[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Network Security](https://www.paloaltonetworks.com/cyberpedia/network-security?ts=markdown) 3. [What Are the Different Types of VPN Protocols?](https://www.paloaltonetworks.com/cyberpedia/types-of-vpn-protocols?ts=markdown) Table of Contents * [Internet Protocol Security (IPsec)](#ipsec) * [Secure Socket Tunneling Protocol (SSTP)](#sstp) * [WireGuard](#wireguard) * [OpenVPN](#openvpn) * [SoftEther](#SoftEther) * [Point-to-Point Tunneling Protocol (PPTP)](#pptp) * [Layer 2 Tunneling Protocol (L2TP)](#l2tp) * [Which VPN Protocol Is Best for Your Business?](#vpn-protocol) * [VPN Protocols FAQs](#faq) # What Are the Different Types of VPN Protocols? 3 min. read Table of Contents * [Internet Protocol Security (IPsec)](#ipsec) * [Secure Socket Tunneling Protocol (SSTP)](#sstp) * [WireGuard](#wireguard) * [OpenVPN](#openvpn) * [SoftEther](#SoftEther) * [Point-to-Point Tunneling Protocol (PPTP)](#pptp) * [Layer 2 Tunneling Protocol (L2TP)](#l2tp) * [Which VPN Protocol Is Best for Your Business?](#vpn-protocol) * [VPN Protocols FAQs](#faq) 1. Internet Protocol Security (IPsec) * [1. Internet Protocol Security (IPsec)](#ipsec) * [2. Secure Socket Tunneling Protocol (SSTP)](#sstp) * [3. WireGuard](#wireguard) * [4. OpenVPN](#openvpn) * [5. SoftEther](#SoftEther) * [6. Point-to-Point Tunneling Protocol (PPTP)](#pptp) * [7. Layer 2 Tunneling Protocol (L2TP)](#l2tp) * [8. Which VPN Protocol Is Best for Your Business?](#vpn-protocol) * [9. VPN Protocols FAQs](#faq) ![What Are the Different Types of VPN Protocols?](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/video-thumbnail-what-are-the-different-types-of-vpn-protocols.jpg) close Types of VPN protocols include: * Internet Protocol Security (IPsec) * Secure Socket Tunneling Protocol (SSTP) * WireGuard * OpenVPN * SoftEther * Point-to-Point Tunneling Protocol (PPTP) * Layer 2 Tunneling Protocol (L2TP) [*What Is a VPN*](https://www.paloaltonetworks.com/cyberpedia/what-is-a-vpn?ts=markdown)? ## Internet Protocol Security (IPsec) ![IPsec protocol demonstrated by two routers connected by an IPsec tunnel through the internet, with computers linked to each router.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/IPsec-v1.png "IPsec protocol demonstrated by two routers connected by an IPsec tunnel through the internet, with computers linked to each router.") Internet Protocol Security (IPsec) is a set of protocols that support secure communication over Internet Protocol (IP) networks through authentication and encryption. Its primary purpose is to ensure data integrity, data confidentiality, and data origin authentication between two communicating parties. IPsec operates by encrypting and authenticating all IP packet transfers. It functions through two main modes: Transport and Tunnel. Transport mode encrypts only the message within the data packet, while Tunnel mode encrypts the entire data packet. Two primary protocols within IPsec, the Authentication Header (AH) and Encapsulating Security Payload (ESP), provide data origin authentication, connectionless integrity, and an anti-replay service. IPsec is widely implemented in the formation of secure tunnels, especially for VPNs. Enterprises use IPsec for secure remote user access to corporate networks, site-to-site connections, and network layer encryption. IPsec advantages include its high security and versatility across different network layer protocols. Configuration complexity can be a drawback, requiring expertise for proper setup and maintenance. While IPsec is protocol-independent and supports a wide range of encryption algorithms, managing its keys and certifications can present challenges. ## Secure Socket Tunneling Protocol (SSTP) ![SSTP protocol represented by a VPN client connecting to an SSTP server via SSL/TLS handshake and HTTP request over port 443.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/SSTP-v1.png "SSTP protocol represented by a VPN client connecting to an SSTP server via SSL/TLS handshake and HTTP request over port 443.") Secure Socket Tunneling Protocol (SSTP) is a VPN communication protocol developed to provide secure, encrypted connections over a network. SSTP uses SSL/TLS encryption, which is the same technology that underpins secure internet connections. SSL/TLS encryption ensures the privacy and security of data as it travels across the internet. SSTP works by channeling VPN traffic through the SSL 3.0 channel. This means it can benefit from features like SSL's integrated connection integrity and encryption capabilities. SSTP typically uses the standard HTTPS port (TCP 443), which allows it to bypass most firewalls and network restrictions. SSTP is a reliable choice for users who need to ensure their VPN connections are not blocked or throttled by local network management tools. SSTP is commonly used in scenarios where other VPN protocols might be blocked. Since it operates over the HTTPS port, it is less likely to be detected and filtered. This is helpful in environments with restrictive internet policies or for those who need to access potentially sensitive information over a public Wi-Fi network. SSTP benefits include its high level of security, strong encryption methods, and the protocol's ability to traverse firewalls. SSTP is a proprietary protocol developed by Microsoft, which may limit its trustworthiness for some users. SSTP is primarily designed for Windows, which can restrict its usability on other operating systems. ## WireGuard ![WireGuard protocol showing various devices connected through a secure VPN tunnel to a WireGuard server and then to a website IP address.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/WireGuard-v1.png "WireGuard protocol showing various devices connected through a secure VPN tunnel to a WireGuard server and then to a website IP address.") WireGuard is a cutting-edge VPN protocol known for its simplicity and high-speed performance. WireGuard is designed to be much simpler and faster than legacy protocols, using state-of-the-art cryptographic techniques. As an open-source project, WireGuard's streamlined approach results in better efficiency and ease of use. Functioning through a unique mechanism called cryptokey routing, WireGuard establishes secure VPN connections with remarkable speed and agility. It works by assigning static IP addresses to VPN clients and managing traffic through cryptographic keys. This approach simplifies the setup process, reduces latency, and increases the protocol's performance over traditional VPN protocols. WireGuard is beneficial for businesses with a mobile workforce or requirements for fast, reliable connections for cloud services. Since WireGuard is lightweight, it can run on various devices (embedded systems, full-fledged servers, etc.) making it versatile for different enterprise network scenarios. WireGuard has its drawbacks. The static IP address assignment can raise privacy concerns as it could potentially log user activity. WireGuard is still undergoing development, which means it may lack the extensive testing and wide-scale trust established by older protocols. ## OpenVPN ![OpenVPN process showing data flow between Host A, virtual and real interfaces, network, and Host B.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/openvpn.png "OpenVPN process showing data flow between Host A, virtual and real interfaces, network, and Host B.") OpenVPN is a robust, secure VPN protocol favored in the enterprise environment for its strong encryption and configurability. This protocol works by creating secure point-to-point or site-to-site connections in routed or bridged configurations. OpenVPN uses custom security protocols that utilize SSL/TLS for key exchange. OpenVPN operates by encapsulating data in SSL/TLS encrypted packets, which are then transmitted over the network. This protocol can run over either the TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) internet protocols. TCP ensures reliable delivery of data packets while UDP prioritizes speed, making OpenVPN versatile for different network performance needs. Businesses use OpenVPN for its adaptability to various network types and ability to establish a secure, reliable connection over intranet and internet. OpenVPN is useful for organizations with remote workforces and/or high security requirements. OpenVPN advantages include its strong security profile, open-source nature (which allows for peer review and audits), and the ability to bypass firewalls. OpenVPN is not known to be easy to set up and configure, particularly for those without extensive networking knowledge. The protocol does not natively support most operating systems. ## SoftEther ![SoftEther VPN protocol shown by secure VPN sessions, a VPN bridge, server, authentications, and defense against attackers.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/SoftEther-v1.png "SoftEther VPN protocol shown by secure VPN sessions, a VPN bridge, server, authentications, and defense against attackers.") SoftEther (Software Ethernet), is a versatile VPN protocol known for performance and interoperability. SoftEther is an open-source, multiprotocol VPN software that supports SSL VPN, L2TP/IPsec, OpenVPN, and SSTP, all within a single VPN server. The protocol operates by establishing secure client-server communication through SSL-VPN Tunneling on HTTPS. SoftEther bypasses firewalls and NATs, making it highly effective for users within restricted network environments. SoftEther is also comprehensive VPN solution that facilitates remote-access and site-to-site VPN. SoftEther works well in various scenarios, including individual remote access, corporate networks, and connecting multiple on-premises sites securely. Its ability to support different VPN protocols makes it a universal tool for creating VPN tunnels. SoftEther stands out for strong encryption capabilities, resistance to network restrictions, and support for various operating systems. SoftEther is less known compared to established protocols like OpenVPN, which can limit adoption. It may present a steeper learning curve for network administrators. ## Point-to-Point Tunneling Protocol (PPTP) ![PPTP depicted by a client connecting to a PPTP server via a Network Access Server and Internet, with PPP and TCP/IP connections.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/PPTP-v1.png "PPTP depicted by a client connecting to a PPTP server via a Network Access Server and Internet, with PPP and TCP/IP connections.") Developed by Microsoft, Point-to-Point Tunneling Protocol (PPTP) is one of the oldest VPN protocols. PPTP facilitates secure data transmission by creating a tunnel for point-to-point communication. The protocol encapsulates data packets within an IP envelope, allowing them to be sent across a network. PPTP works by using a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets. The simple setup makes it relatively fast and widely compatible with various devices and network configurations. PPTP is not recommended for sensitive communications because it uses weaker encryption standards. The primary use case for PPTP is scenarios where legacy support is required, or speed is more critical than security. PPTP is not advisable for transmitting confidential enterprise data because of its known security vulnerabilities. PPTP pros include speed and ease of setup. The protocol is integrated into most operating systems. The disadvantages outweigh the benefits because PPTP is insecure. Advanced encryption standards have surpassed PPTP, making it obsolete for enterprises concerned with protecting sensitive data. ## Layer 2 Tunneling Protocol (L2TP) ![L2TP shown by a remote user modem connecting through PPP to NAS/LAC, then via L2TP through the internet to an LNS.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/L2TP-v1.png "L2TP shown by a remote user modem connecting through PPP to NAS/LAC, then via L2TP through the internet to an LNS.") Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol. It does not provide encryption or confidentiality by itself. L2TP relies on an encryption protocol that it passes within the tunnel to provide privacy. L2TP is often paired with IPsec, which is responsible for encryption and secure transport of data between endpoints. L2TP works by encapsulating data packets within L2TP frames that are sent over the internet. When combined with IPsec, data packets are encrypted and authenticated, providing a secure conduit for transmitting sensitive information. This pairing is commonly referred to as L2TP/IPsec. The protocol is widely used for creating VPN connections. Typical use cases for L2TP include connecting branch offices to a central corporate network, access, and enhancing security for data transmission over the internet. L2TP remains a preferred choice for businesses because it isn't as complex as newer protocols and offers support across various devices and platforms. L2TP benefits include compatibility and the ability to work across multiple devices. L2TP has several disadvantages, including potential speed bottlenecks (because of double encapsulation) and difficulties traversing firewalls compared to protocols that use stealth techniques. ## Which VPN Protocol Is Best for Your Business? To choose the best VPN protocol for your business, evaluate security, speed, and network compatibility requirements. Protocols like L2TP/IPsec are widely supported and offer a balance of speed and security. Protocols with stronger encryption and more rigorous authentication processes may be more appropriate for organizations requiring enhanced security measures. Each protocol comes with its own set of advantages. Some prioritize encryption strength, others are optimized for speed to support bandwidth-intensive tasks, and several offer superior stability for mobile devices and remote users. The right choice will align with your business's specific use cases, network architecture, VPN services, and performance expectations. A careful assessment of requirements will guide you to the most suitable protocol for a secure and efficient VPN experience. Work with your VPN provider to make the best decision possible. | VPN Protocols Comparison ||| | Protocol | Advantages | Disadvantages | |------------|----------------------------------------------------------------------------------------------------------|--------------------------------------------------------------------------------| | IPsec | - High security - Versatile across network protocols | - Complex configuration - Key and certificate management challenges | | SSTP | - Strong encryption - Bypasses firewalls using HTTPS port | - Proprietary to Microsoft - Limited to Windows OS | | WireGuard | - Simple and fast - State-of-the-art cryptography - Efficient and easy to use | - Static IP assignments may raise privacy concerns - Still under development | | OpenVPN | - Strong encryption and security - Open-source and auditable - Flexible across different networks | - Difficult to set up and configure - Requires networking knowledge | | SoftEther | - Strong encryption and interoperability - Supports various protocols - Effective in restricted networks | - Less known, which can limit adoption - Steeper learning curve | | PPTP | - Fast and easy to set up - Widely compatible with devices | - Known security vulnerabilities - Outdated encryption standards | | L2TP/IPsec | - Widely compatible and easy to use - Works across various devices and platforms | - Can be slow due to double encapsulation - Difficulty with firewall traversal | ## VPN Protocols FAQs ### What VPN protocol should I use? The choice of VPN protocol should align with your security needs, network setup, and performance requirements. Assess your priorities to select the protocol that best fits your organization's infrastructure and security policies. ### What is the best protocol for VPN? The best VPN protocol depends on your needs. Consider your priorities like speed, security, device compatibility, and ease of use to choose the most suitable protocol for your specific requirements. ### What are the 3 most common VPN protocols? The 3 most common VPN protocols are OpenVPN, L2TP/IPsec, and IKEv2/IPsec. ### Which types of protocols are used in VPNs? VPNs commonly use protocols such as OpenVPN, L2TP/IPsec, SSTP, and IKEv2/IPsec for secure communication. ### What are the 4 main types of VPN? The 4 main types of VPNs are site-to-site VPN, remote access VPN, cloud VPN, and SSL VPN. ### What are the 4 VPN tunneling protocols? The 4 VPN tunneling protocols include OpenVPN, L2TP/IPsec, SSTP, and Internet Key Exchange version 2 (IKEv2)/IPsec (jointly developed my Microsoft and Cisco). ### Is a VPN UDP or TCP? VPNs can use either UDP for speed or TCP for reliability in their data transport. ### What is better OpenVPN or WireGuard? OpenVPN offers robust flexibility and a long track record of reliability, making it suitable for complex networks, while WireGuard's strength lies in its speed and modern, lean design. The better choice depends on specific network requirements and whether the priority lies in established security or cutting-edge efficiency. ### What is the fastest VPN protocol? The fastest VPN protocol is often considered to be WireGuard because of its streamlined approach to encryption and performance, offering high speeds and lower latency compared to older protocols. ### What is the strongest VPN protocol? OpenVPN is often cited for its robust security features and extensive configurability, allowing for a highly secure setup tailored to diverse environments. However, what is considered the "strongest VPN protocol" depends on the specific security needs and network configurations. ### What is the safest VPN protocol? The safest VPN security protocol varies based on the context and needs. OpenVPN is widely trusted for its strong encryption and open-source auditability. However, other protocols may be preferable depending on the VPN app and environments where different security features or speed are prioritized. ### What is the simplest VPN protocol? The simplest VPN protocol is technically PPTP because of its ease of setup and use. Although it may be the simplest, it is not the strongest or most secure because of its security vulnerabilities. ### What is the most anonymous VPN protocol? Determining the most anonymous VPN protocol depends on the specific use case and desired privacy level. OpenVPN can be highly anonymous when configured correctly, but other protocols may offer anonymity features that better align with a VPN user's particular privacy requirements. ### Should I use IKEv2 or OpenVPN? Whether to use IKEv2 or OpenVPN depends on your needs; IKEv2 is faster and more mobile data friendly, while OpenVPN is more secure and stable. ### Which VPN protocol is hardest to block? The VPN protocol that is hardest to block is SSTP because it can transmit over the same port as HTTPS traffic. ### Which VPN cannot be detected? A VPN's detectability hinges on its ability to mask traffic effectively. No single VPN protocol is inherently undetectable, as this can vary with the network environment and the protocol's ability to obfuscate its traffic to blend in with regular HTTPS traffic. ### Should I use WireGuard or IKEv2? Whether to use WireGuard or IKEv2 depends on specific use cases. WireGuard may be recommended for speed and modern encryption, while IKEv2 may be recommended for stability and fast reconnections. ### What is the newest VPN protocol? The newest VPN protocol is WireGuard, praised for its speed and modern cryptographic techniques. Related Content \[VPN Alternatives for Remote Access VPN alternatives for secure remote access, sometimes referred to as VPN replacements, are methods other than traditional virtual private networks (VPNs) employed to ensure secure c...\](https://www.paloaltonetworks.com/cyberpedia/vpn-alternatives-for-remote-access ?ts=markdown) [GlobalProtect GlobalProtect is more than a VPN. It provides flexible, secure remote access for all users everywhere.](https://www.paloaltonetworks.com/sase/globalprotect?ts=markdown) [Why the SASE approach to network and security is the answer to combating sophisticated cyberattacks Understand why SASE is at the forefront of the agenda for security leaders as the methodology evolves to become a cornerstone of modern security strategy.](https://www.paloaltonetworks.com/resources/whitepapers/why-the-sase-approach-to-network-and-security-is-the-answer-to-combatting-sophisticated-cyberattacks?ts=markdown) [SASE CIO eBook: Driving the future of work through enterprise-wide SASE A CIO'S Guide to Planning and Implementation](https://www.paloaltonetworks.com/resources/ebooks/sase-cio-ebook-driving-the-future-of-work-through-enterprise-wide-sase?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Are%20the%20Different%20Types%20of%20VPN%20Protocols%3F&body=The%20different%20types%20of%20VPN%20protocols%20include%20IPsec%2C%20SSTP%2C%20WireGuard%2C%20OpenVPN%2C%20SoftEther%2C%20PPTP%2C%20and%20L2TP.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/types-of-vpn-protocols) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language