[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Network Security](https://www.paloaltonetworks.com/cyberpedia/network-security?ts=markdown) 3. [What Is Cyber-Physical Systems Security (CPSSEC)? | Overview](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-physical-systems-security-cpssec?ts=markdown) Table of contents * [What are examples of cyber-physical systems?](#examples-of-cpssec) * [What is the difference between a cyber-physical system and an Internet of Things (IoT) device?](#cpssec-iot) * [Why is cyber-physical system security important?](#cpssec-importance) * [What are the common cyber-physical system security challenges?](#cpssec-challenges) * [What to look for in a CPS protection platform](#cps-protection-platform) * [Cyber-physical systems security FAQs](#cpssec-faqs) # What Is Cyber-Physical Systems Security (CPSSEC)? | Overview 9 min. read Table of contents * [What are examples of cyber-physical systems?](#examples-of-cpssec) * [What is the difference between a cyber-physical system and an Internet of Things (IoT) device?](#cpssec-iot) * [Why is cyber-physical system security important?](#cpssec-importance) * [What are the common cyber-physical system security challenges?](#cpssec-challenges) * [What to look for in a CPS protection platform](#cps-protection-platform) * [Cyber-physical systems security FAQs](#cpssec-faqs) 1. What are examples of cyber-physical systems? * [1. What are examples of cyber-physical systems?](#examples-of-cpssec) * [2. What is the difference between a cyber-physical system and an Internet of Things (IoT) device?](#cpssec-iot) * [3. Why is cyber-physical system security important?](#cpssec-importance) * [4. What are the common cyber-physical system security challenges?](#cpssec-challenges) * [5. What to look for in a CPS protection platform](#cps-protection-platform) * [6. Cyber-physical systems security FAQs](#cpssec-faqs) Cyber-physical systems security (CPSSEC) involves protecting the integration of computational algorithms with physical processes in systems that monitor, control, and optimize real-world activities. CPS security secures the devices and networks that link physical systems with computing resources, addressing risks that could compromise operations or cause physical damage. CPSSEC is necessary for ensuring the reliability and security of cyber-physical systems. ## What are examples of cyber-physical systems? Cyber-physical systems (CPS) are integrated systems that combine computing, networking, and physical processes. They're used across various industries to improve efficiency, safety, and productivity. As CPSs continue to evolve, security is becoming exponentially important. Organizations have to be able to effectively protect critical infrastructure, prevent operational disruptions, and ensure safety. Let's take a look at some examples of CPS systems and their security implications, including: * Operational technology (OT) * Industrial Internet of Things (IIoT) * Industrial control systems (ICS) * Building management systems (BMS) * Smart grids * Smart buildings * Robotics * Smart transportation systems * Medical devices * Smart manufacturing ### Operational technology (OT) ![A graphic titled Operational technology featuring a visual layout of hexagons arranged in two rows, with elements of operational technology labeled inside each. From left to right, top row includes hexagons labeled Machinery, Monitoring, and Embedded Compute. The bottom row features hexagons labeled HMIs (Human Machine Interfaces), RTUs (Remote Terminal Units), and SCADA Software. Each hexagon is color-coded, alternating between red and yellow, to distinguish between the different components of operational technology systems.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/2023-ITvOT_2-Operational.png "A graphic titled Operational technology featuring a visual layout of hexagons arranged in two rows, with elements of operational technology labeled inside each. From left to right, top row includes hexagons labeled Machinery, Monitoring, and Embedded Compute. The bottom row features hexagons labeled HMIs (Human Machine Interfaces), RTUs (Remote Terminal Units), and SCADA Software. Each hexagon is color-coded, alternating between red and yellow, to distinguish between the different components of operational technology systems.") Operational technology refers to hardware and software systems that monitor and control physical devices and processes in industries like manufacturing and power generation, for instance. OT systems help manage critical infrastructure such as power plants and transportation systems. [Securing OT](https://www.paloaltonetworks.com/cyberpedia/what-is-ot-security) is crucial because vulnerabilities can lead to disruptions in essential services, including safety hazards and potential damage to physical assets. ### Industrial Internet of Things (IIoT) ![Graphical diagram illustrating the Industrial Internet of Things (IIoT) with various connected sectors. Around the central Industrial Internet of Things (IIoT) circle, there are icons representing robotics, industrial, smart car, smart city, factory/manufacturing, smart grid, smart power/utilities, and smart communications. Each sector is connected to the central hub, highlighting the different applications of IIoT.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/Cyber-physical-systems-2025_1-Industrial.png "Graphical diagram illustrating the Industrial Internet of Things (IIoT) with various connected sectors. Around the central Industrial Internet of Things (IIoT) circle, there are icons representing robotics, industrial, smart car, smart city, factory/manufacturing, smart grid, smart power/utilities, and smart communications. Each sector is connected to the central hub, highlighting the different applications of IIoT.") IIoT involves a network of interconnected devices designed to enhance industrial operations through real-time data collection and automation. These systems improve productivity and safety in sectors like manufacturing and logistics. However: The vast number of connected devices increases the attack surface, making cybersecurity essential to protect sensitive industrial data **and** prevent unauthorized access to control systems. ### Industrial control systems (ICS) ![Architecture diagram illustrating a complex industrial control system architecture, featuring multiple levels of integration and security layers. At the top, connected via Ethernet, are the engineering, administration, and accounting departments, each secured by firewalls. The Internet connection is protected by a VPN/firewall setup. Below this level, a database is also secured by a firewall. In the central section, various components like an application server, operations HMI, printer, and other servers are connected via Ethernet and include a VPN/firewall for additional security. This area links to a DCS process manager through a proprietary network, with connections to field I/O components for digital and analog control and monitoring. At the bottom, auxiliary PLC systems handle tasks like ship loading/unloading, catalyst loading, vibration monitoring, tank monitoring/control, and a safety system for emergency shutdown and area monitoring.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/ICS-2024_13_1.png) ICSs are used to monitor and control industrial processes in sectors like energy and manufacturing. These systems are crucial for the safe and efficient operation of industrial facilities. The [security of ICS](https://www.paloaltonetworks.com/cyberpedia/what-is-ics-security) is especially vital because cyberattacks can result in physical damage, operational disruption, or even endanger human lives. ![The diagram illustrates the role of industrial control systems (ICS) in supporting critical infrastructure. It is divided into three sections, with ICS represented in the center by a computer and server icon, branching into two categories: critical infrastructure and process automation systems. On the left, the critical infrastructure category includes power grids, water management, transportation, and natural gas, each represented by corresponding icons such as transmission towers, water tanks, vehicles, and a gas facility. On the right, the process automation system category connects to nuclear power plants, oil refineries, and steel mills, depicted with icons of industrial facilities.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/ICS-2025_Role_1.png "The diagram illustrates the role of industrial control systems (ICS) in supporting critical infrastructure. It is divided into three sections, with ICS represented in the center by a computer and server icon, branching into two categories: critical infrastructure and process automation systems. On the left, the critical infrastructure category includes power grids, water management, transportation, and natural gas, each represented by corresponding icons such as transmission towers, water tanks, vehicles, and a gas facility. On the right, the process automation system category connects to nuclear power plants, oil refineries, and steel mills, depicted with icons of industrial facilities.") ### Smart buildings ![Graphical diagram of a smart building with various systems and sensors. The building is surrounded by icons representing solar tracking, tank levels, elevator monitoring, temperature sensors, bin sensors, pest control, soil sensors, electric meters, water meters, smart restrooms, occupancy monitoring, security sensors, light sensors, and parking sensors. These systems are connected to the building, indicating various technologies used in smart buildings.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/Cyber-physical-systems-2025_12.png "Graphical diagram of a smart building with various systems and sensors. The building is surrounded by icons representing solar tracking, tank levels, elevator monitoring, temperature sensors, bin sensors, pest control, soil sensors, electric meters, water meters, smart restrooms, occupancy monitoring, security sensors, light sensors, and parking sensors. These systems are connected to the building, indicating various technologies used in smart buildings.") Smart buildings integrate various sensors and control systems to optimize energy usage, security, and comfort. By monitoring and controlling lighting, HVAC, and other systems, these buildings offer sustainable living environments. Securing smart buildings focuses on making sure that the systems remain functional and that unauthorized users can't interfere with critical building functions. ### Building management systems (BMS) ![Graphical diagram of a building management system (BMS) with various connected systems. The building includes icons representing HVAC maintenance services, fire detection and alarm, environmental control, security and access control, digital video, intrusion detection, lighting control and retrofit, mechanical maintenance, asset locator, smoke control, water management, energy supply and load management, energy information management, indoor air quality services, and enterprise systems integration. These systems are arranged around the building to illustrate the different components of a BMS.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/Cyber-physical-systems-2025_13.png) BMSs are systems used to monitor and control various building operations, including HVAC, lighting, and security. They improve energy efficiency and comfort within a building. Since BMSs connect to physical infrastructure, they're vulnerable to cyber threats that could compromise both building operations and the safety of its occupants. ### Smart grids ![Diagram of a smart grid with various connected sectors. Around the central Smart Grid circle, there are icons representing factories, homes, cities and offices, ecological vehicles, nuclear power plants, hydraulic power generation, photovoltaic, and wind generators. These sectors are connected to the central hub, illustrating the integration of diverse energy sources and systems within a smart grid](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/Cyber-physical-systems-2025_2.png "Diagram of a smart grid with various connected sectors. Around the central Smart Grid circle, there are icons representing factories, homes, cities and offices, ecological vehicles, nuclear power plants, hydraulic power generation, photovoltaic, and wind generators. These sectors are connected to the central hub, illustrating the integration of diverse energy sources and systems within a smart grid") Smart grids use information technology to enhance electrical power distribution management. They offer real-time monitoring and automated decision-making. Which makes energy distribution more efficient and reliable. Protecting smart grids is critical---cyberattacks can lead to widespread power outages or manipulation of energy flow, affecting entire regions. ### Robotics ![Diagram illustrating different types of robots. The central title Types of Robots connects icons representing various robot categories: Androids, which resemble humans and are often mobile Telepresence, which simulates physical presence; Swarm, involving insect robots working in fleets under a single controller Industrial, which are complex and remotely controlled; Smart, which feature built-in AI that learns from the environment and experiences and Autonomous, which make decisions based on sensor input. Each category is linked with circular icons to represent its function.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/Cyber-physical-systems-2025_3.png "Diagram illustrating different types of robots. The central title Types of Robots connects icons representing various robot categories: Androids, which resemble humans and are often mobile Telepresence, which simulates physical presence; Swarm, involving insect robots working in fleets under a single controller Industrial, which are complex and remotely controlled; Smart, which feature built-in AI that learns from the environment and experiences and Autonomous, which make decisions based on sensor input. Each category is linked with circular icons to represent its function.") Robotics involves using automated machines to perform tasks, often in manufacturing and healthcare. These CPSs provide precision, improve safety, and increase productivity. Securing robots is essential to prevent manipulation because it can compromise operations or cause safety risks to workers or patients. ### Smart transportation systems ![Diagram of a smart transportation system. It includes icons representing different components: a mobile network, a global positioning system (GPS), and IoT cloud infrastructure. Below, the system branches into vehicle-to-infrastructure, vehicle-to-sensor, vehicle-to-vehicle, and vehicle-to-pedestrian communication, with corresponding icons for each connection type, such as traffic lights, vehicles, and pedestrians.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/Cyber-physical-systems-2025_4.png "Diagram of a smart transportation system. It includes icons representing different components: a mobile network, a global positioning system (GPS), and IoT cloud infrastructure. Below, the system branches into vehicle-to-infrastructure, vehicle-to-sensor, vehicle-to-vehicle, and vehicle-to-pedestrian communication, with corresponding icons for each connection type, such as traffic lights, vehicles, and pedestrians.") Smart transportation systems improve the efficiency and safety of transportation networks through CPS. They include autonomous vehicles, real-time traffic monitoring, and optimized route planning. Smart transportation systems rely heavily on accurate data and secure communication. And that makes cybersecurity a top priority to prevent malicious interference with traffic flow or vehicle operations. ### Medical devices ![Diagram of medical devices and their connections to various elements. At the center, Medical Devices is connected to several components physiological monitoring parameters, such as blood pressure monitoring and ECG sensors connectivity elements, like servers and network devices in-hospital facilities, including MRI and surgical robots; ambient devices like robotic prosthetics; and medical attention devices, such as infusion pumps and pacemakers. Lines connect each element to illustrate the interactions and systems involved.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/Cyber-physical-systems-2025_5.png "Diagram of medical devices and their connections to various elements. At the center, Medical Devices is connected to several components physiological monitoring parameters, such as blood pressure monitoring and ECG sensors connectivity elements, like servers and network devices in-hospital facilities, including MRI and surgical robots; ambient devices like robotic prosthetics; and medical attention devices, such as infusion pumps and pacemakers. Lines connect each element to illustrate the interactions and systems involved.") Medical devices, like pacemakers or infusion pumps, use CPSs to monitor and adjust patient health in real time. These devices help improve patient outcomes by providing continuous monitoring and delivering care when needed. Cybersecurity is critical in medical devices to protect patient safety and ensure devices operate as intended without interference from external threats. ### Smart manufacturing ![Diagram of medical devices and their connections to various elements. At the center, Medical Devices is connected to several components: physiological monitoring parameters, such as blood pressure monitoring and ECG sensors; connectivity elements, like servers and network devices; in-hospital facilities, including MRI and surgical robots; ambient devices like robotic prosthetics; and medical attention devices, such as infusion pumps and pacemakers. Lines connect each element to illustrate the interactions and systems involved.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/Cyber-physical-systems-2025_6.png "Diagram of medical devices and their connections to various elements. At the center, Medical Devices is connected to several components: physiological monitoring parameters, such as blood pressure monitoring and ECG sensors; connectivity elements, like servers and network devices; in-hospital facilities, including MRI and surgical robots; ambient devices like robotic prosthetics; and medical attention devices, such as infusion pumps and pacemakers. Lines connect each element to illustrate the interactions and systems involved.") Smart manufacturing involves the use of CPSs to optimize production processes and improve efficiency. Sensors, robots, and real-time analytics help manufacturers adapt to changing conditions and prevent failures. Securing smart manufacturing systems is about making sure that sensitive production data remains private and that the manufacturing process remains uninterrupted by cyber threats. | ***Further reading:*** * [*What Is the Difference Between IoT and OT Security?*](https://www.paloaltonetworks.com/cyberpedia/iot-security-vs-ot-security) * [*What Are the Differences Between OT, ICS, \& SCADA Security?*](https://www.paloaltonetworks.com/cyberpedia/ot-vs-ics-vs-scada-security) ## What is the difference between a cyber-physical system and an Internet of Things (IoT) device? The difference between a cyber-physical system and an Internet of Things (IoT) device is that a CPS integrates computation, control, and physical processes to interact with and control real-world environments, while IoT devices focus on collecting and transmitting data with limited control over physical systems. ![Comparison between CPS (Cyber-Physical Systems) and IoT (Internet of Things). On the left, CPS features include a specific domain, cloud server use, scalability, large data generation, high security and privacy concerns, and communication technologies like WiFi and Zigbee. On the right, IoT is described as not domain-specific, with optional cloud or edge servers, very high scalability, and large data generation, along with similar communication technologies. In the center, shared features include sensors, resource sharing, real-time systems, data sharing, and a coupled physical and computing environment. The comparison spans from the cyber world to the physical world.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/Cyber-physical-systems-2025-07.png) IoT devices connect everyday objects to the internet for tasks like sensing or transmitting data. \*\*For example:\*\*A smart thermostat adjusts room temperature based on occupancy, without much interaction beyond the data exchange. These devices are primarily concerned with connectivity and monitoring. CPS, on the other hand, is more complex and combines real-time data processing with physical actions. **For instance:** A self-driving car makes decisions by analyzing data from sensors and interacting with its environment to navigate. Basically, CPS systems have greater control over physical processes. They use feedback mechanisms to adapt and make decisions. The key distinctions are complexity and control: IoT devices handle simpler tasks with limited control, whereas CPS provides deeper integration between computational and physical systems, making decisions and acting on them in real time. ## Why is cyber-physical system security important? Cyber-physical system security is important because CPSs integrate physical processes with computing, creating an expanded attack surface that increases the risk of cyberattacks. Since CPSs often control critical infrastructure, breaches can lead to severe disruptions, physical damage, or even harm to individuals. With the growing number of interconnected devices, the risks associated with CPSs continue to rise. Attacks like ransomware can shut down essential operations, while more sophisticated methods, such as GPS spoofing, can compromise navigation and control. Ensuring the security of cyber-physical systems is essential to **(1)** preventing those types of incidents and **(2)** protecting the physical world and the data that powers CPSs. ## What are the common cyber-physical system security challenges? ![Diagram titled Common cyber-physical system security challenges with various challenges listed. On the left side, the challenges include security-by-design limitations, vulnerability management, conflicting IT and OT security priorities, and interoperability issues. On the right side, the challenges are outdated security tools, scalability challenges, compliance and regulatory issues, and real-time data processing. Each challenge is accompanied by an icon representing its concept](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/Cyber-physical-systems-2025_9.png "Diagram titled Common cyber-physical system security challenges with various challenges listed. On the left side, the challenges include security-by-design limitations, vulnerability management, conflicting IT and OT security priorities, and interoperability issues. On the right side, the challenges are outdated security tools, scalability challenges, compliance and regulatory issues, and real-time data processing. Each challenge is accompanied by an icon representing its concept") CPS safety and security comes with a unique set of challenges because of the complexity, interconnectedness, and the integration of physical and computational elements. Cyber-physical systems demand specialized security measures that address both the cyber and physical aspects, which traditional IT security methods often fail to cover. Common cyber-physical system security challenges include: * Security-by-design limitations * Vulnerability management * Conflicting IT and OT security priorities * Interoperability issues * Outdated security tools * Scalability challenges * Compliance and regulatory issues * Real-time data processing ### Security-by-design limitations One of the major challenges in CPS security is the lack of built-in security in many devices. ![The image shows a diagram of cyber-physical attacks in a hierarchical CPS architecture. At the top, there are application layer attacks targeting apps App 1, App 2, App 3, and other apps. Below, network layer attacks are shown affecting the network. At the bottom, physical system attacks are depicted, where an attacker targets sensors and actuators in physical systems 1, 2, and N, which interact with physical dynamics. An attacker is shown connecting across the layers, impacting various system levels.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/Cyber-physical-systems-2025_10.png "The image shows a diagram of cyber-physical attacks in a hierarchical CPS architecture. At the top, there are application layer attacks targeting apps App 1, App 2, App 3, and other apps. Below, network layer attacks are shown affecting the network. At the bottom, physical system attacks are depicted, where an attacker targets sensors and actuators in physical systems 1, 2, and N, which interact with physical dynamics. An attacker is shown connecting across the layers, impacting various system levels.") Most cyber-physical systems were initially designed without considering cybersecurity, often operating in isolated environments. But as CPSs become more interconnected, their security vulnerabilities grow. And that exposes them to cyberattacks that can cause physical harm. Which is why addressing these issues early in the design phase is crucial to ensure long-term security. ### Vulnerability management Another big CPSSEC challenge is vulnerability management. CPS environments usually include a mix of new and legacy devices, each using different protocols. Identifying which devices need patching can be tough. Plus, testing patches on individual devices requires a lot of time and resources. Not to mention: The shortage of specialized security skills further complicates the process of effectively managing vulnerabilities across diverse systems. ### Conflicting IT and OT security priorities The [different priorities between IT and operational technology (OT) security](https://www.paloaltonetworks.com/cyberpedia/ot-vs-it-security) teams present a major hurdle. ![Image showing a comparison between IT and OT security priorities. On the left, IT security priorities are listed 1 Confidentiality of information, 2 Integrity of data, and 3 Availability of data and systems, with corresponding icons. On the right, OT security priorities are listed: 1 Availability of operations and data, 2 Integrity of configuration data, and 3 Confidentiality, also with icons. The diagram visually illustrates the differences in priorities between IT and OT security.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/ComparingITandOTSecurityPriorities.png "Image showing a comparison between IT and OT security priorities. On the left, IT security priorities are listed 1 Confidentiality of information, 2 Integrity of data, and 3 Availability of data and systems, with corresponding icons. On the right, OT security priorities are listed: 1 Availability of operations and data, 2 Integrity of configuration data, and 3 Confidentiality, also with icons. The diagram visually illustrates the differences in priorities between IT and OT security.") IT teams generally prioritize data confidentiality, while OT teams emphasize data availability. These differing focuses can lead to fragmented security strategies, leaving gaps that adversaries could exploit. Organizations need a unified approach to address these challenges comprehensively. ### Interoperability issues CPSs often involve various devices and systems that have to work together. The problem is this: These systems often use incompatible protocols, which complicates integration. Achieving interoperability while maintaining security becomes more difficult as the number of connected devices increases. Organizations have to balance the benefits of interconnected systems with the security risks they bring. ### Outdated security tools Traditional IT security tools are often unsuitable for CPS environments. Since they're designed for IT systems, they don't account for the unique needs of CPSs---like fragility and proprietary protocols, for instance. Using IT-centric security solutions in CPS environments could impair sensitive devices, leaving systems vulnerable. Specialized tools tailored to the needs of CPS are necessary for effective protection. ### Compliance and regulatory issues The evolving regulatory landscape for cyber-physical systems adds another layer of complexity. Organizations have to keep current with changing data protection laws, industry-specific safety standards, and other compliance requirements. Staying compliant and secure requires continuous effort and adjustment. ### Real-time data processing ![Architecture diagram of real-time processing challenges in building management systems. On the left side, asset inventories are categorized into building management, building security, and building devices, with icons representing each category. On the right, real-time data processing challenges are shown, including issues like disparate data feeds, filtering log data/alert fatigue, and siloed visibility into systems. The challenges are connected to the asset inventories, indicating the complexities of managing and processing data in real-time.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/Cyber-physical-systems-2025_14.png "Architecture diagram of real-time processing challenges in building management systems. On the left side, asset inventories are categorized into building management, building security, and building devices, with icons representing each category. On the right, real-time data processing challenges are shown, including issues like disparate data feeds, filtering log data/alert fatigue, and siloed visibility into systems. The challenges are connected to the asset inventories, indicating the complexities of managing and processing data in real-time.") Again, cyber-physical systems require continuous real-time data processing to work properly. Processing delays can result in inaccurate insights and poor decision-making, affecting both the digital and physical components of the system. Which is why real-time visibility into asset inventories and threats is crucial for effective security. Unfortunately, many CPSs lack the tools necessary for full visibility and actionable insights. ## What to look for in a CPS protection platform ![Graphical diagram titled Factors to consider when evaluating CPS protection platforms. On the left side, there is an icon representing industry expertise, connected to deep visibility, broad solution set, and enabling business outcomes. On the right, icons represent deployment flexibility, vulnerability management, and threat intelligence. Each factor is accompanied by a corresponding label. The diagram visually outlines key considerations for selecting a CPS protection platform.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-physical-systems-security-cpssec/Cyber-physical-systems-2025_11.png "Graphical diagram titled Factors to consider when evaluating CPS protection platforms. On the left side, there is an icon representing industry expertise, connected to deep visibility, broad solution set, and enabling business outcomes. On the right, icons represent deployment flexibility, vulnerability management, and threat intelligence. Each factor is accompanied by a corresponding label. The diagram visually outlines key considerations for selecting a CPS protection platform.") When selecting a platform to secure your cyber-physical systems (CPS), it's essential to consider several key factors that ensure comprehensive protection. A CPS protection platform must address the unique complexities of CPS and offer solutions tailored to the diverse devices and systems they encompass. Here are the factors to consider in the search for a CPS protection platform: * Industry expertise * Deep visibility * Broad solution set * Enabling business outcomes * Deployment flexibility * Vulnerability management * Threat intelligence ### Industry expertise Industry expertise is a crucial aspect to consider when choosing a CPS protection platform. A CPS platform should have a proven track record in CPS security. It should also be able to demonstrate its capability to handle the specific challenges of protecting interconnected systems. Look for platforms that actively work with manufacturers to identify vulnerabilities and provide customers with robust defense mechanisms. ### Deep visibility Achieving deep visibility within CPS devices is vital for understanding potential threats. Choose a platform that employs both active and passive discovery methods. This includes techniques capable of accessing devices using unique protocols, proprietary systems, or air-gapped networks that may not be reachable through passive-only methods. The ability to uncover every asset connected to the network is essential for managing security effectively. ***Tip:*** *Prioritize platforms that offer real-time visibility and anomaly detection. This helps detect deviations in system behavior quickly and enables proactive security measures, rather than just retrospective analysis.* ### Broad solution set A platform with a broad solution set can address a wide range of CPS security needs. When evaluating options, ensure the platform supports a variety of CPS across different deployment needs, network architectures, and device types. A vendor with a versatile portfolio should be able to meet your unique environmental and operational requirements---and ensure that all components of your systems are covered. ***Tip:*** *Ensure the platform can integrate seamlessly with existing tools in your infrastructure, such as SIEM (security information and event management) systems, for streamlined operations and a unified security approach.* ### Enabling business outcomes It's important to select a CPS protection platform that's focused on better business outcomes. A comprehensive solution should allow you to manage, monitor, and control all aspects of your CPS security from one interface. The right platform will streamline risk management, provide actionable insights, and enable faster responses to threats. ***Tip:*** *Opt for platforms that offer customizable dashboards and reporting tools. This will allow you to tailor the information to the key performance indicators (KPIs) relevant to your business, making it easier to track and demonstrate improvements in security.* ### Deployment flexibility Flexibility in deployment is another key feature to look for in a CPS protection platform. The ability to deploy the platform on-premises, in the cloud, or in hybrid environments allows you to choose the best option for your organization. Plus, the flexibility can help reduce costs associated with hardware and infrastructure while meeting the specific deployment needs of your network. ### Vulnerability management Effective vulnerability management is key to CPS security. A good platform should correlate asset discovery with databases of known vulnerabilities, allowing for quick identification of risks. The ability to prioritize vulnerabilities based on asset criticality and the likelihood of exploitation, along with detailed remediation guidance, will allow you to act swiftly to minimize threats. ***Tip:*** *Look for platforms with automated patch management and remediation workflows. This will save time by streamlining the process of fixing vulnerabilities and reduce the window of opportunity for attackers.* ### Threat intelligence management The platform you choose should also offer robust threat intelligence management. This will help you stay ahead of emerging threats and ensure your CPS remains secure in the face of evolving cyber risks. This includes integrating indicators of compromise (IoCs), tactics, techniques, and procedures (TTPs) from threat intelligence feeds, as well as signature-based detections. Advanced solutions can usually provide in-depth telemetry for analytics, perform attack simulations, and support machine-readable threat intelligence formats. ## Cyber-physical systems security FAQs #### What is cyber-physical system security? Cyber-physical system security (CPSSEC) protects the integration of computational algorithms with physical processes in systems that monitor, control, and optimize real-world activities. It safeguards devices and networks linking physical systems with computing resources to prevent risks that could compromise operations or cause physical damage. #### What are examples of cyber-physical systems? Examples of cyber-physical systems (CPS) include operational technology (OT), industrial control systems (ICS), smart grids, robotics, smart buildings, and medical devices. These systems combine computing, networking, and physical processes to improve efficiency and safety in sectors like manufacturing, healthcare, and energy. #### What are the 3 major parts of cyber-physical systems? The three major parts of cyber-physical systems are the physical process, the cyber component (including sensors and actuators), and the feedback loop. The physical process interacts with the cyber component, which collects and processes data to control and optimize the physical environment. #### What is physical security in cybersecurity? Physical security in cybersecurity refers to measures taken to protect physical assets, such as hardware, infrastructure, and facilities, from unauthorized access, damage, or theft. This includes security controls like access cards, biometrics, surveillance cameras, and alarm systems to prevent physical breaches that could compromise digital systems or sensitive information. #### What is an example of physical security in cyber security? An example of physical security in cybersecurity is the use of security cameras, access control systems, and biometric authentication to protect critical infrastructure. These physical measures prevent unauthorized access to sensitive systems and ensure the integrity of the physical components of a network. #### What is an example of a cyber-physical infrastructure? An example of cyber-physical infrastructure is a smart grid. It integrates information technology with power infrastructure to enhance real-time monitoring and decision-making, improving energy distribution and reliability. This infrastructure links cyber systems with physical power networks to ensure efficient and secure energy management. Recommended for you [eBook: The Power of \&: A guide for manufacturing CISOs eBook Learn how manufacturers can enhance security and drive transformation with visibility, Zero Trust, and OT security management.](https://www.paloaltonetworks.com/resources/ebooks/the-power-of-ampersand-a-cisos-guide-to-navigating-ot-it-convergence-in-the-manufacturing-industry) [White paper: Secure OT-IT Convergence to Keep the Production Lines Working See the way to implement the principles of Zero Trust for a resilient OT security framework.](https://www.paloaltonetworks.com/resources/whitepapers/ot-security-insights-secure-ot-it-convergence-to-keep-the-production-lines-working) [Report: GigaOm Radar for OT Security report Evaluate the performance of OT security vendors' solutions in three main attack vectors.](https://start.paloaltonetworks.com/OT-Security-GigaOm-Radar-Report-2023.html) [Guide: Asset Visibility and Security for Industrial Control Systems Review a high-level reference architecture for securing OT, IIoT, and ICSs.](https://www.paloaltonetworks.com/resources/guides/asset-visibility-and-security-for-industrial-control-systems) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Cyber-Physical%20Systems%20Security%20%28CPSSEC%29%3F%20%7C%20Overview&body=Cyber-physical%20systems%20security%20protects%20the%20integration%20of%20computing%20and%20physical%20processes%20in%20systems%20that%20monitor%2C%20control%2C%20and%20optimize%20operations.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-cyber-physical-systems-security-cpssec) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language