[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management?ts=markdown) 4. [What Is Vulnerability Management?](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management?ts=markdown) Table of content * What Is Vulnerability Management? * [Vulnerability Management Explained](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#vulnerability?ts=markdown) * [Understanding Vulnerabilities, Threats and Risks](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#understanding?ts=markdown) * [Why Cloud Vulnerability Management Is Challenging](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#why?ts=markdown) * [Vulnerability Management Vs. Patch Management](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#management?ts=markdown) * [Overview of Common Vulnerabilities and Exposures (CVEs)](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#overview?ts=markdown) * [Vulnerability Management Vs. Vulnerability Assessment](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#vs?ts=markdown) * [Setting Up a Vulnerability Management Framework](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#framework?ts=markdown) * [The Four Key Steps of Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#the?ts=markdown) * [Improving Your Vulnerability Management Program](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#improving?ts=markdown) * [CWPP's Role in Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#roles?ts=markdown) * [Best Practices for Managing Cloud Workload Vulnerabilities](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#best?ts=markdown) * [Vulnerability Management FAQs](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#faqs?ts=markdown) * [What Is Patch Management? Process, Policy, and Benefits](https://www.paloaltonetworks.com/cyberpedia/patch-management?ts=markdown) * [Understanding Patch Management](https://www.paloaltonetworks.com/cyberpedia/patch-management#understanding?ts=markdown) * [Why Patch Management Is Important](https://www.paloaltonetworks.com/cyberpedia/patch-management#why?ts=markdown) * [The Patch Management Process](https://www.paloaltonetworks.com/cyberpedia/patch-management#process?ts=markdown) * [Patch Management in Cloud and Hybrid Environments](https://www.paloaltonetworks.com/cyberpedia/patch-management#patch?ts=markdown) * [Key Patch Management Challenges and How to Solve Them](https://www.paloaltonetworks.com/cyberpedia/patch-management#key?ts=markdown) * [How to Create an Effective Patch Management Policy](https://www.paloaltonetworks.com/cyberpedia/patch-management#policy?ts=markdown) * [Leveraging Tools and Technologies for Patch Management](https://www.paloaltonetworks.com/cyberpedia/patch-management#leveraging?ts=markdown) * [CWPPs and Patch Management](https://www.paloaltonetworks.com/cyberpedia/patch-management#cwpps-patch-management?ts=markdown) * [Patch Management FAQs](https://www.paloaltonetworks.com/cyberpedia/patch-management#faqs?ts=markdown) * [What Is Risk-Based Vulnerability Management?](https://www.paloaltonetworks.com/cyberpedia/risk-based-vulnerability-management?ts=markdown) * [Risk-Based Vulnerability Management Definition](https://www.paloaltonetworks.com/cyberpedia/risk-based-vulnerability-management#vulnerability?ts=markdown) * [Why Organizations Need a Risk-Based Approach?](https://www.paloaltonetworks.com/cyberpedia/risk-based-vulnerability-management#why?ts=markdown) * [Key Components of a Risk-Based Vulnerability Management Framework](https://www.paloaltonetworks.com/cyberpedia/risk-based-vulnerability-management#key?ts=markdown) * [From Discovery to Remediation --- RBVM in Practice](https://www.paloaltonetworks.com/cyberpedia/risk-based-vulnerability-management#practice?ts=markdown) * [Benefits of Adopting a Risk-Based Vulnerability Management Strategy](https://www.paloaltonetworks.com/cyberpedia/risk-based-vulnerability-management#benefits?ts=markdown) * [Risk-Based Vulnerability Management FAQs](https://www.paloaltonetworks.com/cyberpedia/risk-based-vulnerability-management#faqs?ts=markdown) * [Vulnerability Management Program: Building a Risk-Based Framework](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management-program?ts=markdown) * [What Is a Vulnerability Management Program?](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management-program#what?ts=markdown) * [Key Components of a Successful Program](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management-program#key?ts=markdown) * [How Does Cloud Vulnerability Management Work?](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management-program#how?ts=markdown) * [Reporting and Metrics](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management-program#reporting?ts=markdown) * [Challenges and Best Practices](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management-program#challenges?ts=markdown) * [Vulnerability Management Program FAQs](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management-program#faqs?ts=markdown) * [What Is Vulnerability Scanning?](https://www.paloaltonetworks.com/cyberpedia/vulnerability-scanning?ts=markdown) * [Vulnerability Scanning Explained](https://www.paloaltonetworks.com/cyberpedia/vulnerability-scanning#vulnerability?ts=markdown) * [How Vulnerability Scanning Works](https://www.paloaltonetworks.com/cyberpedia/vulnerability-scanning#how?ts=markdown) * [Types of Vulnerability Scanning](https://www.paloaltonetworks.com/cyberpedia/vulnerability-scanning#types?ts=markdown) * [Vulnerability Scanning Vs. Penetration Testing](https://www.paloaltonetworks.com/cyberpedia/vulnerability-scanning#vs?ts=markdown) * [CWPP \& Scanning in the Cloud](https://www.paloaltonetworks.com/cyberpedia/vulnerability-scanning#cwpp?ts=markdown) * [Vulnerability Management Best Practices](https://www.paloaltonetworks.com/cyberpedia/vulnerability-scanning#practices?ts=markdown) * [Vulnerability Scanning FAQs](https://www.paloaltonetworks.com/cyberpedia/vulnerability-scanning#faqs?ts=markdown) * [Patch Management Vs. Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/patch-management-vs-vulnerability-management?ts=markdown) * [Patch Management and Vulnerability Management Definition](https://www.paloaltonetworks.com/cyberpedia/patch-management-vs-vulnerability-management#patch?ts=markdown) * [Key Differences Between Patch and Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/patch-management-vs-vulnerability-management#key?ts=markdown) * [Where They Overlap --- Coordination Is Key](https://www.paloaltonetworks.com/cyberpedia/patch-management-vs-vulnerability-management#where?ts=markdown) * [How to Build an Integrated Patch and Vulnerability Management Strategy](https://www.paloaltonetworks.com/cyberpedia/patch-management-vs-vulnerability-management#strategy?ts=markdown) * [Tools That Bridge Vulnerability and Patch Management](https://www.paloaltonetworks.com/cyberpedia/patch-management-vs-vulnerability-management#tools?ts=markdown) * [Patch Management vs. Vulnerability Management FAQs](https://www.paloaltonetworks.com/cyberpedia/patch-management-vs-vulnerability-management#faqs?ts=markdown) * [What Is Threat and Vulnerability Management?](https://www.paloaltonetworks.com/cyberpedia/threat-and-vulnerability-management?ts=markdown) * [Threat and Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/threat-and-vulnerability-management#threat?ts=markdown) * [Key Components of a Threat and Vulnerability Management Program](https://www.paloaltonetworks.com/cyberpedia/threat-and-vulnerability-management#key?ts=markdown) * [Comparing Threat and Vulnerability Management by Risk Elimination](https://www.paloaltonetworks.com/cyberpedia/threat-and-vulnerability-management#comparing?ts=markdown) * [The Value of Integrated Threat and Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/threat-and-vulnerability-management#value?ts=markdown) * [Building a Threat and Vulnerability Management Strategy](https://www.paloaltonetworks.com/cyberpedia/threat-and-vulnerability-management#building?ts=markdown) * [Threat and Vulnerability Management FAQs](https://www.paloaltonetworks.com/cyberpedia/threat-and-vulnerability-management#faqs?ts=markdown) * [Vulnerability Management Lifecycle: Key Phases and Execution](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management-lifecycle?ts=markdown) * [Understanding the Vulnerability Management Lifecycle](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management-lifecycle#understanding?ts=markdown) * [Key Phases of the Vulnerability Management Lifecycle](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management-lifecycle#key?ts=markdown) * [Vulnerability Management Lifecycle Implementation and Real-World Application](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management-lifecycle#vulnerability?ts=markdown) * [Vulnerability Management Lifecycle FAQs](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management-lifecycle#faqs?ts=markdown) * [How to Automate Vulnerability Management Steps, Tools, and Benefits](https://www.paloaltonetworks.com/cyberpedia/automating-vulnerability-management?ts=markdown) * [Understanding Vulnerability Management Automation](https://www.paloaltonetworks.com/cyberpedia/automating-vulnerability-management#understanding?ts=markdown) * [The Four Pillars of Automated Vulnerability Management Workflow](https://www.paloaltonetworks.com/cyberpedia/automating-vulnerability-management#pillars?ts=markdown) * [Tools and Technologies for Vulnerability Remediation Automation](https://www.paloaltonetworks.com/cyberpedia/automating-vulnerability-management#tools?ts=markdown) * [Benefits of Vulnerability Management Automation](https://www.paloaltonetworks.com/cyberpedia/automating-vulnerability-management#benefits?ts=markdown) * [Challenges and Best Practices for Implementation](https://www.paloaltonetworks.com/cyberpedia/automating-vulnerability-management#challenges?ts=markdown) * [How to Automate Vulnerability Management FAQs](https://www.paloaltonetworks.com/cyberpedia/automating-vulnerability-management#faqs?ts=markdown) * [What Is Continuous Vulnerability Management (CVM)?](https://www.paloaltonetworks.com/cyberpedia/continuous-vulnerability-management?ts=markdown) * [Understand Continuous Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/continuous-vulnerability-management#understand?ts=markdown) * [CVM Vs. Traditional Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/continuous-vulnerability-management#traditional?ts=markdown) * [When to Consider Continuous Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/continuous-vulnerability-management#when?ts=markdown) * [How CVM Works in Enterprise Environments](https://www.paloaltonetworks.com/cyberpedia/continuous-vulnerability-management#how?ts=markdown) * [Key Benefits of CVM](https://www.paloaltonetworks.com/cyberpedia/continuous-vulnerability-management#key?ts=markdown) * [Challenges of CVM Adoption](https://www.paloaltonetworks.com/cyberpedia/continuous-vulnerability-management#challenges?ts=markdown) * [Best Practices for CVM Adoption](https://www.paloaltonetworks.com/cyberpedia/continuous-vulnerability-management#best?ts=markdown) * [Continuous Vulnerability Management (CVM) FAQs](https://www.paloaltonetworks.com/cyberpedia/continuous-vulnerability-management#faqs?ts=markdown) # What Is Vulnerability Management? 5 min. read Table of content * * [Vulnerability Management Explained](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#vulnerability?ts=markdown) * [Understanding Vulnerabilities, Threats and Risks](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#understanding?ts=markdown) * [Why Cloud Vulnerability Management Is Challenging](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#why?ts=markdown) * [Vulnerability Management Vs. Patch Management](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#management?ts=markdown) * [Overview of Common Vulnerabilities and Exposures (CVEs)](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#overview?ts=markdown) * [Vulnerability Management Vs. Vulnerability Assessment](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#vs?ts=markdown) * [Setting Up a Vulnerability Management Framework](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#framework?ts=markdown) * [The Four Key Steps of Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#the?ts=markdown) * [Improving Your Vulnerability Management Program](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#improving?ts=markdown) * [CWPP's Role in Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#roles?ts=markdown) * [Best Practices for Managing Cloud Workload Vulnerabilities](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#best?ts=markdown) * [Vulnerability Management FAQs](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#faqs?ts=markdown) 1. Vulnerability Management Explained * * [Vulnerability Management Explained](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#vulnerability?ts=markdown) * [Understanding Vulnerabilities, Threats and Risks](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#understanding?ts=markdown) * [Why Cloud Vulnerability Management Is Challenging](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#why?ts=markdown) * [Vulnerability Management Vs. Patch Management](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#management?ts=markdown) * [Overview of Common Vulnerabilities and Exposures (CVEs)](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#overview?ts=markdown) * [Vulnerability Management Vs. Vulnerability Assessment](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#vs?ts=markdown) * [Setting Up a Vulnerability Management Framework](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#framework?ts=markdown) * [The Four Key Steps of Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#the?ts=markdown) * [Improving Your Vulnerability Management Program](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#improving?ts=markdown) * [CWPP's Role in Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#roles?ts=markdown) * [Best Practices for Managing Cloud Workload Vulnerabilities](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#best?ts=markdown) * [Vulnerability Management FAQs](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management#faqs?ts=markdown) Vulnerability management is an ongoing program that relies on technologies and practices to identify vulnerabilities and remediate them in a timely way to secure an organization's infrastructure and resources. The objective is to establish systematic processes for detecting and mitigating vulnerabilities no matter where they arise. When integrated into [CI processes](https://www.paloaltonetworks.com/cyberpedia/what-is-the-ci-cd-pipeline-and-ci-cd-security?ts=markdown) while continuously monitoring hosts, images, and functions in the [cloud-native environment](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native?ts=markdown), vulnerability management plays an integral role in detecting and preventing vulnerabilities across the application lifecycle. As such, vulnerability management lays the foundation for a healthy [cybersecurity](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security?ts=markdown) strategy by ensuring that security teams can reliably find and fix vulnerabilities before they lead to system intrusions, [data breaches](https://www.paloaltonetworks.com/cyberpedia/data-breach?ts=markdown) or other adverse security incidents. ![Vulnerability management comprises diverse technologies and security measures across the application lifecycle](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/vulnerability-management/vulnerability-management-strategies.jpg) ***Figure 1**: Vulnerability management comprises diverse technologies and security measures across the application lifecycle.* ## Vulnerability Management Explained Network devices, servers, storage systems, workstations, legacy applications, virtual machines, [containers](https://www.paloaltonetworks.com/cyberpedia/what-is-a-container?ts=markdown), cloud applications, [microservices](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices?ts=markdown), databases, APIs, cloud infrastructure services, cloud platform services, security configurations --- the list is seemingly endless. With the increasing prevalence of agile methodologies and cloud services broadening IT environments, vulnerability management has become increasingly complex. As with traditional IT environments, vulnerability management for [cloud workloads](https://www.paloaltonetworks.com/cyberpedia/what-is-workload?ts=markdown) is a continuous, multifaceted process that involves the identification, assessment, prioritization and mitigation of security vulnerabilities to ensure the protection of [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data?ts=markdown), maintain [cloud compliance](https://www.paloaltonetworks.com/cyberpedia/data-compliance?ts=markdown), and reduce the risk of cyberattacks. The process begins with maintaining an up-to-date asset inventory and employing vulnerability scanning to discover potential threats in cloud resources. Vulnerabilities are then assessed based on their severity and impact, allowing for prioritization of remediation efforts. Patch and configuration management address software vulnerabilities and misconfigurations, while continuous monitoring and incident response ensure the rapid detection and containment of emerging threats. Lastly, reporting and auditing activities provide visibility and accountability, ensuring the effectiveness and compliance of the vulnerability management program. ## Understanding Vulnerabilities, Threats and Risks To understand why vulnerabilities are important and how they can impact your business, you must understand the relationship between vulnerabilities, threats and risks. A vulnerability is any flaw, weakness, misconfiguration or oversight in an IT system that attackers could exploit to take control of the system, exfiltrate data from it, disrupt its operations, or otherwise cause harm to the business. What this means is that vulnerabilities create an opportunity for cyberthreats to be carried out. A threat is any entity that seeks to --- and potentially could --- execute a [cyberattack](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cyber-attack?ts=markdown) of some kind. To carry out a cyberattack, however, threats need to find vulnerabilities that they can take advantage of. When a vulnerability exists and a threat actively seeks to exploit it, the organization is at risk. So, vulnerabilities make it possible for threats to become actual risks. Without vulnerabilities, threats --- such as hackers who want to steal sensitive data from your organization for financial gain, or state-sponsored threat actors who seek to disrupt critical systems for geopolitical purposes --- can still exist. It's only when vulnerabilities are present, however, that the risk of threats actually being exploited exists. ## Why Cloud Vulnerability Management Is Challenging Vulnerability management isn't simple for any type of workload, but when you're dealing with cloud workloads, detecting and mitigating vulnerabilities is especially challenging. ### Cloud Services Are Complex And Varied Cloud workloads can vary tremendously. They may include VMs, containers, serverless functions, [orchestration services](https://www.paloaltonetworks.com/cyberpedia/what-is-orchestration-security?ts=markdown), or all of the above. Each type of cloud workload could be subject to different types of vulnerabilities, so you need a vulnerability management strategy that can recognize different threats based on workload context. ### The Cloud Is Constantly Changing More so than most on-premises environments, cloud environments are typically dynamic. Configurations change constantly as workloads scale up and down, users are added or removed, applications are updated, and so on. For this reason, the ability to continuously monitor for vulnerabilities is paramount. ### Cloud Risks Vary in Scope Not all vulnerabilities are created equal. Some --- like those that enable remote code execution exploits --- are riskier than those that can only be exploited under rare configurations. You need to know which ones are severe so you can address them first. ## Vulnerability Management Vs. Patch Management In some respects, the vulnerability management process is akin to other security processes that IT organizations have practiced for decades, such as [patch management](https://www.paloaltonetworks.com/cyberpedia/patch-management?ts=markdown). Like vulnerability management, patch management involves systematically finding and reacting to potential security risks (namely, unpatched software that attackers could exploit) before they become active problems. But the vulnerability management process goes beyond patch management. * Unpatched software is one way that vulnerabilities can be introduced into IT environments, but it's not the only way. Vulnerability management also addresses other entry points for vulnerabilities, such as insecure configurations. * Whereas patch management typically involves the periodic installation of software patches, vulnerability management is a continuous process. You don't --- or shouldn't --- scan for vulnerabilities just once a week or even once a day. Instead, you should scan continuously so that you can find and react to vulnerabilities in real time, whenever and wherever they appear. * The vulnerability management process applies not just to assets (like applications) that can be patched but also to cloud services, infrastructure and other types of resources your IT team typically can't patch in the conventional sense. ## Overview of Common Vulnerabilities and Exposures (CVEs) When security researchers identify a vulnerability in software that is used publicly, they typically report it to a Common Vulnerabilities and Exposures (CVE) database. CVE databases are lists of known vulnerabilities. They include details on what causes the vulnerability, how it can be exploited, how severe it is, and how to patch or update systems to mitigate the vulnerability. Most CVE databases define this information using the Common Vulnerability Scoring System (CVSS), an open framework for sharing details about vulnerabilities and the severity they pose. By making vulnerability data accessible, CVEs and CVSS provide a critical resource that organizations can use to determine which vulnerabilities affect the systems or software they use. Additionally, it can tell teams how serious those vulnerabilities are and whether they can be exploited based on the specific configuration that the business uses. The [National Vulnerability Database](https://nvd.nist.gov/) and the [MITRE CVE](https://cve.mitre.org/) database are among the most popular public CVE databases. However, organizations can also maintain private or enhanced CVE data, which they may provide to other organizations as part of threat intelligence offerings. ![CVE identification process](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/vulnerability-management/cve-identification-process.png) ***Figure 2**: CVE identification process* An important limitation of CVEs is that they typically only list threats that affect publicly available software, such as open-source applications. The main reason why is that anyone can inspect public software and potentially find vulnerabilities within it. Software that an organization reserves for internal use is more difficult for third-party researchers to study. As a result, vulnerabilities within the software haven't necessarily been found or disclosed within CVE databases. You shouldn't, however, assume an application is free of vulnerabilities just because a CVE database shows no record of known vulnerabilities within it. There's always a chance that vulnerabilities exist --- and are known to threat actors --- but simply haven't been reported yet. But security vulnerabilities, as mentioned above, come in many forms. ### Broken Authentication Ineffective [access control](https://www.paloaltonetworks.com/cyberpedia/access-control?ts=markdown) processes or configurations within software may allow malicious actors to access the software or escalate privileges beyond those of the user. ### SQL Injection SQL injection vulnerabilities allow attackers to inject malicious queries into a database to manipulate data or exfiltrate information from it. SQL injection vulnerabilities typically occur due to lack of proper input validation within an application that interfaces with a database. ### Cross-Site Scripting A cross-site scripting vulnerability allows attackers to run malicious scripts. This type of vulnerability most often affects websites that contain poorly written Javascript code. If attackers find the vulnerable code, they can trick the site into running scripts of their choosing, potentially giving them access to resources on the endpoints that connect to the website. ### Cross-Site Request Forgery Attackers can exploit cross-site request forgery vulnerabilities to cause users to inject malicious code into a website or application with which they're currently authenticated. They're similar to cross-site scripting vulnerabilities, with the major difference being that cross-site request forgery vulnerabilities center on impersonating authenticated users to perform malicious actions rather than executing malicious code through insecure Javascript. ### Security Misconfigurations Any type of security configuration mistake or oversight could trigger a vulnerability. For example, admins might inadvertently make sensitive data accessible via the internet due to a firewall configuration mistake, or they may forget to require multifactor authentication when configuring a new application deployment. ## Vulnerability Management Vs. Vulnerability Assessment Vulnerability management is the strategy that IT organizations use to identify and react to vulnerabilities. When an individual vulnerability is discovered, however, they use a process known as vulnerability assessment to understand which level of risk the vulnerability poses and to help determine how to remediate it. Vulnerability assessment is important because not all vulnerabilities pose the same level of risk. For example, a vulnerability that can only be exploited by attackers who have direct physical access to a vulnerable system poses less risk, generally speaking, than one that can be exploited over the network, because the number of threat actors who operate over the network is usually much higher than those who have physical access to IT assets. In addition, in some cases, vulnerabilities can only be exploited under specific configurations or environments. For instance, a vulnerability in an application might be exploitable if the application is hosted on a Windows server but not on a Linux server, or vice versa. Based on factors like these, vulnerability assessment allows organizations to determine the specific level of risk that each vulnerability poses to them. They can then prioritize responding to the most severe vulnerabilities first to minimize their overall level of risk. ## Setting Up a Vulnerability Management Framework Although vulnerability management programs need to be tailored to the unique requirements of the organizations they serve, Gartner offers a vulnerability management guidance framework that provides a helpful starting point for getting started with vulnerability management. The key components of [Gartner's framework](https://www.gartner.com/en/documents/3970669) include: * **Define the scope of the program:** Businesses start their vulnerability management strategy by determining how many IT assets and vulnerability types they need to address. * **Define roles and responsibilities:** Determining who does what and when is a critical component of vulnerability management. From frontline staff, like IT engineers, to CISOs and CTOs, everyone has a role to play in finding, reporting and managing vulnerabilities. * **Select vulnerability assessment tools:** Businesses must decide which tools they'll use to find and assess vulnerabilities, as well as how vulnerability remediation will factor into their workflows and tooling. * **Create and refine policy SLAs:** SLAs determine how quickly organizations will react to vulnerabilities and which level of active vulnerabilities they can tolerate. SLAs are an especially important resource to tailor to the business, since different organizations can tolerate different levels of risk. * **Identify asset context sources:** Asset context sources provide complementary information --- such as data about the role that a system or application plays in the business --- that can be critical for assessing vulnerabilities and their severity. By addressing each of these requirements, organizations can establish vulnerability management programs that empower them to find and react to vulnerabilities across all systems of concern. ## The Four Key Steps of Vulnerability Management When fully implemented, an effective vulnerability management program should allow your business to perform each of the following steps in the vulnerability management process. ### Identify Vulnerabilities You can't fix what you can't see. Finding vulnerabilities involves scanning all IT assets in your organization and determining whether they (or any component of them) are subject to vulnerabilities. CVE databases are a critical resource for this purpose, although again, not every vulnerability is detailed in public CVE lists. ### Evaluate Vulnerabilities After discovery, each vulnerability must be assessed to determine which level of risk it poses to the business. Manual vulnerability evaluation may be necessary in some cases, but vulnerability management tools can accelerate the process by automatically determining the severity of each vulnerability and assessing how likely it is that the vulnerability can be exploited in the business's environment. ### Treat Vulnerabilities Vulnerabilities can be treated in three main ways: * Remediation: Remediation involves the total elimination of a vulnerability, usually by updating or patching the affected asset so that the vulnerability no longer exists. * Mitigation: Mitigation allows organizations to minimize the risk that a vulnerability can be exploited or to reduce the potential harm that it can cause. Mitigation is a good strategy in cases where remediation isn't possible or feasible. For example, if you can't update a vulnerable legacy application because patches aren't available for it, you may still be able to mitigate the vulnerability by changing the application's configuration. * Acceptance: In some instances, IT organizations may decide that vulnerabilities are not serious enough to merit either remediation or mitigation. In that case, they simply accept the vulnerability. ### Report Vulnerabilities Vulnerability reporting is the process of disclosing vulnerabilities to external stakeholders. It often involves submitting vulnerability reports to public CVE databases, but organizations may also be required by compliance mandates or contractual agreements to report vulnerabilities directly to regulators, customers or partners. Either way, the goal of reporting is to share information about which vulnerabilities exist, what causes them, and how they can be fixed so that others can react to the vulnerabilities before they lead to exploits. ## Improving Your Vulnerability Management Program Having a vulnerability management program in place doesn't mean you can stop worrying about vulnerabilities and move on to other concerns. Instead, vulnerability management should benefit from a strategy of continuous improvement, meaning that IT organizations continuously look for ways to improve their vulnerability management strategies. Common examples of vulnerability management program improvements include: * Making more extensive use of automations to add efficiency and consistency to vulnerability management. * Bringing additional systems or applications within the scope of vulnerability management to increase the comprehensiveness of coverage. * Leveraging additional vulnerability databases and/or asset context sources to increase the data available when assessing vulnerabilities. * Deploying new or enhanced vulnerability management tools to detect types of vulnerabilities that previous systems couldn't support. Steps like these allow organizations to make vulnerability management more effective and efficient, bringing them closer to the goal of ensuring real-time detection and remediation of all vulnerabilities, no matter what they entail or where they exist. ## CWPP's Role in Vulnerability Management In the context of modern cloud environments, a [cloud workload protection platform (CWPP)](https://www.paloaltonetworks.com/cyberpedia/what-is-cwpp-cloud-workload-protection-platform) significantly improves an organization's vulnerability management program. Traditional vulnerability management often struggles with the ephemeral, distributed, and rapidly evolving nature of cloud workloads like virtual machines, containers, and serverless functions. CWPP addresses these challenges by providing continuous, deep visibility into these dynamic assets, automatically discovering new workloads and tracking their configurations, operating systems, and installed software and dependencies. Beyond visibility, CWPPs introduce specialized scanning capabilities tailored to cloud-native architectures. Unlike generic vulnerability scanners, CWPPs are designed to perform deep assessments of container images, often integrating directly into [CI/CD pipelines](https://www.paloaltonetworks.com/cyberpedia/what-is-the-ci-cd-pipeline-and-ci-cd-security) to enable [shift-left security](https://www.paloaltonetworks.com/cyberpedia/shift-left-security) --- identifying and remediating vulnerabilities early in the development lifecycle before deployment. They also excel at detecting misconfigurations specific to cloud services, which are common sources of vulnerabilities. Its cloud-aware scanning provides far more accurate and relevant vulnerability intelligence, enabling the vulnerability management program to pinpoint weaknesses that traditional tools miss. ## Best Practices for Managing Cloud Workload Vulnerabilities There's no simple trick for ensuring that you can catch and remediate all cloud vulnerabilities before they turn into critical threats. However, strategies such as the following can help you mitigate your risk of serious cloud-related [cyberattacks](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cyber-attack). ### Integrate Vulnerability Scanning into CI Processes The earlier in the development lifecycle you catch vulnerabilities, the lower the risk that they'll lead to breaches in production environments. For that reason, vulnerability scanning should be integrated into your CI processes. Instead of waiting until workloads are in production to scan them, scan your hosts, containers, serverless functions and other resources in development and staging environments. Even if your configurations change between dev/staging and production, monitoring for vulnerabilities predeployment still maximizes your chances of preventing vulnerabilities from creeping into production. ### Keep Scanning in Production Of course, you should also perform continuous vulnerability monitoring after your workloads have been deployed to production. No amount of predeployment scanning is a substitute for checking for risks in production workloads. ### Scan All Layers of Your Cloud Environment A typical cloud workload includes multiple layers of configuration. Vulnerabilities can exist in each of them. For example, if you deploy containers, you could have vulnerabilities in the container image. Vulnerabilities could also linger in the RBAC policies you configure in the container orchestrator. On top of this, policies that you configure using your cloud provider's IAM framework could create risks for the containerized workload. This is why it's critical to scan all layers of your cloud workloads. Wherever data can exist, a vulnerability can also exist. ### Use CVEs to Gain Vulnerability Context As noted above, some vulnerabilities are more severe than others. But it's not always obvious which ones require immediate attention. Nonetheless, to make vulnerability alerts as actionable as possible, you need to know the severity level of each one. You can do this using Common Vulnerabilities and Exposures (CVE) databases, which list known vulnerabilities and "score" them according to the amount of risk they pose. By pairing vulnerability detection with CVE data, you get contextualized, actionable insights into cloud workload risks. ## Vulnerability Management FAQs ### What is the vulnerability management process? The vulnerability management process typically involves asset inventory, vulnerability scanning, risk assessment, prioritization of remediation efforts, patch and configuration management, continuous monitoring, incident response, and reporting and auditing activities. ### What is the role of vulnerability management? The role of vulnerability management is to reduce the risk of security breaches and protect sensitive data by systematically identifying, assessing and addressing security vulnerabilities. This proactive approach helps maintain a strong security posture, ensures compliance with industry standards and regulations, and minimizes potential damage from cyberthreats. By continuously monitoring and improving the security of cloud environments and IT systems, vulnerability management contributes to the overall resilience and stability of an organization's infrastructure. ### What are the four requirements of every vulnerability management program? Every vulnerability management program should include regular vulnerability scanning, comprehensive risk assessment, timely remediation and ongoing monitoring. These four requirements ensure the continuous identification and mitigation of vulnerabilities, the prioritization of efforts based on risk, and the maintenance of a strong security posture to protect the organization's assets and data. ### Who uses a vulnerability management program? Organizations across all industries --- government agencies, financial institutions, healthcare providers and technology companies --- utilize vulnerability management programs, as they're essential for protecting sensitive data, ensuring compliance with regulations, and maintaining a strong security posture. ### What are the five main types of security vulnerability? 1. Network vulnerabilities involve weaknesses in network infrastructure, protocols or configurations, enabling attackers to intercept, modify or disrupt data transmissions. 2. Operating system vulnerabilities refer to flaws within the OS or its components, which can be exploited to gain unauthorized access, escalate privileges, or execute malicious code. 3. Human vulnerabilities stem from human error or malicious actions, such as falling for phishing attacks, weak passwords or insider threats. 4. Application vulnerabilities result from insecure coding practices and misconfigurations. 5. Process vulnerabilities arise from inadequate security policies, procedures or compliance controls, leading to gaps in protection and increased risk of security breaches. ### What is a threat in terms of cybersecurity? In cybersecurity, a threat refers to any potential malicious activity or event that aims to exploit vulnerabilities in systems, networks or applications, with the intent to compromise the confidentiality, integrity or availability of data and resources. Threats can originate from various sources, such as hackers, cybercriminals, nation-states or even insiders, and can manifest in various forms, including malware, phishing attacks, denial-of-service attacks, ransomware or social engineering schemes. ### What are the challenges of vulnerability management? Challenges of vulnerability management include: * The constant emergence of new vulnerabilities * Limited resources for addressing identified vulnerabilities * Prioritizing remediation efforts * Ensuring timely patching and configuration updates * Maintaining visibility across a complex and evolving IT environment * Overcoming human factors, such as resistance to change or lack of awareness. Additionally, organizations must keep up with industry regulations and compliance requirements, adding another layer of complexity to the vulnerability management process. ### What are the four stages of vulnerability? The four stages of vulnerability are discovery, assessment, exploitation and remediation. Discovery involves identifying vulnerabilities in cloud ecosystems and on-premises networks through automated scanning or manual testing. Assessment refers to evaluating the severity and potential impact of identified vulnerabilities. Exploitation occurs when an attacker leverages a vulnerability to compromise a system or gain unauthorized access. Remediation involves addressing the vulnerability, either through patching, configuration changes, or other mitigating actions, to prevent further exploitation. ### What is a Common Vulnerability Scoring System (CVSS)? The Common Vulnerability Scoring System (CVSS) is a widely adopted, standardized framework for assessing and rating the severity of security vulnerabilities in IT systems and cloud environments. CVSS provides a numerical score between 0 and 10, taking into account factors such as the ease of exploitation, impact on confidentiality, integrity, and availability, and the level of required user interaction. Higher scores indicate more severe vulnerabilities, enabling organizations to prioritize remediation efforts and allocate resources effectively. ### What is a code security vulnerability? A code security vulnerability refers to a weakness or flaw within the source code of a software application, resulting from programming errors, insecure coding practices or misconfigurations. Exploiting such vulnerabilities can enable attackers to compromise the application, gain unauthorized access to sensitive data, or perform malicious actions, potentially causing significant harm to the affected organization. ### How are vulnerabilities scored for severity? Vulnerabilities are scored for severity using standardized frameworks like CVSS, which considers factors such as the potential impact on confidentiality, integrity and availability, the complexity of exploitation, and the required level of user interaction. The resulting numerical score allows organizations to rank vulnerabilities based on their severity, helping to prioritize remediation efforts and allocate resources in a risk-based manner. ### What should be scanned for vulnerabilities? Organizations should scan all components of their IT environment for vulnerabilities, including network devices, servers, workstations, applications, databases and cloud infrastructure. Regular scanning of both internal and external systems, as well as the integration of vulnerability scanning into the software development lifecycle, ensures comprehensive coverage and helps to maintain a strong security posture. ### Who is responsible for vulnerability management? Responsibility for vulnerability management typically falls on a combination of IT security teams, network administrators, system administrators and application developers. Effective vulnerability management requires collaboration and coordination across these teams, with individuals responsible for identifying, assessing and remediating vulnerabilities, as well as implementing security best practices and ensuring compliance with industry standards and regulations. In some organizations, a dedicated vulnerability management team or a chief information security officer (CISO) may oversee the entire process. ### What is the most common type of vulnerability scan? The most common type of vulnerability scan is the automated network vulnerability scan, which utilizes vulnerability scanning tools to identify and assess security weaknesses within an organization's network devices, servers and workstations. These scans typically cover a wide range of known vulnerabilities, including those related to outdated software, misconfigurations and insecure network protocols, helping organizations maintain a secure and compliant IT environment. ### How is a vulnerability scan done? A vulnerability scan is performed using specialized tools that analyze IT systems for known security weaknesses, misconfigurations or outdated software. These tools typically use a combination of signature-based detection, heuristic analysis and manual testing to identify potential vulnerabilities. Scans can be conducted on a scheduled basis, after significant changes to the environment, or on-demand, with results providing detailed information on identified vulnerabilities and recommendations for remediation. ### Which tool is best for vulnerability scanning? Selecting the best tool for vulnerability scanning depends on organizational requirements, budget and the specific IT environment. Popular tools include Nessus, Qualys, OpenVAS and Rapid7 Nexpose. Factors to consider when choosing a vulnerability scanner include its ability to detect a wide range of vulnerabilities, ease of integration with existing infrastructure, scalability and the quality of support and updates provided by the vendor. ### What is a CVE vulnerability scan? A CVE (Common Vulnerabilities and Exposures) vulnerability scan is a process that uses a vulnerability scanning tool to identify known security vulnerabilities within IT systems, based on the CVE database. The CVE database is a publicly accessible, standardized repository of known security vulnerabilities, maintained by the MITRE Corporation. CVE vulnerability scans help organizations detect and address known vulnerabilities in their systems, reducing the risk of security breaches and improving overall security posture. ### What is vulnerability scanning NIST? Vulnerability scanning NIST refers to the process of identifying security vulnerabilities in IT systems, following the guidelines and recommendations provided by the National Institute of Standards and Technology (NIST). NIST offers best practices, such as those found in NIST Special Publication 800-53 and 800-115, to help organizations implement effective vulnerability scanning processes, maintain a strong security posture and ensure compliance with federal regulations and industry standards. Recommended for you [Code to Cloud Vulnerability Management Innovative vulnerability management dashboard streamlines discovery, prioritization and remediation of vulns, ensuring robust security from code to cloud.](https://www.paloaltonetworks.com/blog/prisma-cloud/vulnerability-management-innovation/) [Improve Your Multicloud Security Posture Multicloud environments are complex and difficult to secure without a proactive approach to security and visibility.](https://www.paloaltonetworks.com/resources/datasheets/tip-sheet-improve-your-multicloud-security-posture?ts=markdown) [5 Best Practices for Securing Modern Web Applications and APIs As Web apps and APIs evolve, so does the attack surface. Developers and security practitioners need a comprehensive solution to protect their web apps and APIs.](https://www.paloaltonetworks.com/resources/ebooks/5-best-practices-for-securing-modern-web-applications-and-apis?ts=markdown) [State of Cloud-Native Security Report Over 3,000 cloud security and DevOps professionals identify their challenges, how they handle them and what they've learned in the process.](https://www.paloaltonetworks.com/state-of-cloud-native-security?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Vulnerability%20Management%3F&body=Vulnerability%20management%20identifies%20and%20mitigates%20Cyber%20Exposure%20risks%2C%20securing%20an%20organization%27s%20infrastructure%20and%20resources%20across%20various%20technologies.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/vulnerability-management) Back to Top [Next](https://www.paloaltonetworks.com/cyberpedia/patch-management?ts=markdown) What Is Patch Management? Process, Policy, and Benefits {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language