[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [ASPM](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management?ts=markdown) 4. [What Is Code Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security?ts=markdown) Table of Contents * [What Is Application Security Posture Management (ASPM)?](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management?ts=markdown) * [Application Security Posture Management (ASPM) Explained](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#application?ts=markdown) * [Why Is ASPM Important?](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#why?ts=markdown) * [The Role of ASPM in Cyber Defense](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#role?ts=markdown) * [ASPM: Business Value](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#aspm?ts=markdown) * [Comparing ASPM with Other Security Technologies](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#security?ts=markdown) * [How ASPM Works](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#works?ts=markdown) * [ASPM Use Cases](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#cases?ts=markdown) * [Top Considerations When Choosing an ASPM Solution](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#considerations?ts=markdown) * [ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#faqs?ts=markdown) * [How DSPM Is Evolving: Key Trends to Watch](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends?ts=markdown) * [From Static Discovery to Dynamic Intelligence](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#static?ts=markdown) * [The Convergence of DSPM with Cloud-Native Security Architectures](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#native?ts=markdown) * [Real-Time Data Detection and Response](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#response?ts=markdown) * [AI Security and Generative AI Data Protection](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#protection?ts=markdown) * [Automation, Policy-as-Code, and DevSecOps Integration](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#automation?ts=markdown) * [DSPM Key Trends FAQs](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#faq?ts=markdown) * [Interactive Application Testing \& ASPM: Closing DevSec Gaps](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps?ts=markdown) * [Modern Application Security Testing Architecture](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#modern?ts=markdown) * [Application Security Posture Management Fundamentals](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#application?ts=markdown) * [Technical Integration Mechanisms](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#technical?ts=markdown) * [Enhanced Detection and False Positive Reduction](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#enhanced?ts=markdown) * [Pre-Production Testing and Developer Feedback Loops](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#loops?ts=markdown) * [IAST and ASPM Integration FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#faqs?ts=markdown) * [Buy or Build: Calculating ASPM ROI for Your Organization](https://www.paloaltonetworks.com/cyberpedia/aspm-roi?ts=markdown) * [ASPM Platform Requirements and Strategic Context](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#aspm?ts=markdown) * [Build Vs. Buy Decision Framework](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#vs?ts=markdown) * [ROI Calculation Models and Financial Analysis](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#roi?ts=markdown) * [Implementation Scenarios and Trade-Off Analysis](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#analysis?ts=markdown) * [Long-Term Scalability and Strategic Considerations](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#considerations?ts=markdown) * [ASPM ROI FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#faqs?ts=markdown) * [Overcoming AppSec Chaos: 7 Modes of ASPM Adoption](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes?ts=markdown) * [Why ASPM Is Critical for Cloud-First Enterprises](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes#why?ts=markdown) * [ASPM Maturity Assessment and Organizational Readiness](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes#aspm?ts=markdown) * [7 Paths to ASPM Adoption](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes#adoption?ts=markdown) * [Operating Models and Sustained ASPM Maturity](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes#operating?ts=markdown) * [ASPM Adoption FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes#faqs?ts=markdown) * [ASPM: The Evolution Beyond ASOC](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc?ts=markdown) * [ASPM Vs. ASOC Market Evolution and Convergence Dynamics](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#aspm?ts=markdown) * [ASPM Core Features and Advantages Vs. ASOC Orchestration Capabilities](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#capabilities?ts=markdown) * [ASOC Vs. ASPM Disadvantages and Implementation Challenges](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#challenges?ts=markdown) * [ASPM Vs. ASOC Cost Analysis and Strategic Investment Planning](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#planning?ts=markdown) * [ASOC Vs. ASPM Selection Framework](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#framework?ts=markdown) * [ASPM and ASOC FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#faqs?ts=markdown) * [Top Cloud Data Security Solutions](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions?ts=markdown) * [The Modern Cloud Data Security Landscape](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#modern?ts=markdown) * [The Anatomy of Modern Cloud Security](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#cloud?ts=markdown) * [Evaluating Data Protection Platforms for Enterprise Deployment](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#data?ts=markdown) * [Leading Cloud Data Security Solutions and Market Positioning](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#security?ts=markdown) * [Strategic Implementation and Platform Selection](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#platform?ts=markdown) * [Top Cloud Data Security Solutions FAQs](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#faq?ts=markdown) * [Selecting Your ASPM Solution: Metrics That Matter](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics?ts=markdown) * [Why Opt for an ASPM solution?](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics#solution?ts=markdown) * [Not All ASPM Solutions Are Created Equal](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics#equal?ts=markdown) * [Must Have ASPM Components](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics#components?ts=markdown) * [Real World Evaluation Requirements](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics#evaluation?ts=markdown) * [Selecting ASPM Platform FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics#faq?ts=markdown) * [ASPM in Action: 8 Real‑World Use Cases](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases?ts=markdown) * [ASPM Explained](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases#explained?ts=markdown) * [ASPM Use Cases](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases#cases?ts=markdown) * [Enhancing Cloud Security with ASPM](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases#security?ts=markdown) * [The Business Value of ASPM](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases#value?ts=markdown) * [ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases#faq?ts=markdown) * [State of ASPM 2025: Key Trends \& Emerging Threats](https://www.paloaltonetworks.com/cyberpedia/aspm-trends?ts=markdown) * [ASPM Market Evolution and Adoption Trajectory](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#aspm?ts=markdown) * [AI-Native ASPM and Machine Learning Integration](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#integration?ts=markdown) * [Cloud-Native Security Challenges and Container Orchestration Threats](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#threats?ts=markdown) * [Software Supply Chain Vulnerabilities and SBOM Evolution](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#software?ts=markdown) * [DevSecOps Integration and Future ASPM Architecture](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#devsecops?ts=markdown) * [ASPM Key Trends \& Threats FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#faqs?ts=markdown) * [Application Security Best Practices You Can't Skip in ASPM](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices?ts=markdown) * [ASPM Architecture: From Tool Sprawl to Unified Intelligence](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#aspm?ts=markdown) * [Advanced Risk Correlation and Contextual Prioritization Systems](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#advanced?ts=markdown) * [Policy-Driven Security Automation and Enforcement Architecture](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#policy?ts=markdown) * [Seamless DevOps Integration and Cloud-Native Security Orchestration](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#seamless?ts=markdown) * [Enterprise Scalability, Performance Engineering, and Compliance Automation](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#enterprise?ts=markdown) * [Application Security In ASPM Best Practices FAQs](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#faqs?ts=markdown) * [How Supply Chain Threats Are Shaping ASPM Today](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats?ts=markdown) * [The Supply Chain Attack Surface in Modern ASPM](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#aspm?ts=markdown) * [Critical Supply Chain Vectors Driving ASPM Evolution](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#critical?ts=markdown) * [Software Supply Chain Risk Assessment and Prioritization](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#software?ts=markdown) * [Architectural Shifts in ASPM for Supply Chain Defense](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#defense?ts=markdown) * [Operationalizing Supply Chain Security Within ASPM Programs](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#programs?ts=markdown) * [Supply Chain Threats Are Shaping ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#faqs?ts=markdown) * [How ASPM Strengthens Your Cloud Ecosystem](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem?ts=markdown) * [ASPM's Role in Unified Cloud Security Architecture](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#architecture?ts=markdown) * [Integration Points Across the Cloud Security Stack](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#integration?ts=markdown) * [Risk Intelligence and Contextual Prioritization in Cloud Environments](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#risk?ts=markdown) * [Operational Efficiency Through Automated Cloud Security Workflows](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#workflows?ts=markdown) * [Strategic Advantages for Cloud-First Organizations](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#strategic?ts=markdown) * [ASPM Strengthening the Entire Cloud Ecosystem FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#faqs?ts=markdown) * [Developer Infrastructure Posture: Integrating ASPM Early](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture?ts=markdown) * [Understanding Developer Infrastructure Posture](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#understanding?ts=markdown) * [ASPM Fundamentals: Beyond Traditional Application Security](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#aspm?ts=markdown) * [Early Integration Strategies: Embedding ASPM in Developer Workflows](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#early?ts=markdown) * [ASPM Compliance Framework Integration](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#integration?ts=markdown) * [Risk Prioritization and Remediation at Scale](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#risk?ts=markdown) * [Developer Infrastructure Posture Management and ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#faqs?ts=markdown) * [Amplify ASPM with RBVM Risk‑Based Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability?ts=markdown) * [ASPM and RBVM Technical Convergence](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#aspm?ts=markdown) * [Enhanced API Security Through Contextual Intelligence](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#enhanced?ts=markdown) * [Runtime and Version Monitoring Convergence](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#runtime?ts=markdown) * [Build and Deploy Phase Security Amplification](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#build?ts=markdown) * [Operational Excellence and Measurable Outcomes](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#outcomes?ts=markdown) * [ASPM and RBVM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#faqs?ts=markdown) * [CNAPP and ASPM Collaboration, Not Collision](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp?ts=markdown) * [ASPM Overview](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#aspm?ts=markdown) * [The Emergence of CNAPP](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#emergence?ts=markdown) * [ASPM Vs. CNAPP: The Main Differences](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#vs?ts=markdown) * [CNAPP and ASPM: The Synergies](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#synergies?ts=markdown) * [Integrating and Coordinating Complementary Capabilities](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#integrating?ts=markdown) * [CNAPP and ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#faqs?ts=markdown) * [CSPM Vs ASPM: Where Your Focus Belongs](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm?ts=markdown) * [Core Security Foundations: A Look at CSPM and ASPM](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm#core?ts=markdown) * [Security Layer Distinctions: Infrastructure Vs. Application Focus](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm#security?ts=markdown) * [Strategic Technology Assessment: Benefits and Constraints of Each Approach](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm#strategic?ts=markdown) * [Deployment Scenarios and Implementation Strategies](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm#deployment?ts=markdown) * [CSPM and ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm#faqs?ts=markdown) * [Why You Need Static Analysis, Dynamic Analysis, and Machine Learning?](https://www.paloaltonetworks.com/cyberpedia/why-you-need-static-analysis-dynamic-analysis-machine-learning?ts=markdown) * [What Is a Software Bill of Materials (SBOM)?](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom?ts=markdown) * [Software Bill of Materials Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#sbom-explained?ts=markdown) * [Who Should Have a SBOM](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#who?ts=markdown) * [The Role of SBOMs in Cybersecurity and Compliance](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#role-of-sboms?ts=markdown) * [Why Is an SBOM Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#why-is-an-sbom-important?ts=markdown) * [Software Composition Analysis and SBOMs](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#sca-and-sboms?ts=markdown) * [How Does an SBOM Help Prevent Open-Source Supply Chain Attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#how?ts=markdown) * [SBOM Formats](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#sbom-formats?ts=markdown) * [Software Bill of Materials Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#sbom-best-practices?ts=markdown) * [SBOM FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#faq?ts=markdown) * [What Is Policy-as-Code?](https://www.paloaltonetworks.com/cyberpedia/what-is-policy-as-code?ts=markdown) * [Defining Policy-As-Code](https://www.paloaltonetworks.com/cyberpedia/what-is-policy-as-code#defining?ts=markdown) * [Policy-as-Code vs. Infrastructure as Code](https://www.paloaltonetworks.com/cyberpedia/what-is-policy-as-code#policy?ts=markdown) * [Benefits of Policy-as-Code](https://www.paloaltonetworks.com/cyberpedia/what-is-policy-as-code#benefits?ts=markdown) * [How to Use Policy-As-Code](https://www.paloaltonetworks.com/cyberpedia/what-is-policy-as-code#how?ts=markdown) * [What Is Static Application Security Testing (SAST)?](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing?ts=markdown) * [Why Is SAST Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#why?ts=markdown) * [SAST Vs. DAST](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#vs?ts=markdown) * [Software Composition Analysis and SAST](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#composition?ts=markdown) * [SAST Tools](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#tools?ts=markdown) * [Industry Guidelines](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#guidelines?ts=markdown) * [The Future of SAST](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#future?ts=markdown) * [Static Application Security Testing FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#faq?ts=markdown) * What Is Code Security? * [IaC Security](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#iac?ts=markdown) * [Application Code Security](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#application?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#software?ts=markdown) * [Code Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#faqs?ts=markdown) * [What Is Software Composition Analysis (SCA)?](https://www.paloaltonetworks.com/cyberpedia/what-is-sca?ts=markdown) * [What Is Software Composition Analysis?](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#what?ts=markdown) * [What Are the Risks of Using Open Source Components?](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#components?ts=markdown) * [Software Composition Analysis Identifies Risks in Open Source Packages](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#software?ts=markdown) * [How to Use SCA in the Development Processes](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#processes?ts=markdown) * [The Benefits of Software Composition Analysis](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#analysis?ts=markdown) * [What is Infrastructure-as-Code Security](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security?ts=markdown) * [How IaC Security Works](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security#how?ts=markdown) * [Why is IaC Security Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security#why?ts=markdown) * [What is IaC?](https://www.paloaltonetworks.com/cyberpedia/what-is-iac?ts=markdown) * [Benefits of IaC](https://www.paloaltonetworks.com/cyberpedia/what-is-iac#benefits?ts=markdown) * [Challenges of IaC](https://www.paloaltonetworks.com/cyberpedia/what-is-iac#challenges?ts=markdown) * [Infrastructure as Code FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-iac#faqs?ts=markdown) * [What Is Secrets Management?](https://www.paloaltonetworks.com/cyberpedia/secrets-management?ts=markdown) * [Secrets Management Explained](https://www.paloaltonetworks.com/cyberpedia/secrets-management#secrets?ts=markdown) * [Why Is Secrets Management Important?](https://www.paloaltonetworks.com/cyberpedia/secrets-management#why?ts=markdown) * [Secrets Management Across the Enterprise](https://www.paloaltonetworks.com/cyberpedia/secrets-management#enterprise?ts=markdown) * [Secrets Management in DevOps Environments](https://www.paloaltonetworks.com/cyberpedia/secrets-management#devops?ts=markdown) * [Challenges of Secrets Management](https://www.paloaltonetworks.com/cyberpedia/secrets-management#challenges?ts=markdown) * [Secrets Management Best Practices](https://www.paloaltonetworks.com/cyberpedia/secrets-management#best?ts=markdown) * [A Comprehensive and Automated Solution](https://www.paloaltonetworks.com/cyberpedia/secrets-management#solution?ts=markdown) * [Secrets Management FAQs](https://www.paloaltonetworks.com/cyberpedia/secrets-management#faqs?ts=markdown) * [What Is Infrastructure as Code (IaC) Supply Chain Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security?ts=markdown) * [What Is GitOps? Understanding the 'DevOps' of Infrastructure Management](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security#what?ts=markdown) * [The 4 Stages for Securing Your IaC Supply Chain](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security#the?ts=markdown) * [Best Practices for Securing Your IaC Pipeline](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security#best?ts=markdown) * [Embrace Change: Automating Your Organization's Infrastructure](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security#embrace?ts=markdown) * [IaC Supply Chain Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security#faqs?ts=markdown) * [ASPM Tools: Evaluation Criteria and How to Select the Best Option](https://www.paloaltonetworks.com/cyberpedia/aspm-tools?ts=markdown) * [The Need for Application Security Posture Management Solutions](https://www.paloaltonetworks.com/cyberpedia/aspm-tools#solutions?ts=markdown) * [The Key Components of ASPM Tools](https://www.paloaltonetworks.com/cyberpedia/aspm-tools#key?ts=markdown) * [How to Select and Evaluate the Right ASPM Solution](https://www.paloaltonetworks.com/cyberpedia/aspm-tools#how?ts=markdown) * [Common Challenges Implementing ASPM](https://www.paloaltonetworks.com/cyberpedia/aspm-tools#challenges?ts=markdown) * [ASPM Tools FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-tools#faqs?ts=markdown) # What Is Code Security? 3 min. read [AppSec's New Horizon: A Virtual Event](https://start.paloaltonetworks.com/appsecs-new-horizon-virtual-event.html) Table of Contents * * [IaC Security](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#iac?ts=markdown) * [Application Code Security](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#application?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#software?ts=markdown) * [Code Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#faqs?ts=markdown) 1. IaC Security * * [IaC Security](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#iac?ts=markdown) * [Application Code Security](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#application?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#software?ts=markdown) * [Code Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#faqs?ts=markdown) Code security refers to embedding security into code. Unlike traditional [cloud security posture management](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management?ts=markdown) and [cloud workload](https://www.paloaltonetworks.com/cyberpedia/what-is-workload?ts=markdown) protection solutions, cloud code security focuses on code with several use cases, including infrastructure as code (IaC) security, application code security and software supply chain security. [Cloud-native technologies](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native?ts=markdown), such as IaC and containers, combine application and infrastructure development principles, allowing for greater flexibility, scalability and usability. These technologies have not only changed the way we build the cloud but also how we secure it. ## IaC Security [Infrastructure as code](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security?ts=markdown) is a modern technology and process in which infrastructure is provisioned and managed using machine-readable code files. Frameworks such as Terraform and CloudFormation allow teams to write declarative or imperative code files, check those files into their version control system and [CI/CD pipeline](https://www.paloaltonetworks.com/cyberpedia/what-is-the-ci-cd-pipeline-and-ci-cd-security?ts=markdown), and then spin up the cloud resources across environments. [IaC introduces new security considerations](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security?ts=markdown) that traditional approaches to security don't address. Traditional security typically monitors for cloud security issues, also known as misconfigurations, in runtime environments. With IaC, one misconfiguration in a code file can lead to thousands of misconfigurations and alerts across cloud environments. ![Figure 1: A secure IaC template through to deploy and runtime phases of the development lifecycle](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/figure-1.png) Figure 1: A secure IaC template through to deploy and runtime phases of the development lifecycle Code security solves this by surfacing security feedback earlier in the development lifecycle instead of taking a reactive approach. Addressing misconfigurations during the development and build phases allows for faster and cheaper remediations -- before deployment. This reduces noisy alerts that security teams have to triage and cuts down on the time engineering spends addressing issues ad hoc. The key to a successful code security strategy for IaC is ensuring security is embedded directly in developer tools and workflows. By surfacing actionable feedback in code and embedding security guardrails in the build pipeline, IaC security empowers developers to ship infrastructure that's secure by default. ## Application Code Security Code security for applications focuses on identifying known vulnerabilities in source code, dependencies and open source packages. Vulnerabilities, specifically Common Vulnerabilities and Exposures (CVEs), can introduce security risks across an application's development stages, but code security focuses on the application code itself. A strong code security strategy relies on secure coding best practices and code reviews to identify vulnerabilities. Through automated testing with technologies such as static application security testing (SAST) for custom code and [software composition analysis (SCA)](https://www.paloaltonetworks.com/cyberpedia/what-is-sca?ts=markdown) for open source code, code security solutions complement [cloud workload protection](https://www.paloaltonetworks.com/cyberpedia/what-is-cwpp-cloud-workload-protection-platform?ts=markdown) by identifying CVEs as early as possible. Again, the key to a strong code security strategy for applications is to provide actionable vulnerability findings to the people with the most context and knowledge about the code: developers. This is achieved through developer integrations and granular controls for how compliant versions can be bumped. The other key to a cohesive code security strategy is context and visibility between infrastructure misconfigurations and application vulnerabilities. The lines between infrastructure and applications are blurred within cloud-native applications. Infrastructure is the foundation on which applications run and thus are inextricably linked. The same goes for security. Having visibility into both the infrastructure and application layers of cloud-native applications improves teams' ability to prioritize and address security issues based on their real-world exploitability. Improved visibility also enables teams to more quickly patch identified vulnerabilities, revoke overly permissive access, and lock down the relevant virtual machines (VMs) to minimize an attack's blast radius. ## Software Supply Chain Security Software supply chains comprise application and infrastructure components as well as the underlying pipelines, including version control systems (VCS), continuous integration and continuous deployment (CI/CD) pipelines, and registries. And a cloud-native application is only as secure as its weakest link. So that's why securing those delivery pipelines is also an essential part of code security. If a VCS isn't securely configured, attackers may be able to merge malicious code or get access to exposed secrets that could lead to a larger attack. And if CI/CD pipelines are compromised, attackers can gain access to exposed credentials and tamper with code, which can result in downstream incidents. [Supply chain security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-software-supply-chain-security?ts=markdown) best practices focus on hardening pipelines and configuring access controls and branch protections to restrict access as much as possible. ![Figure 2: Secure components and pipelines within a software supply chain](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/figure-2.png) Figure 2: Secure components and pipelines within a software supply chain Software supply chain security is an important part of a strong code security strategy, as is understanding the connections between pipelines and infrastructure and application code across the development lifecycle. By increasing visibility across software supply chains, code security solutions enable teams to fully take advantage of all the benefits of cloud-native technologies and secure their infrastructure from code to cloud. ## Code Security FAQs ### What is interactive application security testing (IAST)? Interactive application security testing (IAST) assesses applications from the inside during runtime, combining the benefits of SAST and DAST by analyzing code for vulnerabilities while it is being executed. IAST tools are integrated into the application environment, providing continuous feedback to developers as they code, enabling immediate identification and remediation of security issues. ### What is static application security testing (SAST)? [Static application security testing (SAST)](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing?ts=markdown) examines source code for potential security vulnerabilities without executing the program. It's performed early in the development lifecycle, enabling developers to identify and remediate security flaws during coding. SAST tools analyze code against a set of predefined rules to detect issues like input validation errors, insecure dependencies, and other common vulnerabilities. ### What is dynamic application security testing (DAST)? Dynamic application security testing (DAST) assesses applications during runtime, simulating external attacks to identify vulnerabilities. Unlike SAST, DAST evaluates the application from an outsider's perspective, checking for issues like SQL injection, cross-site scripting, and other flaws exploitable without access to source code. DAST provides insights into real-world attack scenarios and the application's behavior in production. ### What is software composition analysis (SCA)? [Software composition analysis (SCA)](https://www.paloaltonetworks.com/cyberpedia/what-is-sca?ts=markdown) tools audit codebases for open-source components and their dependencies to identify known security vulnerabilities, licensing issues, and outdated libraries. SCA automates the process of tracking third-party software used in development, crucial for maintaining the security integrity of applications and adhering to compliance standards. ### How is access control implemented in code security? Access control in code security is implemented through authentication mechanisms, ensuring only authorized users can access specific functions or data. Developers write code to define and enforce access policies, often using role-based or attribute-based access control models. They also employ techniques like multi-factor authentication and least privilege principles to minimize the risk of unauthorized access. ### What is code obfuscation? Code obfuscation transforms readable code into a form that is challenging to understand and reverse-engineer. It is used to protect intellectual property and prevent tampering or theft of code. Through techniques like renaming, control flow alteration, and encryption, obfuscation makes it difficult for attackers to analyze the code and exploit potential vulnerabilities. ### What is the purpose of code review? The purpose of code review is to examine written code by developers other than the author to identify errors, improve quality, and ensure adherence to coding standards. Reviews are conducted manually or with automated tools, fostering knowledge sharing and catching security vulnerabilities or bugs before they are deployed. ### What are secure coding practices? Secure coding practices are guidelines and techniques developers follow to write code that is robust against vulnerabilities. Practices include input validation, output encoding, using prepared statements in SQL queries, and handling errors securely. Adhering to secure coding standards helps protect against common threats like injection attacks, cross-site scripting, and data breaches. ### What is involved in dependency checking? Dependency checking involves analyzing a project's libraries and components to identify outdated or vulnerable versions that may pose security risks. Automated tools scan through dependencies declared in project files, comparing them against databases of known vulnerabilities. Developers are alerted to update or replace insecure components, thereby mitigating potential attack vectors. ### What is penetration testing? Penetration testing is a simulated cyber attack against a system to check for exploitable vulnerabilities. Security professionals, known as ethical hackers, use manual or automated techniques to probe networks, applications, and other systems, attempting to breach security defenses. The findings help organizations understand their security posture and prioritize remediation efforts. ### What is the purpose of code signing? Code signing verifies the authenticity of software by allowing developers to sign their code digitally. It uses cryptographic techniques to assure end users that the code has not been tampered with and is from a trusted source. This process is vital for maintaining the integrity of distributed software and is especially important for preventing the spread of malware. ### What is Security Assertions Markup Language (SAML)? Security Assertions Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties, specifically between an identity provider and a service provider. It enables single sign-on (SSO), allowing users to log in once and access multiple applications securely without re-authenticating. SAML simplifies cross-domain web-based applications by using XML-based identity assertions to communicate user credentials. ### What is OAuth and how is it used in code security? OAuth is an open standard for access delegation commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords. In code security, OAuth allows for secure designated access, providing tokens instead of user credentials to authorize access to specific resources for third-party services without exposing user passwords. ### What is the Open Web Application Security Project (OWASP)? The Open Web Application Security Project (OWASP) is a nonprofit foundation working to improve the security of software. It provides impartial, practical, actionable information and tools to enhance software security. OWASP is well-known for its top ten list of the most critical web application security risks, which is widely regarded as the standard guideline for web application security. ### Why is container security important? Container security is crucial because containers, by design, share the host system's kernel and, if not properly isolated, can expose the host and other containers to risks. Strong container security practices protect the containerized applications and their runtime environment from unauthorized access and vulnerabilities, which is paramount as containers are increasingly used to package and deploy applications in cloud environments. ### What is threat modeling? Threat modeling identifies potential threats to a system and evaluates the risks they pose. It is a structured approach that guides security professionals in identifying and prioritizing potential threats and creating countermeasures to prevent or mitigate the effects of these threats. Threat modeling is an essential step in the design phase of a system's security architecture. ### How is encryption used in code security? Encryption is used in code security to protect sensitive data from unauthorized access or exposure. Developers implement encryption algorithms to encode data, rendering it unintelligible without the corresponding decryption key. This practice is vital in securing data both at rest and during transmission, ensuring that even if data is intercepted, it remains confidential and secure. ### What is authentication in the context of code security? In code security, authentication verifies the identity of users or entities before granting access to software systems. Developers implement authentication mechanisms such as passwords, tokens, or biometrics to ensure that only legitimate users can perform actions within an application. Effective authentication is a cornerstone of secure coding, preventing unauthorized access and protecting system integrity. ### How does authorization work in code security? Authorization in code security involves granting or denying rights to resources within an application based on an authenticated entity's permissions. After authentication, the system checks the user's privileges to determine access levels to files, data, and functionality. Developers enforce authorization through access control lists, role-based access control (RBAC), or attribute-based access control (ABAC), ensuring users can only interact with resources they're cleared to use. ### What does patch management entail? Patch management is the process of distributing and applying updates to software. These patches may include security fixes, new features, or improvements. Effective patch management involves regularly assessing systems for vulnerabilities, prioritizing patching based on risk, and ensuring timely application of patches across all affected systems. This practice is critical for mitigating the risk of security breaches and maintaining operational integrity. Related content [ASPM Buyer's GuideASPM Buyer's Guide Gain a comprehensive framework for evaluating and choosing an ASPM solution that shifts your AppSec strategy from reactive to proactive.](https://start.paloaltonetworks.com/application-security-posture-management-buyers-guide.html) [Accelerate Secure Development with Prevention-First Application Security Posture Management (ASPM) Learn how Cortex Cloud's ASPM centralizes and correlates findings from disparate security scanning tools with complete context across code, application infrastructure, and cloud ru...](https://www.paloaltonetworks.com/resources/datasheets/application-security-posture-management-solution-brief?ts=markdown) [Introducing Cortex Cloud ASPM Cortex Cloud ASPM gives security and engineering teams the control to prevent exploitable risk early and respond with full context across the software lifecycle.](https://www.paloaltonetworks.com/blog/cloud-security/introducing-aspm-cortex-cloud/) [AppSec's New Horizon Join this virtual event to get a practical, prevention-first blueprint --- backed by new Unit 42 research --- to modernize your AppSec strategy.](https://start.paloaltonetworks.com/appsecs-new-horizon-virtual-event.html) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Code%20Security%3F&body=Discover%20how%20to%20embed%20security%20into%20your%20code%20with%20Code%20Security%2C%20including%20protection%20for%20infrastructure%20as%20code%20%28IaC%29%2C%20application%20code%2C%20and%20supply%20chains.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-code-security) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing?ts=markdown) What Is Static Application Security Testing (SAST)? [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-sca?ts=markdown) What Is Software Composition Analysis (SCA)? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language