[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [AI Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-cybersecurity?ts=markdown) 3. [Agentic AI Security: What It Is and How to Do It](https://www.paloaltonetworks.com/cyberpedia/what-is-agentic-ai-security?ts=markdown) Table of contents * [The rise of agentic AI and its security implications](#the-rise-of-agentic-ai-and-its-security-implications) * [Why does agentic AI introduce new security challenges?](#why-does-agentic-ai-introduce-new-security-challenges) * [How does agentic AI security work?](#how-does-agentic-ai-security-work) * [What are the top agentic AI security threats?](#what-are-the-top-agentic-ai-security-threats) * [How to secure agentic AI systems](#how-to-secure-agentic-ai-systems) * [Agentic AI Security FAQs](#agentic-ai-security-faqs) # Agentic AI Security: What It Is and How to Do It 4 min. read Table of contents * [The rise of agentic AI and its security implications](#the-rise-of-agentic-ai-and-its-security-implications) * [Why does agentic AI introduce new security challenges?](#why-does-agentic-ai-introduce-new-security-challenges) * [How does agentic AI security work?](#how-does-agentic-ai-security-work) * [What are the top agentic AI security threats?](#what-are-the-top-agentic-ai-security-threats) * [How to secure agentic AI systems](#how-to-secure-agentic-ai-systems) * [Agentic AI Security FAQs](#agentic-ai-security-faqs) 1. The rise of agentic AI and its security implications * [1. The rise of agentic AI and its security implications](#the-rise-of-agentic-ai-and-its-security-implications) * [2. Why does agentic AI introduce new security challenges?](#why-does-agentic-ai-introduce-new-security-challenges) * [3. How does agentic AI security work?](#how-does-agentic-ai-security-work) * [4. What are the top agentic AI security threats?](#what-are-the-top-agentic-ai-security-threats) * [5. How to secure agentic AI systems](#how-to-secure-agentic-ai-systems) * [6. Agentic AI Security FAQs](#agentic-ai-security-faqs) Agentic AI security is the protection of AI agents that can plan, act, and make decisions autonomously. It focuses on securing the agent's reasoning, memory, tools, actions, and interactions so that autonomy does not create new paths for misuse. It addresses risks that arise only when systems execute multi-step tasks, use external tools, or collaborate with other agents. ## The rise of agentic AI and its security implications Agentic AI refers to systems that can plan tasks, make decisions, and take actions without continuous human direction. That capability is now showing up in real products because organizations want [AI](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai) that can complete multi-step work instead of producing one output at a time. The shift matters. It marks a move from models that respond to prompts to systems that operate as autonomous workers. And it's happening fast. Teams are now building AI agents that plan tasks, call tools, update memory, and work across systems without constant supervision. According to McKinsey's recent survey, [The state of AI in 2025: Agents, innovation, and transformation:](https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai) * Sixty-two percent of survey respondents say their organizations are at least experimenting with AI agents. * Twenty-three percent of respondents report their organizations are scaling an agentic AI system somewhere in their enterprises. * Additionally, high performers have advanced further with their use of AI agents than others have. In most business functions, AI high performers are at least three times more likely than their peers to report that they are scaling their use of agents. The appeal is clear. These agents increase throughput. They reduce manual effort. They operate at speeds that are difficult to match. "By 2028, Gartner predicts that one-third of GenAI interactions will involve autonomous agents." [- Gartner, Agentic AI for Vendors Is a Risk Without Oversight, Jim Hare, September 17, 2025](https://www.gartner.com/en/articles/agentic-ai-for-vendors) Here's why that matters for [generative AI security](https://www.paloaltonetworks.com/cyberpedia/what-is-generative-ai-security): Agentic AI is no longer a static model that receives a prompt and returns a result. It's an active system that makes decisions, chooses actions, and reaches into external environments. Which is why agentic AI shifts where security teams need to focus. Reasoning paths become targets for manipulation. Memory becomes a surface for poisoning. Tools become entry points for unintended actions. Interactions between agents become channels for influence. Each area introduces its own failure modes and opportunities for attackers. Viewing agentic AI through these behaviors creates the foundation for understanding why the security model is different and what must be protected next. We'll dig into that in the next section. ![Icon of a network](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-agentic-ai-security/icon-quiz.svg) ## QUIZ: HOW STRONG IS YOUR AI SECURITY POSTURE? Assess risks across your AI apps and agent-based systems, plus get solution recommendations. [Take quiz](https://www.paloaltonetworks.com/resources/infographics/interactive-quiz) ## Why does agentic AI introduce new security challenges? ![Chart titled 'Why agentic AI introduces new security challenges' showing six labeled security concerns associated with agentic AI. Each box contains a heading, short description, and icon. Top row contains three boxes: 'Identity \& privilege inheritance' with a user icon and text explaining agents act on behalf of others, creating new elevation paths; 'Persistent state \& memory risks' with a document icon and text explaining that stored memory makes compromises more lasting; and 'Tool use \& external actions' with a wrench icon and text stating each action or tool use becomes a potential attack entry point. Bottom row contains three boxes: 'Autonomy \& unpredictable execution' with a compass icon and text stating agents act independently and unpredictably; 'Multi-agent coordination' with a network icon and text explaining agents influence each other's decisions, creating cascading failures; and an unlabeled white space completing the grid layout. All elements are displayed in a clean black-on-white layout with bold titles and light body text.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-agentic-ai-security/Why-agentic-AI-introduces-new-security-challenges.png) **Agentic AI introduces new [GenAI security challenges](https://www.paloaltonetworks.com/cyberpedia/generative-ai-security-risks) because autonomy changes everything.** Again, agents don't just answer a prompt. They interpret goals, decide how to move forward, and take several steps on their own. Which means the execution path isn't predictable in the way traditional LLM workflows are. And that's why traditional [LLM security](https://www.paloaltonetworks.com/cyberpedia/what-is-llm-security) is not enough. **Persistent state creates another problem.** Agents remember what they've done, what they've seen, and what they think matters. Memory becomes part of their decision-making. And once memory becomes part of the loop, poisoning risks become long-term instead of one-off events. **Tool use raises the stakes again.** Agents don't just suggest actions. They perform them. They call APIs, write code, run code. Reach into external systems. Every one of those actions can expose an entry point an attacker can influence. **Then there's identity.** Agents often perform actions on behalf of users or other systems. So any gap in scoping can turn into a confused-deputy situation faster than expected. **Multi-agent setups layer on more complexity.** Agents influence each other's reasoning. They pass information back and forth. They amplify each other's mistakes. And once the system starts operating at agent speed, the blast radius gets bigger. Oversight has less time to catch up. All of this creates a different category of risk. Not theoretical risk. Architectural risk. ![Icon of a brain with a network inside](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-agentic-ai-security/icon-assessment.svg) ## FREE AI RISK ASSESSMENT Get a complimentary vulnerability assessment of your AI ecosystem. [Claim assessment](https://www.paloaltonetworks.com/network-security/cloud-and-ai-risk-assessment#connect) ## How does agentic AI security work? Agentic AI security works by understanding how autonomous agents operate and then securing the parts of the system that drive their behavior. More specifically: Agents don't work like traditional model APIs. They take goals, break them into steps, call tools, store information, and continue working until the task is complete. And that shift from passive output to active execution is what shapes the security model. Basically, agentic AI security aligns to the structure of the agent loop: * **A single-agent system uses one continuous cycle of reasoning, planning, tool use, and state updates.** Each step can expose access to systems or data. And each action creates a point where an attacker can influence outcomes or redirect behavior. * **Multi-agent systems add more to protect.** Different agents perform different functions. They pass information between each other to divide work or validate results. These interactions create new opportunities for an attacker to introduce misleading data or manipulate an agent's decisions. In practice, securing agentic AI means placing controls at each boundary in the loop: * Inputs need validation before they shape reasoning. * Tool calls need guardrails and permission checks. * Memory reads and writes need oversight. * External actions require strict constraints. * And because the loop is iterative, each cycle needs its own verification instead of relying on a single upfront check. The core idea is that agentic AI security mirrors the agent's workflow: you secure the system by securing how it operates, not by wrapping protections around a single model call. ![Icon of a browser with the Prisma AIRS logo on it](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-agentic-ai-security/icon-prisma-airs-demo.svg) ## INTERACTIVE TOUR: PRISMA AIRS See firsthand how Prisma AIRS secures models, data, and agents across the AI lifecycle. [Launch tour](https://start.paloaltonetworks.com/prisma-airs-demo.html) ## What are the top agentic AI security threats? ![A flowchart titled 'Agentic AI threat categories and where they occur' illustrates a core 'Execution Loop' containing 'Planning' and 'Action' stages, which interact with 'Tools/function calling,' 'Short-term memory,' and an 'Application' that handles 'Input' and 'Output.' The loop is central to a system involving 'Agent #1' and 'Agent #2.' This central system is supported by 'Supporting services,' including 'Long-term memory' and a 'Vector datastore,' and feeds into a 'Services' layer below, which encompasses 'Human in loop,' 'Content,' 'Code,' 'Device,' 'Service,' and 'Data.' Threats, indicated by red, rounded rectangular labels, are mapped to specific components or connections. 'Human Attacks on Multi-Agent Systems' and 'Human Manipulation' point toward the 'Application,' where 'Privilege compromise' and 'Tool misuse' also originate. Threats like 'Repudiation \& Untraceability' and 'Resource Overload' connect to 'Agent #2.' 'Cascading Hallucination Attacks,' 'Agent Communication Poisoning,' and 'Rogue Agents in Multi-Agent Systems' are shown near 'Agent #1' and its interaction with 'Short-term memory.' 'Memory poisoning' points directly to the 'Short-term memory.' Threats within the 'Execution Loop' include 'Intent Breaking \& Goal Manipulation' and 'Misaligned \& Deceptive Behaviors.' A linked 'LLM model' and 'Function calling' module is associated with 'Resource Overload,' 'Misaligned \& Deceptive Behaviors,' 'Repudiation \& Untraceability,' 'Identity Spoofing \& Impersonation,' and 'Overwhelming Human in the Loop.' The bottom 'Services' section is connected to 'Overwhelming Human in the Loop,' 'Unexpected RCE \& Code Attacks,' and additional instances of 'Tool misuse' and 'Repudiation \& Untraceability.'](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-agentic-ai-security/Agentic-AI-threat-categories-and-where-they-occur.png) As discussed, traditional LLM risks focus on prompts, data exposure, and output handling. Agentic AI introduces risks in planning, execution, identity, memory, and communication. The result: the attack surface isn't the response. It's the workflow. [OWASP's Agentic AI Threats framework](https://genai.owasp.org/resource/agentic-ai-threats-and-mitigations/) provides a structured, detailed view of the risks that emerge when AI systems operate autonomously. It outlines the specific categories of failures that emerge when autonomy, tool execution, and agent-to-agent communication become part of the stack. It's not exhaustive, but it does give teams a practical baseline for understanding the most common agent-specific vulnerabilities seen today. And that's the right lens to use here. Because once you understand these categories, the controls you need in the next section start to make a lot more sense. Here's a breakdown of the key agentic AI threats identified in the OWASP taxonomy: | OWASP Agents AI threats (2025) | |--------------------------------| | Threat | Description | |---------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------| | **Memory [poisoning](https://www.paloaltonetworks.com/cyberpedia/what-is-data-poisoning)** | Attackers corrupt short-term or long-term memory to influence decisions across steps or sessions. | | **Tool misuse** | Agents are manipulated into misusing their tools or calling them in harmful ways. | | **Privilege compromise** | Weak or inherited permission structures escalate the agent's access. | | **Resource overload** | Attackers overwhelm compute, memory, or dependencies to degrade or block agent behavior. | | **Cascading [hallucination attacks](https://www.paloaltonetworks.com/cyberpedia/what-are-ai-hallucinations)** | False information compounds through reasoning, reflection, or inter-agent communication. | | **Intent breaking \& goal manipulation** | Attackers alter planning, goals, or reasoning so the agent pursues harmful or misaligned tasks. | | **Misaligned or deceptive behaviors** | Agents bypass constraints or act deceptively to achieve objectives. | | **Reproducibility \& untraceability** | Poor logging or opaque reasoning hides actions, making investigation difficult. | | **Identity spoofing \& impersonation** | Attackers impersonate agents or users to trigger unauthorized operations. | | **Overwhelming human-in-the-loop** | Attackers overload reviewers with excessive AI-generated decisions or alerts. | | **Unexpected RCE \& code attacks** | Unsafe or manipulated tool chains lead to unauthorized code execution. | | **Agent communication poisoning** | Attackers corrupt messaging between agents to misdirect workflows. | | **Rogue agents in multi-agent systems** | A compromised agent acts outside expected boundaries and disrupts others. | | **Human attacks on multi-agent systems** | Attackers exploit trust and delegation patterns across agents. | | **Human manipulation** | Compromised agents mislead users into harmful decisions or actions. | These threats form the baseline for understanding how agentic systems fail. And where attackers are most likely to intervene. Plus, they shape the kinds of controls that matter most when securing agents in practice. ## How to secure agentic AI systems ![Diagram titled 'How to secure agentic AI systems' showing a circular agent workflow divided into five labeled segments: Goal, Plan, Act, Observe, and Reflect. Each segment is colored differently and surrounds a central icon representing an agent. Around the circle, five text boxes describe security controls for each phase. Top left box labeled 'Reasoning \& planning' lists actions like constraining goal interpretation and limiting plan expansion. Bottom left box labeled 'Memory \& privilege scope' includes controls like segmenting memory and minimizing privileges. Top right box labeled 'Tools \& execution' suggests requiring permission before tool calls and isolating all execution. Bottom right box labeled 'Communication \& coordination' recommends authenticating agents, validating data, and monitoring for influence attempts. A gray banner across the top reads 'Visibility \& verification' with the note 'Verify each cycle of the agent loop.' A caption below the diagram states: 'Securing agentic AI means securing the workflow. Not the edges. Controls follow the loop. Boundaries shape behavior. Verification keeps agents aligned.' The diagram uses clean linework and consistent typography in a white background layout.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-agentic-ai-security/How-to-secure-agentic-AI-systems.png) Securing agentic AI requires going inside the system and protecting the points where the agent actually forms intentions, makes decisions, accesses resources, and coordinates tasks. In other words, you secure the internal workflow. Not the edges. Here are the core domains that matter most when applying agent security best practices: ### Reasoning and planning * Reasoning is where an agent interprets a goal. * Planning is where it chooses the steps to get there. * Reflection is how it revises those steps as it works. Each of these creates opportunities for drift or misuse if they aren't constrained. With drift and misuse being the primary risks here, the security objective is simple: keep the agent's intent aligned with what it's authorized to accomplish. Here's how. * Set boundaries around what goals can look like. * Limit how deeply a plan can expand. * Review reflective adjustments when tasks shift. * And ensure the agent cannot generate new objectives that fall outside its allowed scope. ***Tip:*** *Track when an agent's reasoning deviates from its normal patterns, since unexpected shifts are often the first sign of manipulation or drift.* ### Tools and execution Tools are often the highest-risk surface in agentic systems because tools turn decisions into actions. That includes code execution, data retrieval, system updates, and downstream automation. So when it comes to tools and execution, strong security starts with strict control. * Require explicit permission checks before tools run. * Isolate execution so actions happen in safe environments. * Define clear input requirements so unexpected parameters don't slip through. * And make each tool available only when the task requires it. These practices prevent small reasoning mistakes from becoming harmful actions. ***Tip:*** *Log tool calls as first-class security events so each invocation can be traced when something looks off.* ### Memory and privilege scope Memory influences every future decision an agent makes: retrieved information, intermediate results, and long-term state. Which is why you have to treat memory as a protected surface: * Validate what gets written. * Segment memory so different types of information stay isolated. * Limit what the agent can read at any given moment. Privilege scope follows the same principle: * Give the agent only the access it needs for the current task. * Assign short-lived credentials. * Prevent privilege inheritance from expanding over time. * And stop escalation paths before they form. Small boundaries here prevent large failures later. ### Communication and coordination In multi-agent systems, communication becomes a decision path: One agent sends information → Another acts on it → And influence spreads quickly. Here's how you secure that communication: * Verify who agents are * Validate what they pass to each other * Restrict which agents can communicate at all Then there's coordination. It's the mechanism agents use to hand off work and influence shared tasks. And because coordination shapes what other agents do next, it needs its own guardrails: * Define which agents are allowed to coordinate and for what purposes. * Constrain how far a coordinated task can propagate. * Check that handoffs follow expected patterns. * Isolate agents when coordination behavior deviates from what's allowed. * And monitor for signs that a compromised agent is trying to steer a workflow it shouldn't control. ***Tip:*** *Use message schemas to reduce cross-agent ambiguity and let receiving agents immediately reject malformed or manipulated messages.* **These controls keep communication and coordination contained. But containment isn't enough on its own. Securing agentic AI also depends on seeing what the agent is doing as it reasons, acts, and interacts.** Which is why agent security depends on visibility across the entire loop: * You want to trace how decisions form, how tools run, how memory changes, and how agents communicate. * And you want lightweight verification every time the agent cycles through its workflow. ![Icon of a browser with the Prisma AIRS logo on it](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-agentic-ai-security/icon-prisma-airs-demo.svg) ## PERSONALIZED DEMO: PRISMA AIRS Schedule a personalized demo with a specialist to see how Prisma AIRS keeps AI agents safe from manipulation and unsafe actions. [Book demo](https://start.paloaltonetworks.com/prisma-airs-demo.html) ## Agentic AI Security FAQs ### How do you secure AI agents? By applying controls to the internal workflow---reasoning, planning, tool use, memory, and coordination. That includes goal constraints, validated tool invocation, memory isolation, scoped identity, and guarded communication. Each control aligns to an agentic surface where influence, misuse, or escalation can occur. ### What are the security concerns of AI agents? AI agents introduce risks through autonomous reasoning, tool execution, memory updates, privilege inheritance, and inter-agent communication. These surfaces can be manipulated, poisoned, or redirected, creating pathways for unintended actions, goal drift, privilege misuse, or coordinated influence across multi-agent systems. ### What are the risks of agentic AI? Key risks include goal manipulation, reasoning interference, memory poisoning, unsafe tool execution, privilege escalation, communication spoofing, coordination misuse, and cascading errors across agents. These arise because agents make decisions, trigger actions, store state, and interact---creating more complex failure modes than traditional model calls. ### What are the privacy issues of agentic AI? Privacy risks emerge when agents retrieve, store, or reuse sensitive information across steps. Memory can retain data longer than intended. Tool use can expose information to external systems. And inter-agent communication can spread data beyond its intended scope without proper validation or controls. ### How does agentic AI affect data security? Agents access, transform, and pass data as part of their workflows. This increases risk around unauthorized reads, unsafe writes, memory persistence, and downstream exposure through tools or coordination. Securing data requires strict control of identity, privilege, memory boundaries, and communication paths. ### How do you detect if an AI agent has been compromised or manipulated? By monitoring decision paths, memory changes, tool calls, and communication patterns for deviations from expected behavior. Sudden goal shifts, abnormal tool usage, unexpected state updates, or irregular coordination often indicate manipulation or poisoning inside the agent loop. ### How do you secure AI agents that operate across multiple platforms and cloud providers? Use consistent identity boundaries, permission checks, tool constraints, and memory controls across environments. Limit what the agent can access on each platform. Validate all cross-platform actions. And ensure communication and coordination channels follow the same authentication and validation rules everywhere the agent operates. ### How do you manage agentic AI identity and access? Assign each agent a scoped identity with the minimum privileges required for its task. Limit delegation. Shorten credential lifetimes. Prevent privilege inheritance from expanding over time. And isolate access paths so the agent cannot escalate or reuse permissions outside its authorized scope. Related content [Report: Unit 42 Threat Frontier: Prepare for Emerging AI Risks Get Unit 42's point of view on AI risks and how to defend your organization.](https://www.paloaltonetworks.com/resources/ebooks/unit42-threat-frontier) [eBook: Is Your AI Ecosystem Secure? Discover the blueprint for protecting all your AI investments.](https://www.paloaltonetworks.com/resources/ebooks/is-your-ai-ecosystem-secure) [Threat research: When AI Remembers Too Much -- Persistent Behaviors in Agents' Memory Check out a PoC that shows how adversaries can use indirect prompt injection to poison an AI Agent.](https://unit42.paloaltonetworks.com/indirect-prompt-injection-poisons-ai-longterm-memory/) [Threat research: AI Agents Are Here. So Are the Threats. Learn how attackers can target agentic applications.](https://unit42.paloaltonetworks.com/agentic-ai-threats/) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=Agentic%20AI%20Security%3A%20What%20It%20Is%20and%20How%20to%20Do%20It&body=Agentic%20AI%20security%20is%20the%20protection%20of%20AI%20agents%20by%20securing%20reasoning%2C%20memory%2C%20tools%2C%20actions%2C%20and%20interactions%20to%20prevent%20new%20paths%20for%20misuse.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-agentic-ai-security) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language