[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberark/Seamless_IDs_small.jpg) Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-security-solution?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberark/Seamless_IDs_small.jpg) Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.paloaltonetworks.com/deploybravely?ts=markdown) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Is Antivirus Enough for Small Businesses? What It Misses](https://www.paloaltonetworks.com/cyberpedia/is-antivirus-enough-for-small-businesses?ts=markdown) Table of contents * [Why antivirus doesn't stop all modern attacks](#why-antivirus-doesn-t-stop-all-modern-attacks) * [What does antivirus actually cover in a modern small business?](#what-does-antivirus-actually-cover-in-a-modern-small-business) * [Where does antivirus fall out of step with small business threats?](#where-does-antivirus-fall-out-of-step-with-small-business-threats) * [Where should security operate in modern small businesses?](#where-should-security-operate-in-modern-small-businesses) * [What does browser-level enforcement actually protect against?](#what-does-browser-level-enforcement-actually-protect-against) * [So---is antivirus enough for small businesses?](#so-is-antivirus-enough-for-small-businesses) * [What should small businesses change about current security practices?](#what-should-small-businesses-change-about-current-security-practices) * [Effectiveness of antivirus for small businesses FAQs](#effectiveness-of-antivirus-for-small-businesses-faqs) # Is Antivirus Enough for Small Businesses? What It Misses 4 min. read Table of contents * [Why antivirus doesn't stop all modern attacks](#why-antivirus-doesn-t-stop-all-modern-attacks) * [What does antivirus actually cover in a modern small business?](#what-does-antivirus-actually-cover-in-a-modern-small-business) * [Where does antivirus fall out of step with small business threats?](#where-does-antivirus-fall-out-of-step-with-small-business-threats) * [Where should security operate in modern small businesses?](#where-should-security-operate-in-modern-small-businesses) * [What does browser-level enforcement actually protect against?](#what-does-browser-level-enforcement-actually-protect-against) * [So---is antivirus enough for small businesses?](#so-is-antivirus-enough-for-small-businesses) * [What should small businesses change about current security practices?](#what-should-small-businesses-change-about-current-security-practices) * [Effectiveness of antivirus for small businesses FAQs](#effectiveness-of-antivirus-for-small-businesses-faqs) 1. Why antivirus doesn't stop all modern attacks * [1. Why antivirus doesn't stop all modern attacks](#why-antivirus-doesn-t-stop-all-modern-attacks) * [2. What does antivirus actually cover in a modern small business?](#what-does-antivirus-actually-cover-in-a-modern-small-business) * [3. Where does antivirus fall out of step with small business threats?](#where-does-antivirus-fall-out-of-step-with-small-business-threats) * [4. Where should security operate in modern small businesses?](#where-should-security-operate-in-modern-small-businesses) * [5. What does browser-level enforcement actually protect against?](#what-does-browser-level-enforcement-actually-protect-against) * [6. So---is antivirus enough for small businesses?](#so-is-antivirus-enough-for-small-businesses) * [7. What should small businesses change about current security practices?](#what-should-small-businesses-change-about-current-security-practices) * [8. Effectiveness of antivirus for small businesses FAQs](#effectiveness-of-antivirus-for-small-businesses-faqs) Antivirus is useful but not enough for small businesses. It detects known malware on managed devices but does not protect against credential misuse, browser-based access, or SaaS abuse. Most modern attacks happen before execution, in places antivirus was never designed to see. ## Why antivirus doesn't stop all modern attacks Most small businesses evaluate whether antivirus is enough after something breaks. A [phishing](https://www.paloaltonetworks.com/cyberpedia/what-is-phishing) email lands. Someone signs in. Data is accessed. Sometimes [exfiltrated](https://www.paloaltonetworks.com/cyberpedia/data-exfiltration). And the antivirus software stays quiet. That's the moment the question "Is antivirus enough for a small business?" surfaces. You had antivirus installed. It was running. It didn't alert. Yet something clearly went wrong. Which leads to a reasonable conclusion: either the product failed, or it was never in a position to intervene. Here's the thing. Antivirus is built to detect malicious software on a device. But many modern attacks don't involve [malware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware) at all. They rely on stolen credentials, happen inside legitimate cloud applications, and unfold entirely within a browser session. In these cases, nothing malicious is installed. Nothing executes locally, so there's nothing for the antivirus to see. Which means the issue isn't that antivirus is broken. It's that the attack didn't occur in the layer antivirus was designed to protect. That's the mismatch this article is about. | ***Further reading:*** * [*What Is a Credential-Based Attack?*](https://www.paloaltonetworks.com/cyberpedia/what-is-a-credential-based-attack) ## What does antivirus actually cover in a modern small business? Antivirus serves as the 'boots on the ground' for your hardware. **Its primary role is to scan, identify, and stop malicious code from compromising the local operating system.** That includes scanning files, detecting known malware, and flagging suspicious execution behavior. Some tools also include basic behavioral monitoring to catch variants that don't exactly match known signatures. **To put it simply, antivirus focuses on what happens on the device.** It looks for harmful files. Watches how programs behave once they run. And assumes the device itself is managed, monitored, and consistently protected by an installed agent. That assumption matters. Because in most small businesses, antivirus doesn't come with full [detection and response](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-detection-and-response-edr) capabilities. There's often no centralized telemetry. No automated containment. No ongoing investigation after an alert. Once something is detected, the outcome usually depends on a person noticing the alert and taking action. **The point is this: antivirus coverage typically stops at the endpoint.** It doesn't see what happens inside cloud applications, track user behavior across SaaS tools, or provide visibility into activity that never touches the local file system. Important: This isn't a flaw. It's a design choice. **Ultimately, antivirus is built for post-execution malware defense.** It's meant to catch malicious software after it appears on a device or begins to run. It's not designed to [control access](https://www.paloaltonetworks.com/cyberpedia/access-control). It's not designed to govern user actions. And it's not designed to enforce policy across unmanaged or shared systems. That scope can still be useful. But it's narrow by design. | ***Further reading:*** * [*What Is Endpoint Detection and Response (EDR)?*](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-detection-and-response-edr) * [*What Are Endpoint Detection and Response Tools?*](https://www.paloaltonetworks.com/cyberpedia/what-are-endpoint-detection-and-response-tools) * [*What Is Endpoint Security Antivirus?*](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-security-antivirus) * [*What Is the Difference Between Advanced Endpoint Security and Antivirus (AV)?*](https://www.paloaltonetworks.com/cyberpedia/advanced-endpoint-security-vs-antivirus) ## Where does antivirus fall out of step with small business threats? Antivirus is often evaluated as if every business operates in a tightly managed environment. That assumption breaks down quickly in small organizations. Many small businesses rely on personal laptops, shared office computers, or temporary access for contractors. Endpoint agents may not be installed everywhere. And even when they are, coverage is inconsistent. There's also the operational reality. Small businesses rarely have 24/7 monitoring or dedicated [incident response](https://www.paloaltonetworks.com/cyberpedia/what-is-incident-response). Alerts, if they occur, depend on someone noticing them. Often after the fact. That makes antivirus a reactive control, not a continuous one. Now layer in how attacks typically start today. Most compromises don't begin with malware. They begin with access. A phishing email convinces someone to sign in. Credentials are reused. A session token is captured. From there, the attacker operates inside legitimate applications: Email. Cloud storage. Accounting platforms. CRM tools. The activity looks like a normal user session because, technically, it is one. This is where timing matters. Antivirus is designed to intervene after something suspicious executes on a device. But when an attack happens entirely through identity misuse or browser-based access, there's no execution event to detect. Access is granted before malware ever appears. Sometimes malware never appears at all. Data can be viewed, copied, or exfiltrated directly through the browser. Especially in cloud and SaaS environments. Basically, the threat model has shifted. But antivirus is still anchored to a point in the attack chain that small business attacks increasingly bypass. If an attacker logs in with valid credentials, antivirus has no reason to respond. So the core issue isn't detection quality. It's enforcement timing. | ***Further reading:*** * [*What Is Inadequate Identity and Access Management?*](https://www.paloaltonetworks.com/cyberpedia/inadequate-iam-cicd-sec2) * [*Establishing a SaaS Security Approach*](https://www.paloaltonetworks.com/cyberpedia/saas-security) ## Where should security operate in modern small businesses? ![Comparison diagram titled 'Device-centric vs. browser-aware enforcement'. The left side, labeled 'Then: Device-centric', shows antivirus monitoring device files, malware executing on endpoints, controls applied after execution, and coverage limited to managed devices. The right side, labeled 'Now: Browser-aware', highlights that apps are used in the browser, access occurs during active sessions, controls are enforced during user interaction, and protection applies to any device, trusted or not, with lines connecting each legacy approach to its modern counterpart.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/is-antivirus-enough-for-small-businesses/Antivirus-for-small-business_1-device-v-browser.png "Comparison diagram titled 'Device-centric vs. browser-aware enforcement'. The left side, labeled 'Then: Device-centric', shows antivirus monitoring device files, malware executing on endpoints, controls applied after execution, and coverage limited to managed devices. The right side, labeled 'Now: Browser-aware', highlights that apps are used in the browser, access occurs during active sessions, controls are enforced during user interaction, and protection applies to any device, trusted or not, with lines connecting each legacy approach to its modern counterpart.") **Security decisions no longer happen only on the device. Increasingly, they also happen in the browser.** That's where employees log in to email. Where client documents are shared. Where payroll and billing systems are accessed. And it's also where attackers can exploit access if nothing stands in their way. **Essentially, the browser has become the new control point. Most critical actions---whether legitimate or malicious---happen inside that session.** However: Most antivirus tools are still focused on what happens after something bad lands on the device. That leaves a gap. Security can't just operate after a problem starts. It needs to act during the session. While the user is clicking, typing, sharing, or uploading. That's the moment risk is introduced. That's the moment it must be contained. **So security should operate at the point of access.** In real time. Regardless of what device someone's using. That shift changes everything. It repositions the browser as the logical enforcement layer. Not because it's trendy, but because it's where business happens now. And where exposure begins if controls aren't there. This doesn't require a full-stack replatform. It just means recognizing that modern work---and modern risk---both start in the same place. Inside the session. Inside the browser. | ***Further reading:*** * [*What Is a Secure Enterprise Browser (AKA Secure Browser)?*](https://www.paloaltonetworks.com/cyberpedia/what-is-an-enterprise-browser) ![Icon of two charts next to each other](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/is-antivirus-enough-for-small-businesses/icon-comparison-chart.svg) ### COMPARISON Prisma for Business vs. Consumer Browsers: See the difference. [View Datasheet](https://www.paloaltonetworks.com/resources/datasheets/prisma-browser-for-business-vs-consumer-browsers) ## What does browser-level enforcement actually protect against? **Browser-level enforcement applies controls where antivirus can't.** It can limit what users can do with [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data) during a session. For example, it can prevent copy, paste, print, download, or screen capture. It can watermark what's visible. It can log actions taken during access. It can require reauthentication before specific actions. And it can enforce these policies without needing to trust the underlying device. These capabilities fall under a product category known as secure browsers, also sometimes referred to as enterprise browsers or secure enterprise browsers. **These tools apply policy directly in the session without needing to manage the underlying device.** They treat the browser as a controllable environment, allowing organizations to restrict activity, monitor behavior, and enforce security during access itself. This is important because most small businesses can't guarantee device trust. Contractors, remote staff, and shared computers are common. Browser-based controls work even when no endpoint agent is installed. Even when there's no malware present. Even when no file ever gets downloaded. That's the difference. **Browser enforcement protects the data itself during use.** Not just the device. It gives small businesses a way to apply consistent policy at the only place risk can be controlled in real time: inside the session. Not before. Not after. While it's happening. That's what makes it structurally different from antivirus and necessary alongside it. | ***Further reading:*** * [*10 Secure Enterprise Browser Use Cases \[+ Examples \& Tips\]*](https://www.paloaltonetworks.com/cyberpedia/secure-enterprise-browser-use-cases) ### Explainer Video ![Image of a woman working at a laptop.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/small-business-cybersecurity-best-practices/browser-explainer-video-thumbnail.jpg) See for yourself how Prisma Browser for Business ensures productivity never comes at the cost of security. close ## So---is antivirus enough for small businesses? **Antivirus is still useful for what it's designed to do,** which is to help detect and stop malicious software on individual devices as a baseline layer of defense. That protection is still important. **But antivirus alone isn't enough for most small businesses today.** That's because, as mentioned, work no longer happens primarily on managed endpoints. It happens in cloud applications, browsers, and across personal devices, shared systems, and remote access. So whether antivirus is "enough" depends on where your controls operate. Not how many tools you deploy. If security only engages after something runs on a device, gaps remain. Especially in SaaS-first, browser-based environments. In short: Antivirus is necessary. But on its own, it's not sufficient for how small businesses work---and how they're attacked---today. That's why many small businesses are shifting enforcement to where the risk actually happens. ## What should small businesses change about current security practices? Antivirus alone isn't enough, but the next step isn't just adding more tools. It's stepping back and rethinking where risk actually shows up: * Where are your users working? * What devices are they using? * When are actions most likely to introduce exposure? * And most important---what controls do you have at those moments? You don't need to rip out what you have. But you may need to shift your focus. This isn't about replacing antivirus entirely. It's about recognizing where enforcement needs to happen---at the point of access, inside the browser, during the session itself. That means evaluating security tools built to operate there. Secure browsers give small businesses a way to apply policy in real time, across devices they don't own or fully control. They make it possible to enforce access rules, monitor behavior, and protect data at the moment risk is introduced. That's how you align protection with the way small businesses actually work today. | ***Further reading:** [How to Choose the Best Enterprise Browser for Your Business](https://www.paloaltonetworks.com/cyberpedia/how-to-choose-an-enterprise-browser)* ### Get the secure browser free for 30 days. Only ^$^6 ~per user | per month after trial~ ^$^50 ~annually/user~ No long-term contracts. Cancel anytime during your free trial. [Start your 30-day free trial](https://pab-smb.us.auth0.com/authorize?response_type=code&client_id=vTJHih5RUvtwr7bpN0uzMAMQEt8FrIAF&redirect_uri=https://portal.us.pbb.paloaltonetworks.com&scope=openid%20profile%20email&screen_hint=signup) ## Effectiveness of antivirus for small businesses FAQs ### What is the best antivirus for small businesses? The best antivirus depends on business needs, device environments, and support requirements. Look for solutions with malware detection, basic behavioral analysis, and centralized management. Some vendors also offer integrated endpoint protection platforms for broader coverage. ### What are the main issues with antivirus software? Antivirus tools detect malware post-execution but miss identity-based threats, browser-layer attacks, and activity in cloud apps. They assume managed endpoints and offer limited visibility into session behavior or SaaS usage---where many modern attacks now occur. ### Do small businesses need cybersecurity? Yes. Small businesses face phishing, credential theft, and data exposure risks. They often lack dedicated IT teams, making it critical to adopt baseline protections like antivirus, secure authentication, and browser-level or access-layer controls where work actually happens. ### Is antivirus worth it anymore? Yes, for what it does. Antivirus still blocks known malware on managed devices. But it isn't sufficient alone. It should be paired with access controls, identity protections, and in-session enforcement to address the full scope of modern threats. Related content [Solution brief: Prisma Browser for Business Get to know Prisma Browser for Business.](https://www.paloaltonetworks.com/resources/techbriefs/prisma-browser-for-small-business-security) [Checklist: 42 Tips to Build a Resilient Cybersecurity Program Find out everything you need to know to build a more robust cybersecurity program.](https://start.paloaltonetworks.com/incident-response-42-tips-checklist-unit42) [Blog: Six Uncomfortable Truths About Working in Web Browsers Learn why working in the browser isn't as secure as it might seem.](https://www.paloaltonetworks.com/blog/sase/six-uncomfortable-truths-about-working-in-web-browsers/) [Guide: Understanding Prisma Browser for Business: A Secure Guide for Small Business This guide details the Prisma Browser for Business solution that brings world-class security to your growing business.](https://www.paloaltonetworks.com/resources/guides/understanding-prisma-browser-for-business-secure-guide-for-small-business) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=Is%20Antivirus%20Enough%20for%20Small%20Businesses%3F%20What%20It%20Misses&body=Antivirus%20is%20useful%20for%20small%20businesses%20but%20insufficient.%20It%20misses%20credential%20misuse%2C%20browser%20access%2C%20and%20SaaS%20abuse%2C%20where%20most%20attacks%20actually%20begin.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/is-antivirus-enough-for-small-businesses) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language