[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Threats](https://www.paloaltonetworks.com/cyberpedia/threat?ts=markdown) 3. [Security Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture?ts=markdown) 4. [What is a Security Threat Assessment?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment?ts=markdown) Table of Contents * [What Is Security Architecture?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture?ts=markdown) * [Key Objectives of Security Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture#key?ts=markdown) * [Benefits of Security Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture#benefits?ts=markdown) * [Frameworks and Standards for Cybersecurity Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture#frameworks?ts=markdown) * [How to Build an Effective Security Architecture?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture#how?ts=markdown) * [Best Practices for Security Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture#best?ts=markdown) * [Cybersecurity Architecture FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture#faq?ts=markdown) * What is a Security Threat Assessment? * [Common Types of Security Threats](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#common?ts=markdown) * [Elements of a Security Threat Assessment](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#elements?ts=markdown) * [Benefits of a Security Threat Assessment](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#benefits?ts=markdown) * [Steps for Conducting a Security Threat Assessment](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#steps?ts=markdown) * [Security Threat Assessment FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#faqs?ts=markdown) * [What is Cybersecurity Consolidation?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation?ts=markdown) * [Why is Cybersecurity Consolidation Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#important?ts=markdown) * [What Are the Benefits of Cybersecurity Consolidation?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#benefits?ts=markdown) * [Why is Cybersecurity Consolidation a Priority in 2023?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#priority?ts=markdown) * [What Are the Challenges of Implementing Cybersecurity Consolidation?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#challenges?ts=markdown) * [Consolidated Platform vs. Best of Breed](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#platform?ts=markdown) * [Cybersecurity Consolidation FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#faqs?ts=markdown) * [What is an IT Security Policy?](https://www.paloaltonetworks.com/cyberpedia/what-is-an-it-security-policy?ts=markdown) * [What is Cybersecurity Transformation?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation?ts=markdown) * [Why Is Cybersecurity Transformation Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation#transformation?ts=markdown) * [4 Benefits of Cybersecurity Transformation](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation#benefits?ts=markdown) * [How to Implement Cybersecurity Transformation](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation#implement?ts=markdown) * [Challenges and Barriers to Cybersecurity Transformation](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation#challenges?ts=markdown) * [Future Trends in Cybersecurity Transformation](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation#trends?ts=markdown) * [Cybersecurity Transformation FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation#faqs?ts=markdown) * [Reducing Cybersecurity Risk at the Board Level](https://www.paloaltonetworks.com/cyberpedia/reducing-cybersecurity-risk-at-the-board-level?ts=markdown) * [Additional Resources](https://www.paloaltonetworks.com/cyberpedia/reducing-cybersecurity-risk-at-the-board-level#resources?ts=markdown) * [What Is a Distributed Enterprises and Why Does Cybersecurity Matter for Branch Offices?](https://www.paloaltonetworks.com/cyberpedia/what-is-distributed-enterprises-and-why-does-cybersecurity-matter?ts=markdown) * [How to Get the Most Value Out of Security Investments](https://www.paloaltonetworks.com/cyberpedia/how-to-get-the-most-value-out-of-security-investments?ts=markdown) # What is a Security Threat Assessment? 3 min. read Table of Contents * * [Common Types of Security Threats](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#common?ts=markdown) * [Elements of a Security Threat Assessment](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#elements?ts=markdown) * [Benefits of a Security Threat Assessment](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#benefits?ts=markdown) * [Steps for Conducting a Security Threat Assessment](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#steps?ts=markdown) * [Security Threat Assessment FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#faqs?ts=markdown) 1. Common Types of Security Threats * * [Common Types of Security Threats](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#common?ts=markdown) * [Elements of a Security Threat Assessment](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#elements?ts=markdown) * [Benefits of a Security Threat Assessment](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#benefits?ts=markdown) * [Steps for Conducting a Security Threat Assessment](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#steps?ts=markdown) * [Security Threat Assessment FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#faqs?ts=markdown) A security threat assessment identifies, evaluates, and analyzes potential security threats or vulnerabilities that could impact an organization or system. It involves assessing risks from both internal and external sources, understanding the likelihood of threats occurring, and determining their potential impact. The goal is to prioritize risks and develop effective strategies or solutions to mitigate or manage them, ensuring the security of assets, data, and operations. ## Common Types of Security Threats In today's digitally interconnected world, common security threats pose significant risks to individuals, organizations, and governments. These threats encompass a wide range of malicious activities and vulnerabilities that can compromise the confidentiality, integrity, and availability of sensitive information and critical systems. **Malware and Viruses** Malicious software ([malware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware?ts=markdown)) and computer viruses are programs designed to infiltrate and damage computer systems, steal data, or disrupt normal operations. **Phishing Attacks** [Phishing](https://www.paloaltonetworks.com/cyberpedia/phishing-protection-in-the-digital-age-understanding-phishing-and-how-to-protect-against-it?ts=markdown) involves tricking individuals into revealing sensitive information, such as passwords or credit card details, by posing as a trustworthy entity through deceptive emails, websites, or messages. **DDoS Attacks** [Distributed denial of service (DDoS) attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-a-ddos-attack?ts=markdown) overwhelm a target system or network with excessive traffic, rendering it inaccessible to legitimate users. **Insider Threats** [Threats from within an organization](https://www.paloaltonetworks.com/cyberpedia/insider-threat?ts=markdown) where employees or insiders intentionally or unintentionally compromise security by sharing sensitive information or engaging in malicious activities. **Ransomware** [Ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-ransomware?ts=markdown) encrypts a victim's files or entire systems, demanding a ransom payment in exchange for the decryption key to regain access to the data. **Social Engineering** [Social engineering](https://www.paloaltonetworks.com/cyberpedia/what-is-social-engineering?ts=markdown) techniques manipulate human psychology to deceive individuals into divulging confidential information or taking actions that compromise security. **Data Breaches** [Data breaches](https://www.paloaltonetworks.com/cyberpedia/data-breach?ts=markdown), data theft, or exposure often occur due to unauthorized access, security lapses, vulnerabilities, or cyberattacks. **Password Attacks** Cybercriminals attempt to crack or guess passwords through brute force or dictionary attacks to gain unauthorized access to accounts or systems. **Physical Security Breaches** Intruders gain physical access to secure areas, data centers, or facilities, potentially stealing or damaging hardware and sensitive information. **Software Vulnerabilities** Attackers can exploit weaknesses or flaws in software code to gain unauthorized access, disrupt systems, or execute malicious actions. Implementing comprehensive security measures, such as regular software updates, strong access controls, secure coding practices, network monitoring, and employee awareness training, is crucial to assess and mitigate these security threats effectively. Regular security audits and [vulnerability assessments](https://www.paloaltonetworks.com/cyberpedia/vulnerability-scanning?ts=markdown) can also help identify and address potential weaknesses in your cybersecurity defenses. ## Elements of a Security Threat Assessment A comprehensive security threat assessment should evaluate all potential risks, identify specific threats, and examine the impact of potential compromises across the entire organization or system. The ideal threat assessment process should include: * **Threat Identification** Assessors identify and catalog various potential threats and hazards that could pose risks to the organization or entity. Threats include physical threats (e.g., intruders, natural disasters), cyberthreats (e.g., hacking, malware), insider threats, terrorism, vandalism, and more. * **Vulnerability Assessment** Vulnerabilities within the organization or system are evaluated to determine if the identified threats can exploit them. This includes examining physical security measures, cybersecurity practices, access controls, and any weaknesses that could be exploited. * **Risk Analysis** A risk analysis involves studying and evaluating the potential that identified threats can/will occur and the potential impact if they do occur. Based on these assessments, risks are typically categorized as low, moderate, or high. * **Consequence Analysis** Organizations must understand the impact of different threat models. The analysis should include harm to people, damage to property, financial losses, operational disruptions, and reputational damage. * **Risk Assessment** A [risk assessment](https://www.paloaltonetworks.com/cyberpedia/data-risk-assessment?ts=markdown)combines the results from assessing the likelihood of a cyber event and the consequences analysis. It is used to prioritize and rank the identified risks, and it helps organizations concentrate their resources on addressing the most significant and urgent security concerns. * **Mitigation Strategies** Security experts and stakeholders use the risk assessment to develop mitigation strategies to reduce the impact of identified risks. As a result, organizations may enact physical security enhancements, cybersecurity measures, policy changes, training and awareness programs, and emergency response plans. * **Implementation and Monitoring** Once mitigation strategies are devised, they are implemented. Implementation includes deploying security measures and ongoing monitoring to ensure their effectiveness. It also involves regularly updating and testing security protocols. * **Reporting and Documentation** Those doing the assessments typically issue a formal report on their findings and recommendations from the threat assessment. This report usually includes identified threats, vulnerabilities, risks, and mitigation strategies. This documentation is used for decision-making, compliance, and reference by business and technical executives, often including the board of directors. * **Continuous Improvement** Since security is an ongoing process, organizations should periodically review and update their threat assessments to account for changing threats, vulnerabilities, and operational environments. Continuous improvement ensures that security measures remain effective over time. ## Benefits of a Security Threat Assessment Security threat assessments provide valuable insights into emerging threats and evolving attack techniques. Staying up-to-date on the latest trends and vulnerabilities is crucial, given the ever-evolving nature of cyberthreats. Regular assessments help organizations avoid potential threats and adapt their security strategies to safeguard their systems and networks effectively. Organizations must conduct a thorough assessment to identify vulnerabilities and risks within their systems or networks. This helps them understand their security posture and identify areas that require improvement. By proactively identifying potential threats and vulnerabilities in advance, organizations can implement appropriate security measures to prevent or minimize the impact of security incidents. This helps safeguard sensitive data, protect systems from unauthorized access, and prevent potential breaches. Additionally, regular assessments help organizations comply with industry regulations and standards. Many industries have specific security requirements that businesses must adhere to. By conducting regular assessments, organizations can ensure they meet these requirements and maintain compliance, avoiding potential legal and financial consequences. ## Steps for Conducting a Security Threat Assessment When conducting a security threat assessment, it's crucial to follow a structured approach: 1. **Preparing for an Assessment** The first step towards a successful assessment is to set clear objectives. Define what you want to achieve with the evaluation and identify critical assets in your organization that require protection, such as sensitive data or critical systems. It is vital to assemble a cross-functional team, including IT, security experts, and key stakeholders, to get a complete perspective. 2. **Gathering Threat Intelligence** To assess threats effectively, you must collect and analyze external threat data. Palo Alto Networks threat intelligence resources, such as the Unit 42 [Threat Research Center](https://unit42.paloaltonetworks.com/category/threat-research/), can help you stay up-to-date about emerging threats and attack vectors. This information is essential to understanding the evolving threat landscape. 3. **Identifying Vulnerabilities** Assess your network infrastructure to identify potential weaknesses. Conduct an application security assessment to discover vulnerabilities within your software systems. Evaluate endpoint security to determine the susceptibility of individual devices to threats. This step will help you pinpoint areas requiring immediate attention. 4. **Risk Assessment** Calculate risk scores for identified vulnerabilities to prioritize them based on potential impact and likelihood of exploitation. Align your [risk assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) with Palo Alto Networks' best practices to ensure a well-informed decision-making process regarding threat mitigation. 5. **Remediation Planning** Develop a comprehensive mitigation strategy based on the assessed risks. Integrate Palo Alto Networks solutions into your security framework to bolster your defenses effectively. Ensure that budgeting and resource allocation align with the remediation plan to implement necessary changes efficiently. e.g., financial services or other highly regulated markets. It is also a good idea to do an interim or updated assessment in the case of an unexpected service interruption or breach. ## Security Threat Assessment FAQs ### What is the role of threat intelligence in cybersecurity? Threat intelligence plays a critical role in cybersecurity by providing organizations with valuable information about potential threats and vulnerabilities, including data on emerging threats, attack techniques, and malicious actors. By analyzing threat intelligence, organizations can proactively identify and respond to security threats, strengthen their defenses, and reduce the risk of cyberattacks. ### What are the primary sources of threat intelligence data? Threat intelligence data is sourced from a variety of places, including: * **Open-Source Feeds:** Information freely available online, such as blogs, forums, and news articles. * **Commercial Threat Feeds:** Data provided by cybersecurity companies and vendors that offer threat intelligence services. * **Government Agencies:** Reports and alerts issued by cybersecurity agencies and law enforcement. * **Industry-Specific Reports:** Research and analysis focused on specific industries, often provided by industry associations or research firms. * **Internal Security Logs:** Data generated by an organization's security systems, including logs from firewalls, intrusion detection systems, and antivirus software. ### How long does a security risk assessment typically take? While there is no pre-determined time frame for a security risk assessment, there are a few key issues to consider when planning and scheduling one. An assessment can run from several weeks to many months, depending on factors such as the organization's goals, operational and technical complexity, regulatory and legal exposure, etc. Related Content [What is Attack Surface Assessment? Leverage attack surface assessments to boost your security posture and reduce cyberattack risks.](https://www.paloaltonetworks.com/cyberpedia/attack-surface-assessment?ts=markdown) [Unit 42 Threat Research Center Stay up-to-date with Unit 42's latest cyber threat intelligence and research and get valuable insights to protect your organization.](https://unit42.paloaltonetworks.com/) [Unit 42 Cloud Security Assessment Discover cloud risks, prioritize remediation efforts and develop a roadmap to enhance your cloud security.](https://www.paloaltonetworks.com/resources/datasheets/unit-42-cloud-security-assessment?ts=markdown) [How Nine Organizations Respond to---and Prepare for---Cyberthreats Gain insights from case studies showcasing how Unit 42 partners with organizations to overcome complex cyberthreats.](https://www.paloaltonetworks.com/resources/ebooks/how-nine-organizations-respond-to-and-prepare-for-cyberthreats?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20is%20a%20Security%20Threat%20Assessment%3F&body=Master%20the%20process%20of%20conducting%20a%20security%20threat%20assessment%20to%20stay%20ahead%20of%20potential%20cyber%20threats%20and%20vulnerabilities.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture?ts=markdown) What Is Security Architecture? [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation?ts=markdown) What is Cybersecurity Consolidation? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language