[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [What Are Business Email Compromise (BEC) Tools and Technologies?](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies?ts=markdown) Table of Contents * [What Are Types of Business Email Compromise (BEC) Scams?](https://www.paloaltonetworks.com/cyberpedia/types-of-business-email-compromise-bec-scams?ts=markdown) * [Key Characteristics of BEC Scams](https://www.paloaltonetworks.com/cyberpedia/types-of-business-email-compromise-bec-scams#key?ts=markdown) * [Most Common Types of BEC Scams](https://www.paloaltonetworks.com/cyberpedia/types-of-business-email-compromise-bec-scams#most?ts=markdown) * [Methods Used in BEC Scams](https://www.paloaltonetworks.com/cyberpedia/types-of-business-email-compromise-bec-scams#methods?ts=markdown) * [Real-World Examples of the Largest BEC Scams](https://www.paloaltonetworks.com/cyberpedia/types-of-business-email-compromise-bec-scams#examples?ts=markdown) * [Prevention Strategies for BEC Scams](https://www.paloaltonetworks.com/cyberpedia/types-of-business-email-compromise-bec-scams#prevention?ts=markdown) * [Business Email Compromise (BEC) Types FAQ](https://www.paloaltonetworks.com/cyberpedia/types-of-business-email-compromise-bec-scams#faqs?ts=markdown) * [What Is Business Email Compromise (BEC)?](https://www.paloaltonetworks.com/cyberpedia/what-is-business-email-compromise-bec-tactics-and-prevention?ts=markdown) * [Business Email Compromise Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-business-email-compromise-bec-tactics-and-prevention#business?ts=markdown) * [Mechanics Behind Business Email Compromise](https://www.paloaltonetworks.com/cyberpedia/what-is-business-email-compromise-bec-tactics-and-prevention#mechanics?ts=markdown) * [BEC as a Strategic Component in Multistage Attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-business-email-compromise-bec-tactics-and-prevention#bec?ts=markdown) * [Use Cases: BEC Campaigns with Measurable Impact](https://www.paloaltonetworks.com/cyberpedia/what-is-business-email-compromise-bec-tactics-and-prevention#impact?ts=markdown) * [Detecting BEC in Enterprise Environments](https://www.paloaltonetworks.com/cyberpedia/what-is-business-email-compromise-bec-tactics-and-prevention#detecting?ts=markdown) * [Practical Defenses Against BEC at the Identity Layer](https://www.paloaltonetworks.com/cyberpedia/what-is-business-email-compromise-bec-tactics-and-prevention#practical?ts=markdown) * [Why BEC Is a Board-Level Concern](https://www.paloaltonetworks.com/cyberpedia/what-is-business-email-compromise-bec-tactics-and-prevention#why?ts=markdown) * [Business Email Compromise FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-business-email-compromise-bec-tactics-and-prevention#faqs?ts=markdown) * What Are Business Email Compromise (BEC) Tools and Technologies? * [What Is Business Email Compromise (BEC)?](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#what?ts=markdown) * [Tools and Technologies Used by BEC Scammers](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#tools?ts=markdown) * [Tools and Technologies to Mitigate BEC Risk](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#risk?ts=markdown) * [The Role of the Dark Web in BEC](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#role?ts=markdown) * [How to Use BEC Tools and Technologies for BEC Prevention](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#how?ts=markdown) * [BEC Tools and Technologies FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#faqs?ts=markdown) # What Are Business Email Compromise (BEC) Tools and Technologies? 5 min. read Table of Contents * * [What Is Business Email Compromise (BEC)?](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#what?ts=markdown) * [Tools and Technologies Used by BEC Scammers](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#tools?ts=markdown) * [Tools and Technologies to Mitigate BEC Risk](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#risk?ts=markdown) * [The Role of the Dark Web in BEC](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#role?ts=markdown) * [How to Use BEC Tools and Technologies for BEC Prevention](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#how?ts=markdown) * [BEC Tools and Technologies FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#faqs?ts=markdown) 1. What Is Business Email Compromise (BEC)? * * [What Is Business Email Compromise (BEC)?](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#what?ts=markdown) * [Tools and Technologies Used by BEC Scammers](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#tools?ts=markdown) * [Tools and Technologies to Mitigate BEC Risk](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#risk?ts=markdown) * [The Role of the Dark Web in BEC](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#role?ts=markdown) * [How to Use BEC Tools and Technologies for BEC Prevention](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#how?ts=markdown) * [BEC Tools and Technologies FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies#faqs?ts=markdown) There are two main categories of tools and technologies related to business email compromise (BEC) scams, both relying on automation, artificial intelligence (AI), and machine learning (ML) to enhance their effectiveness. The first category includes the tools and technologies used by the scammers who execute these attacks, while the second encompasses the tools and technologies employed by cybersecurity teams to prevent such incidents. These tools work together to protect organizations from email-based threats by: * Identifying malicious emails before they reach employees * Educating users on how to spot and avoid phishing scams * Ensuring sensitive data remains protected and uncompromised * Responding quickly to suspected incidents to minimize damage By combining these tools and technologies, organizations can significantly reduce the risk of falling victim to BEC attacks. ## What Is Business Email Compromise (BEC)? Business email compromise is a type of cyberattack that uses social engineering, artificial intelligence, machine learning, spoofing, spear phishing, and other technologies to trick employees into taking actions that can compromise their organizations. BEC attacks are incredibly dangerous due to the advanced tools and technologies employed by scammers to make their emails appear authentic and legal. These attacks pose a significant threat to businesses as they can cause substantial financial harm, costing companies billions of dollars. ## Tools and Technologies Used by BEC Scammers BEC scammers have long relied on familiar tactics like phishing and email spoofing. However, advancements in automation, AI, and ML advancements have elevated these methods, enabling attackers to deploy them with remarkable speed and effectiveness. BEC attacks have become increasingly sophisticated, with scammers exploiting shifts in work culture, such as remote and hybrid environments, to target more vulnerable employees. By leveraging AI, ML, and social engineering, attackers now craft highly authentic and deceptive emails, making it easier to deceive victims. Using advanced technologies, attackers can target victims with exceptional precision and deploy attacks on an unprecedented scale, making the tools and techniques behind BEC scams more potent than ever. Below are some primary tools and technologies commonly used in BEC attacks. ### Email Spoofing Software Scammers use this software to manipulate email header information and make their emails appear as if they come from a trusted source. By altering the "From" address and other details, scammers can deceive recipients into believing the email is legitimate. ### Phishing Kits These pre-packaged tools enable scammers to create and distribute authentic-looking phishing emails. Phishing kits often include templates that mimic the look and feel of legitimate emails from well-known organizations, making it easier for scammers to trick their targets. ### Social Engineering Techniques Scammers use various social engineering tactics to manipulate individuals into divulging confidential information. They might pose as company executives or IT personnel to trick employees into revealing passwords or transferring funds. ### Malware and Keyloggers Some BEC attacks involve malware or keyloggers that are covertly installed on a victim's computer. These tools capture keystrokes, allowing scammers to gain access to sensitive information like login credentials and financial data. ### Credential Harvesting Tools BEC attackers often use tools designed to collect and store credentials obtained through phishing or malware. These tools can store large amounts of data, which scammers can later use or sell. ### Fake Domain Registration Scammers frequently register domain names that are slight variations of legitimate company domains. These fake domains are used to send deceptive emails that appear from a genuine source but are part of a BEC scheme. ### Caller ID Spoofing for Vishing BEC scammers use vishing (voice phishing), where they spoof caller IDs to make phone calls appear as if they're coming from a trusted number within the organization or from a known business partner. ### Automated Scripts Scammers may use automated scripts to send phishing emails in bulk. These scripts can personalize emails with the recipient's name or other details, making the scam more convincing. ### Proxy Servers and VPNs BEC scammers often use proxy servers or VPNs to hide their location and evade detection. This makes it more difficult for authorities to trace the scam back to its source. ### Deepfake Technology Advanced scammers employ deepfake audio or video technology to create realistic simulations of a person's voice or appearance, typically a senior executive, to request fraudulent transactions or sensitive information. ## Tools and Technologies to Mitigate BEC Risk As automation, artificial intelligence, and machine learning enhance the sophistication of business email compromise attacks, they also improve the effectiveness of tools and technologies designed to prevent such attacks. Security operations centers (SOCs) are becoming more resilient with the integration of AI and automation, providing analysts with better tools to prioritize alerts effectively. Furthermore, traditional technologies, including email filtering tools and endpoint protection platforms, benefit from AI and machine learning advancements. The primary tools and technologies cybersecurity teams use to mitigate risks and reduce potential damages from BEC attacks include: ### Email Authentication Protocols (SPF, DKIM, DMARC) These are fundamental tools for validating email authenticity. They help ensure that emails are sent from legitimate sources and have not been altered in transit, which is crucial in preventing email spoofing and phishing. ### Advanced Email Filtering Solutions These systems employ various techniques, including AI, to identify and block phishing emails and suspicious attachments. They can analyze email content, sender reputation, and other behavioral patterns. ### Endpoint Protection Platforms (EPP) EPPs prevent malware infections that could lead to credential theft. They often include antivirus, anti-malware, and personal firewalls. They can integrate AI-driven behavioral analysis to detect and block suspicious activities on endpoints. ### User and Entity Behavior Analytics (UEBA) UEBA tools leverage AI to analyze user behavior and detect anomalies, such as unusual access patterns or large file transfers, that could indicate a compromised account. ### Next-Generation Security Operations Center (SOC) A next-generation SOC integrates advanced technologies like AI and ML for proactive threat hunting and incident response. This approach can quickly identify and respond to BEC attempts, reducing attackers' time to cause harm. ### Zero Trust Framework Implementing a Zero Trust security model ensures that access to sensitive data and systems is strictly controlled and monitored, reducing the chance of unauthorized access through compromised email accounts. ### Security Awareness Training Ongoing training is essential, including tools that provide continuing education and training for employees about the latest BEC tactics, phishing schemes, and best practices for email security. These programs often include simulated phishing campaigns to test and reinforce employee awareness. ### Multi-Factor Authentication (MFA) MFA is a key security measure that adds an extra layer of protection. It ensures that attackers still need a second verification form to access accounts even if login credentials are compromised. ### Secure Email Gateways (SEGs) SEGs are deployed to inspect incoming and outgoing emails for malicious content and anomalies. They provide features like anti-malware scanning, URL filtering, and data loss prevention (DLP). ### Incident Response Platforms These platforms facilitate the quick detection, investigation, and remediation of security incidents, including BEC attacks. They often include automated workflows and integrate with other security tools for a coordinated response. ### Threat Intelligence Platforms These platforms gather and analyze data on current cyberthreats, including BEC tactics. They provide insights that help update and fortify cybersecurity strategies against emerging threats. ### Cloud Access Security Brokers (CASBs) CASBs provide visibility into cloud-based applications and services in organizations that use cloud services heavily. They help monitor suspicious activities that could indicate a BEC attack, like unauthorized access to cloud email services. ### Platform Model for Cybersecurity A platform-based approach to cybersecurity ensures integrated and comprehensive protection across all levels of an organization's digital infrastructure. This integration is key in BEC prevention, allowing for coordinated defense mechanisms and streamlined threat responses. ## The Role of the Dark Web in BEC The dark web gives scammers easy access to tools and technologies for business email compromise attacks. Cybercriminals can find user-friendly phishing kits, malware, and email spoofing software, allowing even those with limited technical skills to launch sophisticated attacks. Additionally, the dark web serves as a platform for exchanging stolen data, including email addresses, passwords, and other sensitive information. BEC attackers can utilize this data to create more targeted and convincing phishing emails. It also offers services like VPNs, proxy servers, and other methods to mask identities and locations, providing security for scammers. This anonymity fosters a collaborative environment among cybercriminals, who share tactics, techniques, and experiences to refine their methods and continually evade detection. ## How to Use BEC Tools and Technologies for BEC Prevention Best practices for utilizing BEC tools and technologies for security measures extensively use automation, AI, and ML while emphasizing ongoing monitoring, advanced threat detection, training, and awareness (for employees and cybersecurity teams), and an integrated platform model consolidating tools and cybersecurity management. ![Proven Approach to Improving BEC Readiness | This image is Palo Alto Network’s infographic with a four-step process for organizational assessment and improvement in the context of email security. The steps are divided into](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/bec-tools-and-technologies/proven-approach-to-improving-bec-readiness.png "Proven Approach to Improving BEC Readiness | This image is Palo Alto Network’s infographic with a four-step process for organizational assessment and improvement in the context of email security. The steps are divided into ") ### An Integrated Security Approach Utilize a cohesive combination of tools like email filters, endpoint protection, and security operations centers. Ensure these systems communicate and share intelligence for a more comprehensive defense. Consolidate tools wherever possible. #### Regularly Update and Configure Security Systems Keep all cybersecurity tools updated to protect against the latest threats. Configure email authentication protocols (SPF, DKIM, DMARC) and secure email gateways to block malicious emails. #### Leverage AI and Machine Learning Extensively Implement AI-based tools for advanced threat detection and behavioral analysis. These systems identify anomalies and patterns indicative of BEC attacks more efficiently than traditional methods. Use AI, ML, and automation extensively in SOCs to simplify analysts' work and ease pressure while there is a severe shortage of skilled cybersecurity personnel. #### Ongoing Employee Education and Training Regularly train employees on the latest BEC tactics and general cybersecurity awareness. Use simulated phishing exercises to reinforce training and assess the effectiveness of employee knowledge. These tools and techniques are essential for remote and hybrid employees, representing a growing target for BEC scams. #### Zero Trust Adopt a Zero Trust security model, which assumes that threats can originate from anywhere and require verification at every stage of digital interaction. This approach is vital in mitigating the risk of internal threats and compromised accounts. #### Proactive Monitoring and Response Utilize next-generation SOCs for continuous monitoring and swift response to potential threats. Establish clear procedures for responding to suspected BEC incidents. #### Regular Audits and Compliance Checks Conduct regular security audits to assess the effectiveness of current security measures and ensure compliance with relevant cybersecurity standards and regulations. #### Incident Response Planning Develop and regularly update an incident response plan with protocols for responding to BEC attacks. This should involve coordination across different departments and clear communication strategies. #### Evolve to a Platform Model for Cybersecurity Integrate cybersecurity tools into a unified platform for better threat visibility and coordinated response. This approach ensures that security policies are uniformly applied across the organization. #### Data Backups and Recovery Plans Maintain regular backups of critical data and establish a robust disaster recovery plan. This reduces the risk of data loss in the event of a successful BEC attack. ## BEC Tools and Technologies FAQs ### What essential tools should every organization have to prevent BEC attacks? Key tools include advanced email filtering solutions, multifactor authentication (MFA), secure email gateways, endpoint protection platforms, and user behavior analytics. Implementing a Zero-Trust framework and next-generation SOC is also important. ### How effective is AI in detecting and preventing BEC attacks? AI is highly effective in detecting BEC attacks, especially when identifying anomalies in communication patterns and email content. AI-powered tools can proactively flag suspicious activities, offering a significant advantage over traditional, rule-based systems. ### Is integrating BEC defense tools into a unified platform necessary? Integration into a unified platform enhances the overall effectiveness of BEC defense. It ensures seamless coordination and consistent application of security policies, providing a comprehensive defense against varied BEC tactics. ### How often should security systems and protocols be audited for BEC readiness? Regular audits, at least bi-annually, are needed to ensure that all security systems and protocols are up-to-date and capable of defending against the latest BEC strategies. ### In the case of a successful BEC attack, what immediate steps should be taken? Immediately isolate the affected systems, reset passwords, and revoke compromised credentials. Then, activate the incident response plan, notify affected parties, and conduct a thorough investigation to prevent future incidents. Related Content [What is Cyberthreat Intelligence (CTI) CTI analyzes and shares insights on digital threats, enabling organizations preemptively defend against cyberattacks.](https://www.paloaltonetworks.com/cyberpedia/what-is-cyberthreat-intelligence-cti?ts=markdown) [Cortex XSOAR Threat Intelligence Management Threat intelligence management (TIM) is the process of effectively managing threat data. Learn about Palo Alto Network's unique approach.](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) [The Unit 42 Threat Frontier: Prepare for Emerging AI Risks This report spotlights how Generative AI is reshaping the threat landscape, and shares best practices and advice for managing risk.](https://www.paloaltonetworks.com/resources/ebooks/unit42-threat-frontier?ts=markdown) [SANS independent product review Get an objective take on the product capabilities of Cortex XSOAR from the world's largest cybersecurity researcher on XSOAR.](https://start.paloaltonetworks.com/cortex-xsoar-sans-review) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Are%20Business%20Email%20Compromise%20%28BEC%29%20Tools%20and%20Technologies%3F&body=Understand%20the%20tools%20and%20technologies%20used%20by%20perpetrators%20of%20Business%20Email%20Compromise%20%28BEC%29%2C%20and%20the%20tools%20and%20technologies%20to%20prevent%20successful%20attacks.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-are-bec-tools-and-technologies) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-business-email-compromise-bec-tactics-and-prevention?ts=markdown) What Is Business Email Compromise (BEC)? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language