[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Threats](https://www.paloaltonetworks.com/cyberpedia/threat?ts=markdown) 3. [MDR](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response?ts=markdown) 4. [What are Managed Detection and Response (MDR) Services?](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr?ts=markdown) Table of Contents * [What Is Managed Detection and Response (MDR)?](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response?ts=markdown) * [How MDR Fills the Gaps from Traditional Services](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response#mdr?ts=markdown) * [The Framework of MDR Services](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response#services?ts=markdown) * [Types of Detection and Response Solutions](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response#types?ts=markdown) * [MDR vs. EDR vs. MSSPs](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response#edr?ts=markdown) * [Implementing MDR](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response#implement?ts=markdown) * [The Impact of MDR on Modern Cybersecurity Strategies](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response#impact?ts=markdown) * [Managed Detection and Response (MDR) FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response#faqs?ts=markdown) * [What is the Difference Between EDR vs MDR?](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr?ts=markdown) * [What is the Difference Between MDR and EDR?](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#difference?ts=markdown) * [Benefits of EDR](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#benefits-edr?ts=markdown) * [Benefits of MDR](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#benefits-mdr?ts=markdown) * [Should I Use EDR, MDR, or Both?](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#should?ts=markdown) * [What is Extended Detection and Response (XDR)?](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#xdr?ts=markdown) * [MDR vs. EDR FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#faqs?ts=markdown) * [What is MDR vs MSSP?](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences?ts=markdown) * [Why Organizations Need MDR/MSSP](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences#why?ts=markdown) * [Exploring Managed Detection and Response (MDR)](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences#mdr?ts=markdown) * [Exploring Managed Security Service Providers (MSSP)](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences#mssp?ts=markdown) * [Key Differences Between MDR vs MSSP](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences#vs?ts=markdown) * [Assessing Your Needs: MDR or MSSP?](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences#assessing?ts=markdown) * [MDR vs. MSSP FAQs](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences#faqs?ts=markdown) * What are Managed Detection and Response Services (MDR)? * [What is MDR?](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#mdr?ts=markdown) * [Categories of MDR Services](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#mdr-services?ts=markdown) * [Features Offered by MDR Service Providers](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#features?ts=markdown) * [Why are MDR Services Important?](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#why?ts=markdown) * [How MDR Services Work](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#how-mdr-services-work?ts=markdown) * [Do Smaller Businesses Need MDR Services?](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#do-smaller-businesses-need-mdr-services?ts=markdown) * [MDR Services FAQs](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#faq?ts=markdown) # What are Managed Detection and Response (MDR) Services? 5 min. read Table of Contents * * [What is MDR?](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#mdr?ts=markdown) * [Categories of MDR Services](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#mdr-services?ts=markdown) * [Features Offered by MDR Service Providers](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#features?ts=markdown) * [Why are MDR Services Important?](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#why?ts=markdown) * [How MDR Services Work](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#how-mdr-services-work?ts=markdown) * [Do Smaller Businesses Need MDR Services?](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#do-smaller-businesses-need-mdr-services?ts=markdown) * [MDR Services FAQs](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#faq?ts=markdown) 1. What is MDR? * * [What is MDR?](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#mdr?ts=markdown) * [Categories of MDR Services](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#mdr-services?ts=markdown) * [Features Offered by MDR Service Providers](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#features?ts=markdown) * [Why are MDR Services Important?](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#why?ts=markdown) * [How MDR Services Work](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#how-mdr-services-work?ts=markdown) * [Do Smaller Businesses Need MDR Services?](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#do-smaller-businesses-need-mdr-services?ts=markdown) * [MDR Services FAQs](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#faq?ts=markdown) Managed Detection and Response (MDR) services are designed to help customers proactively monitor, detect, and respond to cybersecurity threats across [endpoint](https://www.paloaltonetworks.com/cyberpedia/what-is-an-endpoint?ts=markdown), network identity, and cloud attack surfaces, leveraging expert analysis and advanced technologies to enhance an organization's overall security posture. MDR services are particularly valuable for organizations that would like to expand internal expertise, resources, or technology to more effectively detect and respond to cybersecurity threats. By partnering with [MDR providers](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown), organizations can enhance their security defenses and reduce the risk of [data breaches](https://www.paloaltonetworks.com/cyberpedia/data-breach?ts=markdown) and [cyberattacks](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cyber-attack?ts=markdown). ## What is MDR? [Managed Detection and Response](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response?ts=markdown) (MDR) represents a specialized segment within the Security-as-a-Service domain, wherein organizations entrust a third-party provider to assume certain aspects of their security operations. Unlike traditional security services that primarily focus on identifying threats, MDR extends these capabilities by actively engaging in the mitigation, containment, and resolution of security issues within an organization's network. In essence, comprehensive MDR security solutions encompass not only threat detection but also a proactive response to mitigate potential risks. This proactive approach differentiates MDR from conventional security services, shifting from merely alerting organizations about threats to actively addressing and remediating them. ## Categories of MDR Services MDR services typically cover use cases in four major categories: * Continuous monitoring * Proactive advanced [threat hunting](https://www.paloaltonetworks.com/cyberpedia/threat-hunting?ts=markdown) * Managed investigation and response * Security posture optimization Each of these fills a somewhat different type of security service, taking place over an extended process covering from the identification of a specific threat to the response to that threat. ## Features Offered by MDR Service Providers MDR cybersecurity services are provided by [EDR](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-detection-and-response-edr?ts=markdown)/[XDR](https://www.paloaltonetworks.com/cyberpedia/what-is-extended-detection-response-XDR?ts=markdown) vendors, and specialized managed security service providers (MSSPs). They benefit organizations by offering comprehensive protection by continuously monitoring an organization's IT environment, which includes endpoint, networks, identity, and cloud. MDR services typically focus on several key aspects: * **Threat detection and monitoring**: MDR services keep a constant watch on the organization's digital landscape, seeking out any signs of suspicious or malicious activities that could indicate a cybersecurity threat. * **Incident investigation**: When potential threats are identified, MDR providers conduct thorough investigations to understand the nature and scope of the incident. This involves analyzing data logs, network traffic, and relevant information to determine the attack's origin and potential impact. * **Threat hunting**: Proactive threat hunting is a part of MDR services where cybersecurity experts actively search for concealed or advanced threats that automated detection systems might miss. This proactive approach uses threat intelligence and advanced analytics to identify potential risks. * **Alerting and response**: MDR services generate alerts when suspicious activities are detected. Security analysts then assess these alerts, categorize them based on their severity, and take appropriate actions to mitigate the threats. This can include isolating affected systems or implementing security measures. * [**Endpoint detection and response (EDR)**](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-detection-and-response-edr?ts=markdown): Many MDR services include endpoint detection and response capabilities, focusing on monitoring and securing individual endpoints, such as desktops, laptops, and servers. [EDR tools](https://www.paloaltonetworks.com/cortex/endpoint-detection-and-response?ts=markdown) provide real-time visibility and response capabilities at the endpoint level. * **Behavioral analytics**: MDR services often leverage behavioral analytics and machine learning to establish a baseline of normal behavior within an organization's network and endpoints. Deviations from this baseline trigger alerts, indicating potentially abnormal or malicious activities. * **Incident reporting and documentation**: MDR providers supply detailed reports on security incidents, their causes, and the actions taken to mitigate them. These reports may also include recommendations for improving an organization's security posture. * **Continuous improvement** : MDR services remain dynamic to adapt to evolving threats and [vulnerabilities](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management?ts=markdown). Service providers update their detection rules, response strategies, and threat intelligence sources to stay ahead of cyber threats. * **Expertise and resources**: MDR services tap into the expertise of skilled cybersecurity professionals who possess a deep understanding of a wide range of threats and extensive knowledge of the threat landscape. Organizations benefit from the collective knowledge and experience of the MDR team. ## Why are MDR Services Important? MDR services deliver various technical, operational, and process benefits to organizations. These include: 1. Increased security maturity with a modern approach to threat management and security operations that is both reactive and proactive, such as threat hunting, paving the way for transformation across other aspects of security operations. 2. Faster time to value your security investment with access to security experts, operational best practices, and recommendations on policy changes and tuning. 3. Reduced mean time to detect (MTTD) and mean time to respond (MTTR) for faster detection of and response to advanced threats, thereby reducing risk. 4. Resource augmentation with continuous 24/7, year-round coverage and expertise to aid security teams in areas that require specialized skill sets, such as threat hunting, forensic investigation, and incident response. 5. Guided response and managed remediation to restore endpoints to a known good status in the event of a threat. ## How MDR Services Work [Extended Detection and Response (XDR)](https://www.paloaltonetworks.com/cyberpedia/what-is-extended-detection-response-XDR?ts=markdown) vendors offering MDR services leverage their XDR technology by engaging directly with customers on the [XDR platform](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown), eliminating the need for additional software installations. Users connect with the providers' own team of MDR specialists, which augment an organization's existing skills within its IT or SecOps departments. The MDR service provider collects relevant logs, data, and other telemetry from the customer environment and then analyzes this telemetry using analytics, threat intelligence, automation, and human expertise to deliver continuous monitoring, high-fidelity threat detection, containment, and investigation. Additionally, proactive threat hunting is carried out to detect new types of sophisticated threats and multistage attacks that might evade typical security controls. MDR service providers deliver valuable help to in-house security operations teams that often lack sufficient manpower, experience, budget, or technical/process expertise. They also enable customer teams to connect with the MDR provider's security experts, who can help bolster the security skills of the client company's IT department. This makes them ideal for businesses that don't have a designated threat detection or threat hunting team in-house. As a dedicated expert in delivering MDR services to help organizations fight threats and contend with vulnerabilities, an MDR provider fills important cybersecurity coverage gaps but allows in-house teams to spend more time on other cybersecurity requirements. However, it's vital for organizations to select an experienced, reputable provider that understands MDR technologies, regulatory [compliance](https://www.paloaltonetworks.com/cyberpedia/data-compliance?ts=markdown), [data governance](https://www.paloaltonetworks.com/cyberpedia/data-governance?ts=markdown), and risk management. ### Examples of Continuous Monitoring Services Continuous monitoring services provide real-time, continuous analysis and monitoring of IT infrastructure, applications, and data. They pinpoint security threats, organizational vulnerabilities, potential compliance violations, and other high-impact events in an around-the-clock manner instead of doing intermittent analyses or audits. Examples of Continuous Monitoring include: * Comprehensive visibility, which provides data from endpoints, networks, cloud, and identities with 24-hour monitoring and analysis of security events. * Alert management and incident triage, enabling both automated and manual review of activities and behaviors to triage alerts and to create rules for understanding context and follow-up actions. * Notification and security event escalation, escalating events that need attention, and leveraging integrated logic and alert stitching to align with the \[MITRE ATT\&CK\](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre- attack?ts=markdown) framework. ### Examples of Proactive Advanced Threat Hunting Proactive [advanced threat hunting](https://www.paloaltonetworks.com/cortex/managed-threat-hunting?ts=markdown) actively searches for and identifies security threats and vulnerabilities throughout an organization before harm is done or a negative impact becomes clear via an automated security process. Examples include: * 24/7 threat hunting based on analysis of analytics, suspicious signals, custom detection rules, and threat intelligence research. * High-fidelity threat intelligence using widespread signal telemetry and detections from other installed security products worldwide to inform and enhance threat investigations. * Actionable reporting identifies the scope, source, and attack tools used by bad actors to understand attacker intent and the context of a threat better, as well as recommended actions to take in assessing the impact of emerging threats. * Direct assistance, such as simple and fast access to a provider's threat-hunting team to ask direct questions and get hands-on guidance. ### What are Examples of Managed Investigation and Response? Managed investigation and response refers to the MDR service provider's ability to detect, investigate, and respond to security events and threats in a proactive manner by coordinating information, experiences, and detailed analysis. Examples include: * Quick containment of threats, requiring analysts to restrict and restrain active threats by isolating endpoints and removing malicious files or processes using a function-rich XDR tool. * Streamlined investigations, where endpoints are scrutinized, forensic artifacts are analyzed, and network/cloud telemetry is used to identify the root cause and scope of the potential attack. * Rapid recovery, using sophisticated tools and proven processes to remove threats such as malicious files and registry keys and to restore damaged files. ### Examples of Security Posture Optimization Security posture optimization entails continuously improving an organization's security posture by assessing, enhancing, and maintaining security measures, policies, and practices. The goal is to strengthen an organization's resilience against a vast and growing number of types of security challenges. Examples include: * Health checks for identifying gaps in security requirements using endpoint security profiles, device control, host firewalls, and disk encryption. * Vulnerability assessments are conducted regularly to identify and quantify vulnerabilities for endpoint-installed applications. * Host inventory to quickly identify potential security or IT issues that could attract threats. ## Do Smaller Businesses Need MDR Services? MDR services are well-suited for any organization because they substantially deepen an organization's awareness and knowledge of new and emerging threats. They also enhance an organization's ability to proactively respond to cybersecurity challenges. Since smaller organizations are both frequent targets of cyberattacks and often lack significant internal experience and expertise to battle those threats, using a third-party provider for MDR services is an intelligent step. ## MDR Services FAQs ### What is the difference between an MDR provider and a managed security service provider? Managed security service providers (MSSPs) typically focus on alerting, security management, and monitoring, leaving response actions to the customer. MSSP services are mostly focused on more passive activities and are designed to be highly automated, including interactions with customers typically available only via a portal. MDR includes both reactive (continuous monitoring) and proactive activities, such as proactive threat hunting, which is done in real-time by a team of human experts. MDR provides alerts and indicators of compromise (IoC) triage and includes alert response, investigation, containment, and remediation. ### What kinds of threats can MDR devices detect? MDR services can detect a wide range of threats, including malware, phishing attacks, insider threats, unauthorized access attempts, suspicious network traffic patterns, and more. They are designed to identify known and unknown threats. ### What role is artificial intelligence (AI) currently playing in delivering MDR services? AI technologies are being used to enhance the effectiveness and efficiency of MDR services in several key ways. Several of the most prominent and important are: * Threat detection and analysis * Behavioral analysis * Automated alert triage * Threat intelligence * Pattern recognition * Predictive analytics Most leading MDR service providers are building their services and tools using AI and machine learning technologies to generate insights, spot trends, and determine risk prevention steps more quickly and efficiently. ### Do MDR services help with compliance requirements? MDR services can assist organizations in maintaining compliance with industry-specific regulations and data protection standards by ensuring that security incidents are managed in accordance with legal and regulatory requirements. Related Content [Managed Detection and Response (MDR) Managed Detection and Response is a cybersecurity service that offers 24/7 monitoring of endpoints, networks, and cloud environments.](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response?ts=markdown) [Managed Detection and Response (MDR) Service Page Unit 42^®^ Managed Detection and Response service helps you monitor security events and proactively detect and respond to threats to minimize their impact.](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) [Enloe Medical Center strengthens its security with Unit 42 MDR Unit 42 MDR service combines Cortex XDR and Unit 42's security expertise to enhance the healthcare client's protection, productivity, and morale.](https://www.paloaltonetworks.ca/customers/enloe-medical-center-strengthens-its-security-posture-and-improves-efficiency-with-unit-42-mdr) [Supercharge Your Defenses Learn how Unit 42 MDR helps you gain comprehensive visibility across your environment, resolve incidents, reduce MTTR, and improve your security posture.](https://www.paloaltonetworks.com/resources/whitepapers/supercharge-your-defenses?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20are%20Managed%20Detection%20and%20Response%20Services%20%28MDR%29%3F&body=Explore%20the%20world%20of%20Managed%20Detection%20and%20Response%20%28MDR%29%20services%3A%20proactive%20monitoring%2C%20advanced%20threat%20detection%2C%20swift%20incident%20response%2C%20and%20more%20to%20safeguard%20your%20digital%20assets.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences?ts=markdown) What is MDR vs MSSP? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language