[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberark/Seamless_IDs_small.jpg) Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-security-solution?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberark/Seamless_IDs_small.jpg) Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.paloaltonetworks.com/deploybravely?ts=markdown) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Security Operations](https://www.paloaltonetworks.com/cyberpedia/security-operations?ts=markdown) 3. [SIEM](https://www.paloaltonetworks.com/cyberpedia/security-analytics?ts=markdown) 4. [Best SIEM Tools](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison?ts=markdown) Table of Contents * [What is Security Analytics?](https://www.paloaltonetworks.com/cyberpedia/security-analytics?ts=markdown) * [Security Analytics Platforms](https://www.paloaltonetworks.com/cyberpedia/security-analytics#security?ts=markdown) * [Security Analytics Capabilities](https://www.paloaltonetworks.com/cyberpedia/security-analytics#capabilities?ts=markdown) * [MITRE ATT\&CK Mapping](https://www.paloaltonetworks.com/cyberpedia/security-analytics#mitre?ts=markdown) * [SOAR and Threat Intelligence Platform](https://www.paloaltonetworks.com/cyberpedia/security-analytics#platform?ts=markdown) * [Benefits of Security Analytics](https://www.paloaltonetworks.com/cyberpedia/security-analytics#benefits?ts=markdown) * [SIEM vs. Security Analytics](https://www.paloaltonetworks.com/cyberpedia/security-analytics#vs?ts=markdown) * [Our Approach to Security Analytics](https://www.paloaltonetworks.com/cyberpedia/security-analytics#approach?ts=markdown) * [Security Analytics FAQs](https://www.paloaltonetworks.com/cyberpedia/security-analytics#faqs?ts=markdown) * [What are SIEM Use Cases?](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-use-cases?ts=markdown) * [Exploring SIEM Use Cases](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-use-cases#SIEM?ts=markdown) * [Key SIEM Use Cases](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-use-cases#use-cases?ts=markdown) * [Building and Managing SIEM Use Cases](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-use-cases#managing?ts=markdown) * [Implementing SIEM: Best Practices and Considerations](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-use-cases#best-practices?ts=markdown) * [SIEM Use Cases FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-use-cases#faq?ts=markdown) * Best SIEM Tools for 2026: Compare 10 Leading Platforms * [What Are SIEM Tools and Why Do They Matter](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#what?ts=markdown) * [SIEM vs XDR vs SOAR vs Log Management vs Security Data Lake](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#vs?ts=markdown) * [Key SIEM Trends to Watch in 2026](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#key?ts=markdown) * [10 Best SIEM Tools for 2026](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#best?ts=markdown) * [How to Choose the Best SIEM Provider](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#how?ts=markdown) * [SIEM Tools FAQs](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#faqs?ts=markdown) * [What is SIEM?](https://www.paloaltonetworks.com/cyberpedia/what-is-siem?ts=markdown) * [SIEM: The Foundation for XSIAM](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#foundation?ts=markdown) * [How SIEM Works](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#how?ts=markdown) * [Key Functions and Benefits of SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#key?ts=markdown) * [Role of AI and ML in SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#role?ts=markdown) * [SIEM Integration](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#siem?ts=markdown) * [SIEM Use Cases](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#usecases?ts=markdown) * [How to Choose a SIEM Solution](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#solution?ts=markdown) * [Best Practices for SIEM Implementation](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#best?ts=markdown) * [SIEM vs Other Security Solutions](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#vs?ts=markdown) * [What is Cloud SIEM?](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#cloud?ts=markdown) * [The Evolution of SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#evolution?ts=markdown) * [The Future of SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#future?ts=markdown) * [SIEM FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#faqs?ts=markdown) * [What is Security Information and Event Management (SIEM) Integration?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-information-event-management-siem-integration?ts=markdown) * [How Does SIEM Integration Work?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-information-event-management-siem-integration#how?ts=markdown) * [What are the Benefits of SIEM Integration?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-information-event-management-siem-integration#what?ts=markdown) * [Fundamentals of SIEM Integration](https://www.paloaltonetworks.com/cyberpedia/what-is-security-information-event-management-siem-integration#fundamentals?ts=markdown) * [SIEM Integration FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-security-information-event-management-siem-integration#faqs?ts=markdown) * [What is SIEM Logging?](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging?ts=markdown) * [Why is SIEM Logging Important for IT Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging#why?ts=markdown) * [SIEM vs. Log Management: Understanding the Differences](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging#vs?ts=markdown) * [Key Components in SIEM Logs](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging#key?ts=markdown) * [The Mechanics of SIEM Logging](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging#mechanics?ts=markdown) * [SIEM Logging Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging#best-practices?ts=markdown) * [SIEM Logging Challenges and Solutions](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging#challenges?ts=markdown) * [SIEM Logging FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging#faqs?ts=markdown) * [What Is Security Event Management (SEM)?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-event-management-sem?ts=markdown) * [Why is SEM Important to IT Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-event-management-sem#why?ts=markdown) * [How does SEM work?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-event-management-sem#how?ts=markdown) * [Scenario: Detecting and Mitigating an Insider Threat](https://www.paloaltonetworks.com/cyberpedia/what-is-security-event-management-sem#scenario?ts=markdown) * [SIM vs. SEM vs. SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-security-event-management-sem#sim?ts=markdown) * [Security Event Management (SEM) FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-security-event-management-sem#faqs?ts=markdown) * [What is a SIEM Solution in a SOC?](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc?ts=markdown) * [What is a Security Information and Event Management (SIEM) Solution?](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#what?ts=markdown) * [What Is a Security Operations Center (SOC)?](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#soc?ts=markdown) * [Key Components of SIEM Solutions](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#key?ts=markdown) * [How Does SIEM Integrate with SOC?](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#how?ts=markdown) * [Why is SIEM Utilized?](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#why?ts=markdown) * [Traditional SIEMs](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#traditional?ts=markdown) * [Limitations of a SIEM](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#limitations?ts=markdown) * [What Is Next-Generation SIEM?](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#next-generations?ts=markdown) * [SIEM Solutions in SOC FAQs](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#faqs?ts=markdown) * [How Do SIEM Tools Benefit SOC Teams?](https://www.paloaltonetworks.com/cyberpedia/how-do-siem-tools-benefit-soc-teams?ts=markdown) * [What is a SOC (Security Operations Center)?](https://www.paloaltonetworks.com/cyberpedia/how-do-siem-tools-benefit-soc-teams#what?ts=markdown) * [What is Security Information and Event Management (SIEM)?](https://www.paloaltonetworks.com/cyberpedia/how-do-siem-tools-benefit-soc-teams#siem?ts=markdown) * [The Benefits of SIEM Tools for SOC Teams](https://www.paloaltonetworks.com/cyberpedia/how-do-siem-tools-benefit-soc-teams#benefits?ts=markdown) * [Implementing SIEM in SOCs](https://www.paloaltonetworks.com/cyberpedia/how-do-siem-tools-benefit-soc-teams#implementing?ts=markdown) * [Challenges and Considerations](https://www.paloaltonetworks.com/cyberpedia/how-do-siem-tools-benefit-soc-teams#challenges?ts=markdown) * [How SIEM Tools Benefit SOC Teams FAQs](https://www.paloaltonetworks.com/cyberpedia/how-do-siem-tools-benefit-soc-teams#faqs?ts=markdown) * [What Is the Role of AI and ML in Modern SIEM Solutions?](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-and-machine-learning-ml-in-siem?ts=markdown) * [The Evolution of SIEM Systems](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-and-machine-learning-ml-in-siem#the?ts=markdown) * [Benefits of Leveraging AI and ML in SIEM Systems](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-and-machine-learning-ml-in-siem#benefits?ts=markdown) * [SIEM Features and Functionality that Leverage AI and ML](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-and-machine-learning-ml-in-siem#siem?ts=markdown) * [AI Techniques and ML Algorithms that Support Next-Gen SIEM Solutions](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-and-machine-learning-ml-in-siem#ai?ts=markdown) * [Predictions for Future Uses of AI and ML in SIEM Solutions](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-and-machine-learning-ml-in-siem#predictions?ts=markdown) * [Role of AI and Machine Learning in SIEM FAQs](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-and-machine-learning-ml-in-siem#faqs?ts=markdown) * [What is Cloud SIEM?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem?ts=markdown) * [Why Use a Cloud SIEM?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#why?ts=markdown) * [How SIEM Interacts with Cloud Environments and SaaS Applications](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#how?ts=markdown) * [Core Cloud SIEM Features and Capabilities](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#core?ts=markdown) * [Cloud SIEM Deployment Models](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#cloud?ts=markdown) * [On-Premise vs. Cloud SIEM Deployment](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#vs?ts=markdown) * [Key Steps for Implementing Cloud SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#key?ts=markdown) * [Cloud SIEM Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#challenges?ts=markdown) * [Considerations of a Cloud Native SIEM Solution](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#considerations?ts=markdown) * [Cloud SIEM FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#faqs?ts=markdown) * [What Is Security Information Event Management (SIEM) Software?](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software?ts=markdown) * [How Security Information Event Management (SIEM) Software Works](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software#works?ts=markdown) * [Benefits of SIEM Software](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software#benefits?ts=markdown) * [SIEM Software Features](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software#features?ts=markdown) * [SIEM Software Types](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software#types?ts=markdown) * [SIEM Implementation and Deployment](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software#implementation?ts=markdown) * [SIEM Software Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software#practices?ts=markdown) * [What Are Security Information and Event Management (SIEM) Tools?](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools?ts=markdown) * [What Is Security and Information Event Management (SIEM)?](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#SIEM?ts=markdown) * [What Do SIEM Tools Do?](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#Tools?ts=markdown) * [How Do SIEM Tools Work?](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#How?ts=markdown) * [Why Is SIEM important?](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#Why?ts=markdown) * [Key SIEM Tools and Features](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#Features?ts=markdown) * [Compliance Management and Reporting](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#Compliance?ts=markdown) * [Benefits of SIEM Tools](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#Benefits?ts=markdown) * [Security Information and Event Management (SIEM) FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#FAQs?ts=markdown) # Best SIEM Tools For 2026 5 min. read Table of Contents * * [What Are SIEM Tools and Why Do They Matter](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#what?ts=markdown) * [SIEM vs XDR vs SOAR vs Log Management vs Security Data Lake](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#vs?ts=markdown) * [Key SIEM Trends to Watch in 2026](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#key?ts=markdown) * [10 Best SIEM Tools for 2026](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#best?ts=markdown) * [How to Choose the Best SIEM Provider](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#how?ts=markdown) * [SIEM Tools FAQs](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#faqs?ts=markdown) 1. What Are SIEM Tools and Why Do They Matter * * [What Are SIEM Tools and Why Do They Matter](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#what?ts=markdown) * [SIEM vs XDR vs SOAR vs Log Management vs Security Data Lake](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#vs?ts=markdown) * [Key SIEM Trends to Watch in 2026](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#key?ts=markdown) * [10 Best SIEM Tools for 2026](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#best?ts=markdown) * [How to Choose the Best SIEM Provider](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#how?ts=markdown) * [SIEM Tools FAQs](https://www.paloaltonetworks.com/cyberpedia/siem-tools-comparison#faqs?ts=markdown) Security Information and Event Management (SIEM) is a platform that collects and analyzes security logs and events from across an organization to help detect threats, investigate incidents, and support compliance reporting. In 2026, leading SIEM tools increasingly combine scalable data architectures with automation to reduce alert noise and speed investigations. This guide compares 10 SIEM platforms and provides a framework for evaluating data costs, detection quality, and integration with XDR and SOAR. ## What Are SIEM Tools and Why Do They Matter [SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-siem?ts=markdown) platforms aggregate and analyze security event data across your organization in real time. They collect logs and telemetry from network devices, endpoints, cloud infrastructure, and applications---essentially any system that generates security-relevant data. The platform then correlates this information to detect threats, flag suspicious behavior, and generate alerts that enable security teams to investigate incidents and respond more quickly. Think of it as a central nervous system for your security operations: raw data flows in from everywhere, and actionable intelligence flows out. Key Points * **Collection**: Aggregates security logs from endpoints, networks, cloud, and applications into one place. \* **Correlation**: Links related events across systems to detect multi-stage attacks that individual tools would miss. \* **Detection**: Applies rules and ML models to surface threats and suspicious behavior patterns. \* **Investigation**: Provides search and analysis capabilities to trace attack progression and root causes. \* **Compliance**: Generates audit reports for regulations requiring security monitoring evidence. \* **Response Integration**: Triggers automated containment actions through SOAR platforms and security tools. The stakes have shifted dramatically in 2026. Organizations now face regulatory breach notification requirements, often measured in hours or days depending on regulatory and contractual requirements, while threat actors compress entire kill chains into sub-hour windows. Modern SIEM solutions address three converging pressures: exploding data volumes in hybrid environments, analyst burnout from alert fatigue, and board-level demands for demonstrable improvements in the security posture. Best SIEM platforms now process and handle very large telemetry volumes daily while reducing mean time to detect through machine learning models and automated response capabilities. Top SIEM vendors have evolved beyond static correlation rules to deliver AI-driven detection that identifies attack patterns across previously siloed data sources. Best SIEM tools in 2026 converge extended detection and response, security orchestration, user behavior analytics, and attack surface management into unified platforms. Organizations deploying best SIEM solutions report significant reductions in incidents requiring manual investigation and tremendous improvements in remediation speed compared to legacy architectures. SIEM is not endpoint protection; it depends on data sources (agents, cloud logs, network telemetry) and uses analytics + correlation to surface and prioritize security-relevant events. ## SIEM vs XDR vs SOAR vs Log Management vs Security Data Lake These security tools overlap in function but serve different primary purposes, and understanding the distinctions helps you build a coherent security architecture rather than a pile of redundant platforms. SIEM aggregates security logs from across your environment, correlates events to detect threats, and provides investigation workflows. It's fundamentally about visibility and detection through log analysis. Think of it as your security data analyst. It watches everything, connects the dots, and raises its hand when something looks wrong. XDR (Extended Detection and Response) prioritizes detection and response across specific security layers: endpoints, networks, cloud workloads, and identities. Unlike SIEM's broad log correlation approach, XDR focuses on deep telemetry from integrated security tools to catch threats faster and automate containment. It's more about immediate threat response than comprehensive log retention. SOAR (Security Orchestration, Automation, and Response) doesn't detect threats itself. It automates post-detection tasks, enriching alerts, executing playbooks, and coordinating actions across your security stack. SOAR ingests alerts from your SIEM or XDR and automates repetitive response tasks, allowing analysts to focus on complex investigations. Log Management collects and stores logs for operational troubleshooting, compliance, and general IT visibility. It lacks the security-specific correlation rules, threat intelligence integration, and behavioral analytics that define SIEM. If you only need to retain logs for audit purposes, log management is more cost-effective. If you need to detect threats in those logs, you need a SIEM. Security Data Lake is a raw storage infrastructure, a repository where you dump massive volumes of security telemetry without immediate processing. Organizations use data lakes to store historical data cost-effectively and query it as needed for investigations or compliance. Some modern SIEM platforms let you bring your own data lake to separate storage costs from analytics costs. ## Key SIEM Trends to Watch in 2026 ### AI-assisted investigation and summarization Modern SIEM platforms use AI to help analysts understand what's happening faster. Instead of writing complex queries, security teams can ask questions in plain language, such as: "show me all failed login attempts from this IP address in the last 24 hours", and get instant results. AI models automatically parse unfamiliar log formats, correlate related events across different systems, and summarize multi-stage attacks into coherent narratives. This dramatically reduces investigation time. ### Automation guardrails and response approvals The bigger shift is AI that actually takes action, not just answers questions. Leading SIEM vendors deploy autonomous agents that execute pre-approved response workflows, isolating compromised endpoints, blocking suspicious IP addresses, or revoking credentials, without waiting for analyst approval. These systems operate within defined guardrails: they're trained on thousands of past incident responses to know when to act immediately and when to flag an issue for human review. Organizations using this level of automation report significant reductions in mean time to remediation, with AI handling routine threats while analysts focus on complex investigations. Data management innovation has become the primary competitive differentiator among the best SIEM platforms: * **Pipelines before ingestion** : Advanced vendors let you filter, sample, and route telemetry before it hits storage---sending only what you need to hot storage and dumping the rest. This keeps costs from spiraling as data volumes grow, but requires upfront planning to avoid filtering out the signals you'll need later. * **Hot vs cold storage** : Send high-fidelity endpoint data to hot storage for real-time threat hunting, while compliance logs sit in cheap cold storage. This works great until you need to correlate an active threat with three-month-old audit logs---then query performance matters. * **Bring-your-own-data-lake (BYODL)** : Decouple compute from storage by processing security events in your own data warehouse. You get flexibility and potentially lower costs at scale, but you're also taking on the operational complexity of managing that infrastructure yourself. XDR convergence continues to reshape how SIEM tools deliver detection coverage most effectively. Leading SIEM vendors now bundle endpoint detection and response, network detection and response, cloud detection and response, and identity threat detection into unified platforms with single-pane-of-glass interfaces. Best SIEM platforms eliminate tool sprawl through strategic consolidation rather than point-product proliferation, reducing cognitive load on analysts who previously toggled between five or more security consoles to complete investigation workflows. ## 10 Best SIEM Tools for 2026 Top SIEM vendors have converged detection, investigation, and response capabilities into platforms that process petabyte-scale telemetry while delivering sub-minute remediation times. Best SIEM solutions in 2026 distinguish themselves through AI-driven automation, flexible data architectures, and native XDR integration. | SIEM solution | Standout capability | Data model/pricing driver | Best for | | #1 Palo Alto Networks Cortex XSIAM | Converged XDR-SIEM-SOAR-ASM platform with a large number of ML models, auto-grouping alerts into incidents | Not volume-based (platform licensing) | Enterprises seeking platform consolidation and AI-first automation | | #2 Rapid7 InsightIDR | Unlimited data ingestion with managed detection services included | Monitored assets (not data volume) | Small to midsize orgs needing predictable costs and 24/7 SOC coverage | | #3 CrowdStrike Falcon Next-Gen SIEM | Charlotte AI assistant enables natural language threat hunting | Petabyte-scale ingestion | Existing Falcon customers wanting unified threat management | | #4 Datadog Cloud SIEM | Security analytics built into the observability platform | Events analyzed (millions per month) | DevSecOps teams needing unified app performance + security visibility | | #5 Fortinet FortiSIEM | Native CMDB with live query to external data lakes via ODBC | Events per second (self-managed) or compute-storage (cloud) | Organizations with existing Fortinet infrastructure | | #6 Securonix Unified Defense SIEM | Embedded Snowflake data lake with psycho-analytics for insider threats | Bring-your-own-storage or Securonix-managed | Large enterprises with complex identity-based attack scenarios | | #7 Splunk Enterprise Security | Massive marketplace ecosystem with Cisco Talos threat intelligence | Daily ingest volume or virtual compute | Large enterprises requiring extensive third-party integrations | | #8 Elastic Security | Attack Discovery auto-correlates alerts into attack chains; AI-assisted migration | Storage-based or compute-based | Organizations seeking open-source foundations with enterprise features | | #9 ManageEngine Log360 | Budget-friendly with compliance templates and Zoho automation | Gigabytes per day | Midsize enterprises with budget constraints and Microsoft environments | | #10 Stellar Cyber AI-Driven SIEM | Multi-tenant architecture with AI Investigator for natural language queries | Predictable flat pricing | MSSPs and lean enterprise teams needing automation-first approach | |-------------------------------------|------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------|------------------------------------------------------------------------| **Quick take**: If your biggest constraint is data cost and scale, focus on architectures that optimize pipelines and storage. If your biggest constraint is response speed, prioritize automation maturity and tight integration with XDR/SOAR workflows. ### Palo Alto Networks Cortex XSIAM ![Palo Alto Networks Cortex XSIAM](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/siem-tools-comparison/panw-cortex-xsiam.webp "Palo Alto Networks Cortex XSIAM") Cortex XSIAM combines SIEM, XDR, SOAR, and attack-surface management into a single platform that applies machine-learning models to auto-correlate low-confidence alerts into high-fidelity incidents. **Best for**: Enterprises seeking platform consolidation with AI-driven automation at the core of their security operations. **Strength**: Automated playbooks learn from analyst behaviors to execute response actions before human intervention, reducing time spent on routine alert triage. **What to validate**: * Whether platform licensing (non-volume-based) fits your budget model compared to per-GB competitors * Integration quality with non-Palo Alto Networks security tools in heterogeneous environments ### 2. Rapid7 InsightIDR ![Rapid7 InsightIDR](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/siem-tools-comparison/rapid7.webp "Rapid7 InsightIDR") InsightIDR is a cloud-native SIEM with unlimited data ingestion priced by monitored assets rather than data volume, bundled with managed detection and response services. **Best for**: Small to midsize organizations needing predictable costs and 24/7 SOC coverage without building an in-house team. **Strength**: Threat Complete package combines SIEM, attack surface management, and digital forensics with professional monitoring services. **What to validate**: * Whether asset-based pricing remains cost-effective as your infrastructure scales * Customization limits for organizations requiring deep analytics or advanced compliance reporting ### 3. CrowdStrike Falcon Next-Gen SIEM ![CrowdStrike Falcon Next-Gen SIEM](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/siem-tools-comparison/crowdstrike.webp "CrowdStrike Falcon Next-Gen SIEM") Falcon Next-Gen SIEM extends the Falcon security platform with Charlotte AI for natural language querying and collaborative incident management workflows. **Best for**: Organizations already invested in CrowdStrike's endpoint ecosystem seeking unified visibility. **Strength**: Deep integration with Falcon endpoint, identity, and cloud products creates a correlated threat context across the security stack. **What to validate**: * Integration complexity and value if deploying outside the Falcon ecosystem * Whether Charlotte AI query capabilities match your team's investigation needs in practice ### 4. Datadog Cloud SIEM ![Datadog Cloud SIEM](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/siem-tools-comparison/datadog.webp "Datadog Cloud SIEM") Datadog embeds security monitoring into its observability platform, letting DevSecOps teams analyze application performance and security events in one place. **Best for**: Teams already using Datadog for infrastructure monitoring who want to reduce tool sprawl. **Strength**: Flexible event-based pricing and unified visibility into how application changes impact security posture. **What to validate**: * Whether the platform offers enough security-native workflows compared to purpose-built SIEM tools * Playbook and orchestration capabilities versus dedicated SOAR solutions ### 5. Fortinet FortiSIEM ![Fortinet FortiSIEM](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/siem-tools-comparison/forti-siem.webp "Fortinet FortiSIEM") FortiSIEM integrates a native configuration management database that auto-discovers devices, users, and applications, with live query capabilities to external data repositories. **Best for**: Organizations with existing Fortinet infrastructure seeking centralized asset inventory and event correlation. **Strength**: ODBC-based live query pulls context from AWS, data warehouses, and databases without full telemetry replication. **What to validate**: * Whether you need FortiSOAR separately for advanced automation workflows * Manual effort required for custom log format integration using XML-based parsers ### 6. Securonix Unified Defense SIEM ![Securonix Unified Defense SIEM](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/siem-tools-comparison/securonix.webp "Securonix Unified Defense SIEM") Securonix embeds Snowflake data lake storage with advanced user and entity behavior analytics designed for insider threat detection. **Best for**: Large enterprises with complex identity-based attack scenarios requiring sophisticated behavioral modeling. **Strength**: Psycho-analytics profiles and Data Pipeline Manager optimize ingestion costs while maintaining detection coverage. **What to validate**: * Whether your team has the expertise to tune behavioral models effectively * Pricing competitiveness against platforms offering basic correlation and alerting ### 7. Splunk Enterprise Security ![Splunk Enterprise Security](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/siem-tools-comparison/splunk.webp "Splunk Enterprise Security") Splunk Enterprise Security extends the Splunk platform with security analytics, correlation rules, and a massive marketplace of community-developed integrations. **Best for**: Large enterprises with dedicated platform teams capable of extensive customization and ongoing maintenance. **Strength**: Cisco Talos threat intelligence integration and broad ecosystem of content packs and apps. **What to validate**: * Operational complexity and specialized expertise required for deployment and ongoing management * AI integration maturity compared to platforms with built-in autonomous investigation capabilities ### 8. Elastic Security ![Elastic Security](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/siem-tools-comparison/elastic-security.webp "Elastic Security") Elastic Security builds on the Elastic Stack with Attack Discovery features that transform disparate alerts into cohesive attack chains through automated correlation. **Best for**: Organizations replacing legacy SIEM infrastructure that value open architecture and strong migration tooling. **Strength**: AI-powered Automatic Import translates detection rules from other platforms, reducing transition friction. **What to validate**: * UEBA tuning requirements for advanced behavioral use cases * Need for third-party SOAR integrations since workflow automation isn't native ### 9. ManageEngine Log360 ![ManageEngine Log360](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/siem-tools-comparison/manage-engine-log360.webp "ManageEngine Log360") Log360 combines SIEM, user behavior analytics, and security orchestration through Zoho's Qntrl Circuit automation platform with gigabyte-based pricing. **Best for**: Cost-conscious midsize enterprises with limited security engineering resources standardizing on ManageEngine tools. **Strength**: Dark web monitoring via Constella Intelligence alerts when compromised credentials appear in breach databases. **What to validate**: * AI-driven capabilities compared to market leaders with more mature automation * Operational technology monitoring needs if you have industrial environments ### 10. Stellar Cyber AI-Driven SIEM ![Stellar Cyber AI-Driven SIEM](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/siem-tools-comparison/stellar-cyber.webp "Stellar Cyber AI-Driven SIEM") Stellar Cyber's Multi-Layer AI^™^ technology automates threat detection and correlation without manual rule creation, with a multi-tenant architecture for MSSP environments. **Best for**: MSSPs managing multiple clients or mid-market enterprises running lean SOC teams with limited deep technical expertise. **Strength**: AI Investigator enables natural language threat hunting, accelerating investigations for teams lacking specialized query skills. **What to validate**: * Compliance reporting frameworks versus enterprise-focused platforms with deeper audit capabilities * Customization depth for behavioral analytics if you have advanced detection requirements ## How to Choose the Best SIEM Provider Selecting SIEM tools demands rigorous evaluation across technical capabilities, total cost of ownership, and organizational alignment. The best SIEM platforms are distinguished by measurable improvements in detection accuracy, investigation efficiency, and remediation speed, not by feature checklists alone. ### Data Architecture \& Cost Controls * Evaluate how platforms handle telemetry pipelines before ingestion---filtering, sampling, and routing reduce storage costs * Test query performance across datasets exceeding your projected three-year growth * Assess hot vs cold storage strategies for balancing real-time analytics with compliance retention * Determine if the bring-your-own-data-lake architecture fits your infrastructure capabilities * Verify whether pricing scales with ingested volume, analyzed events, or monitored assets * Request benchmark costs for your specific data volume and retention requirements ### Detection Quality \& False-Positive Control * Request customer references demonstrating specific reductions in mean time to detect and investigate * Verify whether ML models train on your specific telemetry or rely solely on vendor signatures * Test how behavioral analytics establishes baselines for your environment versus generic rules * Evaluate alert correlation accuracy and incident auto-grouping effectiveness * Ask for false-positive rates across different detection rule types * Confirm threat intelligence integration quality and update frequency ### Automation \& Response Maturity * Measure automated incident closure rates and alert volume reduction through intelligent correlation * Test natural language query accuracy for your team's investigation patterns * Evaluate pre-built playbook coverage for your common response scenarios * Assess guardrails and approval workflows for autonomous response actions * Request metrics on analyst productivity gains from existing customers * Verify whether automation learns from your team's behaviors or requires manual tuning ### Integration Strategy (XDR/SOAR/Data Lake) * Decide between converged platforms (unified XDR-SIEM-SOAR) versus best-of-breed integration * Assess whether converged platforms reduce operational overhead for your team size * Evaluate API quality and pre-built connectors for your existing security stack * Test federated search capabilities to pull context from external systems without full replication * Consider migration complexity if switching from the current ecosystem * Verify data normalization quality across diverse telemetry sources ### Deployment, Support, and MDR Options * Review onboarding timelines from customer references matching your organization's size * Test automated connectors for your common data sources versus manual parser requirements * Verify geographic coverage for data centers and SOC facilities matching your infrastructure * Assess managed detection and response service availability for 24/7 coverage * Evaluate professional services dependencies during deployment and ongoing operations * Confirm language support for dashboards, alerts, and documentation across your global teams ## SIEM Tools FAQs ### What do security professionals typically do with SIEM tools? Security professionals leverage SIEM tools to aggregate telemetry from endpoints, networks, and cloud infrastructure, then apply correlation rules and behavioral analytics to detect threats. Analysts investigate alerts by querying historical data, enriching events with threat intelligence, and tracing attack progression across systems. Teams orchestrate response actions through automated playbooks, generate compliance reports for regulatory requirements, and conduct proactive threat hunting to identify advanced persistent threats before damage occurs. ### Which SIEM tools provide 24/7 analyst support? Palo Alto Networks Cortex XSIAM, Rapid7 InsightIDR, and several other top SIEM vendors offer managed detection and response services that provide round-the-clock monitoring by security professionals. ConnectWise SIEM delivers co-managed options with 150+ certified analysts reviewing events continuously. Organizations can augment internal teams with vendor-managed services when facing resource constraints, geographic expansion, or skill gaps requiring immediate coverage without proportional headcount increases. ### What are the different types of SIEM tools? SIEM tools span cloud-native SaaS platforms, self-hosted on-premises deployments, and hybrid architectures combining both approaches. Converged platforms integrate XDR, SOAR, and attack surface management into unified systems, while modular solutions maintain SIEM as a central hub connecting specialized security tools. Observability-focused offerings from vendors like Datadog combine security monitoring with application performance management, whereas purpose-built security platforms prioritize threat detection over operational telemetry analysis. ### What are some of the key benefits of SIEM tools? Best SIEM platforms reduce mean time to detect threats from days to minutes through automated correlation and behavioral analytics. Organizations achieve comprehensive visibility across hybrid environments by centralizing telemetry from disparate sources into normalized data models. Automated response playbooks eliminate manual investigation overhead, while compliance reporting capabilities streamline audit preparation for frameworks including PCI DSS, HIPAA, and GDPR. Advanced platforms reduce alert fatigue by 75% through intelligent de-duplication and risk-based prioritization. ### How does SIEM integrate with other security tools? SIEM platforms consume telemetry from endpoint detection and response agents, network traffic analyzers, cloud security posture management systems, and identity providers through APIs and syslog protocols. Bidirectional integrations with SOAR platforms enable automated response actions across firewalls, email gateways, and identity systems based on SIEM detections. Threat intelligence platforms enrich SIEM alerts with adversary context, while vulnerability management tools correlate exploit availability with asset exposure. Top SIEM vendors maintain marketplace ecosystems with hundreds of pre-built connectors. Related Content [Explore XSIAM Discover XSIAM from Palo Alto Networks---the AI-driven security operations platform that unifies threat detection and response across your entire attack surface. XSIAM automatically ...](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) [Upgrade Your SIEM: A Security Leader's Guide to Breaking Free from Legacy Systems Our guide provides security leaders a structured approach to SIEM transformation, covering how to assess your current capabilities, define operational goals, evaluate modern SecOps...](https://www.paloaltonetworks.com/resources/guides/upgrade-your-siem-guide?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=Best%20SIEM%20Tools%20for%202026%3A%20Compare%2010%20Leading%20Platforms&body=Compare%20the%20top%20SIEM%20tools%20for%202026%3A%20AI%20detection%2C%20automation%2C%20data%20architecture%2C%20and%20a%20buyer%20framework%20to%20help%20you%20choose%20the%20right%20SIEM%20for%20your%20SOC.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/siem-tools-comparison) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-use-cases?ts=markdown) What are SIEM Use Cases? [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-siem?ts=markdown) What is SIEM? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language