[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [AI-Powered Applications](https://www.paloaltonetworks.com/cyberpedia/large-language-models-llm?ts=markdown) 4. [What Are Large Language Models (LLMs)?](https://www.paloaltonetworks.com/cyberpedia/large-language-models-llm?ts=markdown) Table of Contents * [What Are Some Current LLMs?](#what) * [How LLMs Work](#how) * [Benefits of LLMs](#benefits) * [Challenges with LLMs](#challenges) * [LLM Use Cases \& Deployment Options](#use-cases) * [‍LLM Security Concerns](#llm) * [The OWASP Top Ten: LLM Security Risks](#owasp) * [Large Language Model FAQs](#faqs) # What Are Large Language Models (LLMs)? 5 min. read [Interactive: LLM Security Risks](https://www.paloaltonetworks.com/resources/infographics/llm-applications-owasp-10?ts=markdown) Table of Contents * [What Are Some Current LLMs?](#what) * [How LLMs Work](#how) * [Benefits of LLMs](#benefits) * [Challenges with LLMs](#challenges) * [LLM Use Cases \& Deployment Options](#use-cases) * [‍LLM Security Concerns](#llm) * [The OWASP Top Ten: LLM Security Risks](#owasp) * [Large Language Model FAQs](#faqs) 1. What Are Some Current LLMs? * [1. What Are Some Current LLMs?](#what) * [2. How LLMs Work](#how) * [3. Benefits of LLMs](#benefits) * [4. Challenges with LLMs](#challenges) * [5. LLM Use Cases \& Deployment Options](#use-cases) * [6. ‍LLM Security Concerns](#llm) * [7. The OWASP Top Ten: LLM Security Risks](#owasp) * [8. Large Language Model FAQs](#faqs) Large language models (LLMs) are a cutting-edge natural language processing (NLP) development designed to understand and generate human language. LLMs are advanced AI models trained on vast amounts of text data, enabling them to recognize linguistic patterns, comprehend context, and produce coherent and contextually relevant responses. While NLP provides the foundational techniques for machines to grapple with language, LLMs represent a specialized approach that has significantly enhanced the machine's capability to mimic human-like language understanding and generation.. ## What Are Some Current LLMs? LLMs represent the frontier of natural language processing, and several models currently dominate the space, including Google's Gemini, Meta's Galactica and Llama, OpenAI's GPT series, and others like Falcon 40B and Phi-1. With varying architectures and parameter sizes, these models excel at tasks ranging from answering queries to generating coherent and contextually relevant text over long passages. [BERT](https://blog.google/products/search/search-language-understanding-bert/), introduced by Google, laid the foundational groundwork with its transformer-based architecture. On the other hand, Meta's Galactica, a recent entrant, explicitly targets the scientific community while facing scrutiny for producing misleading "hallucinations" that could have profound implications in the scientific domain. Meanwhile, OpenAI's GPT series, especially GPT-3 and GPT-4, have been groundbreaking in their capacity, with the latter rumored to contain over 170 trillion parameters and abilities to process both text and images. This model's prowess led to speculations about nearing artificial general intelligence (AGI), a theoretical machine capability on par with or exceeding human intelligence. Challenges, however, persist. The sheer scale and complexity of these models can lead to unpredictable outputs, and their immense training requirements raise concerns about environmental sustainability and biased results. Amidst concerns, though, the evolution of LLMs promises advancements in diverse sectors --- from mundane tasks like web search improvements to critical areas like medical research and cybersecurity. As the field advances, the balance between potential and caution remains paramount. ## How LLMs Work To excel in understanding and generating human-like language, LLMs use a combination of neural networks, vast training datasets, and an architecture called transformers. ### Neural Networks At the core of large language models are neural networks with multiple layers, known as deep learning models. These networks consist of interconnected nodes, or neurons, that learn to recognize patterns in the input data during the training phase. LLMs are trained on a massive body of text, encompassing diverse sources such as websites, books, and articles, allowing them to learn grammar, syntax, semantics, and contextual information. On the backs of algorithms designed to recognize patterns, neural networks interpret sensory data through a kind of [machine perception](https://www.paloaltonetworks.com/cyberpedia/machine-learning-ml?ts=markdown), labeling, or clustering of raw input. The architectures of neural networks range from simple feedforward networks, where connections between the nodes don't form a cycle, to complex structures with sophisticated layers and multiple feedback loops. * **Convolutional Neural Networks (CNNs)**: These are particularly effective for processing data with a grid-like topology. Examples include image data, which can be thought of as a 2D grid of pixels. * **Recurrent Neural Networks (RNNs)**: These are suited for sequential data like text and speech. The output at each step depends on the previous computations and a certain kind of memory about what has been processed so far. ### Transformers The transformer architecture is a critical component of LLMs, introduced by Vaswani et al. in 2017. Transformers address the limitations of earlier sequence models like RNNs and LSTMs, which struggled with long-range dependencies and parallelization. Transformers employ a mechanism called self-attention, which enables the model to weigh the importance of different words in the input context and capture relationships between them, regardless of their distance in the sequence. ### Tokenization Tokenization is the first step in processing text with an LLM. The input text is broken down into smaller units called tokens, which are then converted into numerical representations (vectors) that the neural network can process. During training, the model learns to generate contextually appropriate output tokens based on the input tokens and their relationships. The training process involves adjusting the weights of the neural network connections through a technique called backpropagation. By minimizing the difference between the model's predictions and the actual target tokens in the training data, the model learns to generate more accurate and coherent language. Once trained, large language models can be fine-tuned on specific tasks or domains, such as sentiment analysis, summarization, or question-answering, by training the model for a short period on a smaller, task-specific dataset. This process enables the LLM to adapt its generalized language understanding to the nuances and requirements of the target task. ***Related Article** : [Artificial Intelligence Explained](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai?ts=markdown)* ## Benefits of LLMs Large language models offer a wide range of benefits, including: 1. **Advanced Natural Language Understanding:** LLMs can understand context and nuances in language, making their responses more relevant and human-like. 2. **Versatility:** LLMs can be applied to various tasks, such as text generation, summarization, translation, and question answering, without requiring task-specific training. 3. **Translation:** LLMs trained in multiple languages can effectively translate between them. Some theorize that they could even derive meanings from unknown or lost languages based on patterns. 4. **Automating Mundane Tasks:** LLMs can perform text-related tasks like summarizing, rephrasing, and generating content, which can be especially useful for businesses and content creators. 5. **Emergent Abilities:** Due to the vast amount of data they're trained on, LLMs can exhibit unexpected but impressive capabilities, such as multi-step arithmetic, answering complex questions, and generating chain-of-thought prompts. 6. **Debugging and Coding:** In cybersecurity, LLMs can assist in writing and debugging code more rapidly than traditional methods. 7. **Analysis of Threat Patterns:** In cybersecurity, LLMs can identify patterns related to Advanced Persistent Threats, aiding incident attribution and real-time mitigation. 8. **Response Automation:** In Security Operations Centers, LLMs can automate responses, generate scripts and tools, and assist in report writing, reducing the time security professionals spend on routine tasks. Despite these benefits, it's essential to remember that LLMs have drawbacks and ethical considerations that must be managed. ## Challenges with LLMs While it is easy to get caught up in the benefits delivered by an LLM's impressive linguistic capabilities, organizations must also be aware and prepared to address the potential challenges that come with them. ### Operational Challenges 1. **Hallucination:** LLMs can sometimes produce bizarre, untrue outputs or give an impression of sentience. These outputs aren't based on the model's training data and are termed "hallucinations." 2. **Bias:** If an LLM is trained on biased data, its outputs can be discriminatory or biased against certain groups, races, or classes. Even post-training, biases can evolve based on user interactions. Microsoft's Tay is a notorious example of how bias can manifest and escalate. 3. **Glitch Tokens or Adversarial Examples:** These are specific inputs crafted to make the model produce erroneous or misleading outputs, effectively causing the model to "malfunction." 4. **Lack of Explainability:** It can be challenging to understand how LLMs make certain decisions or generate specific outputs, making it hard to troubleshoot or refine them. 5. **Over-Reliance:** As LLMs become more integrated into various sectors, there's a risk of excessive reliance, potentially sidelining human expertise and intuition. ## LLM Use Cases \& Deployment Options LLMs offer organizations a number of optional implementation patterns, each relying on a different set of tools and related security implications. ### Use of Pre-Trained LLMs Cloud providers like OpenAI and Anthropic offer API access to powerful LLMs that they manage and secure. Organizations can leverage these APIs to incorporate LLM capabilities into their applications without having to manage the underlying infrastructure. Alternatively, open-source LLMs such as Meta's LLaMa can be run on an organization's own infrastructure, providing more control and customization options. On the downside, open-source LLMs require significant compute resources and AI expertise to implement and maintain securely. #### LLMs Deployment Models * **API-based SaaS**: The infrastructure is provided and managed by the LLM developer (e.g., OpenAI) and provisioned via a public API. * **CSP-managed**: The LLM is deployed on infrastructure provided by cloud hyperscalers and can run in a private or public cloud, such as Azure, OpenAI, and Amazon Bedrock. * **Self-managed**: The LLM is deployed on the company's own infrastructure, which is relevant only for open-source or homegrown models. Pre-trained LLMs offer various functionalities --- content generation, chatbots, sentiment analysis, language translation, and code assistants. An e-commerce company might use an LLM to generate product descriptions, while a software development firm could leverage an LLM-powered coding assistant to boost programmer productivity. #### Security Implications Associated with Pre-Trained LLMs The availability of easily accessible cloud APIs and open-source models has dramatically lowered the barriers to adding advanced AI language capabilities to applications. Developers can now plug LLMs into their software without maintaining deep expertise in AI and ML. While this accelerates innovation, it increases the risk of shadow AI projects that lack proper security and compliance oversight. Development teams, meanwhile, may be experimenting with LLMs without fully considering data privacy, [model governance](https://www.paloaltonetworks.com/cyberpedia/ai-governance?ts=markdown), and output control issues. ### Fine-Tuning and Retrieval-Augmented Generation (RAG) To customize LLMs for specific applications, organizations can fine-tune them on smaller datasets related to the desired task or implement RAG, which involves integrating LLMs with knowledge bases for question-answering and content summarization. Use cases for these include specialized AI assistants with access to internal data (e.g., for customer support, HR, or IT helpdesk) and Q\&A apps (e.g., for documentation, code repositories, or training materials). For example, a telecommunication company's customer service chatbot could be fine-tuned on product documentation, FAQs, or past support interactions to better assist customers with technical issues and account management. #### Security Implications Associated with Fine-tuning and RAG Fine-tuning and RAG allow organizations to adapt LLMs to their specific domain and data, enabling more targeted and accurate outputs. However, this customization process often involves exposing the model to sensitive internal information during training. Strong data governance practices are required to ensure that only authorized data is used for fine-tuning and that the resulting models are secured. ### Model Training Some large technology companies and research institutions choose to invest in training their own LLMs. While this is a highly resource-intensive process that requires massive compute power and datasets, it gives organizations full control over the model architecture, training data, and optimization process. Additionally, the organization maintains full intellectual property rights over the resulting models. Model training can result in advanced applications like drug discovery, materials science, or autonomous systems. A healthcare organization could develop a model to help diagnose diseases from medical records and imaging data, for example. #### Security Implications Associated with Model Training Training custom LLMs raises difficult questions regarding how to maintain accountability and auditability of model behavior when dealing with complex black-box models. The training process itself consumes enormous compute resources, necessitating strong isolation and access controls around the training environment to prevent abuse or interference. First, the organization must build a high-performance computing infrastructure and carefully curate massive datasets, which can introduce new security challenges. ## ‍LLM Security Concerns A primary concern with deploying large language models in enterprise settings is potentially including sensitive data during training. Once data has been incorporated into these models, it becomes challenging to discern precisely what information was fed into them. This lack of visibility can be problematic when considering the myriad data sources used for training and the various individuals that could access this data. Ensuring visibility into the data sources and maintaining strict control over who has access to them is crucial to prevent unintentional exposure of confidential information. An additional concern is the potential misuse of LLMs in cyberattacks. Malicious actors can utilize LLMs to craft persuasive phishing emails to deceive individuals and gain unauthorized access to sensitive data. This method, known as social engineering, has the potential to create compelling and deceptive content, escalating the challenges of data protection. Without rigorous access controls and safeguards, the risk of significant [data breaches](https://www.paloaltonetworks.com/cyberpedia/data-breach?ts=markdown) increases, with malicious actors gaining the ability to spread misinformation, propaganda, or other harmful content with ease. While LLMs have near-infinite positive applications, they harbor the potential to create malicious code, bypassing conventional filters to prevent such behaviors. This susceptibility could lead to a new era of cyberthreats where [data leaks](https://www.paloaltonetworks.com/cyberpedia/data-leak?ts=markdown) aren't just about stealing information but generating dangerous content and codes. If manipulated, for instance, LLMs can produce malicious software, scripts, or tools that can jeopardize entire systems. Their potential for "reward hacking" raises alarms in the cybersecurity domain, suggesting unintended methods to fulfill their objectives could be discovered, leading to accidental access to or harvesting of [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data?ts=markdown). As we rely more on LLM applications, it becomes imperative for organizations and individuals to stay vigilant to these emerging threats, prepared to protect data at all times. ![Securing LLMs from top OWASP security risks](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/llms.png "Securing LLMs from top OWASP security risks") *Figure 1: Securing LLMs from top OWASP security risks* ## The OWASP Top Ten: LLM Security Risks Conventional application vulnerabilities present a new strain of security risks within LLMs. But true to form, OWASP delivered the [OWASP Top Ten LLM Security Risks](https://owasp.org/www-project-top-10-for-large-language-model-applications/) in timely fashion, alerting developers to new mechanisms and the need to adapt traditional remediation strategies for their applications utilizing LLMs. ### LLM01: Prompt Injection Prompt injection can manipulate a large language model through devious inputs, causing the LLM to execute the attacker's intentions. With direct injections, the bad actor overwrites system prompts. With indirect prompt injections, attackers manipulate inputs from external sources. Either method can result in [data exfiltration](https://www.paloaltonetworks.com/cyberpedia/data-exfiltration?ts=markdown), social engineering, and other issues. ### LLM02: Insecure Output Handling Insecure output handling is a vulnerability that occurs when an LLM output is accepted without scrutiny, exposing backend systems. It arises when a downstream component blindly accepts LLM output without effective scrutiny. Misuse can lead to cross-site scripting (XSS) and cross-site request forgery (CSRF) in web browsers, as well as server-side request forgery (SSRF), privilege escalation, and remote code execution on backend systems. ### LLM03: Training Data Poisoning Training data poisoning occurs when LLM training data is manipulated via Common Crawl, WebText, OpenWebText, books, and other sources. The manipulation introduces backdoors, vulnerabilities, or biases that compromise the LLM's security and result in performance decline, downstream software exploitation, and reputational damage. ### LLM04: Model Denial of Service Model denial of service occurs when an attacker exploits a LLM to trigger a resource-intensive operation, leading to service degradation and increased costs. This vulnerability is amplified by the demanding nature of LLMs and the unpredictable nature of user inputs. In a model denial of service scenario, an attacker engages with an LLM in a manner that demands a disproportionate amount of resources, causing a decline in service quality for both the attacker and other users while potentially generating significant resource expenses. ### LLM05: Supply Chain Vulnerabilities Supply chain vulnerabilities in LLMs can compromise training data, ML models, and deployment platforms, causing security breaches or total system failures. Vulnerable components or services can arise from poisoned training data, insecure plugins, outdated software, or susceptible pretrained models. ### LLM06: Sensitive Information Disclosure LLM applications can expose sensitive data, confidential information, and proprietary algorithms, leading to unauthorized access, intellectual property theft, and [data breaches](https://www.paloaltonetworks.com/cyberpedia/data-breach?ts=markdown). To mitigate these risks, LLM applications should employ data sanitization, implement appropriate strict user policies, and restrict the types of data returned by the LLM. ### LLM07: Insecure Plugin Design Plugins can comprise insecure inputs and insufficient [access control](https://www.paloaltonetworks.com/cyberpedia/access-control?ts=markdown), making them prone to malicious requests that can lead to [data exfiltration](https://www.paloaltonetworks.com/cyberpedia/data-exfiltration?ts=markdown), remote code execution, and privilege escalation. Developers must follow stringent parameterized inputs and secure access control guidelines to prevent exploitation. ### LLM08: Excessive Agency Excessive agency refers to LLM-based systems taking actions leading to unintentional consequences. The vulnerability stems from granting the LLM too much autonomy, over-functionality, or excessive permissions. Developers should limit plugin functionality to what is absolutely essential. They should also track user authorization, require human approval for all actions, and implement authorization in downstream systems. ### LLM09: Overreliance An LLM can generate inappropriate content when human users or systems excessively rely on the LLM without providing proper oversight. Potential consequences of LLM09 include misinformation, security vulnerabilities, and legal issues. ### LLM10: Model Theft LLM model theft involves unauthorized access, copying, or exfiltration of proprietary LLMs. Model theft results in financial loss and loss of competitive advantage, as well as reputation damage and unauthorized access to sensitive data. Organizations must enforce strict security measures to protect their proprietary LLMs. ## Large Language Model FAQs ### ‍What are the security considerations for LLM? To safeguard your LLM, implement a multifaceted security approach that encompasses strong access controls, network resource access restriction via network segmentation and secure sandboxing, continuous resource monitoring, and routine audits of logs and LLM-associated activities. ### ‍What is the LLM model structure? The LLM model structure is based on the transformer architecture, which processes and generates sequences of data using self-attention mechanisms. ### ‍How do you begin creating an LLM? The initial phase of constructing a large language model involves amassing an extensive amount of textual data for training, which is segmented into smaller data units termed tokens to facilitate smoother processing and learning. ### What is the difference between a NLP and a LLM? NLP is a subfield of AI and linguistics that focuses on enabling computers to understand, interpret, and generate human language. NLP encompasses a wide range of tasks, including sentiment analysis, machine translation, text summarization, and named entity recognition. NLP techniques typically involve computational algorithms, statistical modeling, and machine learning to process and analyze textual data. A LLM is a type of deep learning model, specifically a neural network, designed to handle NLP tasks at a large scale. LLMs, such as GPT-3 and BERT, are trained on vast amounts of text data to learn complex language patterns, grammar, and semantics. These models leverage a technique called transformer architecture, enabling them to capture long-range dependencies and contextual information in language. The primary difference between NLP and LLM is that NLP is a broader field encompassing various techniques and approaches for processing human language, while LLM is a specific type of neural network model designed for advanced NLP tasks. LLMs represent a state-of-the-art approach within the NLP domain, offering improved performance and capabilities in understanding and generating human-like language compared to traditional NLP methods. ### What is a training model? A training model in machine learning refers to the process of developing a mathematical representation that can make predictions or decisions based on input data. By feeding a model with labeled training data, it learns to recognize patterns, relationships, and features that enable it to generalize and make accurate inferences on previously unseen data. The training process involves adjusting the model's parameters iteratively to minimize errors and improve performance. Once the model achieves satisfactory accuracy and generalization capabilities, it can be deployed to solve real-world problems, such as image recognition, natural language processing, or customer behavior prediction. ### What is artificial intelligence (AI)? Artificial intelligence (AI) is a branch of computer science that focuses on creating intelligent systems capable of simulating human cognitive abilities, such as problem-solving, pattern recognition, and decision-making. By leveraging algorithms, data, and computational power, AI systems can learn from experience, adapt to new information, and perform tasks that typically require human intelligence. These systems have applications across various industries, including healthcare, finance, and manufacturing, enabling automation, enhanced productivity, and innovative solutions. ### What is machine learning (ML)? Machine learning (ML) is a subfield of artificial intelligence that involves developing algorithms that enable computers to learn and improve their performance on specific tasks without explicit programming. By processing and analyzing large datasets, ML models can identify patterns, make predictions, and generate insights, becoming more accurate and efficient over time as they receive more data. ML techniques, such as supervised, unsupervised, and reinforcement learning, have numerous applications, including natural language processing, image recognition, and recommendation systems. ### What is generative AI? Generative AI is a subset of artificial intelligence that focuses on creating new content, data, or patterns by learning from existing examples. This form of AI leverages advanced machine learning techniques, such as generative adversarial networks (GANs) and variational autoencoders (VAEs), to generate previously unseen outputs that resemble the input data. Applications of generative AI include image synthesis, text generation, and data augmentation, enabling innovative solutions in fields like art, design, entertainment, and data science. ### What are generative adversarial networks (GANs)? Generative adversarial networks (GANs) are a class of machine learning models designed to generate new data samples that resemble a given dataset. GANs consist of two neural networks, a generator and a discriminator, that are trained simultaneously in a competitive manner. The generator creates synthetic samples, while the discriminator evaluates the generated samples and distinguishes them from real data. The generator continually improves its data generation capabilities by attempting to deceive the discriminator, which, in turn, refines its ability to identify real versus generated samples. This adversarial process continues until the generated samples become nearly indistinguishable from the real data, making GANs particularly useful in applications like image synthesis, data augmentation, and style transfer. ### What are variational autoencoders (VAEs)? Variational autoencoders (VAEs) are a type of generative model that learn to represent complex data distributions by encoding input data into a lower-dimensional latent space and then reconstructing the data from this compressed representation. VAEs consist of two neural networks: an encoder that maps the input data to a probability distribution in the latent space, and a decoder that reconstructs the data from sampled points in this distribution. The VAE model is trained to minimize the reconstruction error and a regularization term that encourages the learned distribution to align with a predefined prior distribution. VAEs are capable of generating new data samples by decoding random points sampled from the latent space, making them suitable for applications such as image generation, data denoising, and representation learning. Related Content [AI-SPM Ensures Security and Compliance of AI-Powered Applications Learn AI model discovery and inventory, data exposure prevention, and posture and risk analysis in this AI-SPM datasheet.](https://www.paloaltonetworks.com/resources/datasheets/aispm-secure-ai-applications?ts=markdown) [Securing the Data Landscape with DSPM and DDR Stay ahead of the data security risks. Learn how data security posture management (DSPM) with data detection and response (DDR) fills the security gaps to strengthen your security ...](https://www.paloaltonetworks.com/resources/guides/dspm-ddr-big-guide?ts=markdown) [AI-SPM: Security and Compliance for AI-Powered App Prisma Cloud AI-SPM addresses the unique challenges of deploying AI and Gen AI at scale while helping reduce security and compliance risks.](https://www.paloaltonetworks.com/blog/prisma-cloud/ai-spm/) [Security Posture Management for AI Learn how to protect and control your AI infrastructure, usage and data with Prisma Cloud AI-SPM.](https://www.paloaltonetworks.com/prisma/cloud/ai-spm?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Are%20Large%20Language%20Models%20%28LLMs%29%3F&body=Learn%20how%20large%20language%20AI-powered%20models%20leverage%20vast%20text%20data%20to%20excel%20in%20NLP%20tasks%2C%20opening%20up%20new%20language%20processing%20and%20understanding%20possibilities.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/large-language-models-llm) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language