[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [AI in Threat Detection](https://www.paloaltonetworks.com/cyberpedia/what-is-precision-ai?ts=markdown) 4. [What Is an Adversarial AI Attack?](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning?ts=markdown) Table of Contents * [What Is Precision AI™?](https://www.paloaltonetworks.com/cyberpedia/what-is-precision-ai?ts=markdown) * [Precision AI Capabilities](https://www.paloaltonetworks.com/cyberpedia/what-is-precision-ai#precision?ts=markdown) * [The Key Elements of Precision AI: Data and Models](https://www.paloaltonetworks.com/cyberpedia/what-is-precision-ai#the?ts=markdown) * [How Palo Alto Networks Platforms Use AI](https://www.paloaltonetworks.com/cyberpedia/what-is-precision-ai#how?ts=markdown) * [Benefits of Precision AI](https://www.paloaltonetworks.com/cyberpedia/what-is-precision-ai#benefits?ts=markdown) * [Combat the AI-Driven Threats](https://www.paloaltonetworks.com/cyberpedia/what-is-precision-ai#combat?ts=markdown) * [Precision AI: Key Takeaways](https://www.paloaltonetworks.com/cyberpedia/what-is-precision-ai#takeaways?ts=markdown) * [Precision AI FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-precision-ai#faqs?ts=markdown) * What Are Adversarial AI Attacks on Machine Learning? * [Adversarial AI Attacks Explained](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#adversarial?ts=markdown) * [Adversarial Examples in Machine Learning](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#examples?ts=markdown) * [Adversarial Attacks vs. Traditional Cyberattacks](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#vs?ts=markdown) * [How Do Adversarial AI Attacks Work?](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#how?ts=markdown) * [Types of Adversarial Attacks on Machine Learning](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#types?ts=markdown) * [How to Defend Against Adversarial Attacks](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#defend?ts=markdown) * [Adversarial AI Attack FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#faqs?ts=markdown) * [What Is Inline Deep Learning?](https://www.paloaltonetworks.com/cyberpedia/what-is-inline-deep-learning?ts=markdown) * [Why Is Inline Deep Learning Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-inline-deep-learning#why?ts=markdown) * [What Is Deep Learning?](https://www.paloaltonetworks.com/cyberpedia/what-is-inline-deep-learning#dl?ts=markdown) * [What Is Machine Learning?](https://www.paloaltonetworks.com/cyberpedia/what-is-inline-deep-learning#ml?ts=markdown) * [Machine Learning vs. Deep Learning](https://www.paloaltonetworks.com/cyberpedia/what-is-inline-deep-learning#vs?ts=markdown) * [How Does Inline Deep Learning Work?](https://www.paloaltonetworks.com/cyberpedia/what-is-inline-deep-learning#how?ts=markdown) * [Preventing Unknown Threats with Inline Machine Learning](https://www.paloaltonetworks.com/cyberpedia/what-is-inline-deep-learning#preventing?ts=markdown) * [Inline Deep Learning FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-inline-deep-learning#faq?ts=markdown) # What Is an Adversarial AI Attack? 3 min. read [Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com/) [GenAI Security Guide](https://start.paloaltonetworks.com/The-C-Suite-Guide-to-GenAI-Risk-Management?utm_source=google-jg-amer-sase-smco-sfow&utm_medium=paid_search&utm_campaign=google-sase-shw-amer-multi-lead_gen-en-restructure&utm_content=7014u000001Zy2DAAS&utm_term=dlp%20palo%20alto&cq_plac=&cq_net=g&gad_source=1&gad_campaignid=21826186755&gbraid=0AAAAADHVeKmJKswP8zikLIg5D8Uc3Sj3L&gclid=EAIaIQobChMImNmqurnOjwMVqdLCBB0aVRbOEAAYASAAEgLV2vD_BwE) Table of Contents * * [Adversarial AI Attacks Explained](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#adversarial?ts=markdown) * [Adversarial Examples in Machine Learning](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#examples?ts=markdown) * [Adversarial Attacks vs. Traditional Cyberattacks](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#vs?ts=markdown) * [How Do Adversarial AI Attacks Work?](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#how?ts=markdown) * [Types of Adversarial Attacks on Machine Learning](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#types?ts=markdown) * [How to Defend Against Adversarial Attacks](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#defend?ts=markdown) * [Adversarial AI Attack FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#faqs?ts=markdown) 1. Adversarial AI Attacks Explained * * [Adversarial AI Attacks Explained](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#adversarial?ts=markdown) * [Adversarial Examples in Machine Learning](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#examples?ts=markdown) * [Adversarial Attacks vs. Traditional Cyberattacks](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#vs?ts=markdown) * [How Do Adversarial AI Attacks Work?](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#how?ts=markdown) * [Types of Adversarial Attacks on Machine Learning](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#types?ts=markdown) * [How to Defend Against Adversarial Attacks](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#defend?ts=markdown) * [Adversarial AI Attack FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning#faqs?ts=markdown) An adversarial AI attack is a malicious technique that manipulates machine learning models by deliberately feeding them deceptive data to cause incorrect or unintended behavior. These attacks exploit vulnerabilities in the model's underlying logic, often through subtle, imperceptible changes to the input data. They challenge the trustworthiness and reliability of AI systems, which can have serious consequences in applications such as fraud detection, autonomous vehicles, and cybersecurity. ### Stopping AI-Powered Adversaries at Every Stage of the Kill Chain - Part 1 ![Stopping AI-Powered Adversaries at Every Stage of the Kill Chain - Part 1](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-are-adversarial-attacks-on-ai-ml/video-thumbnail-stopping-ai-powered-adversaries.webp) close Key Points * **Definition**: Adversarial AI attacks manipulate machine learning models to produce incorrect outputs by introducing deceptive data. \* **Methodology**: Attackers create "adversarial examples," which are inputs with subtle, nearly imperceptible alterations that cause the model to misclassify data. \* **Impact**: These attacks can compromise decision-making systems, degrade security posture, and erode trust in AI-driven tools. \* **Types**: Common types include poisoning attacks (corrupting training data) and evasion attacks (fooling a trained model). \* **Defense**: Defending against them requires specialized strategies like adversarial training, ensemble methods, and input validation. ![The difference between a normal image and an adversarial example; an added noise can cause AI to misclassify the image.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-are-adversarial-attacks-on-ai-ml/difference-between-normal-image-and-adversarial-example.webp "The difference between a normal image and an adversarial example; an added noise can cause AI to misclassify the image.") ***Figure 1**: The difference between a normal image and an adversarial example; an added noise can cause AI to misclassify the image.* ## Adversarial AI Attacks Explained Adversarial [artificial intelligence (AI)](https://www.paloaltonetworks.com/cyberpedia/ai-security?ts=markdown) attacks are a growing threat that targets the very nature of how machine learning models operate. Unlike traditional cyberattacks that may exploit software vulnerabilities or human error, adversarial attacks focus on the data itself or the model's decision-making process. They are designed to be subtle and can often bypass conventional security defenses. For example, an attacker could add a few pixels of "noise" to an image of a stop sign, causing a self-driving car to misinterpret it as a speed limit sign. The original image looks normal to a human, but the machine learning model is tricked. The rise of AI-driven systems has made this threat particularly significant. In B2B environments, where AI is utilized for everything from fraud detection to [network security](https://www.paloaltonetworks.com/cyberpedia/what-is-network-security?ts=markdown), a successful adversarial attack could result in substantial financial losses, [data breaches](https://www.paloaltonetworks.com/cyberpedia/data-breach?ts=markdown), and a loss of confidence in the technology. The threat isn't just about an isolated incident. It's about a fundamental subversion of a system's logic that can lead to long-term, systemic problems. Defending against these attacks requires a shift in mindset, moving from traditional security practices to more specialized and proactive measures. ## Adversarial Examples in Machine Learning Adversarial examples are specially crafted inputs that appear benign to humans but are designed to trick a model into making an incorrect prediction. They exploit the sensitivities of high-dimensional decision boundaries---tiny, targeted perturbations can flip outcomes without raising human suspicion. As AI is embedded in authentication, fraud prevention, and autonomous systems, these subtle inputs create outsized risk: incorrect access decisions, failed fraud catches, or misread road signs. The takeaway: adversarial examples are not "noisy data"; they are deliberate, optimized attacks on the model's logic. Understanding this mechanic is foundational to evaluating defenses and choosing where to place controls in the ML lifecycle. ## Adversarial Attacks vs. Traditional Cyberattacks Adversarial attacks differ from traditional cyberattacks in their target, complexity, and impact. While conventional attacks often exploit known software vulnerabilities or human weaknesses, adversarial attacks specifically target the unique way AI models process information. This makes them harder to detect using conventional tools, such as [firewalls](https://www.paloaltonetworks.com/cyberpedia/what-is-a-firewall?ts=markdown) or signature-based antivirus software. The input may appear legitimate, but it's crafted to exploit the model's subtle weaknesses. Traditional attacks can cause immediate, visible damage, such as data breaches or service disruptions. Adversarial attacks, however, can silently degrade an AI model's accuracy over time, resulting in faulty predictions or biased outcomes that may not be immediately apparent. The damage is often more subtle and long-term, complicating [incident response](https://www.paloaltonetworks.com/cyberpedia/what-is-incident-response?ts=markdown) and recovery. * **Target** : Traditional attacks target software and human vulnerabilities, while adversarial attacks target [machine learning](https://www.paloaltonetworks.com/cyberpedia/machine-learning-ml?ts=markdown) models and their underlying data. * **Detection**: Traditional attacks are often detected by signature-based tools and firewalls; however, adversarial attacks can bypass these defenses because their inputs appear normal. * **Impact**: The impact of traditional attacks is often immediate and visible, whereas adversarial attacks can lead to silent, long-term degradation of a model's performance. *** ** * ** *** ![podcast default icon](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/podcast-icon-white.svg) ![podcast icon white](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/podcast-icon-white.svg) Podcast: Threat Vector | Defending against Adversarial AI and Deepfakes with Billy Hewlett and Tony Huynh Seek Slider 15s 30s Volume Slider *00:00* *00:00* *** ** * ** *** ## How Do Adversarial AI Attacks Work? Adversarial attacks exploit the vulnerabilities and limitations inherent in machine learning models, including neural networks. These attacks manipulate input data or the model itself to cause the AI system to produce incorrect or undesired outcomes. Adversarial AI and ML attacks typically follow a four-step pattern that involves understanding, manipulating, and exploiting the target system. ### Step 1: Understanding the Target System Attackers first analyze how the target AI system operates. They do this by studying its algorithms, data processing methods, and decision-making patterns. To achieve this, they may use reverse engineering to break down the AI model and identify its weaknesses. ### Step 2: Creating Adversarial Inputs Once attackers understand how an AI system works, they create adversarial examples that exploit its weaknesses. These are intentionally designed inputs intended to be misinterpreted by the system. For example, attackers could slightly alter an image to deceive an image recognition system or modify data fed into a natural language processing model, causing misclassification. ### Step 3: Exploitation Attackers then deploy the adversarial inputs against the target AI system. The goal is to make the system behave unpredictably or incorrectly, which could range from making incorrect predictions to bypassing security protocols. Attackers utilize gradients to understand how changes to the input data impact the model's behavior, enabling them to create and exploit these examples to undermine the system's trustworthiness. ### Step 4: Post-Attack Actions The consequences of adversarial attacks can range from the misclassification of images or text to potentially life-threatening situations in critical applications, such as healthcare or autonomous vehicles. Defending against these attacks requires robust model architectures, extensive testing against adversarial examples, and ongoing research into adversarial training techniques to enhance the resilience of AI systems. ## Types of Adversarial Attacks on Machine Learning Adversarial attacks can be classified by when they occur in the machine learning lifecycle and by the attacker's level of knowledge about the model. White-box attacks happen when the attacker has full access to the model's architecture and parameters. Black-box attacks are more common and involve the attacker having limited or no knowledge of the model's internal workings, instead relying on querying the model and observing its outputs. The main types of attacks include: * [**Poisoning Attacks**](https://www.paloaltonetworks.com/cyberpedia/what-is-data-poisoning?ts=markdown): "Training time" attacks where malicious data is injected into the training dataset. This corrupts the model's learning process, leading to degraded accuracy or deliberate vulnerabilities. For example, an attacker could inject mislabeled spam emails into a dataset, teaching the model to ignore actual spam in the future. * **Evasion Attacks** : Attacks that occur when input data is manipulated to deceive an already trained AI model. For example, adding invisible changes to an image can cause an AI system to misidentify it. Evasion attacks are categorized into two subtypes: * **Nontargeted attacks**: In nontargeted evasion attacks, the goal is to make the AI model produce any incorrect output, regardless of the production. For example, an attacker might manipulate a stop sign image so that the AI system fails to recognize it as a stop sign, potentially leading to dangerous road situations. * **Targeted attacks**: The attacker aims to force the AI model to produce a specific, predefined, incorrect output, such as classifying a benign object as harmful. * **Model Extraction Attacks**: An attacker repeatedly queries a deployed model to create a replica of its functionality, thereby compromising the model's security and intellectual property without ever accessing its code. * **Inference-Related Attacks** : These attacks exploit a model's output to extract [sensitive information](https://www.paloaltonetworks.com/cyberpedia/sensitive-data?ts=markdown) or learn about its training data. This includes model inversion, which reconstructs sensitive data from the model's outputs, and membership inference, which determines if a specific data point was used in the training set. * **Transfer Attacks**: These attacks involve creating adversarial examples for one AI system and adapting them to attack other, different AI models. ## How to Defend Against Adversarial Attacks Defending against adversarial attacks requires a multi-layered approach that goes beyond traditional cybersecurity. Organizations need to focus on making their machine learning models more resilient. The goal is to make it difficult for attackers to find and exploit the subtle weaknesses that these attacks rely on. The most effective defenses often combine multiple strategies: * **Adversarial Training**: This proactive defense involves training the model with both normal data and adversarial examples. By exposing the model to these malicious inputs during the training phase, it learns to recognize and correctly classify them. While effective, this method can be computationally expensive and time-consuming. * **Input Validation and Transformation** : This involves implementing techniques to detect and sanitize potential adversarial inputs before they reach the model, thereby preventing malicious [attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cyber-attack?ts=markdown). Methods such as input resizing, pixel-value reduction, and noise filtering can help mitigate adversarial perturbations and reduce their impact. * **Ensemble Methods**: Using a combination of multiple machine learning models to make a single prediction can significantly enhance a system's resilience and accuracy. An attack that successfully bypasses one model may not be able to fool the others in the ensemble, leading to a more reliable overall output. * **Monitoring and Anomaly Detection**: Continuously monitoring a model's inputs and outputs can help detect sudden drops in accuracy, unusually low confidence scores, or unexpected outputs for standard inputs. These indicators can signal a potential adversarial attack, allowing for a swift response. * **Secure Development Lifecycle** : Integrating security into the entire machine learning development process, from data collection to deployment, is crucial. This includes applying principles like [least privilege](https://www.paloaltonetworks.com/cyberpedia/what-is-the-principle-of-least-privilege?ts=markdown), [threat modeling](https://www.paloaltonetworks.com/cyberpedia/threat-modeling?ts=markdown), and regular security audits to the AI pipeline itself. ## Adversarial AI Attack FAQs ### Is it possible to completely prevent adversarial AI attacks? No, it is not possible to completely prevent adversarial AI attacks. They are a fundamental vulnerability in machine learning models. The goal is to create a system as robust and resilient as possible, rather than achieving perfect invulnerability. ### Why are self-driving cars so vulnerable to adversarial attacks? Self-driving cars rely on computer vision models to interpret their surroundings. Adversarial attacks can easily manipulate these models by making tiny, almost invisible changes to real-world objects, such as road signs or traffic lights, which could have catastrophic consequences. ### Can adversarial attacks be used for good? Yes, the techniques used to create adversarial attacks can also be used for defensive purposes. By studying how models can be fooled, researchers can identify weaknesses and develop stronger, more robust models. This is often referred to as "red teaming" or "ethical hacking" for AI systems. ### How does a poisoning attack differ from an evasion attack? A poisoning attack manipulates the model during its training phase by corrupting the training data, affecting its future performance. An evasion attack, on the other hand, targets a model that is already trained and in use, deceiving it with a single malicious input. ### What is an adversarial example? An adversarial example is an input to a machine learning model that has been intentionally manipulated to cause an incorrect output. To a human, this input may appear completely normal or identical to an un-manipulated example. Related Content [What is Artificial Intelligence? The ultimate guide to leveraging AI in cybersecurity, including advantages and predictions.](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai?ts=markdown) [What is Generative AI for Cybersecurity? Generative AI will accelerate incident response and supercharge risk posture. Here's how.](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity?ts=markdown) [What is Cybersecurity Consolidation? The evolving threat landscape means organizations need airtight cyber defenses. A platform approach to cybersecurity ensures organizations are protected from the latest threats.](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation?ts=markdown) [Cyber Transformation Through Consolidation From multicloud environments to AI-based attacks, the threat landscape is changing rapidly. Consolidating your security is key to preventing threats in 2024 and beyond.](https://start.paloaltonetworks.com/secure-from-every-angle.html) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Are%20Adversarial%20AI%20Attacks%20on%20Machine%20Learning%3F&body=Explore%20adversarial%20AI%20attacks%20in%20machine%20learning%20and%20uncover%20vulnerabilities%20that%20threaten%20AI%20systems.%20Get%20expert%20insights%20on%20detection%20and%20strategies.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-are-adversarial-attacks-on-AI-Machine-Learning) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-precision-ai?ts=markdown) What Is Precision AI™? [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-inline-deep-learning?ts=markdown) What Is Inline Deep Learning? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language