[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [AppSec](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security?ts=markdown) 4. [How Does VMware NSX Security Work](https://www.paloaltonetworks.com/cyberpedia/how-does-vmware-nsx-security-work?ts=markdown) Table of contents * [What Is AppSec?](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security?ts=markdown) * [AppSec Explained](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#appsec?ts=markdown) * [The Fundamentals of AppSec](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#fundamentals?ts=markdown) * [Building Security into the Development Lifecycle](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#building?ts=markdown) * [Implementing Secure Coding Practices](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#implementing?ts=markdown) * [Application Security Testing](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#testing?ts=markdown) * [Implementing Security in CI/CD Pipelines](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#pipelines?ts=markdown) * [Securing Application Architecture](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#architecture?ts=markdown) * [Access Control and Authentication](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#access?ts=markdown) * [Monitoring and Incident Response](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#monitoring?ts=markdown) * [Managing AppSec in Production](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#managing?ts=markdown) * [Training and Building a Security-First Culture](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#training?ts=markdown) * [AppSec Trends](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#trends?ts=markdown) * [AppSec FAQs](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#faqs?ts=markdown) * [What Is Sandboxing?](https://www.paloaltonetworks.com/cyberpedia/sandboxing?ts=markdown) * [Sandboxing Explained](https://www.paloaltonetworks.com/cyberpedia/sandboxing#sandboxing?ts=markdown) * [Sandboxing in Email Security](https://www.paloaltonetworks.com/cyberpedia/sandboxing#security?ts=markdown) * [Endpoint Sandboxing and EDR](https://www.paloaltonetworks.com/cyberpedia/sandboxing#endpoint?ts=markdown) * [Browser Isolation and Web Sandboxing](https://www.paloaltonetworks.com/cyberpedia/sandboxing#browser?ts=markdown) * [Sandboxing in Cloud-Native Workflows](https://www.paloaltonetworks.com/cyberpedia/sandboxing#workflows?ts=markdown) * [Sandbox Evasion and Threat Actor Tradecraft](https://www.paloaltonetworks.com/cyberpedia/sandboxing#tradecraft?ts=markdown) * [Real-World Case Studies in Sandboxing Effectiveness](https://www.paloaltonetworks.com/cyberpedia/sandboxing#effectiveness?ts=markdown) * [Feeding Sandboxed Intelligence into XDR and SOC Pipelines](https://www.paloaltonetworks.com/cyberpedia/sandboxing#feeding?ts=markdown) * [Sandboxing FAQs](https://www.paloaltonetworks.com/cyberpedia/sandboxing#faqs?ts=markdown) * [Application Security: A Practitioner's Guide](https://www.paloaltonetworks.com/cyberpedia/application-security?ts=markdown) * [Application Security Explained](https://www.paloaltonetworks.com/cyberpedia/application-security#application?ts=markdown) * [Types of Applications Organizations Need to Secure](https://www.paloaltonetworks.com/cyberpedia/application-security#types?ts=markdown) * [Whose Job Is It -- Developers or Security?](https://www.paloaltonetworks.com/cyberpedia/application-security#security?ts=markdown) * [A Pragmatic Guide for Security-Minded Developers](https://www.paloaltonetworks.com/cyberpedia/application-security#developers?ts=markdown) * [Types of Application Security Testing](https://www.paloaltonetworks.com/cyberpedia/application-security#testing?ts=markdown) * [Application Security Tools and Solutions](https://www.paloaltonetworks.com/cyberpedia/application-security#solutions?ts=markdown) * [Compliance Is Not Security, But It's Not Optional Either](https://www.paloaltonetworks.com/cyberpedia/application-security#compliance?ts=markdown) * [Application Security FAQs](https://www.paloaltonetworks.com/cyberpedia/application-security#faqs?ts=markdown) * [What Is Cloud Detection and Response (CDR)?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr?ts=markdown) * [Cloud Detection and Response (CDR) Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#explained?ts=markdown) * [How CDR Works](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#how?ts=markdown) * [Key Features of CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#key?ts=markdown) * [CDR and Other Detection and Response Approaches](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#vs?ts=markdown) * [How CDR and XSIAM Work Together](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#work?ts=markdown) * [How CDR Addresses Unique Challenges in Cloud Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#addressing?ts=markdown) * [Key Capabilities of CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#capabilities?ts=markdown) * [How CDR Bridges SOC and Cloud Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#bridging?ts=markdown) * [Challenges of Implementing CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#potential?ts=markdown) * [CDR Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#practices?ts=markdown) * [Cloud Detection and Response FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#faqs?ts=markdown) * [How to Transition from DevOps to DevSecOps](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops?ts=markdown) * [Initiate a Security-First Culture](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#initiate-a-security-first-culture?ts=markdown) * [Incorporate Secure DevOps Practices](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#devops-practices?ts=markdown) * [Automate and Monitor Security](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#automate-and-monitor-security?ts=markdown) * [Evaluate and Maintain Security Posture](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#maintain-security-posture?ts=markdown) * [Ensure Compliance and Effective Incident Response](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#effective-incident-response?ts=markdown) * [Continuous Improvement in Security](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#improvement-in-security?ts=markdown) * [DevOps to DevSecOps FAQs](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#faq?ts=markdown) * [Cloud Security Service, Cloud Storage and Cloud Technology](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology?ts=markdown) * [Cloud and Platform as a Service](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#cloud-and-pass?ts=markdown) * [Infrastructure as a Service -- The Public Cloud](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#information-as-a-service?ts=markdown) * [Comprehensive, Scalable Cloud Security with Flexible Licensing Options](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#scalable-cloud-security?ts=markdown) * [Cloud Security Service, Storage and Technology FAQs](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#faq?ts=markdown) * How Does VMware NSX Security Work * [What Is the Software Development Lifecycle (SDLC)?](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle?ts=markdown) * [Software Development Lifecycle Explained](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#software?ts=markdown) * [Why the SDLC Matters](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#why?ts=markdown) * [Foundational Phases](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#phases?ts=markdown) * [Common SDLC Models](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#common?ts=markdown) * [Security and Compliance Integration](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#security?ts=markdown) * [SDLC in Context](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#context?ts=markdown) * [SDLC Challenges](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#challenges?ts=markdown) * [Choosing or Tailoring an SDLC Model](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#choosing?ts=markdown) * [SDLC Tooling and Automation](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#automation?ts=markdown) * [Version Control and CI/CD Pipelines](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#version?ts=markdown) * [Value-Stream Metrics and Visibility](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#visibility?ts=markdown) * [Cloud, On-Premises, and Hybrid Considerations](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#cloud?ts=markdown) * [Best-Practice Guidelines for High-Velocity Delivery](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#best?ts=markdown) * [Next Steps Toward Lifecycle Maturity](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#next?ts=markdown) * [Software Development Lifecycle FAQs](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#faqs?ts=markdown) * [What Is SDLC Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle?ts=markdown) * [SDLC Security Overview](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#sdlc?ts=markdown) * [Security Across the Classic SDLC Phases](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#security?ts=markdown) * [Common Vulnerabilities and Attack Vectors in the SDLC](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#common?ts=markdown) * [Foundational Secure-SDLC Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#practices?ts=markdown) * [Tooling and Automation Layers](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#tooling?ts=markdown) * [Frameworks and Standards for Secure SDLC](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#frameworks?ts=markdown) * [DevSecOps Integration](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#devsecops?ts=markdown) * [Metrics and Continuous Improvement](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#metrics?ts=markdown) * [Advancements in Software Supply Chain Defense](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#advancements?ts=markdown) * [Roadmap to Secure-SDLC Maturity](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#roadmap?ts=markdown) * [SDLC Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#faqs?ts=markdown) # How Does VMware NSX Security Work 3 min. read VMware NSX^®^ is a network virtualization platform that enables the implementation of virtual networks on physical networks and within virtual server infrastructures. NSX falls under the rubric of software-defined networking (SDN), which extends the server virtualization concept popularized by VMware into the networking space. VMware NSX can be used to implement microsegmentation in virtualized environments, isolating individual [workloads](https://www.paloaltonetworks.com/cyberpedia/what-is-workload?ts=markdown) within a given trust zone and helping reduce an organization's attack surface. As IT infrastructures have evolved from the traditional, centralized data center to more distributed architectures, NSX has evolved into two distinct offerings: NSX-V and NSX-T. As the direct descendent of the original NSX solution introduced in 2013, NSX-V brings SDN functionality to private clouds based on VMware vSphere®. The newer VMware NSX-T -- think "T for transformation" -- supports heterogeneous environments consisting of multiple clouds, multi-hypervisor environments, cloud native applications and bare-metal workloads. NSX provides a solid foundation for securing virtualized environments, but more is needed. Along with virtualized workloads, network security teams must also secure their data center and campus perimeters; segment their physical networks; and create trust boundaries between physical, virtual and public cloud workloads. In addition, some regulations -- such as the Payment Card Industry Data Security Standard (PCI DSS) -- call for stricter security measures than NSX can deliver natively. These needs compel many organizations to seek ways to augment their security infrastructure. To secure virtual networks, security teams need to accomplish three main objectives: limit lateral threat movement, respond quickly and effectively to intrusions, and prevent information loss. **Objective 1: Limit Threat Movement** Lateral threat movement (also known as east-west movement) is a common attack strategy in which a threat first finds an entry point to a vulnerable entity -- such as a virtual machine or virtual network function -- and then travels stealthily within the network topology to infect other components. In the absence of internal defenses, such infections move laterally quite rapidly. For security teams reviewing incident logs and using legacy security tools, they can be difficult to detect quickly. The solution lies in microsegmentation, one of the key use cases VMware NSX supports. Security architects can use microsegmentation to isolate workloads from each other and prevent workload-to-workload interactions except when explicitly authorized. This technique requires no human intervention and is highly effective in containing intrusions, even before they are detected. **Objective 2: Respond to Intrusions Quickly and Effectively** While microsegmentation can effectively isolate workloads from each other, a given workload may need to interact with other workloads or particular network services to function properly. For example, financial applications often need to communicate with DNS servers located in a different trust zone. Applications can also reside in different trust zones from important data. For instance, a web-based ordering system might need to send and receive sensitive customer information to and from a database in a high-trust segment. Security staff can create policies authorizing these required interactions. The trick is to make sure cyberattackers do not masquerade as components with authorization to cross trust boundaries. To that end, advanced threat prevention, including intrusion prevention, is a must to secure traffic that moves between trust zones, especially when the levels of trust differ. Intrusion prevention systems (IPS) help security teams monitor their networks for malicious traffic to ensure that only known, acceptable services are running. When malicious signatures are detected, IPS can take appropriate corrective action. **Objective 3: Prevent Information Loss** To mount an effective defense, security architects must get inside the heads of their adversaries. Many cyberattacks are motivated by the desire to steal customer information or intellectual property that can be monetized through corporate blackmail or illicit sale. Unfortunately, attackers often find an open front door: the network connection to the public internet. Therefore, the last line of defense must ensure that even threats that evade the other two security measures cannot exfiltrate information outside the security perimeter. Security teams usually deploy next-generation firewalls at all network entry points to prevent intrusions, but intrusions will happen sooner or later. For this reason, it's recommended to add anti-exfiltration features to next-generation firewalls -- specifically [DNS security](https://www.paloaltonetworks.com/resources/datasheets/dns-security-service?ts=markdown) and URL filtering. DNS security uses predictive analytics to disrupt attacks that attempt to use DNS to steal data, while [URL filtering](https://www.paloaltonetworks.com/resources/infographics/supercharge-with-url-filtering?ts=markdown) uses machine learning to block access to malicious sites that deliver malware and steal credentials. **Summary** Intrusions are inevitable in NSX environments, but it is possible to minimize the scope of possible damage by deploying effective security tools that limit threat movement, allow security teams to respond quickly and effectively, and prevent information loss. While each one of the aforementioned capabilities improve NSX security, only the combination of all of them provides a highly effective response to today's advanced threats. Click here for more information about NSX security. ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=How%20Does%20VMware%20NSX%20Security%20Work&body=Explore%20how%20VMware%20NSX%C2%AE%20enables%20virtual%20networking%20across%20physical%20and%20virtual%20infrastructures%2C%20transforming%20network%20security%20and%20operational%20efficiency.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/how-does-vmware-nsx-security-work) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology?ts=markdown) Cloud Security Service, Cloud Storage and Cloud Technology [Next](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle?ts=markdown) What Is the Software Development Lifecycle (SDLC)? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language