [lifecycle of an AI system](https://www.paloaltonetworks.com/cyberpedia/ai-development-lifecycle), from data collection and model training to deployment and maintenance. This encompasses protecting data used for training AI models, ensuring the integrity of AI algorithms, and guarding against unauthorized access or tampering. It also involves continuously monitoring and updating the AI systems to protect against emerging threats. Securing the AI pipeline is critical for several reasons: 1. Protecting sensitive data from being compromised is particularly important when AI systems handle personal or confidential information. 2. Ensuring AI systems' reliability and trustworthiness is essential for their acceptance and effective utilization. 3. Guarding against manipulating AI systems can have serious consequences, from spreading misinformation to causing physical harm in AI-controlled environments. Best security practices in the AI pipeline include resilient [data governance](https://www.paloaltonetworks.com/cyberpedia/data-governance), [encryption](https://www.paloaltonetworks.com/cyberpedia/data-encryption) and secure coding practices, [multi-factor authentication](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-factor-authentication), and continuous monitoring and response. ## AI in Cybersecurity: Predictions for the Future ![Generative AI Predictions](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/generative-ai-in-cybersecurity/generative-ai-predictions.png) As AI continues to evolve, so do the risks to cybersecurity. The following [predictions](https://www.paloaltonetworks.com/cyberpedia/predictions-of-artificial-intelligence-ai-in-cybersecurity) provide several insights into the direction of AI in cybersecurity. 1. **More sophisticated AI-powered attacks**: With AI, attackers can create more sophisticated and targeted attacks that bypass traditional security measures. 2. **Greater use of AI for cyber defense**: As AI evolves, it will become more widely used for cybersecurity, including threat detection, analysis, and response. 3. **More regulations and standards**: As the risks of AI-powered attacks increase, more regulations and standards will be put in place to ensure the responsible and ethical use of AI. 4. **Greater emphasis on human oversight**: As AI becomes more prevalent in cybersecurity, it will become increasingly important to have human oversight and decision-making to ensure that AI is being used effectively and ethically. 5. **More investment in AI cybersecurity**: As the risks of AI-powered attacks increase, more will be invested in developing AI-powered cybersecurity solutions to stay ahead of attackers. The future of generative AI is closely tied to the ability of cybersecurity leaders to harness its power to ensure that the technology is used safely and securely across all industries and use cases. This means maximizing the use of generative AI for prevention, protection, response, and prediction. ## Generative AI for Cybersecurity FAQs ### What is generative AI in cybersecurity? Generative AI is a branch of artificial intelligence that creates models that generate new content, such as text, images, and videos. In cybersecurity, generative AI is used to create new fake data that can be used to train machine learning models to detect cyber attacks. ### How is generative AI used in cybersecurity? Generative AI is used in Cybersecurity to create new fake data that can be used to train machine learning models to detect cyber attacks. These models can then be used to identify and prevent future attacks. ### What are the benefits of using generative AI in cybersecurity? The benefits of using Generative AI in cybersecurity include improved accuracy in detecting cyberattacks, faster response times, and reduced human error in identifying potential threats. ### What are the challenges of using generative AI in cybersecurity? The challenges of using Generative AI in cybersecurity include: * The possibility of generating false positives or false negatives. * The need for large amounts of data to train the models. * The potential for attackers to use generative AI to create more sophisticated attacks. ### Can generative AI replace human cybersecurity experts? No, Generative AI cannot replace human cybersecurity experts. While it can help to automate specific tasks and improve the accuracy of threat detection, human experts are still needed to analyze the data and make decisions based on their expertise and experience. Related Content [What is Artificial Intelligence (AI) in Cybersecurity? The ultimate guide to leveraging AI in cybersecurity, including advantages and predictions.](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai?ts=markdown) [What is Cybersecurity Consolidation? The evolving threat landscape means organizations need airtight cyber defenses. A platform approach to cybersecurity ensures organizations are protected from the latest threats.](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation?ts=markdown) [Cyber Transformation Through Consolidation From multicloud environments to AI-based attacks, the threat landscape is changing rapidly. Consolidating your security is key to preventing threats in 2024 and beyond.](https://start.paloaltonetworks.com/secure-from-every-angle.html) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Generative%20AI%20in%20Cybersecurity%3F&body=Discover%20how%20Generative%20AI%20is%20transforming%20the%20cybersecurity%20landscape%20and%20learn%20how%20to%20protect%20your%20organization%20from%20potential%20threats.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-an-ml-powered-ngfw?ts=markdown) What is an ML-Powered NGFW? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language