[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [What Is an SD-WAN Appliance? | SD-WAN Hardware \& Equipment](https://www.paloaltonetworks.com/cyberpedia/what-is-an-sdwan-appliance?ts=markdown) Table of Contents * [How do SD-WAN appliances work?](#how) * [What are the different types of SD-WAN appliances?](#what) * [What are the different SD-WAN appliance deployment models?](#different) * [What are the benefits of SD-WAN appliances?](#benefits) * [What are the common features of SD-WAN appliances?](#common) * [Security considerations for SD-WAN appliances](#security) * [How to choose the right SD-WAN appliance for your needs](#needs) * [SD-WAN appliance FAQs](#faqs) # What Is an SD-WAN Appliance? | SD-WAN Hardware \& Equipment 5 min. read Table of Contents * [How do SD-WAN appliances work?](#how) * [What are the different types of SD-WAN appliances?](#what) * [What are the different SD-WAN appliance deployment models?](#different) * [What are the benefits of SD-WAN appliances?](#benefits) * [What are the common features of SD-WAN appliances?](#common) * [Security considerations for SD-WAN appliances](#security) * [How to choose the right SD-WAN appliance for your needs](#needs) * [SD-WAN appliance FAQs](#faqs) 1. How do SD-WAN appliances work? * [1. How do SD-WAN appliances work?](#how) * [2. What are the different types of SD-WAN appliances?](#what) * [3. What are the different SD-WAN appliance deployment models?](#different) * [4. What are the benefits of SD-WAN appliances?](#benefits) * [5. What are the common features of SD-WAN appliances?](#common) * [6. Security considerations for SD-WAN appliances](#security) * [7. How to choose the right SD-WAN appliance for your needs](#needs) * [8. SD-WAN appliance FAQs](#faqs) An SD-WAN appliance is a hardware or virtual device that enables the deployment and management of SD-WAN networks. It continuously monitors multiple network connections to dynamically route traffic over the most efficient path. SD-WAN appliances provide built-in security features like firewalls, encryption, and intrusion detection/prevention systems to protect network traffic and ensure data privacy. ## How do SD-WAN appliances work? [SD-WAN (software-defined wide area network)](https://www.paloaltonetworks.com/cyberpedia/what-is-sd-wan?ts=markdown) appliances work by creating a virtual network overlay that abstracts the underlying transport services, like [MPLS](https://www.paloaltonetworks.com/cyberpedia/mpls-what-is-multiprotocol-label-switching?ts=markdown), broadband, and LTE. The abstraction allows the appliance to aggregate and manage these diverse WAN connections smoothly and efficiently. The core functionality of an SD-WAN appliance is to continuously monitor network conditions like latency, packet loss, and jitter. By analyzing these metrics, the central management system makes real-time decisions about the most efficient path for data, which the appliance then enforces. ![Basic SD-WAN appliance operation](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-an-sdwan-appliance/basic-sd-wan-appliance-operation.png) **In essence:** SD-WAN appliances continuously analyze network conditions, make real-time routing decisions, and apply security measures to maintain optimal performance and security. Here's a step-by-step breakdown of how SD-WAN appliances work: ### Step 1: Connection management SD-WAN appliances start by establishing connections to multiple transport services: traditional MPLS links, broadband internet, or LTE networks. ![SD-WAN connects to multiple transport services](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-an-sdwan-appliance/sd-wan-connects-multiple-transport-services.png) Each connection is treated as part of a larger, cohesive network. The appliance constantly monitors the performance of each link, gathering data on latency, packet loss, jitter, and overall reliability. ### Step 2: Dynamic path selection Using the performance data, the SD-WAN appliance dynamically selects the optimal path for each data packet. This process, known as dynamic path selection, ensures that high-priority traffic (like real-time voice or video) takes the fastest, most reliable route. Lower-priority traffic (like email synchronization) is assigned to less expensive or lower-performing links. Predefined policies govern the decision-making process. Network admins set the policies to specify criteria for routing decisions based on the type of traffic and current network conditions. ![SD-WAN dynamic path selection and traffic steering](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-an-sdwan-appliance/sd-wan-dynamic-path-selection.png) ### Step 3: Traffic steering Once the optimal path is selected, the appliance directs the traffic along its chosen path while continuing to make real-time assessments. This is called traffic steering. Traffic steering takes into account the decisions made during dynamic path selection and moves the traffic dynamically depending on the network conditions it encounters. Which means traffic can be rerouted as necessary for the best possible performance and reliability. For example: If an MPLS link experiences high latency, the appliance can reroute traffic through a broadband or LTE connection. Traffic steering optimizes performance and makes the network more reliable by providing automatic failover in case of link failures. ***Note:** Dynamic path selection and traffic steering are related but distinct concepts. Dynamic path selection chooses the best path based on real-time network metrics. Traffic steering then directs traffic over the chosen path to maintain optimal performance.* ### Step 4: Encryption and security As traffic travels through the network, the SD-WAN appliance applies data plane or control plane encryption to protect the privacy and integrity of data. Data plane encryption is typically used to secure the actual data being transmitted, ensuring its confidentiality across public and private networks. **Like this:** ![Data plane encryption](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-an-sdwan-appliance/data-plane-encryption.png) On the other hand, control plane encryption secures the signaling and management information exchanged between devices, maintaining the integrity of network operations. Both are crucial for safeguarding sensitive information as it travels across public and private networks. Depending on the solution, the appliance may also incorporate additional security measures to protect against threats, like [firewall](https://www.paloaltonetworks.com/cyberpedia/what-is-a-firewall?ts=markdown) functionalities and [intrusion detection systems](https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-detection-system-ids?ts=markdown). ### Step 5: Connecting users to applications SD-WAN appliances continuously connect users to applications and services efficiently throughout the entire process. When a user initiates a connection, the appliance evaluates the best path based on the current network status and the requirements of the application. ![Connecting users with SD-WAN](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-an-sdwan-appliance/connecting-users-sd-wan.png) For example: A video conferencing application might be routed over a low-latency MPLS link, while general web browsing could be directed through a broadband connection. Intelligent routing allows users to enjoy the best possible performance regardless of where they are. ### Step 6: Centralized management and orchestration ![Centralized management in SD-WAN](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-an-sdwan-appliance/centralized-management-sd-wan.png) Centralized management and orchestration are an ongoing, core part of an SD-WAN appliance's functioning more so than the final step. Basically, centralized management and orchestration are always running in the background. As explained, network admins use a central controller to define policies and monitor network performance. The SD-WAN appliances at each site automatically receive updates and instructions from this central controller. And this leads to consistent policy enforcement and network behavior across all locations. Central management makes it a lot easier for admins to configure and maintain the network and adjust quickly when demands change. ## What are the different types of SD-WAN appliances? ![Types of SD-WAN appliances](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-an-sdwan-appliance/types-of-sd-wan-appliances.png) SD-WAN appliances come in various forms to cater to different networking needs and deployment scenarios. Choosing the right type of SD-WAN appliance depends on an organization's specific requirements, including performance needs, deployment scale, and management preferences. Let's break down the main categories of SD-WAN appliances and their distinct characteristics: ### Physical SD-WAN hardware These are dedicated hardware devices installed at branch offices, data centers, or headquarters. Physical appliances are known for high performance and reliability. They tend to offer better throughput and processing power compared to their virtual counterparts. Physical appliances often come equipped with specialized SD-WAN hardware components, like security processors (SPUs), which enhance their ability to handle complex security tasks. Such as encryption and intrusion prevention. Organizations with large, high-traffic environments often prefer physical appliances for the superior high performance and reliability. ### Virtual SD-WAN appliances Unlike physical appliances, virtual appliances are software-based and can be deployed in virtualized environments, such as on virtual machines (VMs) in data centers or cloud platforms. Virtual appliances are flexible and scalable, so they're great for dynamic and rapidly changing environments. They can be easily scaled up or down based on demand. Plus, they can also coexist with other virtual network functions (VNFs) in a virtualized infrastructure. This type of appliance is especially useful for organizations with a cloud-first strategy or the need to deploy SD-WAN across geographically dispersed locations without the overhead of physical SD-WAN hardware. ### Cloud-based SD-WAN appliances These are essentially virtual appliances hosted by a cloud service provider. Cloud-based appliances rely on the scalability and global reach of public cloud platforms to provide SD-WAN services without the need for physical infrastructure. This approach makes deployment and management easier because the public cloud provider handles the underlying infrastructure. Cloud-based SD-WAN appliances are a good option for organizations with significant cloud workloads or the need to operate across multiple regions with consistent performance and connectivity. ### Hybrid SD-WAN appliances Hybrid SD-WAN appliances combine elements of both physical and virtual appliances. They offer the flexibility of virtual appliances with the performance benefits of physical devices. In a hybrid deployment, an organization might use physical appliances at larger, high-traffic sites and virtual appliances at smaller or more remote locations. This setup allows for optimized performance where it's needed most, but it's still flexible and scalable. Hybrid appliances are suitable for organizations with diverse networking needs and a mix of on-premises and cloud-based resources. ### Software-defined branch (SD-branch) appliances These are designed to extend SD-WAN capabilities to the branch level, integrating various network functions into a single appliance. An SD-branch appliance typically includes SD-WAN, routing, firewall, and other network services. The consolidation reduces the need for multiple devices at branch locations. Which means management is easier and costs are lower. [SD-branch](https://www.paloaltonetworks.com/cyberpedia/sd-branch?ts=markdown) appliances tend to work well for organizations who want to streamline their branch network infrastructure while still using the advanced features of SD-WAN. ## What are the different SD-WAN appliance deployment models? ![SD-WAN appliance deployment models](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-an-sdwan-appliance/sd-wan-appliance-deployment-models.png) There are several variations on SD-WAN appliance configurations and infrastructure setups. This includes how SD-WAN appliances interact with different network environments. The deployment model plays a role in determining the flexibility, scalability, and performance of the network. Which is why it's important to choose the best configuration for specific needs and operational requirements. ### Traditional WAN edge hardware Traditional WAN edge appliances are dedicated hardware devices installed at branch offices, headquarters, or data centers. They connect to multiple transport services. Cloud management servers usually handle their configuration, which makes setup and management easier. Traditional WAN edge hardware often offers zero-touch deployment, making the installation process quick and simple. ### PC server architecture In this model, virtual SD-WAN appliances run on standard PC servers. This setup is flexible and scalable. Management and adjustments based on network demands are fairly easy. Which makes it ideal for environments that need to adapt quickly and expand rapidly. ### White box architecture White box architecture uses universal customer premises equipment (uCPE) or virtual CPE (vCPE). This model allows organizations to select and implement vendor-specific features as needed. It's also cost-effective and flexible. Plus, it makes it possible to integrate various network functions on a single hardware platform. ### Hybrid WAN edge and NFV approach A growing trend in SD-WAN appliance deployment is the hybrid approach, which combines traditional WAN edge appliances with network functions virtualization (NFV). This method uses cloud-based security and [WAN optimization](https://www.paloaltonetworks.com/cyberpedia/what-is-wan-optimization-wan-acceleration?ts=markdown) features as standalone NFV solutions. The combined approach provides a mix of on-premises and cloud-based functionalities. It offers enhanced flexibility and scalability while optimizing network performance. ## What are the benefits of SD-WAN appliances? ![Primary benefits of SD-WAN appliances](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-an-sdwan-appliance/primary-benefits-sd-wan-appliances.png) It's worth noting that there are extensive benefits of SD-WAN as a networking technology. However, the appliances themselves are dedicated to executing the operations that make these benefits possible. With this distinction made, the [benefits of SD-WAN](https://www.paloaltonetworks.com/cyberpedia/benefits-of-sd-wan?ts=markdown) appliances can be summed up concisely: optimized application performance, improved redundancy and reliability, and scalability and flexibility. ### Optimized application performance SD-WAN appliances monitor network conditions continuously and dynamically route traffic. When critical applications receive the bandwidth and low-latency paths they need, performance is smooth and uninterrupted. ### Improved redundancy and reliability SD-WAN appliances, as established, can use multiple transport links. Their multi-path capability ensures that if one link fails or degrades, the appliance can reroute traffic automatically to another available link. The result is a more resilient network that minimizes downtime and maintains connectivity. Even during link failures or performance issues. ### Scalability and flexibility SD-WAN appliances can scaled easily to accommodate new sites or increased traffic demands. Virtual appliances, in particular, offer a high degree of flexibility. They can be deployed quickly in cloud environments or on virtual machines. The overall adaptability makes it easier for organizations to expand networks as needs grow without significant investment in new hardware. ## What are the common features of SD-WAN appliances? ![Primary features of SD-WAN appliances](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-an-sdwan-appliance/primary-features-sd-wan-appliances.png) There's a broad array of features you'll find in the SD-WAN appliance market. Different organizations have varying networking needs and priorities, which has led to a range of functionalities engineered to address these requirements. Despite the variety, there are a few common SD-WAN appliance features based on the core purpose of SD-WAN. These features address the more fundamental challenges that most organizations face. ### Dynamic path selection As explained, SD-WAN appliances continuously monitor the performance of multiple network connections: MPLS, broadband, LTE etc. Again, by analyzing metrics like latency, jitter, and packet loss, the appliances can dynamically route traffic over the most efficient path. ### Centralized management and orchestration Unlike traditional WANs that require manual configuration at each site, SD-WAN appliances offer centralized control through a management console. Network admins can configure and manage the entire network from one interface. And that makes managing policies much simpler. Plus, it majorly lowers the risk of configuration errors. ### Basic security SD-WAN appliances generally provide basic protection mechanisms. Many include built-in firewalls that monitor and control traffic based on security policies. Encryption capabilities are common, too. Intrusion detection and prevention systems (IDS/IPS) are also often embedded in the appliances. ### Zero touch provisioning [Zero touch provisioning](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-touch-provisioning-ZTP?ts=markdown) simplifies the deployment process of SD-WAN appliances. When new appliances are installed, they can automatically download the configuration and policies from a central controller. This feature makes it much easier and quicker to set up new sites. Network admins can deploy the network fast, and scale efficiently. ### Traffic prioritization and quality of service (QoS) These features basically ensure that critical applications get resources they need to perform at the highest possible level. SD-WAN appliances can prioritize traffic based on application type. Which ensures that important business applications have precedence over less critical traffic. [Quality of service (QoS)](https://www.paloaltonetworks.com/cyberpedia/what-is-quality-of-service-qos?ts=markdown) settings allow the appliance to allocate bandwidth appropriately. And that minimizes congestion and improves the user experience. ***Note:** Dynamic path selection and QoS are related but distinct concepts. Dynamic path selection chooses the best route based on real-time metrics, while QoS ensures critical applications receive the necessary resources for optimal performance by prioritizing traffic.* ### Application visibility and control SD-WAN appliances provide detailed insights into network traffic. So network admins can see which applications are consuming bandwidth and how they're performing. Which adds up to better decision-making and more effective network resource management. ## Security considerations for SD-WAN appliances As discussed, SD-WAN appliances typically come with a few basic security measures. However, it's important to note: No single SD-WAN solution can address all potential threats. SD-WAN appliances provide a basic foundation by covering essential security needs. ***Note:** SD-WAN is a great solution if network performance and management are your primary concerns. However, it's not designed for comprehensive security.* To achieve comprehensive network security, a multilayered approach is necessary. This approach may involve third-party solutions or a shift to secure access service edge (SASE). In either case, to address security, organizations need protection beyond the basic capabilities of SD-WAN appliances. ![Components of SASE](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-an-sdwan-appliance/components-sase.png) SASE combines SD-WAN capabilities with a suite of cloud-delivered security services, including: * [Secure web gateways (SWG)](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-web-gateway?ts=markdown) * [Cloud access security brokers (CASB)](https://www.paloaltonetworks.com/cyberpedia/what-is-the-difference-between-a-traditional-casb-and-an-next-generation-casb?ts=markdown) * [Firewall as a service (FWaaS)](https://www.paloaltonetworks.com/cyberpedia/what-is-firewall-as-a-service?ts=markdown) * [Zero trust network access (ZTNA)](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-ztna?ts=markdown) This integrated approach offers a unified, scalable, and flexible security solution. With this established, here are the common security features you'll often find baked into many SD-WAN appliances: ### Encryption Encryption ensures data remains confidential as it moves across different network links. Regardless of how data travels, encryption protects it from interception by unauthorized parties. This is crucial for maintaining the privacy and integrity of sensitive information. ### Firewall integration Many SD-WAN appliances come with built-in firewalls that monitor and control incoming and outgoing network traffic based on predetermined security rules. Firewalls help prevent unauthorized access to the network and protect against various cyber threats, like malware and denial-of-service attacks. The firewalls in SD-WAN appliances are often designed to work seamlessly with network routing capabilities. This way, security measures coordinate with how data is directed through the network. ### Intrusion detection and prevention systems (IDS/IPS) IDS/IPS systems monitor network traffic for suspicious activity and can block potentially harmful traffic in real-time. Which is essential for identifying and mitigating threats before they can cause significant damage. By analyzing patterns in network traffic, IDS/IPS systems can detect anomalies that might indicate a cyber attack. ***Further reading:*** * [SD-WAN vs. SASE: What's the Difference?](https://www.paloaltonetworks.com/cyberpedia/sd-wan-vs-sase?ts=markdown) * [What Is SASE?](https://www.paloaltonetworks.com/cyberpedia/what-is-sase?ts=markdown) ## How to choose the right SD-WAN appliance for your needs ![How to choose an SD-WAN appliance](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-an-sdwan-appliance/how-choose-sd-wan-appliance.png) If you're shopping around for SD-WAN appliances, you probably know that there's a lot of variation in features and capabilities from one appliance to another. For example: Maybe the appliance you have your eye on offers most of the features and functionalities you want, but only facilitates packet based routing when you need flow based. Not all SD-WAN provider appliances are created equally, which doesn't especially help the procurement process. Here's a step-by-step guide to help you navigate the SD-WAN appliance evaluation process: ### 1. Assess your network requirements Start by evaluating your current network infrastructure and requirements. * Understand the volume of traffic your network handles and the types of applications that are most critical. * Identify the locations that need to be connected and the types of connections available at each site. This initial assessment will help you determine the necessary specifications for your SD-WAN appliances, such as bandwidth capacity and the number of supported connections. ### 2. Determine required features Next, identify the key features your SD-WAN appliance must have to meet your specific needs. Consider features like dynamic path selection, centralized management, and security capabilities. For example: If ease of deployment is a priority, ensure the appliance supports zero-touch provisioning. ### 3. Evaluate security capabilities Security isn't SD-WAN's focus area, but that doesn't mean you shouldn't consider it. ***Note:** If your goal is complete security on top of network performance and management, you'll need to combine appliance features with third-party solutions or consider a shift to SASE.* * Determine your security needs and expectations. * Assess the security features offered by different appliances and look for options that reflect your needs. * **Don't forget:** Consider how the appliance handles security for remote users and cloud access. ***Tip:** If you plan to integrate an existing security solution with your SD-WAN appliance, mention this early in the procurement process. Not all SD-WAN appliances support security integrations.* ### 4. Consider scalability and flexibility Know your growth plans. * If scalability and flexibility are primary concerns, focus on options that can scale with your organization's growth. (This is less important when it comes to static networks or short-term deployments.) * Ensure the appliance can support the addition of new sites and increased traffic without significant hardware investments. ***Tip:** Virtual appliances are flexible and easy to deploy in cloud environments. Keep this in mind if your network is especially dynamic and prone to rapid changes.* ### 5. Assess management and orchestration tools Effective management and orchestration are vital for the smooth operation of your SD-WAN. While many SD-WAN appliances offer management and orchestration tools, the specific capabilities and ease of use can vary between different appliances and vendors. Here's what to consider: * **Feature set:** Identify the management features you need, like real-time network visibility, application performance monitoring, automated policy updates, etc. * **User interface:** Evaluate the ease of use and intuitiveness of the management interface. A more user-friendly interface reduces the learning curve and administrative burden. * **Integration:** Check how well the appliance integrates with your existing network management tools or third-party services for a cohesive management experience. * **Vendor-specific enhancements:** Consider any unique management features or enhancements offered by different vendors that may provide additional value or capabilities. ### 6. Evaluate redundancy and reliability Redundancy and reliability are important for making sure that network operations remain uninterrupted. At the same time, specific implementations can vary significantly based on organizational needs. Different businesses have unique requirements for maintaining uptime, whether it's ensuring continuous customer access, supporting remote workforces, or managing critical applications. Here's how to assess redundancy and reliability in SD-WAN appliances to match your needs: * **Multiple network paths:** Verify that the SD-WAN appliance can leverage multiple network paths to ensure continuous connectivity. * **Automatic failover capabilities:** Ensure the appliance provides automatic failover to reroute traffic seamlessly if one link fails. * **Traffic rerouting:** Evaluate how efficiently the appliance handles traffic rerouting to maintain smooth operation during network disruptions. * **Performance during disruptions:** Assess the appliance's performance in maintaining connectivity and minimizing downtime when network issues arise. * **Vendor-specific features:** Consider any additional redundancy and reliability features offered by different vendors that could benefit your specific network needs. ### 7. Check compatibility with existing infrastructure Every organization has unique existing systems and varying transport types. Ensuring compatibility with your existing network infrastructure minimizes disruptions and simplifies the deployment process. Here's how to evaluate compatibility effectively: * **Current network equipment:** Confirm that the SD-WAN appliance can integrate with existing routers, firewalls, and other networking equipment. * **Interoperability:** Assess the appliance's ability to work with various network protocols and standards to avoid compatibility issues. * **Vendor support:** Look into the vendor's support for seamless integration and their experience with similar deployments. * **Transition simplicity:** Evaluate how easily the appliance can be deployed in your existing network environment without causing significant disruptions. ### 8. Analyze cost and ROI Finally, consider the cost of the SD-WAN appliance and its potential return on investment (ROI). * While initial costs are important, also evaluate the long-term savings from reduced management complexity, improved network performance, and lower bandwidth costs. * Look for appliances that offer a good balance between cost and functionality, providing the features you need without unnecessary expenses. [![Compare SD-WAN and SASE ROI now.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-an-sdwan-appliance/compare-sd-wan-sase-roi.png)](https://tei.forrester.com/go/paloalto/prismasase/index.html?lang=en-us) ## SD-WAN appliance FAQs ### What are SD-WAN appliances? An SD-WAN appliance is a hardware or virtual device that enables the deployment and management of SD-WAN networks, monitoring multiple connections to dynamically route traffic efficiently and securely. ### Is an SD-WAN device a router? An SD-WAN device is not just a router; it provides additional functions like dynamic path selection, traffic steering, and built-in security features such as firewalls and encryption. ### Can SD-WAN replace a router? Yes, an SD-WAN appliance can replace traditional routers by offering advanced networking features, including dynamic path selection and integrated security, which traditional routers typically lack. ### Does SD-WAN require hardware? SD-WAN can use hardware appliances or virtual appliances, depending on the deployment needs. Both types are capable of managing SD-WAN networks effectively. ### Which SD-WAN equipment is necessary? Necessary SD-WAN equipment includes either physical hardware appliances for robust performance or virtual appliances for flexibility, depending on the specific networking and deployment requirements. Related Content [Report: 2024 Gartner Magic Quadrant for SD-WAN 5-time Leader with the Furthest for Completeness of Vision.](https://start.paloaltonetworks.com/gartner-sd-wan-mq-2024.html) [eBook: SD-WAN For Dummies® Learn the four tenets of next-gen SD-WAN.](https://start.paloaltonetworks.com/branch-of-the-future-with-sd-wan-for-dummies.html) [White paper: The Power of Next-Generation SD-WAN Find out the benefits of next-generation SD-WAN with app-defined fabric.](https://start.paloaltonetworks.com/power-of-next-gen-sd-wan.html) [Study: Forrester Total Economic Impact of Prisma SD-WAN Discover the potential ROI Prisma SD-WAN can deliver.](https://start.paloaltonetworks.com/tei-spotlight-sd-wan) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20an%20SD-WAN%20Appliance%3F%20%7C%20SD-WAN%20Hardware%20%26%20Equipment&body=An%20SD-WAN%20appliance%20is%20a%20hardware%20or%20virtual%20device%20that%20enables%20the%20deployment%20and%20management%20of%20SD-WAN%20networks.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-an-sdwan-appliance) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language