[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/cyber-security?ts=markdown) 3. [ZTNA](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-ztna?ts=markdown) 4. [SASE vs. ZTNA: What Is the Difference?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna?ts=markdown) Table of Contents * [What Is Zero Trust Network Access (ZTNA)](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-ztna?ts=markdown) * [What Is ZTNA?](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-ztna#what?ts=markdown) * [How Does ZTNA Work?](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-ztna#how?ts=markdown) * [Benefits of ZTNA](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-ztna#benefits?ts=markdown) * [ZTNA 2.0](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-ztna#two?ts=markdown) * [ZTNA \& SASE](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-ztna#sase?ts=markdown) * [Zero Trust Network Access FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-ztna#faqs?ts=markdown) * SASE vs. ZTNA: What Is the Difference? * [What Is SASE?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#sase?ts=markdown) * [What Is ZTNA?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#ztna?ts=markdown) * [What Are the Differences Between SASE and ZTNA?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#differences?ts=markdown) * [What Are the Similarities Between SASE and ZTNA?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#similarities?ts=markdown) * [What Is the Difference Between SASE and Zero Trust?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#diff-sase-zt?ts=markdown) * [The Role of ZTNA in SASE](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#role?ts=markdown) * [Benefits of Adopting SASE and ZTNA](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#benefits?ts=markdown) * [SASE vs. ZTNA FAQs](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#faq?ts=markdown) * [What is Zero Trust Network Access (ZTNA) 2.0](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-2-0?ts=markdown) * [ZTNA 2.0](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-2-0#ztna?ts=markdown) * [ZTNA 1.0 vs. ZTNA 2.0](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-2-0#ztna1?ts=markdown) * [Next-Gen ZTNA vs. ZTNA 2.0](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-2-0#next?ts=markdown) * [ZTNA 2.0 Benefits](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-2-0#benefits?ts=markdown) * [Single Unified Approach with ZTNA 2.0](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-2-0#heading?ts=markdown) # SASE vs. ZTNA: What Is the Difference? 5 min. read Table of Contents * * [What Is SASE?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#sase?ts=markdown) * [What Is ZTNA?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#ztna?ts=markdown) * [What Are the Differences Between SASE and ZTNA?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#differences?ts=markdown) * [What Are the Similarities Between SASE and ZTNA?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#similarities?ts=markdown) * [What Is the Difference Between SASE and Zero Trust?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#diff-sase-zt?ts=markdown) * [The Role of ZTNA in SASE](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#role?ts=markdown) * [Benefits of Adopting SASE and ZTNA](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#benefits?ts=markdown) * [SASE vs. ZTNA FAQs](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#faq?ts=markdown) 1. What Is SASE? * * [What Is SASE?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#sase?ts=markdown) * [What Is ZTNA?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#ztna?ts=markdown) * [What Are the Differences Between SASE and ZTNA?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#differences?ts=markdown) * [What Are the Similarities Between SASE and ZTNA?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#similarities?ts=markdown) * [What Is the Difference Between SASE and Zero Trust?](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#diff-sase-zt?ts=markdown) * [The Role of ZTNA in SASE](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#role?ts=markdown) * [Benefits of Adopting SASE and ZTNA](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#benefits?ts=markdown) * [SASE vs. ZTNA FAQs](https://www.paloaltonetworks.com/cyberpedia/sase-vs-ztna#faq?ts=markdown) ![enterprise browser](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/sase-vs-ztna.jpg) close The difference between SASE and ZTNA is that SASE is a comprehensive cloud-native architecture that combines network and security services, while ZTNA is a specific component of SASE that provides secure access to applications based on identity verification. SASE offers a broader scope, applying a consistent security policy across the entire network. ZTNA provides fine-grained access control, enforcing policies that limit user access to the necessary role-specific resources. Together, SASE and ZTNA represent a shift toward a more secure, flexible, and efficient network infrastructure. ## What Is SASE? ![SASE diagram showing SaaS, clouds, and data center linked to security services and endpoints.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/sase.png "SASE diagram showing SaaS, clouds, and data center linked to security services and endpoints.") The secure access service edge (SASE) model is a unified cloud-native security approach that combines software-defined wide area networking (SD-WAN) with a range of security functionalities, including secure web gateway (SWG), cloud access security broker (CASB), firewall as a service (FWaaS), and Zero Trust network access (ZTNA) into a single integrated platform. SASE orchestrates various components to secure network connections, manage a comprehensive set of security features, enhance management workflows, and offer a flexible network structure that can adjust to evolving business needs. SASE architecture addresses the shifting requirements for secure connectivity in modern enterprise settings. It expands the traditional network boundary to encompass all access points, aiming to enable secure and efficient cloud interactions for remote users, regardless of location. SASE functions by directing network traffic through a cloud-native service platform that integrates multiple security and network functionalities. By placing these services at the network edge, closer to the points of user and device connectivity, it reduces latency, enhances network performance, and elevates the user experience. This strategy ensures uniform enforcement of security policies across the enterprise and centralizes control. *[What Is SASE](https://www.paloaltonetworks.com/cyberpedia/what-is-sase?ts=markdown)?* ## What Is ZTNA? ![ZTNA diagram showing connections between private/public clouds, internet, and remote users to a data center.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/ztna.png "ZTNA diagram showing connections between private/public clouds, internet, and remote users to a data center.") Zero Trust network access (ZTNA) is a set of technologies designed to securely manage remote access to applications and services by enforcing predefined access control policies. Unlike traditional VPNs, which provide broad access to a local area network, ZTNA solutions adopt a deny-by-default stance. Deny-by-default grants users access to explicitly authorized services only. As the number of remote users grows, it is crucial for organizations to understand the security advantages and potential gaps that come with ZTNA solutions. ZTNA grants user access only after successful authentication to the ZTNA service. The service then facilitates access to the required application on behalf of the user via a secure, encrypted connection. This approach adds an extra layer of security to corporate applications and services by concealing IP addresses that would otherwise be exposed to the public. Similar to the principles of software-defined perimeters (SDP), ZTNA applies the concept of a dark cloud, which hides applications and services from users unless they have explicit permission to access them. This strategy helps prevent lateral movement by attackers, who could otherwise use compromised endpoints or credentials to scan and pivot to other services. ## What Are the Differences Between SASE and ZTNA? | ZTNA vs. SASE: What Are the Differences? ||| |---------------------------------------|--------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------| | | **SASE** | **ZTNA** | | **Architectural Integration** | Integrates networking and security into a cloud-based service for remote and hybrid users. | Focuses on secure remote access with no intrinsic networking capabilities. | | **Scope of Application** | Secures a broad range of enterprise environments. | Targets specific applications and services for remote users. | | **Network Design Philosophy** | Emphasizes cloud-based capabilities deployed as needed. | Operates on a zero-trust principle, restricting access without network redesign. | | **Application Visibility and Access** | Offers visibility across the entire network at the edge. | Visibility limited to user and application interaction. | | **Security Capabilities** | Includes SWG, CASB, FWaaS, and ZTNA. | Focuses on identity verification and access tunnels. | | **Deployment and Management** | Simplifies management by consolidating functions and services. | Typically requires integration into broader security strategies. | | **Access Control Strategies** | Enforces security across all applications and data paths. | Access restricted to pre-defined services for authenticated users only. | ### Architectural Integration Architectural integration is a key difference between ZTNA and SASE. SASE integrates networking and security into a singular cloud-based service. This architecture supports remote and hybrid users through cloud gateways, avoiding traffic backhauls to data centers. Conversely, ZTNA focuses solely on secure remote access without intrinsic networking capabilities. ### Scope of Application SASE provides a comprehensive suite of security and networking features, designed to safeguard all types of enterprise environments. In contrast, ZTNA targets the secure access of remote users to specific applications and services. ### Network Design Philosophy SASE represents a shift in network design, emphasizing cloud-based capabilities deployed as needed. ZTNA operates on the Zero Trust principle that restricts access, with no inherent network redesign. ### Application Visibility and Access SASE operates at the network edge, offering visibility across the entire network. ZTNA, however, provides visibility limited to user and application interaction, based on stringent access control policies. ### Security Capabilities SASE encompasses a broad range of security functions such as SWG, CASB, and FWaaS, alongside ZTNA. ZTNA as a component focuses on identity verification and secure, narrow access tunnels for users. ### Deployment and Management SASE aims to simplify management by consolidating various functions and services. ZTNA, being one of these services, typically requires integration into broader security strategies like SASE. ### Access Control Strategies SASE enforces security across all applications and datapaths in a network. ZTNA's access control is more specific, restricting access to predefined services for authenticated users only. ## What Are the Similarities Between SASE and ZTNA? | ZTNA vs. SASE: What Are the Similarities? || |------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---| | \* Both ensure secure remote access for modern workforces. \* They align with cloud transformation, supporting more fluid, cloud-based infrastructures. \* Both prioritize identity-based authentication and granular access control. \* They aim to reduce the complexity of network and security operations. \* Both improve network performance and user experience by minimizing latency. | ### Emphasis on Secure Remote Access Both SASE and ZTNA facilitate secure remote access, addressing the needs of modern workforces. They provide solutions that enable secure connectivity for dispersed users, ensuring that access to applications and services is both safe and reliable. ### Alignment with Cloud Transformation SASE and ZTNA align with cloud transformation initiatives, offering services that are compatible with cloud and multicloud environments. They support the transition away from traditional network perimeters to more fluid, cloud-based infrastructures. ### Focus on Identity and Access Management Identity-based authentication and granular access control are central to both SASE and ZTNA. They prioritize verifying the identity of users and devices and enforce access policies that restrict entry to network services and applications based on user credentials. ### Reduction of Operational Complexity SASE and ZTNA both contribute to reducing network and security operations complexity. By delivering cloud-native capabilities, they simplify the resource management and eliminate the need for multiple disparate security products. ### Enhanced Performance and User Experience Improving network performance and the overall user experience is a shared objective of SASE and ZTNA. They employ techniques to minimize latency and optimize access, enhancing the efficiency of user interactions with applications. ## What Is the Difference Between SASE and Zero Trust? Zero Trust is a security strategy that requires verification for every access request within a network, whereas SASE is an integrated network architecture that combines comprehensive security services, including [Zero Trust](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture) principles, within a cloud-based infrastructure. Zero Trust operates on the assumption that trust should never be implicit within or outside the network, and access is granted only after thorough verification. In contrast, SASE extends beyond access control, encompassing a range of security functions it delivers at the network edge to ensure secure access and optimal performance. SASE solutions support the dynamic, distributed nature of modern enterprises, applying Zero Trust as part of a broader, strategic approach to network security and management. ## The Role of ZTNA in SASE ![SASE architecture diagram with user traffic sources, network components, and data destinations.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/sase-architecture.png "SASE architecture diagram with user traffic sources, network components, and data destinations.") Zero Trust Network Access (ZTNA) plays a crucial role in SASE (secure access service edge) architecture by enforcing strict access control. In a SASE model, ZTNA provides fine-grained, identity-based access to organizational resources, ensuring only authenticated and authorized users can access specific applications and services. Adherence to the principle of "never trust, always verify" underpins the security model that SASE embodies, extending it across the network regardless of where resources or users are located. ZTNA is embedded within the SASE framework to enhance security by segmenting access based on user profiles and their associated trust levels. It rejects the traditional, location-based perimeter defense in favor of a dynamic, risk-informed access strategy. This strategy assesses context, such as the user's role, location, and the device's security posture, before granting access. Assessing context reduces the attack surface against unauthorized entry and lateral movement within the network. The integration of ZTNA into SASE architectures represents a transformative approach to network security. It shifts the focus from network-centric security models to user- and device-centric models, which is essential in a landscape where remote work and cloud-based assets are the norm. Within SASE, ZTNA enables direct, secure connections to applications, eliminating the need for remote users to connect via traditional VPNs, which can be a security liability due to their broad network access. One of the main purposes of ZTNA in a SASE architecture is to provide agility and scalability. As businesses grow and adopt more cloud services, the ability to quickly adapt and enforce consistent security policies becomes paramount. ZTNA aids in this by allowing security teams to implement and manage policies centrally. This streamlines the secure access of a distributed workforce without the complexity of managing individual VPNs or legacy remote access solutions. ## Benefits of Adopting SASE and ZTNA ![Benefits of SASE \& ZTNA: security, network efficiency, simpler security mgmt, less costs, fast deployment](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/sase-ztna-benefits.png "Benefits of SASE & ZTNA: security, network efficiency, simpler security mgmt, less costs, fast deployment") Implementing SASE and ZTNA together strengthens an organization's security posture. ZTNA ensures secure access through identity verification, while SASE extends security services to the network's edge. This combination mitigates risks of unauthorized access and lateral movement within the network. ### Improved Network Efficiency SASE and ZTNA reduce latency by facilitating direct connections to applications and avoiding the need to route traffic through a central hub. This approach leads to improved performance for remote users and distributed workforces. ### Simplified Security Management The integration of SASE with ZTNA streamlines network and security management. Organizations benefit from a unified platform to enforce policies, resulting in simplified operations and better control over the IT environment. ### Reduced Costs By converging networking and security into a single cloud-based platform, SASE with ZTNA can lower the total cost of ownership. It eliminates the need for multiple security solutions or appliances and reduces the complexity of network architecture. ### Accelerated Deployment Cloud-based deployment models of SASE and ZTNA enable rapid implementation across organizations, reducing the time and resources typically required for setting up traditional security infrastructure. ## SASE vs. ZTNA FAQs ### What is the difference between Zero Trust and SASE architecture? Zero Trust is a security model requiring verification for every access request, regardless of origin. SASE combines network and security functions with Zero Trust, delivered as a cloud service. ### What are two benefits of implementing the SASE and ZTNA solution? Benefits of SASE and ZTNA include enhanced security with identity-based access and reduced complexity by unifying various security services into one platform. ### What is the difference between ZTA and ZTNA? ZTA refers broadly to a security framework based on Zero Trust principles, whereas ZTNA is a technology enforcing those principles for network access. ### What is the difference between CASB and ZTNA? CASB provides security governance for cloud services; ZTNA governs access to internal applications based on strict identity verification. ### What is the difference between VPN and ZTNA? VPN provides users with secure network access via encrypted tunnels; ZTNA grants access to specific applications based on identity, not just a network connection. ### What is the difference between Zero Trust and SASE architecture? Zero Trust is a security strategy denying trust by default, requiring verification for every access. SASE is a framework combining networking and security functions, including Zero Trust, delivered as a cloud service. ### What is the difference between Zero Trust and security service edge? Zero Trust is a strategic approach to cybersecurity that trusts nothing inside or outside the network by default. SSE is a component of SASE that specifically focuses on security services for edge network access. Related Content \[What Is AI-Powered SASE? AI-Powered SASE is a cloud-based network architecture that integrates AI-enhanced SWG, SD-WAN, CASB, and ZTNA for efficient security and networking.\](https://www.paloaltonetworks.com/cyberpedia/ai-powered-sase ?ts=markdown) [Prisma SASE AI-powered Prisma SASE is the secure foundation for agile, cloud-enabled organizations.](https://www.paloaltonetworks.com/sase?ts=markdown) [Why the SASE approach to network and security is the answer to combatting sophisticated cyberattacks Understand why SASE is at the forefront of the agenda for security leaders as the methodology evolves to become a cornerstone of modern security strategy.](https://www.paloaltonetworks.com/resources/whitepapers/why-the-sase-approach-to-network-and-security-is-the-answer-to-combatting-sophisticated-cyberattacks?ts=markdown) [SASE CIO eBook: Driving the future of work through enterprise-wide SASE A CIO'S Guide to Planning and Implementation](https://www.paloaltonetworks.com/resources/ebooks/sase-cio-ebook-driving-the-future-of-work-through-enterprise-wide-sase?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=SASE%20vs.%20ZTNA%3A%20What%20Is%20the%20Difference%3F&body=The%20difference%20between%20SASE%20and%20ZTNA%20is%20that%20SASE%20is%20a%20cloud-native%20architecture%20that%20combines%20networking%20and%20security%2C%20while%20ZTNA%20is%20a%20component%20of%20SASE.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/sase-vs-ztna) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-ztna?ts=markdown) What Is Zero Trust Network Access (ZTNA) [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-2-0?ts=markdown) What is Zero Trust Network Access (ZTNA) 2.0 {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language