[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-security-solution?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Network Security](https://www.paloaltonetworks.com/cyberpedia/network-security?ts=markdown) 3. [How Does a VPN Work?](https://www.paloaltonetworks.com/cyberpedia/how-does-a-vpn-work?ts=markdown) Table of Contents * [1. Pre-Connection Setup](#setup) * [2. The Initiation Phase](#initiation) * [3. Establishing the Tunnel](#establishing-the-tunnel) * [4. Data Transfer](#data-transfer) * [5. Network Routing and Resource Access](#network-routing) * [6. Ongoing Connection Management](#ongoing-connection-management) * [7. Connection Termination](#connection-termination) * [How Does a VPN Work? FAQs](#faq) # How Does a VPN Work? 5 min. read Table of Contents * [1. Pre-Connection Setup](#setup) * [2. The Initiation Phase](#initiation) * [3. Establishing the Tunnel](#establishing-the-tunnel) * [4. Data Transfer](#data-transfer) * [5. Network Routing and Resource Access](#network-routing) * [6. Ongoing Connection Management](#ongoing-connection-management) * [7. Connection Termination](#connection-termination) * [How Does a VPN Work? FAQs](#faq) 1. 1. Pre-Connection Setup * [1. 1. Pre-Connection Setup](#setup) * [2. 2. The Initiation Phase](#initiation) * [3. 3. Establishing the Tunnel](#establishing-the-tunnel) * [4. 4. Data Transfer](#data-transfer) * [5. 5. Network Routing and Resource Access](#network-routing) * [6. 6. Ongoing Connection Management](#ongoing-connection-management) * [7. 7. Connection Termination](#connection-termination) * [8. How Does a VPN Work? FAQs](#faq) A virtual private network, or VPN, secures data transfers across the internet by creating an encrypted tunnel between the user's device and a remote server. It involves configuring a secure network, authenticating user access, establishing a protected tunnel, and maintaining and terminating connections. VPNs enable secure remote access to company resources by ensuring data remains encrypted and inaccessible to unauthorized users. 1. Pre-Connection Setup ----------------------- ![Image labeled "Pre-Connection Setup," which presents a structured diagram explaining the initial setup phase for a VPN, listing the key components and settings required. The diagram is split into two main sections: "Infrastructure \& Component Overview" and Ȭonfiguration \& Policy Setting." The left section, "Infrastructure \& Component Overview," lists elements like Network Infrastructure, VPN Gateway, Internal Corporate Network, and External Employee Devices. The right section, Ȭonfiguration \& Policy Setting," includes items such as Security Policies, User Authentication, Encryption Standards, and Network Routes.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/vpn-pre-connection.png "Image labeled \"Pre-Connection Setup,\" which presents a structured diagram explaining the initial setup phase for a VPN, listing the key components and settings required. The diagram is split into two main sections: \"Infrastructure & Component Overview\" and Ȭonfiguration & Policy Setting.\" The left section, \"Infrastructure & Component Overview,\" lists elements like Network Infrastructure, VPN Gateway, Internal Corporate Network, and External Employee Devices. The right section, Ȭonfiguration & Policy Setting,\" includes items such as Security Policies, User Authentication, Encryption Standards, and Network Routes.") ### Infrastructure and Component Overview Corporate [*virtual private networks (VPN)*](https://www.paloaltonetworks.com/cyberpedia/what-is-a-vpn?ts=markdown) rely on the coordinated function of the VPN server or gateway, client software, and the underlying network infrastructure. The VPN gateway sits at the network's edge. It functions as a bridge between the internal corporate network and external devices, implementing security measures for data traffic. Client software, installed on employee devices, initiates the VPN connection and handles ongoing communication with the VPN gateway. Network infrastructure includes routers, switches, and firewalls that maintain network integrity and facilitate data flow. ### Configuration and Policy Setting Before connecting to the internet through a VPN, there's a series of steps that must be followed. Initial VPN configuration requires careful setup. Administrators define security policies and access rules to govern the flow of traffic and dictate user permissions. This involves establishing a secure communication protocol, selecting strong encryption standards, and configuring network routes that the encrypted VPN traffic will follow. Access rules are set to specify which users can access which network resources when connected via VPN. This ensures employees have the appropriate level of network access, and company data and personal information remain secure. 2. The Initiation Phase ----------------------- ![Image labeled "The Initiation Phase," visually detailing the user authentication process during the initiation phase of a VPN setup by mapping out key components and sequence involved. It features a flowchart divided into two sections. The left section, labeled "User Authentication," includes a vertical sequence of steps: User/Device, Authentication Server, Multi-Factor Authentication, and Active Directory. The right section, labeled Ȭlient-Server Handshake," outlines the technical steps involved: Handshake Protocol, Version Negotiation, VPN Security Protocol, and Cipher Suite.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/initiation-phase.png "Image labeled \"The Initiation Phase,\" visually detailing the user authentication process during the initiation phase of a VPN setup by mapping out key components and sequence involved. It features a flowchart divided into two sections. The left section, labeled \"User Authentication,\" includes a vertical sequence of steps: User/Device, Authentication Server, Multi-Factor Authentication, and Active Directory. The right section, labeled Ȭlient-Server Handshake,\" outlines the technical steps involved: Handshake Protocol, Version Negotiation, VPN Security Protocol, and Cipher Suite.") ### User Authentication User authentication is the beginning of the VPN initiation phase. This process verifies the identity of the user attempting to access the network. Certificates issued by a trusted certificate authority confirm the legitimacy of the user's device. Multifactor authentication adds an additional security layer by requiring the user to provide two or more verification factors. This could include a password, a physical token, or a biometric verification. Directory services, such as Active Directory, centralize credential management and enforce access policies, ensuring that only authenticated users gain network access. The authentication process protects against unauthorized access from both the local network and the wider internet. ### Client-Server Handshake Following successful authentication, the client and server commence a handshake protocol. This step involves version negotiation where the client and server agree on the VPN security protocol version to be used. They also select a cipher suite, which dictates the encryption algorithm and key exchange method. The handshake ensures both the client and server have the necessary credentials and cryptographic capabilities to establish a secure communication channel. It is the foundation for all subsequent data exchanges across the encrypted connection, from the user to the internet service provider (ISP)---and through to the VPN server. 3. Establishing the Tunnel -------------------------- ![Diagram labeled Ȯstablishing the VPN Tunnel," depicting the third step in setting up a VPN, focusing on protocol selection and key exchange mechanisms. It is split into two parts. On the left, the "Protocol Selection and Security Considerations" section features icons for IPsec and L2TP, emphasizing the client-server handshake process. On the right, the "Key Exchange \& Encryption Mechanisms" section illustrates the use of public and private keys between a server and a client.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/vpn-tunnel.png "Diagram labeled Ȯstablishing the VPN Tunnel,\" depicting the third step in setting up a VPN, focusing on protocol selection and key exchange mechanisms. It is split into two parts. On the left, the \"Protocol Selection and Security Considerations\" section features icons for IPsec and L2TP, emphasizing the client-server handshake process. On the right, the \"Key Exchange & Encryption Mechanisms\" section illustrates the use of public and private keys between a server and a client.") ### Protocol Selection and Security Considerations Once the client-server handshake is complete, the focus shifts to establishing the VPN tunnel. The tunneling protocol is the core that supports secure data passage. Both the client and server agree on a tunneling protocol (such as IPsec or L2TP) that suits their security requirements and network capabilities. Tunneling protocol selection determines the level of security, compatibility with existing infrastructure, and the ability to traverse firewalls and network address translators (NATs). ### Key Exchange and Encryption Mechanisms Following protocol selection, the secure channel's creation begins with a key exchange. The Diffie-Hellman (DH) algorithm is often the choice for such exchanges. This provides a way to securely generate and share a key between the two parties without the need to transmit the key itself over the internet. In this mechanism, both client and server generate temporary key pairs---private and public---and exchange the public keys between them. Each side then combines the received public key with its own private key to generate a shared secret. Further security is provided by employing advanced DH groups with larger key sizes. Additionally, cryptographic algorithms such as AES are used to encrypt the shared secret, providing another layer of security. Some implementations use perfect forward secrecy (PFS), ensuring that the compromise of one key will not lead to the compromise of all subsequent keys. The secure channel is pivotal for maintaining data confidentiality and integrity in all communications between the client and the corporate network. Once established, the secure channel acts as a protective tunnel for data traffic. This ensures sensitive information sent through the tunnel remains encrypted and inaccessible to anyone without the decryption key. 4. Data Transfer ---------------- ![The image titled "Data Transfer" illustrates the fourth step in the VPN setup process, focusing on various aspects of data handling. It features a horizontal series of four diamond-shaped icons connected by lines, representing different stages in the data transfer process. From left to right, the icons depict "IP Address Allocation \& Network Integration," "Performance Optimization in Data Transmission," "Packet Switching \& Routing," and Ȯnsuring Integrity \& Privacy." Each icon is annotated with brief descriptions to guide understanding of how data is managed and secured during transmission over a VPN.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/data-transfer.png "The image titled \"Data Transfer\" illustrates the fourth step in the VPN setup process, focusing on various aspects of data handling. It features a horizontal series of four diamond-shaped icons connected by lines, representing different stages in the data transfer process. From left to right, the icons depict \"IP Address Allocation & Network Integration,\" \"Performance Optimization in Data Transmission,\" \"Packet Switching & Routing,\" and Ȯnsuring Integrity & Privacy.\" Each icon is annotated with brief descriptions to guide understanding of how data is managed and secured during transmission over a VPN.") ### IP Address Allocation and Network Integration After a secure channel is established, IP address allocation is central to integrating the client into the network. Each VPN client is assigned an IP address from a designated pool, which is crucial for directing packets to their proper destinations. IP address allocation enables the client device to effectively join the corporate network. This allows the client to access resources in alignment with established permissions and policies. ### Performance Optimization in Data Transmission In this phase, the efficiency of the data transfer comes to the forefront. VPN protocols can incorporate mechanisms like compression to improve throughput and reduce latency, optimizing network performance. The choice of tunneling protocol can impact connection speed and reliability. Protocols like point-to-point tunneling (PPTP) offer higher speeds but lower security, and others like OpenVPN provide a better balance of speed and security. ### Packet Switching and Routing The method by which data packets navigate through the VPN is pivotal for maintaining a high-performance connection. Packet switching techniques allow for dynamic packet routing. This accounts for factors like network congestion and changing conditions in real-time. A dynamic approach ensures that the VPN can maintain a stable and efficient connection, even in the face of varying network demands. ### Ensuring Integrity and Privacy Once data packets are prepared for transit, they travel through the secure tunnel, effectively isolated from outside interference. This privacy is not just about concealing data from potential eavesdroppers. It also maintains packet integrity, ensuring that no parts of the communication are altered in transit. At the tunnel's end, the VPN server processes the incoming packets. It decrypts the data and strips away encapsulation to forward original data to its intended destination within the corporate network. 5. Network Routing and Resource Access -------------------------------------- ![The image titled "Network Routing and Resource Access" visualizes the fifth step in setting up a VPN, focusing on traffic routing methods. It features a vertical design with three interconnected circles along a central line, each representing a key aspect of network routing. The top circle is labeled "Traffic Routing Methods: Split vs. Full Tunneling," illustrated with a diagram differentiating the two methods. The middle circle, labeled "Strategic Configuration for Efficiency \& Security," includes icons for network configuration. The bottom circle, titled "Access Control \& Network Policies," displays icons for security and policy management.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/network-routing.png "The image titled \"Network Routing and Resource Access\" visualizes the fifth step in setting up a VPN, focusing on traffic routing methods. It features a vertical design with three interconnected circles along a central line, each representing a key aspect of network routing. The top circle is labeled \"Traffic Routing Methods: Split vs. Full Tunneling,\" illustrated with a diagram differentiating the two methods. The middle circle, labeled \"Strategic Configuration for Efficiency & Security,\" includes icons for network configuration. The bottom circle, titled \"Access Control & Network Policies,\" displays icons for security and policy management.") ### Traffic Routing Methods: Split vs. Full Tunneling VPN technology offers two main methods for routing client traffic to the corporate network: split tunneling and full tunneling. Split tunneling allows for direct internet access by the user's device for noncorporate traffic. This conserves bandwidth on the corporate network. However, this can introduce security risks, as traffic does not benefit from corporate firewalls and other security measures. Full tunneling routes all client traffic through the VPN to the corporate network, regardless of its destination. This ensures all data is subject to corporate security policies but can result in increased bandwidth usage and potential network congestion. ### Access Control and Network Policies Access to network resources via a VPN is regulated through access control lists (ACLs) and network policies. ACLs are a set of rules that define which users or system processes are granted access to objects, and which operations are allowed on given objects. Each entry in an ACL specifies a subject and an operation; for example, it can allow a user to read a file but not to modify it. Network policies may further dictate terms based on user roles, device compliance status, and other factors. They ensure that only authorized users can access sensitive corporate resources, and define the conditions under which those resources may be accessed. These measures are central to safeguarding the corporate network and preventing unauthorized access to sensitive data. The strategic configuration of network routing and resource access is critical in balancing operational efficiency and security in a corporate VPN setup. Through appropriate tunneling methods and strict access controls, enterprises can ensure both the productivity and protection of their digital assets. 6. Ongoing Connection Management -------------------------------- ![The image titled "Ongoing Connection Management" details the sixth step in VPN configuration, focusing on the maintenance of network stability and security. It displays three interconnected circles along a horizontal line. Each circle contains an icon and title describing different aspects of connection management: "Integrity Checks \& Data Protection Mechanisms," "Connection Stability \& Control Messages," and "Dynamic Network Adjustment \& Data Security."](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/ongoing-connection-management.png "The image titled \"Ongoing Connection Management\" details the sixth step in VPN configuration, focusing on the maintenance of network stability and security. It displays three interconnected circles along a horizontal line. Each circle contains an icon and title describing different aspects of connection management: \"Integrity Checks & Data Protection Mechanisms,\" \"Connection Stability & Control Messages,\" and \"Dynamic Network Adjustment & Data Security.\"") ### Integrity Checks and Data Protection Mechanisms Ongoing connection management in a VPN ensures continuous protection and stability of the network link. For data integrity, VPN protocols incorporate mechanisms like checksums and sequence numbers. A checksum is a value derived from the sum of the bytes in a data packet, which is used to detect errors after transmission. If the checksum computed by the receiver matches the sender's, it confirms that the data has not been tampered with in transit. Sequence numbers help maintain the correct order of packets. This prevents replay attacks where old messages are resent, potentially disrupting communication or facilitating unauthorized access. ### Connection Stability and Control Messages The VPN connection is kept alive and stable using heartbeats and keepalive messages. Heartbeats are regular signals sent by one device to another to confirm the connection is active. If a heartbeat is not returned, it signals a potential issue with the connection, prompting corrective measures. Keepalive messages serve a similar purpose. They are sent at predefined intervals to keep the connection open even when no actual data is being transmitted. This is crucial for VPNs because idle timeouts could otherwise close the connection, interrupting access to the corporate network. These checks and messages allow for dynamic adjustment to changing network conditions while safeguarding data integrity and confidentiality. They contribute to creating a reliable and secure channel for corporate communications over potentially insecure public Wi-Fi networks. 7. Connection Termination ------------------------- ![The image titled "Connection Termination" visualizes the seventh and final step in the VPN setup process, detailing the proper procedure for ending a VPN session securely. It features a sequence of three circular icons arranged horizontally. Each icon represents a specific phase of the termination process: "Initiation of Teardown," "Dismantling the Tunnel," and "Session Cleanup \& Logging." These icons are color-coded in red, pink, and yellow respectively, and linked by arrows, illustrating the orderly progression from initiating the disconnection to thoroughly securing the session data post-termination.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/connection-termination.png "The image titled \"Connection Termination\" visualizes the seventh and final step in the VPN setup process, detailing the proper procedure for ending a VPN session securely. It features a sequence of three circular icons arranged horizontally. Each icon represents a specific phase of the termination process: \"Initiation of Teardown,\" \"Dismantling the Tunnel,\" and \"Session Cleanup & Logging.\" These icons are color-coded in red, pink, and yellow respectively, and linked by arrows, illustrating the orderly progression from initiating the disconnection to thoroughly securing the session data post-termination.") ### Teardown Process and Secure Closure The connection termination is a critical phase that ensures the secure closure of the communication session. The teardown process begins when the user's VPN client signals the server to end the session, or when the server itself initiates the termination due to inactivity or user log-off. This signal starts a series of messages that confirm the closure of the tunnel. VPN software then proceeds to dismantle the tunnel, often using a controlled sequence of steps. Dismantling includes sending a termination packet, which ensures that both ends of the VPN tunnel acknowledge the session end. Session cleanup is an important post-termination step. The VPN server ensures that any allocated resources, such as IP addresses, are released while temporary data associated with the session are deleted. This maintains the integrity and security of the VPN service for future connections. Session logging plays a pivotal role in maintaining a record for audit and compliance purposes. Logs can provide details about connection times, data transfer volumes, and user activity. These records are often reviewed for security audits to ensure adherence to corporate policies. Logs are also monitored for anomalous activity that might indicate a breach. The connection termination process safeguards against unauthorized access and potential data leaks. Session cleanup and logging allow for ongoing security assessments in the corporate VPN environment. ## How Does a VPN Work? FAQs ### How do VPNs work? A VPN encrypts a company's internet traffic and routes it through remote servers. This safeguards data and enables secure access to business resources from anywhere. A VPN for a business acts like a secure, dedicated highway that connects remote employees to their company's building. It ensures data travels safely and privately, away from the public roads of the internet. ### How does a VPN work step by step? 1. Pre-connection setup 2. Initiation 3. Establishing the tunnel 4. Data transfer 5. Network routing and resource access 6. Ongoing connection management 7. Connection termination ### Can people see you on a VPN? No, people cannot see you on a VPN because it encrypts your internet connection. This makes your activities invisible to external observers. However, within an enterprise environment, authorized IT personnel may have the ability to monitor VPN traffic for security and maintenance purposes. ### How do I use VPN for beginners? To use a VPN: 1. Install the VPN client software from your provider. 2. Enter your login credentials. 3. Select a server location for your desired virtual address. 4. Connect. Your internet traffic is now encrypted, securing your online activities within a private network. This is a simplified overview. Exact usage steps vary depending on the VPN. ### Are VPNs legal? VPNs are legal in most countries and are commonly used for security and privacy. However, some countries restrict or ban their use. ### Can you explain VPN in simple terms? A VPN connects devices to a private network over the internet. It encrypts data to protect it from eavesdropping, much like using a secure, private tunnel for online communications and access to remote resources. ### What does a VPN not protect you from? A VPN does not protect against threats that bypass its encrypted tunnel, such as local malware or deceptive phishing sites. More comprehensive solutions like secure web gateways (SWG), secure access service edge (SASE), and SD-WAN offer broader security by integrating advanced threat prevention technologies. ### Will a VPN stop hackers? A VPN alone cannot stop hackers; it encrypts internet traffic to protect data in transit. For broader security, technologies like next-generation firewalls and advanced threat protection, are essential to defend against various cyberthreats. ### Which is the safest VPN? Certainly. The safest VPN configuration depends on a company's specific needs, such as remote access or inter-office connectivity. It's important to assess security requirements, scale of operations, and the nature of the data being transmitted to determine the best VPN solution. ### Are VPNs free? Corporate environments require paid VPN services. Businesses need advanced security features, dedicated support, and scalability to protect data and ensure secure access to corporate resources. Free VPNs exist for personal use. ### How does a VPN work with different operating systems? A VPN encrypts internet traffic, masking your online identity and location. It works across different operating systems by establishing a secure connection to a VPN server, with client software tailored to each OS ensuring compatibility and ease of use. Related Content [VPN Alternatives for Remote Access VPN alternatives for secure remote access, sometimes referred to as VPN replacements, are methods other than traditional virtual private networks (VPNs) employed to ensure secure c...](https://www.paloaltonetworks.com/cyberpedia/vpn-alternatives-for-remote-access?ts=markdown) \[GlobalProtect GlobalProtect is more than a VPN. It provides flexible, secure remote access for all users everywhere.\](https://www.paloaltonetworks.com/sase/globalprotect ?ts=markdown) [Accelerating Digital Transformation with SASE SASE breaks down barriers and streamlines processes, empowering organizations to securely accelerate their digital transformations.](https://www.paloaltonetworks.com/resources/ebooks/accelerating-digital-transformation-with-sase?ts=markdown) \[SASE CIO eBook: Driving the future of work through enterprise-wide SASE A CIO's Guide to Planning and Implementation\](https://www.paloaltonetworks.com/resources/ebooks/sase-cio-ebook-driving-the-future-of-work-through-enterprise-wide-sase ?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=How%20Does%20a%20VPN%20Work%3F&body=Discover%20how%20VPNs%20secure%20internet%20traffic%20by%20encrypting%20data%20transfers%20and%20creating%20private%20tunnels%20between%20devices%20and%20remote%20servers%20for%20privacy%20protection.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/how-does-a-vpn-work) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language