[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [A Complete Guide to SASE Architecture](https://www.paloaltonetworks.com/cyberpedia/sase-architecture?ts=markdown) Table of contents * [How does SASE architecture work?](#how-does-sase-architecture-work) * [How is a SASE architecture deployed?](#how-is-sase-architecture-deployed) * [How is SASE architecture different from legacy models?](#how-is-sase-architecture-different-from-legacy-models) * [How does SASE architecture apply in practice?](#how-does-sase-architecture-apply-in-practice) * [SASE architecture FAQs](#sase-architecture) # A Complete Guide to SASE Architecture 5 min. read Table of contents * [How does SASE architecture work?](#how-does-sase-architecture-work) * [How is a SASE architecture deployed?](#how-is-sase-architecture-deployed) * [How is SASE architecture different from legacy models?](#how-is-sase-architecture-different-from-legacy-models) * [How does SASE architecture apply in practice?](#how-does-sase-architecture-apply-in-practice) * [SASE architecture FAQs](#sase-architecture) 1. How does SASE architecture work? * [1. How does SASE architecture work?](#how-does-sase-architecture-work) * [2. How is a SASE architecture deployed?](#how-is-sase-architecture-deployed) * [3. How is SASE architecture different from legacy models?](#how-is-sase-architecture-different-from-legacy-models) * [4. How does SASE architecture apply in practice?](#how-does-sase-architecture-apply-in-practice) * [5. SASE architecture FAQs](#sase-architecture) SASE architecture is the structural design that defines how secure access service edge is implemented and operated. It separates the control plane from the data plane, delivers networking and security functions through distributed points of presence, and applies single-pass inspection to traffic. Policies and visibility are managed through one control plane, creating consistency across all users, devices, and locations. ## How does SASE architecture work? [SASE (secure access service edge)](https://www.paloaltonetworks.com/cyberpedia/what-is-sase) architecture works by converging networking and security into a unified cloud-based framework. ![Architecture diagram titled 'SASE architecture' showing how secure access service edge combines networking and security. On the left, icons represent traffic sources labeled 'Mobile/Computer', 'Branch/Retail', and 'Home'. In the center, two columns are labeled 'SSE the secure service edge' and 'A the network access'. Under SSE are four icons labeled 'FWaaS firewall as a service', 'SWG secure web gateway', 'CASB cloud access security broker', and 'ZTNA zero trust network access'. Under network access are two icons labeled 'SD-WAN unified connectivity' and 'Internet global networks'. On the right, icons represent traffic destinations labeled 'HQ/Data center', 'SaaS applications', and 'Public cloud'. At the bottom, the left caption reads 'Your users traffic sources' and the right caption reads 'Your data traffic destinations'.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/sase-architecture/SASE-architecture.png "Architecture diagram titled 'SASE architecture' showing how secure access service edge combines networking and security. On the left, icons represent traffic sources labeled 'Mobile/Computer', 'Branch/Retail', and 'Home'. In the center, two columns are labeled 'SSE the secure service edge' and 'A the network access'. Under SSE are four icons labeled 'FWaaS firewall as a service', 'SWG secure web gateway', 'CASB cloud access security broker', and 'ZTNA zero trust network access'. Under network access are two icons labeled 'SD-WAN unified connectivity' and 'Internet global networks'. On the right, icons represent traffic destinations labeled 'HQ/Data center', 'SaaS applications', and 'Public cloud'. At the bottom, the left caption reads 'Your users traffic sources' and the right caption reads 'Your data traffic destinations'.") At its core, it brings together [SD-WAN (software-defined wide area network)](https://www.paloaltonetworks.com/cyberpedia/what-is-sd-wan) with security functions such as [SWG (secure web gateway)](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-web-gateway), [CASB (cloud access security broker)](https://www.paloaltonetworks.com/cyberpedia/what-is-a-casb-cloud-access-security-broker), [ZTNA (zero-trust network access)](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-ztna), and [FWaaS (firewall as a service)](https://www.paloaltonetworks.com/cyberpedia/what-is-firewall-as-a-service). These elements are delivered as integrated services rather than separate point products. The architecture is less about individual features and more about how they're combined and delivered as one system. SASE architecture separates the control plane from the data plane. The control plane manages policy and orchestration. The data plane enforces those policies as traffic flows. ![A diagram titled 'Control plane and data plane separation in SASE' illustrates the separation of two primary components. The 'CONTROL PLANE' is represented by a horizontal bar listing four elements: 'Network security,' 'Data security,' 'Device security,' and 'User experience.' A downward arrow labeled 'Policy push' connects the control plane to the 'DATA PLANE,' which is depicted as a large rectangular box containing twelve policy enforcement functions arranged in two rows: 'DNS security,' 'URL filtering,' 'AI security,' 'Threat protection,' 'Firewall,' 'IPS,' 'DLP,' 'OT,' 'CASB,' 'IoT,' 'App acceleration,' and 'ADEM.' This box is subtitled, 'Distributed policy enforcement points for local policy enforcement.' The data plane is linked via vertical lines to six elements at the bottom, each represented by an icon: 'Partners,' 'Cloud \& SaaS,' 'Devices,' 'Users,' 'Locations,' and 'AI apps.' Below these, four green check-marked statements describe the benefits of the architecture: 'Centralized management,' with the descriptor 'Single policy definition;' 'Distributed enforcement,' with the descriptor 'Policies enforced at nearest PoP for optimal performance;' 'No backhauling,' with the descriptor 'Traffic flows directly to destinations without central hub routing;' and 'Elastic stability,' with the descriptor 'Add PoPs globally without redesigning architecture.'](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/sase-architecture/Control-plane-and-data-plane-separation-in-SASE.png) The split allows policies to be managed centrally while enforcement happens as close to users and applications as possible. Which means organizations can scale and maintain consistency without forcing all traffic back through a single choke point. Cloud-native points of presence (PoPs) extend these enforcement capabilities worldwide. ![A diagram titled 'Global distribution of SASE points of presence' illustrates an architecture with a unified 'CONTROL PLANE' overseeing a distributed 'DATA PLANE.' The control plane is a horizontal bar listing four elements: 'Network security,' 'Data security,' 'Device security,' and 'User experience.' A downward arrow labeled 'Policy push' connects the control plane to the data plane, which contains two distinct 'Point of presence' (PoP) boxes side-by-side. The left PoP is labeled 'America' and the right PoP is labeled 'EMEA.' Both PoP boxes contain an identical grid of twelve security and network functions arranged in three rows: 'DNS security,' 'URL filtering,' 'AI security,' 'Threat protection,' 'Firewall,' 'IPS,' 'DLP,' 'OT,' 'CASB,' 'IoT,' 'App acceleration,' and 'ADEM.' The 'America' PoP connects to two entities below: 'Remote user (New York)' and 'SaaS (Chicago).' The 'EMEA' PoP connects to two entities below: 'Mobile user (Paris)' and 'Data center (London).' A dashed line labeled 'Direct app access,' 'Low-latency,' and 'Local access' connects the SaaS and Data center entities back up toward their respective PoPs.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/sase-architecture/Global-distribution-of-SASE-points-of-presence.png) SASE vendors deploy PoPs in metro areas across multiple continents. That way, traffic can be inspected and secured near the source. This avoids unnecessary backhauling and improves user experience. Some vendors also allow organizations to select where inspection happens to meet performance or compliance needs. SASE also uses a single-pass inspection model. Traffic is decrypted once, inspected against multiple security policies, and then re-encrypted. That inspection covers [malware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware), [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data), and [access controls](https://www.paloaltonetworks.com/cyberpedia/access-control). ***Note:*** *Traditional approaches often chained multiple tools together, which meant traffic was decrypted and scanned multiple times. A single-pass design reduces overhead and avoids latency penalties.* Unified management is core to SASE architecture design. Instead of switching between multiple consoles, administrators use a single control plane to define and enforce policies across all services. That includes visibility, troubleshooting, reporting, and advanced analytics. The goal is to simplify operations and reduce the chance of configuration errors that occur when managing separate tools. | ***Further reading:*** * [*SD-WAN vs. SASE: Where One Ends and the Other Begins*](https://www.paloaltonetworks.com/cyberpedia/sd-wan-vs-sase) * [*SD-WAN vs. SASE vs. SSE: What Are the Differences?*](https://www.paloaltonetworks.com/cyberpedia/sdwan-vs-sase-vs-sse) ![Icon of hand and the Prisma logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/sase-architecture/icon-prisma-airs-demo.svg) ## INTERACTIVE WALKTHROUGH See firsthand how Prisma SASE components work together. [Launch experience](https://www.paloaltonetworks.com/sase/how-it-works) ## How is a SASE architecture deployed? ![Diagram titled 'SASE architecture deployment models' showing three labeled panels: 'Single-vendor', 'Double-vendor', and 'Managed SASE'. Each panel contains stylized icons representing relationships between SASE and SSE functions. The single-vendor panel shows one provider icon encompassing two stacked circles labeled 'SASE' in blue and 'SSE' in orange. The double-vendor panel shows two separate provider icons connected by dotted lines, with one linked to a blue circle labeled 'SASE' and the other to an orange circle labeled 'SSE'. The managed SASE panel shows one provider icon above a dotted box enclosing both the blue 'SASE' and orange 'SSE' circles.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/sase-architecture/SASE-architecture-deployment-models.png "Diagram titled 'SASE architecture deployment models' showing three labeled panels: 'Single-vendor', 'Double-vendor', and 'Managed SASE'. Each panel contains stylized icons representing relationships between SASE and SSE functions. The single-vendor panel shows one provider icon encompassing two stacked circles labeled 'SASE' in blue and 'SSE' in orange. The double-vendor panel shows two separate provider icons connected by dotted lines, with one linked to a blue circle labeled 'SASE' and the other to an orange circle labeled 'SSE'. The managed SASE panel shows one provider icon above a dotted box enclosing both the blue 'SASE' and orange 'SSE' circles.") The three most common ways to deploy SASE architecture are: * Single-vendor * Dual-vendor * Managed SASE Each reflects how organizations choose to consume the architecture rather than differences in the technology itself. **In a single-vendor deployment, one provider delivers both networking and security services.** That means SD-WAN and the full [security service edge (SSE)](https://www.paloaltonetworks.com/cyberpedia/what-is-security-service-edge-sse) stack are integrated into a single platform. The appeal here is simplicity. Organizations gain one management plane, one data model, and one support contract. And adoption is rising quickly. "By 2028, 50% of new SASE deployments will be based on a single-vendor SASE Platform offering, up from 30% in 2025." [- Gartner, "Magic Quadrant for SASE Platforms," by Jonathan Forest, Neil MacDonald, and Dale Koeppen, 9 July 2025.](https://www.gartner.com/en/documents/6701734) **A dual-vendor approach combines offerings from two providers---typically one for SD-WAN and one for SSE.** This is still the most common model in the market today. It allows organizations to pair an incumbent SD-WAN with a preferred security provider, or vice versa. The tradeoff is complexity. Integration between management planes and data planes is improving but not always seamless. **Then there's managed SASE. Here, a service provider designs, deploys, and operates the architecture on behalf of the enterprise.** This approach can reduce internal burden for organizations with limited staff or expertise. Market adoption has been slower than single-vendor or dual-vendor models. Most organizations still prefer direct control over configuration, visibility, and performance. Each option comes with design tradeoffs: * Single-vendor platforms simplify management but may not always match best-of-breed depth in every feature. * Dual-vendor deployments provide flexibility but increase integration overhead. * Managed services can speed time to adoption but may limit control and visibility. Which path an organization chooses often depends on existing contracts, internal skills, and long-term IT strategy. | ***Further reading:** [What Are Managed SASE Services?](https://www.paloaltonetworks.com/cyberpedia/what-are-managed-sase-services)* ## How is SASE architecture different from legacy models? Legacy WAN and security architectures were built for centralized data centers and fixed offices. But SASE takes a different approach. It was designed for distributed users, cloud applications, and global networks. ![A comparative diagram titled 'Legacy network models vs. SASE architecture' is divided horizontally into two sections. The top section, 'LEGACY ARCHITECTURE,' shows a DATA CENTER connected to a row of seven security technologies: Firewall, VPN, SSL inspection, SWG (Secure Web Gateway), CASB (Cloud Access Security Broker), DLP (Data Loss Prevention), Sandbox, and IPS/IDS (Intrusion Prevention/Detection System). Above these security technologies are three destinations—Cloud, SaaS (Software as a Service), and Internet—each with an upward arrow indicating traffic flow. Below the security technologies, five types of users or locations are shown: Branches, Campuses, Remote employees, Contractors, and Devices. Underneath these, three characteristics of the legacy model are listed: 'Location based trust' with 'trusted' and 'un-trusted' status; 'Multi-console management' listing three issues; and 'Backhaul traffic' listing two issues. The bottom section, 'SASE ARCHITECTURE,' shows three destinations—Cloud, SaaS, and Datacenters—with traffic flowing down into a DATA PLANE represented by a dashed box containing three PoP (Point of Presence) elements. Below the PoPs, four types of users or locations are shown: Branches, Remote employees, Contractors, and Devices. Underneath these, three characteristics of the SASE model are listed: 'Identity-based trust' with a 'trusted' check and an 'un-trusted' warning; 'Unified management' listing three benefits; and 'Direct connectivity' listing two benefits.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/sase-architecture/Legacy-network-models-vs-SASE-architecture.png) Legacy networks often followed a hub-and-spoke model. All traffic was backhauled through a central site before reaching the internet or cloud. This created bottlenecks. SASE uses globally distributed points of presence (PoPs) to enforce policy closer to users. So traffic is secured near its source, avoiding unnecessary detours. Earlier architectures also relied heavily on appliances. Organizations stacked routers, [firewalls](https://www.paloaltonetworks.com/cyberpedia/what-is-a-firewall), and web gateways in branch offices or headquarters. Scaling required adding more hardware. But SASE delivers these same functions as converged, cloud-native services. And that reduces the need for appliance sprawl and simplifies updates. Trust was once tied to being "inside the network." Anyone on the corporate LAN was often considered trusted. That model breaks down in a cloud-first world. SASE applies zero-trust principles everywhere. Access is based on user identity, device posture, and context, not physical location. Management is another difference. Traditional environments forced administrators to use multiple consoles for SD-WAN, firewalls, and cloud security tools. Policies had to be duplicated across systems. SASE replaces this with a unified control plane. Administrators define policies once, and they're applied consistently across all services. In short: Legacy models were location-bound, appliance-heavy, and fragmented. SASE is cloud-native, identity-driven, and unified. The result is an architecture better suited for today's distributed work and application environments. ## How does SASE architecture apply in practice? SASE architecture enables several real-world applications by design, with the most common including: * Securing branch locations * Applying zero trust everywhere * Supporting remote users * Consolidating multiple functions into a unified framework Let's dive into each in a bit more detail. **Secure branch modernization happens when branches connect directly to nearby points of presence (PoPs).** Networking and security functions are delivered from the cloud, and policies are enforced consistently through a single control plane. This reduces the need for complex branch infrastructure while maintaining uniform protection. **Zero-trust SASE applies identity- and context-based checks across the environment.** The control plane evaluates users, devices, and sessions in real time, while enforcement happens at distributed PoPs. So the same access policies follow users wherever they connect. **"Coffee shop" networking describes how remote or mobile users get the same level of inspection as if they were on campus.** Traffic is secured close to its source, and single-pass inspection ensures it is decrypted and checked once before moving on. This helps balance security with predictable performance. **Foundational consolidation comes from unifying SD-WAN and the security service edge into one architecture.** Administrators manage policies, visibility, and reporting through a single console. The result is lower operational overhead and fewer opportunities for misconfiguration across tools. | ***Further reading:** [How Zero Trust and SASE Can Work Together](https://www.paloaltonetworks.com/cyberpedia/zero-trust-and-sase)* ![Icon of report](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/sase-architecture/icon-report.svg) ## RESEARCH: GARTNER STRATEGIC ROADMAP FOR SASE CONVERGENCE Read a blueprint for how organizations should adopt SASE over the next 3--5 years [Download](https://www.paloaltonetworks.com/resources/research/gartner-2025-strategic-roadmap-sase-convergence) ## SASE architecture FAQs #### What are the core components of SASE architecture? SASE architecture converges SD-WAN with security functions including secure web gateway (SWG), cloud access security broker (CASB), zero-trust network access (ZTNA), firewall as a service (FWaaS), and remote browser isolation. These are delivered as cloud-native services, supported by single-pass inspection and globally distributed points of presence. #### What are the 4 SASE architectural requirements? Consistent policy enforcement across all access types; ease of administration via a unified control plane; integrated SD-WAN and security service edge in globally distributed PoPs; and single-pass inspection of encrypted traffic at line speed. #### What is an example of a SASE architecture? An enterprise may deploy a single-vendor SASE platform that integrates SD-WAN with SWG, CASB, ZTNA, and FWaaS in cloud PoPs. Policies are managed centrally in a unified console, while enforcement occurs at distributed edges close to users and applications. #### How is SASE architecture different from traditional network security? Legacy models rely on hub-and-spoke routing, location-based trust, and appliance sprawl. SASE distributes enforcement through cloud PoPs, applies zero-trust identity-based access, converges networking and security in the cloud, and centralizes management in a unified control plane. #### Does every SASE architecture include SD-WAN? Yes. SD-WAN is a core capability of SASE. Some vendors market SSE-only offerings without integrated SD-WAN, but a complete SASE architecture must combine SD-WAN with cloud-delivered security services. Related content [Threat research: Investigating LLM Jailbreaking of Popular GenAI Web Products Learn about Unit 42's investigation into jailbreaking 17 of the most popular GenAI web products that offer text generation or chatbot services.](https://unit42.paloaltonetworks.com/jailbreaking-generative-ai-web-products/) [Threat research: Deceptive Delight: Jailbreak LLMs Through Camouflage and Distraction Find out more about a simple, straightforward technique for jailbreaking that Unit 42 calls Deceptive Delight.](https://unit42.paloaltonetworks.com/jailbreak-llms-through-camouflage-distraction/) [LIVEcommunity blog: Secure AI by Design Discover a comprehensive GenAI security framework.](https://live.paloaltonetworks.com/t5/community-blogs/genai-security-technical-blog-series-1-6-secure-ai-by-design-a/ba-p/589504) [Report: Unit 42 Threat Frontier: Prepare for Emerging AI Risks Read about how attackers compromise GenAI tools and what to do about it.](https://www.paloaltonetworks.com/resources/ebooks/unit42-threat-frontier-report?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=A%20Complete%20Guide%20to%20SASE%20Architecture&body=SASE%20architecture%20is%20the%20structural%20design%20that%20defines%20how%20secure%20access%20service%20edge%20is%20implemented%20and%20operated.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/sase-architecture) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language