[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Security Operations](https://www.paloaltonetworks.com/cyberpedia/security-operations?ts=markdown) 3. [SIEM](https://www.paloaltonetworks.com/cyberpedia/security-analytics?ts=markdown) 4. [What is Cloud SIEM?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem?ts=markdown) Table of Contents * [What is Security Analytics?](https://www.paloaltonetworks.com/cyberpedia/security-analytics?ts=markdown) * [Security Analytics Platforms](https://www.paloaltonetworks.com/cyberpedia/security-analytics#security?ts=markdown) * [Security Analytics Capabilities](https://www.paloaltonetworks.com/cyberpedia/security-analytics#capabilities?ts=markdown) * [MITRE ATT\&CK Mapping](https://www.paloaltonetworks.com/cyberpedia/security-analytics#mitre?ts=markdown) * [SOAR and Threat Intelligence Platform](https://www.paloaltonetworks.com/cyberpedia/security-analytics#platform?ts=markdown) * [Benefits of Security Analytics](https://www.paloaltonetworks.com/cyberpedia/security-analytics#benefits?ts=markdown) * [SIEM vs. Security Analytics](https://www.paloaltonetworks.com/cyberpedia/security-analytics#vs?ts=markdown) * [Our Approach to Security Analytics](https://www.paloaltonetworks.com/cyberpedia/security-analytics#approach?ts=markdown) * [Security Analytics FAQs](https://www.paloaltonetworks.com/cyberpedia/security-analytics#faqs?ts=markdown) * [What is SIEM?](https://www.paloaltonetworks.com/cyberpedia/what-is-siem?ts=markdown) * [SIEM: The Foundation for XSIAM](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#foundation?ts=markdown) * [How SIEM Works](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#how?ts=markdown) * [Key Functions and Benefits of SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#key?ts=markdown) * [Role of AI and ML in SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#role?ts=markdown) * [SIEM Integration](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#siem?ts=markdown) * [SIEM Use Cases](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#usecases?ts=markdown) * [How to Choose a SIEM Solution](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#solution?ts=markdown) * [Best Practices for SIEM Implementation](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#best?ts=markdown) * [SIEM vs Other Security Solutions](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#vs?ts=markdown) * [What is Cloud SIEM?](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#cloud?ts=markdown) * [The Evolution of SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#evolution?ts=markdown) * [The Future of SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#future?ts=markdown) * [SIEM FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-siem#faqs?ts=markdown) * [What is Security Information and Event Management (SIEM) Integration?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-information-event-management-siem-integration?ts=markdown) * [How Does SIEM Integration Work?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-information-event-management-siem-integration#how?ts=markdown) * [What are the Benefits of SIEM Integration?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-information-event-management-siem-integration#what?ts=markdown) * [Fundamentals of SIEM Integration](https://www.paloaltonetworks.com/cyberpedia/what-is-security-information-event-management-siem-integration#fundamentals?ts=markdown) * [SIEM Integration FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-security-information-event-management-siem-integration#faqs?ts=markdown) * [What is SIEM Logging?](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging?ts=markdown) * [Why is SIEM Logging Important for IT Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging#why?ts=markdown) * [SIEM vs. Log Management: Understanding the Differences](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging#vs?ts=markdown) * [Key Components in SIEM Logs](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging#key?ts=markdown) * [The Mechanics of SIEM Logging](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging#mechanics?ts=markdown) * [SIEM Logging Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging#best-practices?ts=markdown) * [SIEM Logging Challenges and Solutions](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging#challenges?ts=markdown) * [SIEM Logging FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging#faqs?ts=markdown) * [What Is Security Event Management (SEM)?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-event-management-sem?ts=markdown) * [Why is SEM Important to IT Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-event-management-sem#why?ts=markdown) * [How does SEM work?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-event-management-sem#how?ts=markdown) * [Scenario: Detecting and Mitigating an Insider Threat](https://www.paloaltonetworks.com/cyberpedia/what-is-security-event-management-sem#scenario?ts=markdown) * [SIM vs. SEM vs. SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-security-event-management-sem#sim?ts=markdown) * [Security Event Management (SEM) FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-security-event-management-sem#faqs?ts=markdown) * [What is a SIEM Solution in a SOC?](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc?ts=markdown) * [What is a Security Information and Event Management (SIEM) Solution?](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#what?ts=markdown) * [What Is a Security Operations Center (SOC)?](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#soc?ts=markdown) * [Key Components of SIEM Solutions](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#key?ts=markdown) * [How Does SIEM Integrate with SOC?](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#how?ts=markdown) * [Why is SIEM Utilized?](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#why?ts=markdown) * [Traditional SIEMs](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#traditional?ts=markdown) * [Limitations of a SIEM](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#limitations?ts=markdown) * [What Is Next-Generation SIEM?](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#next-generations?ts=markdown) * [SIEM Solutions in SOC FAQs](https://www.paloaltonetworks.com/cyberpedia/siem-solutions-in-soc#faqs?ts=markdown) * [How Do SIEM Tools Benefit SOC Teams?](https://www.paloaltonetworks.com/cyberpedia/how-do-siem-tools-benefit-soc-teams?ts=markdown) * [What is a SOC (Security Operations Center)?](https://www.paloaltonetworks.com/cyberpedia/how-do-siem-tools-benefit-soc-teams#what?ts=markdown) * [What is Security Information and Event Management (SIEM)?](https://www.paloaltonetworks.com/cyberpedia/how-do-siem-tools-benefit-soc-teams#siem?ts=markdown) * [The Benefits of SIEM Tools for SOC Teams](https://www.paloaltonetworks.com/cyberpedia/how-do-siem-tools-benefit-soc-teams#benefits?ts=markdown) * [Implementing SIEM in SOCs](https://www.paloaltonetworks.com/cyberpedia/how-do-siem-tools-benefit-soc-teams#implementing?ts=markdown) * [Challenges and Considerations](https://www.paloaltonetworks.com/cyberpedia/how-do-siem-tools-benefit-soc-teams#challenges?ts=markdown) * [How SIEM Tools Benefit SOC Teams FAQs](https://www.paloaltonetworks.com/cyberpedia/how-do-siem-tools-benefit-soc-teams#faqs?ts=markdown) * [What Is the Role of AI and ML in Modern SIEM Solutions?](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-and-machine-learning-ml-in-siem?ts=markdown) * [The Evolution of SIEM Systems](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-and-machine-learning-ml-in-siem#the?ts=markdown) * [Benefits of Leveraging AI and ML in SIEM Systems](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-and-machine-learning-ml-in-siem#benefits?ts=markdown) * [SIEM Features and Functionality that Leverage AI and ML](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-and-machine-learning-ml-in-siem#siem?ts=markdown) * [AI Techniques and ML Algorithms that Support Next-Gen SIEM Solutions](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-and-machine-learning-ml-in-siem#ai?ts=markdown) * [Predictions for Future Uses of AI and ML in SIEM Solutions](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-and-machine-learning-ml-in-siem#predictions?ts=markdown) * [Role of AI and Machine Learning in SIEM FAQs](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-and-machine-learning-ml-in-siem#faqs?ts=markdown) * What is Cloud SIEM? * [Why Use a Cloud SIEM?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#why?ts=markdown) * [How SIEM Interacts with Cloud Environments and SaaS Applications](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#how?ts=markdown) * [Core Cloud SIEM Features and Capabilities](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#core?ts=markdown) * [Cloud SIEM Deployment Models](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#cloud?ts=markdown) * [On-Premise vs. Cloud SIEM Deployment](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#vs?ts=markdown) * [Key Steps for Implementing Cloud SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#key?ts=markdown) * [Cloud SIEM Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#challenges?ts=markdown) * [Considerations of a Cloud Native SIEM Solution](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#considerations?ts=markdown) * [Cloud SIEM FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#faqs?ts=markdown) * [What Is Security Information Event Management (SIEM) Software?](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software?ts=markdown) * [How Security Information Event Management (SIEM) Software Works](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software#works?ts=markdown) * [Benefits of SIEM Software](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software#benefits?ts=markdown) * [SIEM Software Features](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software#features?ts=markdown) * [SIEM Software Types](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software#types?ts=markdown) * [SIEM Implementation and Deployment](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software#implementation?ts=markdown) * [SIEM Software Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software#practices?ts=markdown) * [What are SIEM Use Cases?](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-use-cases?ts=markdown) * [Exploring SIEM Use Cases](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-use-cases#SIEM?ts=markdown) * [Key SIEM Use Cases](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-use-cases#use-cases?ts=markdown) * [Building and Managing SIEM Use Cases](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-use-cases#managing?ts=markdown) * [Implementing SIEM: Best Practices and Considerations](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-use-cases#best-practices?ts=markdown) * [SIEM Use Cases FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-use-cases#faq?ts=markdown) * [What Are Security Information and Event Management (SIEM) Tools?](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools?ts=markdown) * [What Is Security and Information Event Management (SIEM)?](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#SIEM?ts=markdown) * [What Do SIEM Tools Do?](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#Tools?ts=markdown) * [How Do SIEM Tools Work?](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#How?ts=markdown) * [Why Is SIEM important?](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#Why?ts=markdown) * [Key SIEM Tools and Features](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#Features?ts=markdown) * [Compliance Management and Reporting](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#Compliance?ts=markdown) * [Benefits of SIEM Tools](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#Benefits?ts=markdown) * [Security Information and Event Management (SIEM) FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-siem-tools#FAQs?ts=markdown) # What is Cloud SIEM? 4 min. read Table of Contents * * [Why Use a Cloud SIEM?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#why?ts=markdown) * [How SIEM Interacts with Cloud Environments and SaaS Applications](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#how?ts=markdown) * [Core Cloud SIEM Features and Capabilities](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#core?ts=markdown) * [Cloud SIEM Deployment Models](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#cloud?ts=markdown) * [On-Premise vs. Cloud SIEM Deployment](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#vs?ts=markdown) * [Key Steps for Implementing Cloud SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#key?ts=markdown) * [Cloud SIEM Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#challenges?ts=markdown) * [Considerations of a Cloud Native SIEM Solution](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#considerations?ts=markdown) * [Cloud SIEM FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#faqs?ts=markdown) 1. Why Use a Cloud SIEM? * * [Why Use a Cloud SIEM?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#why?ts=markdown) * [How SIEM Interacts with Cloud Environments and SaaS Applications](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#how?ts=markdown) * [Core Cloud SIEM Features and Capabilities](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#core?ts=markdown) * [Cloud SIEM Deployment Models](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#cloud?ts=markdown) * [On-Premise vs. Cloud SIEM Deployment](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#vs?ts=markdown) * [Key Steps for Implementing Cloud SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#key?ts=markdown) * [Cloud SIEM Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#challenges?ts=markdown) * [Considerations of a Cloud Native SIEM Solution](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#considerations?ts=markdown) * [Cloud SIEM FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem#faqs?ts=markdown) Cloud SIEM (Security Information and Event Management), also called SIEM-as-a-Service or SIEM SaaS, is a solution that provides visibility into [workloads](https://www.paloaltonetworks.com/cyberpedia/what-is-workload?ts=markdown) across distributed environments and enables real-time monitoring, analysis, and anomaly alerting to identify threats and speed up incident response. A cloud SIEM solution can monitor log data from multiple sources, such as [endpoint](https://www.paloaltonetworks.com/cyberpedia/what-is-an-endpoint?ts=markdown) devices and networks, through a unified, cloud-based dashboard. Cloud SIEM solutions offer several cybersecurity benefits over [traditional SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-siem?ts=markdown) tools when managing threat detection and gathering [threat intelligence](https://www.paloaltonetworks.com/cyberpedia/what-is-threat-intelligence?ts=markdown) across disparate environments. ## Why Use a Cloud SIEM? Cloud SIEM assists in-house security teams in automating the collection, monitoring, and analysis of data from any location. It helps security teams defend against cyberattacks, including known threats identified in the [MITRE ATT\&CK framework](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack?ts=markdown). This capability is crucial now that most organizations have workforces and critical workloads outside traditional on-premise boundaries. Cloud SIEM also supports integrations with other [security operations](https://www.paloaltonetworks.com/cyberpedia/what-is-security-operations?ts=markdown) tools, allowing them to ingest more data for broader observability. The inherent scalability of cloud SIEM allows these systems to gather and correlate massive amounts of data to identify potential security incidents. Additional Cloud SIEM benefits include the following: * **Elasticity:** Cloud SIEM solutions allow organizations to adjust capacity dynamically rather than estimate future resource needs, often resulting in a shortage or surplus. * **Less Expertise and Staff Required:** Cloud-based SIEM solutions are designed to be easy to implement, use, and maintain, reducing the level of expertise and the number of staff needed to support them. * **Cost-Effectiveness:** Cloud SIEM eliminates the need for complex, resource-intensive, and costly maintenance, avoiding capital expenditures associated with on-premise SIEM deployments. * **Rapid Deployment:** Security teams can customize and deploy cloud SIEM solutions faster than traditional on-premise systems. * **Resilience:** Cloud SIEM operates in managed environments with automatic backup and recovery functions and is often deployed across multiple locations for redundancy. * **Unified System with All Security and Event Log Data:** Security teams can monitor all physical and virtual systems from a unified system, enabling real-time alerts, detection rule updates, risk assessments, and compliance audit reports. ## How SIEM Interacts with Cloud Environments and SaaS Applications SIEM systems enhance security in cloud environments and [SaaS applications](https://www.paloaltonetworks.com/cyberpedia/what-is-saas?ts=markdown) by collecting and normalizing logs through API integrations with [cloud service providers](https://www.paloaltonetworks.com/cyberpedia/cloud-service-provider?ts=markdown) and SaaS platforms. They use advanced analytics and threat intelligence to detect anomalies and potential threats while correlating events across diverse sources. Automated incident responses and integrations with [SOAR platforms](https://www.paloaltonetworks.com/cyberpedia/what-is-soar?ts=markdown) enable rapid threat mitigation. SIEMs also provide detailed reporting and audit trails to ensure compliance with regulatory requirements, offering a unified view of security across an organization's entire IT landscape. ## Core Cloud SIEM Features and Capabilities ![Core Cloud SIEM Features and Capabilities](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/cloud-siem-core-cloud-siem-features-and-capabilities.png) ## Cloud SIEM Deployment Models Several models are available for deploying cloud SIEM, with the optimal choice depending on security teams' capabilities, demands, resources, and preferences for responsibility, capital expenditure, and data control. Review the following options to gauge the best fit. ### Customer-Deployed Cloud SIEM Model The customer-deployed model, which falls under the category of [infrastructure-as-a-service](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-a-service?ts=markdown), is often used as an interim step before embracing a fully cloud-based solution. It is used by organizations that want a high degree of data control and have the resources to cover the cost and responsibility for the infrastructure beyond virtualization. ### Cloud-Hosted SIEM Model This single-tenant model requires less capital expenditure and support from the security team. The vendor provides and manages the hardware and software via the cloud, offering much of the control and security of a customer-deployed solution but at a relatively high cost due to the lack of economies of scale. ### Cloud Native SIEM Model A multi-tenant model offering a complete SaaS solution. This model delivers all the benefits of a cloud SIEM implementation, with vendors providing all hardware, software, and supporting architectures. Organizations have their own dashboards and user interfaces, but backend components are shared, keeping costs lower. Cloud-native SIEM providers build in core functionality with key tools that are pre-configured out of the box. ### Cloud SIEM as Managed Service Cloud SIEM is also a full-service solution, with managed service providers handling all aspects of running the system. This model eliminates the need for organizations to self-operate a security operations center (SOC), with security operations processes managed remotely or in-house. ## On-Premise vs. Cloud SIEM Deployment Like all technology, the right deployment model is dictated by the organization's security operations requirements, budget, and the security team's capacity and skills. ### Characteristics of Organizations that Choose an On-Premise SIEM * The organization needs a high degree of autonomy, control, and flexibility in its cybersecurity posture. * Prioritize [data privacy](https://www.paloaltonetworks.com/cyberpedia/data-privacy?ts=markdown) to meet strict compliance and legal requirements * Want the ability to customize and finely tune their SIEM ### Characteristics of Organizations that Choose a Cloud SIEM * Rely heavily on cloud-based operations * Want the ability to integrate with other cloud systems seamlessly * Need a high degree of scalability and accessibility * Seek the deployment and management simplicity of a cloud SIEM ## Key Steps for Implementing Cloud SIEM Successful deployment of Cloud SIEM requires careful planning and execution. Key steps must be taken to implement Cloud SIEM, ensuring your organization can effectively harness its capabilities while addressing potential challenges. These steps establish a powerful, scalable, and efficient Cloud SIEM solution tailored to your security needs. ### \#1: Understand the Current Environment Start by gathering information about all [digital assets](https://www.paloaltonetworks.com/cyberpedia/what-are-digital-assets?ts=markdown) (cloud and on-prem), the current [security analytics](https://www.paloaltonetworks.com/cyberpedia/security-analytics?ts=markdown) coverage, and the available technical resources (i.e., systems and people) to support the project. Assess the staff's skills relative to the requirements for the cloud SIEM deployment and ongoing management, as well as the technical resources, such as bandwidth. ### \#2: Determine and Prioritize Use Cases Identify current use cases covered by the legacy SIEM or other security tools. Then, additional use cases should be considered. ### \#3: Assess Cloud SIEM Solutions Consider the available cloud SIEM solutions and deployment models. Map each solution's functionality to the organization's specific requirements and capabilities. Pay attention to how the cloud SIEM aligns with [compliance requirements](https://www.paloaltonetworks.com/cyberpedia/what-is-compliance?ts=markdown). ### \#4: Define Goals Define metrics to quantify the results of the specific objectives for each implementation stage. This is critical for keeping the implementation on schedule, identifying issues, and optimizing systems and processes. ### \#5: Establish Operational Processes and Roles Before beginning a cloud SIEM deployment, processes and roles should be determined. This should include the functions to support the implementation and the ongoing support roles and processes needed to manage and maintain the cloud SIEM solution. Policies and detection rules should be updated and created during this step. ### \#6: Train the Team Schedule formal training for the security team using the cloud SIEM. Provide training in various formats to make it engaging and optimally reach each constituent. This can include hands-on lab work, reading materials, videos, and ask-the-expert sessions. ### \#7: Deploy and test the cloud SIEM The specific steps for deployment will vary based on the model selected, but the process should be articulated and communicated to the security team before it begins. Once the system is live, key use cases should be tested to proactively identify bugs and ensure optimal performance. Testing frameworks should cover the validation of key functionality and the efficacy and accuracy of threat detection, alert generation, and contextualization of alerts to expedite incident response. ### \#8: Create Processes for Reviews and Updates Post-implementation, regular reviews of performance metrics and operational functions should be conducted to keep policies and rules updated and optimized. Performance should also be closely monitored, as this can degrade as data volumes grow over time. In addition, new or improved third-party threat intelligence should be used to improve the detection of security incidents. ## Cloud SIEM Challenges While Cloud SIEM offers numerous advantages, such as scalability and real-time threat detection, organizations might encounter a few challenges. However, proper planning and the right strategies can effectively manage these challenges. ### Data Security Concerns Organizations might worry about the [security of sensitive data](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security?ts=markdown) in the cloud. To address this, reputable Cloud SIEM providers implement robust encryption protocols and comply with stringent security standards to [protect data](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-data-protection?ts=markdown). ### Complexity of Integration Integrating Cloud SIEM with existing systems can be complex. Choosing a solution with comprehensive support and clear integration guidelines can simplify this process and ensure seamless deployment. ### Evolving Threat Landscape The ever-evolving threat landscape can pose challenges for Cloud SIEM solutions. However, leveraging [machine learning](https://www.paloaltonetworks.com/cyberpedia/machine-learning-ml?ts=markdown) and regular updates from threat intelligence feeds can keep the system ahead of emerging threats. ### Cost Management Some organizations may be concerned about initial deployment costs. Opting for a scalable, pay-as-you-go model helps manage costs effectively, ensuring that you only pay for the resources you use. Despite potential challenges, the continuous advancements in Cloud SIEM technology and adherence to industry best practices significantly mitigate these issues. While there are some initial hurdles, the long-term benefits of Cloud SIEM far outweigh these challenges. Organizations that adopt Cloud SIEM can enjoy enhanced security visibility, improved incident response times, and better compliance posture, ultimately leading to a more secure and resilient IT environment. ## Considerations of a Cloud Native SIEM Solution When implementing a cloud-native SIEM, consider these factors for success: * **Bandwidth:** Ensure your organization has enough bandwidth to handle the volume of logs and interfaces. * **Cost:** Understand initial pricing and future costs as data volume grows. * **Data control:** Assess the level of control over your data based on the deployment model. * **Network reliability:** Ensure stable and reliable network connectivity between data sources and the cloud SIEM. * **Regulatory and legal compliance:** Comply with various regulations and laws concerning sensitive data, including data sovereignty, protection, and [privacy](https://www.paloaltonetworks.com/cyberpedia/data-privacy?ts=markdown) rules. ## Cloud SIEM FAQs ### How is data protected with cloud SIEM? Cloud SIEM uses a number of security measures are used to protect data. Encryption methods and protocols protect data at rest (e.g., advanced encryption standard or AES) and in transit (e.g., transport layer security or TLS). Other important security controls for cloud SIEM include data loss protection (DLP) and identity and access management (IAM). ### How is data collected and delivered to cloud SIEM? Cloud SIEM solutions collect data from devices in several ways, including installing an agent on each device, directly connecting to devices using a network protocol or API call, accessing log files from storage, or using a streaming protocol (e.g., SNMP, Netflow, or IPFIX). ### What is the modern SIEM alternative to a cloud SIEM? CISOs and security teams are replacing traditional and cloud SIEM systems with extended security intelligence and automation management (XSIAM). This approach unifies and automates SIEM functionality and other SOC capabilities, allowing analysts to focus on tasks that require human intelligence. Key integrated functionalities delivered through XSIAM include traditional SIEM and cloud SIEM capabilities, [extended detection and response (XDR)](https://www.paloaltonetworks.com/cyberpedia/what-is-extended-detection-and-response-xdr?ts=markdown), endpoint protection, identity threat detection and response (ITDR), attack surface management (ASM), [security orchestration, automation, and response (SOAR)](https://www.paloaltonetworks.com/cyberpedia/what-is-soar?ts=markdown), cloud detection and response (CDR), and compliance management and reporting support. Related Content [What is SIEM Logging SIEM logging is at the heart of SIEM's capability - a crucial element that transforms raw data into meaningful insights, enhancing security measures and strategies.](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-logging?ts=markdown) [Cortex XSIAM Simplify security operations and accelerate incident remediation with a platform built to stop the threats of today --- and the threats of the future.](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) [XSIAM Infographic Cortex XSIAM is the only security operations solution you need, consolidating all of your data and tools into a single AI-driven platform.](https://www.paloaltonetworks.com/resources/infographics/xsiam-infographic?ts=markdown) [Adapt or Die: XDR Is on a Collision Course with SIEM and SOAR This report provides a deep dive into the XDR landscape, distinguishes between security analytics platforms, SIEM and SOAR.](https://www.paloaltonetworks.com/resources/research/xdr-is-on-a-collision-with-siem-and-soar?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20is%20Cloud%20SIEM%3F&body=Learn%20how%20cloud%20SIEM%20solutions%20interact%20with%20cloud%20environments%20and%20SaaS%20applications%20to%20provide%20better%20security%20than%20traditional%20on-premises%20systems.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-cloud-siem) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/role-of-artificial-intelligence-ai-and-machine-learning-ml-in-siem?ts=markdown) What Is the Role of AI and ML in Modern SIEM Solutions? [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software?ts=markdown) What Is Security Information Event Management (SIEM) Software? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language