[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Security Operations](https://www.paloaltonetworks.com/cyberpedia/security-operations?ts=markdown) 3. [Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security?ts=markdown) 4. [What is Cybersecurity?](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security?ts=markdown) Table of contents * What Is Cybersecurity? Why It Matters \& Core Concepts * [Why Cybersecurity Matters: An Enterprise Risk](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#why?ts=markdown) * [Key Principles of a Layered Defense](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#principles?ts=markdown) * [Core Domains of Cybersecurity (Types of Security)](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#core?ts=markdown) * [Understanding the Threat Landscape](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#landscape?ts=markdown) * [Industry-Specific Cybersecurity Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#challenges?ts=markdown) * [The Dual Role of AI](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#role?ts=markdown) * [The Acceleration of AI-Driven Threats](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#threats?ts=markdown) * [Cybersecurity Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#practices?ts=markdown) * [Cybersecurity Frameworks and Standards](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#standards?ts=markdown) * [The Cybersecurity Workforce](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#workforce?ts=markdown) * [Cybersecurity FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#faqs?ts=markdown) * [What Is Cybersecurity Platformization?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-platformization?ts=markdown) * [Cybersecurity Platform Consolidation: An Overview](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-platformization#cybersecurity?ts=markdown) * [Benefits of Security Tool Consolidation](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-platformization#benefits?ts=markdown) * [How AI Enhances Cybersecurity Consolidation](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-platformization#how?ts=markdown) * [Selecting the Right Consolidation Strategy](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-platformization#strategy?ts=markdown) * [Aligning Investments with Business Goals](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-platformization#aligning?ts=markdown) * [Challenges in Platformization](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-platformization#challenges?ts=markdown) * [Future Trends in Cybersecurity Platform Consolidation](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-platformization#future?ts=markdown) * [Cybersecurity Platformization FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-platformization#faqs?ts=markdown) * [4 Ways Cybersecurity Automation Should Be Used](https://www.paloaltonetworks.com/cyberpedia/4-ways-cybersecurity-automation-should-be-used?ts=markdown) * [Cybersecurity Automation Explained](https://www.paloaltonetworks.com/cyberpedia/4-ways-cybersecurity-automation-should-be-used#cybersecurity?ts=markdown) * [Cybersecurity Automation Use Cases: Four Key Areas](https://www.paloaltonetworks.com/cyberpedia/4-ways-cybersecurity-automation-should-be-used#areas?ts=markdown) * [How Cybersecurity Automation Works](https://www.paloaltonetworks.com/cyberpedia/4-ways-cybersecurity-automation-should-be-used#how?ts=markdown) * [Benefits of Automating Your Security Operations](https://www.paloaltonetworks.com/cyberpedia/4-ways-cybersecurity-automation-should-be-used#benefits?ts=markdown) * [The Critical Role of Human Oversight](https://www.paloaltonetworks.com/cyberpedia/4-ways-cybersecurity-automation-should-be-used#critical?ts=markdown) * [Challenges and Best Practices for Implementation](https://www.paloaltonetworks.com/cyberpedia/4-ways-cybersecurity-automation-should-be-used#challenges?ts=markdown) * [How Automation Stops the Attack Lifecycle](https://www.paloaltonetworks.com/cyberpedia/4-ways-cybersecurity-automation-should-be-used#lifecycle?ts=markdown) * [Cybersecurity Automation FAQs](https://www.paloaltonetworks.com/cyberpedia/4-ways-cybersecurity-automation-should-be-used#faqs?ts=markdown) * [What Is a Cybersecurity Risk Assessment?](https://www.paloaltonetworks.com/cyberpedia/cybersecurity-risk-assessment?ts=markdown) * [Cybersecurity Risk Assessment Explained](https://www.paloaltonetworks.com/cyberpedia/cybersecurity-risk-assessment#cybersecurity?ts=markdown) * [Why Is Cyber Risk Assessment Important?](https://www.paloaltonetworks.com/cyberpedia/cybersecurity-risk-assessment#why?ts=markdown) * [Common Cybersecurity Risks and Threats](https://www.paloaltonetworks.com/cyberpedia/cybersecurity-risk-assessment#common?ts=markdown) * [Different Approaches to Cyber Risk](https://www.paloaltonetworks.com/cyberpedia/cybersecurity-risk-assessment#different?ts=markdown) * [How to Perform a Cybersecurity Risk Assessment](https://www.paloaltonetworks.com/cyberpedia/cybersecurity-risk-assessment#how?ts=markdown) * [Determine the Scope of the Assessment](https://www.paloaltonetworks.com/cyberpedia/cybersecurity-risk-assessment#determine?ts=markdown) * [Cybersecurity Risk Assessment Benefits](https://www.paloaltonetworks.com/cyberpedia/cybersecurity-risk-assessment#benefits?ts=markdown) * [Cyber Risk Assessment FAQs](https://www.paloaltonetworks.com/cyberpedia/cybersecurity-risk-assessment#faqs?ts=markdown) * [What is Cybersecurity for Small Businesses?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-for-small-businesses?ts=markdown) * [Why is Cybersecurity for Small Businesses Critical?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-for-small-businesses#why?ts=markdown) * [Key Cybersecurity Threats Faced by Small Businesses](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-for-small-businesses#key?ts=markdown) * [Essential Cybersecurity Solutions for Small Businesses](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-for-small-businesses#Essentials?ts=markdown) * [Optimizing Costs and Resources](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-for-small-businesses#optimizing?ts=markdown) * [Enhancing Employee Awareness and Involvement](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-for-small-businesses#enhancing?ts=markdown) * [Cybersecurity for Small Businesses FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-for-small-businesses#faqs?ts=markdown) # What is Cybersecurity? 5 min. read Table of contents * * [Why Cybersecurity Matters: An Enterprise Risk](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#why?ts=markdown) * [Key Principles of a Layered Defense](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#principles?ts=markdown) * [Core Domains of Cybersecurity (Types of Security)](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#core?ts=markdown) * [Understanding the Threat Landscape](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#landscape?ts=markdown) * [Industry-Specific Cybersecurity Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#challenges?ts=markdown) * [The Dual Role of AI](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#role?ts=markdown) * [The Acceleration of AI-Driven Threats](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#threats?ts=markdown) * [Cybersecurity Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#practices?ts=markdown) * [Cybersecurity Frameworks and Standards](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#standards?ts=markdown) * [The Cybersecurity Workforce](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#workforce?ts=markdown) * [Cybersecurity FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#faqs?ts=markdown) 1. Why Cybersecurity Matters: An Enterprise Risk * * [Why Cybersecurity Matters: An Enterprise Risk](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#why?ts=markdown) * [Key Principles of a Layered Defense](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#principles?ts=markdown) * [Core Domains of Cybersecurity (Types of Security)](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#core?ts=markdown) * [Understanding the Threat Landscape](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#landscape?ts=markdown) * [Industry-Specific Cybersecurity Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#challenges?ts=markdown) * [The Dual Role of AI](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#role?ts=markdown) * [The Acceleration of AI-Driven Threats](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#threats?ts=markdown) * [Cybersecurity Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#practices?ts=markdown) * [Cybersecurity Frameworks and Standards](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#standards?ts=markdown) * [The Cybersecurity Workforce](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#workforce?ts=markdown) * [Cybersecurity FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security#faqs?ts=markdown) Cybersecurity is the practice of protecting digital systems, networks, cloud environments, and data from unauthorized access, misuse, or disruption. It's a constantly evolving discipline that integrates technology, policy, and human expertise to defend the confidentiality, integrity, and availability of critical assets across the modern digital landscape. Key Points * **Holistic, layered defense**: People + process + technology, spanning endpoint, network, cloud, application, data, and identity. \* **Guiding principles**: Confidentiality (keep data private), Integrity (keep data accurate), Availability (keep services reliable). \* **Zero Trust by default**: Continuous verification and least-privilege access limit lateral movement after compromise. \* **AI's dual role**: Accelerates defense (automation, behavioral analytics) and offense (faster phishing, polymorphic malware). \* **Human factor dominates**: Social engineering and credential abuse remain leading initial access vectors. \* **Broad scope**: Core domains include Network, Cloud, Endpoint, Application, Data/Information, Identity \& Access Management (IAM), Mobile, OT/ICS \& Critical Infrastructure, and AI Security. ### Transformation of Cybersecurity ![Transformation of Cybersecurity](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-security/thumbnail-transformation-of-cybersecurity.webp) close ## Why Cybersecurity Matters: An Enterprise Risk Cybersecurity is no longer just an IT issue---it's a business survival requirement and an enterprise risk that directly impacts continuity and reputation. ### The Financial and Operational Impact Today's cyber threats are more frequent, sophisticated and financially devastating. Attackers exploit automation, AI, and supply-chain vulnerabilities, often halting operations and eroding trust. * **Average Breach Cost** : The average global cost of a data breach is approximately [$4.44 million](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report?ts=markdown), with the U.S. average often exceeding $10 million due to higher regulatory penalties and response costs. * **Operational Downtime**: Unplanned outages can cost organizations an average of $14,000 per minute. * **Reputational Damage**: Beyond direct costs, companies spend months rebuilding trust with customers and partners, often seeing sharp drops in customer retention and market valuation. * **Regulatory fines** : Noncompliance with [GDPR](https://www.paloaltonetworks.com/cyberpedia/gdpr-compliance?ts=markdown), [HIPAA](https://www.paloaltonetworks.com/cyberpedia/what-is-hipaa?ts=markdown), and similar frameworks can incur multi-million-dollar penalties. ![The diagram visually explains how an attacker can inject malicious code into a vendor's software update process, ultimately compromising the vendor's customers.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-security/anatomy-of-a-supply-chain-attack.png "Anatomy of a Supply Chain Attack") **Figure 1**: Anatomy of a Supply Chain Attack ### The Small Business Crisis While global enterprises dominate headlines, small and midsize businesses (SMBs) are the most frequent victims, often representing easy targets due to limited budgets and a false sense of security. * **Target Ratio**: 43% of all cyberattacks target SMBs. * **The Ultimate Cost**: Nearly 1 in 5 SMBs that suffer a breach close permanently within six months. ## Key Principles of a Layered Defense Effective cybersecurity is fundamentally about risk management, combining preventive controls with detection and response mechanisms. It operates on a principle called Defense in Depth, which uses multiple, overlapping layers of protection. ### 1. The CIA Triad: Guiding Principles These three principles define every effective security strategy: * **Confidentiality**: Ensuring only authorized users can access sensitive data. * **Integrity**: Guaranteeing that data and systems remain accurate and unaltered. * **Availability**: Maintaining system uptime and accessibility even during attacks or outages. ### 2. The Zero Trust Framework The shift to cloud and remote work has made the traditional network perimeter obsolete. [Zero Trust](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture?ts=markdown) is the modern response: * **Mandate**: "Never trust, always verify" for every user, device, and application. * **Continuous Verification**: Access is not granted just once; it is continuously authenticated based on context and risk posture. * [**Least Privilege Access (LPA)**](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access?ts=markdown): Users are granted only the minimum level of access necessary for their specific task, preventing a threat actor from moving laterally through the network if a single account is compromised. * **CISO and SOC Imperative** : Zero Trust is essential for mitigating the top initial access vector (social engineering/stolen credentials), which, according to Unit 42, often leverages over-permissioned access that allows [lateral movement](https://www.paloaltonetworks.com/cyberpedia/what-is-lateral-movement?ts=markdown) after an initial compromise. ## Core Domains of Cybersecurity (Types of Security) Cybersecurity is categorized into specialized domains, each protecting a different aspect of the digital environment: |---------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------| | **Domain** | **Focus** | **Key Practices** | | [**Network Security**](https://www.paloaltonetworks.com/cyberpedia/what-is-network-security?ts=markdown) | Protecting the connections and communication channels. | Monitoring traffic, VPNs, firewalls, and network segmentation. | | [**Endpoint Security**](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-security?ts=markdown) | Protecting devices (laptops, phones, servers) that connect to the network. | Antivirus/Anti-malware, firewalls, and Endpoint Detection \& Response (EDR). | | [**Application Security**](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security?ts=markdown) | Protecting software applications from attack. | Writing secure code, thorough testing, and continuous monitoring. | | **Information Security ([Data Security](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security?ts=markdown))** | Safeguarding sensitive data (also known as Data Security). | Encryption, access controls, risk management, and clear data-handling policies. | | [**Cloud Security**](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security?ts=markdown) | Protecting data, applications, and services hosted in the cloud. | Encryption, access controls, and compliance management in shared environments. | | **Identity \& Access Management (IAM)** | Ensuring users are who they claim to be and have appropriate permissions. | Multi-Factor Authentication (MFA) and least privilege access. | | [**Critical Infrastructure Security**](https://www.paloaltonetworks.com/cyberpedia/what-is-critical-infrastructure?ts=markdown) | Protecting vital systems (energy, transportation, communication). | Threat detection, access control, and regulatory compliance for OT/ICS. | | **Mobile Security** | Shielding smartphones and tablets from malware and unauthorized access. | Encryption, secure app usage, and remote device management. | | [**AI Security**](https://www.paloaltonetworks.com/cyberpedia/ai-security?ts=markdown) | Keeping artificial intelligence systems safe from cyber threats and misuse. | Data integrity and privacy, model robustness, governance \& lifecycle security (operational framework) | ![A bar graph illustrates a spectrum of cybersecurity threats, categorized by their ease of execution and sophistication: The left side of the spectrum is labeled 'Easy to Execute' and includes: Known threats, Evasive malware, and Fileless attacks. The right side of the spectrum is labeled 'Sophisticated \& Damaging' and includes: Zero-day attacks, Targeted attacks, Insider threats. Below the spectrum, two statements summarize prevention: 99%+ of attacks can be prevented with the right tools (positioned under the 'Easy to Execute' threats), and \<1% require analysis over time with machine learning (placed under the 'Sophisticated \& Damaging' threats).](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-security/execution-of-cybersecurity-threats.png "The Spectrum of Cybersecurity Threats Categorized by Ease of Execution.") **Figure 2**: The Spectrum of Cybersecurity Threats Categorized by Ease of Execution ## Understanding the Threat Landscape The cybersecurity threat landscape is constantly shifting---driven by the convergence of automation, artificial intelligence, and increasingly sophisticated adversaries. The human element remains the single most significant vulnerability. The table below highlights today's leading cyberattack methods, their trends, and actionable strategies to mitigate risk. **Common Cybersecurity Vectors** 🔥 Critical ⚠️ High 🟡 Moderate 🟢 Low |-----------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------| | **Attack Vector / Risk Level** | **Trend Insight (Unit 42)** | **CISO Action** | | 🔥 [Social Engineering](https://www.paloaltonetworks.com/cyberpedia/what-is-social-engineering?ts=markdown) | Remains the top initial access vector, accounting for 36 % of all incidents. | **Strengthen the Human Layer**: Mandate awareness training and deploy AI-driven filters to block sophisticated phishing campaigns. | | ⚠️ Software / [API](https://www.paloaltonetworks.com/cyberpedia/what-is-api-security?ts=markdown) Vulnerabilities | Favored by nation-state actors for high-impact, targeted intrusions. | **Patch Management \& Threat Prevention**: Prioritize patching and use advanced threat prevention to block unpatched exploits. | | 🔥 [Phishing](https://www.paloaltonetworks.com/cyberpedia/what-is-phishing?ts=markdown) | Resurged as a top entry point (23 % of cases) due to AI-crafted emails. | **Email Security \& MFA**: Enforce multi-factor authentication to prevent credential compromise and escalation of breaches. | | 🔥 Ransomware | 59% of organizations experienced ransomware in 2024; average payments rose from $400K to $2M. | **Zero Trust \& Backup Resilience**: Segment networks, maintain immutable offline backups, and regularly test recovery plans. | | ⚠️ [Supply Chain Attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-software-supply-chain-security?ts=markdown) | ~15% of incidents stem from supply-chain compromises (e.g., MOVEit affecting 1,500+ MSPs). | **Third-Party Risk Management**: Vet vendors, require NIST/ISO certifications, apply Zero Trust segmentation, and maintain SBOMs. | | ⚠️ [AI Attacks](https://www.paloaltonetworks.com/cyberpedia/generative-ai-security-risks?ts=markdown) | Generative AI enables faster, more scalable attacks such as polymorphic malware and AI-driven phishing. | **AI Security Integration**: Monitor for AI-driven anomalies, secure training data, and use AI-based defensive models. | | ⚠️ [Malware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware?ts=markdown) | Evolving through obfuscation and fileless execution to evade traditional defenses. | **Endpoint Protection \& Threat Hunting**: Use EDR/XDR for behavioral analysis and sandbox containment. | | 🟡 [Insider Threats](https://www.paloaltonetworks.com/cyberpedia/insider-threat?ts=markdown) | Disgruntled or compromised insiders remain difficult to detect and often cause data leaks. | **User Behavior Analytics**: Monitor for anomalies, limit data access, and enforce least-privilege controls. | | ⚠️ [Distributed Denial of Service (DDoS)](https://www.paloaltonetworks.com/cyberpedia/what-is-a-ddos-attack?ts=markdown) | Botnets and IoT devices are increasingly used to flood and disable services. | **DDoS Mitigation \& Redundancy**: Use cloud-based scrubbing, CDNs, and elastic infrastructure to absorb traffic. | | ⚠️ [Credential Theft](https://www.paloaltonetworks.com/cyberpedia/what-is-a-credential-based-attack?ts=markdown) | Compromised passwords remain a leading cause of unauthorized access. | **Identity Security \& MFA**: Require MFA, use password vaulting, and monitor credentials for breach reuse. | | 🔥 [Advanced Persistent Threats (APTs)](https://www.paloaltonetworks.com/cyberpedia/what-is-advanced-persistent-threat-apt?ts=markdown) | Long-term, stealthy nation-state campaigns target high-value data and infrastructure. | **Threat Intelligence \& Segmentation**: Integrate intel feeds, isolate critical assets, and monitor for lateral movement. | | ⚠️ [Zero-Day Exploits](https://www.paloaltonetworks.com/cyberpedia/zero-day-attacks-explained-risks-examples-prevention?ts=markdown) | Newly discovered vulnerabilities are weaponized before patches exist. | **Virtual Patching \& IPS**: Deploy intrusion prevention systems and behavioral analytics to detect threats early. | | ⚠️ Man-in-the-Middle (MitM) Attacks | Attackers intercept traffic to steal credentials or inject malware. | **Encryption \& Certificate Pinning**: Use TLS/SSL end-to-end, VPNs for remote users, and validate certificates. | | 🟡 [SQL Injection](https://www.paloaltonetworks.com/cyberpedia/sql-injection?ts=markdown) | Still a prevalent method for compromising poorly secured web apps. | **Secure Coding \& Validation**: Use parameterized queries, sanitize user input, and conduct regular code audits. | | ⚠️ [IoT Attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security?ts=markdown) | Proliferation of connected devices expands the attack surface dramatically. | **IoT Device Management**: Require strong authentication, timely firmware updates, and network segmentation. | ## Industry-Specific Cybersecurity Challenges Different sectors face unique risks and regulatory pressures that require tailored defenses: * **Healthcare**: Protecting patient data (PHI) and medical devices from ransomware and data breaches. * **Finance**: Preventing fraud, insider threats, and regulatory violations under PCI DSS and SOX. * **Energy and Manufacturing**: Defending operational technology (OT) and industrial control systems (ICS) from state-sponsored attacks. * **Technology**: Securing intellectual property, AI models, and supply-chain dependencies. * **Public Sector**: Safeguarding national infrastructure, elections, and citizen data from geopolitical cyber operations. Each industry's risk profile underscores one truth: cybersecurity isn't optional---it's foundational to resilience, compliance, and public trust. ## The Dual Role of AI Artificial intelligence and machine learning (AI/ML) are transforming both sides of the cyber domain: |-----------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------| | **AI as the Defender (Defensive)** | **AI as the Attacker (Offensive)** | | **Automated Threat Detection**: Sifts through billions of data points to quickly identify subtle anomalies that human analysts miss. | **Accelerated Intrusions**: Reduces the time for a full-scale attack (e.g., ransomware) to minutes. | | **Faster Response**: Integrates with SOAR (Security Orchestration, Automation, and Response) platforms to automate incident triage and containment. | **Sophisticated Social Engineering**: Generates highly personalized, grammatically flawless phishing emails at a massive scale. | | **Behavioral Analytics**: Establishes a baseline of normal user and network behavior to flag risky deviations. | **Polymorphic Malware**: Creates self-mutating code that constantly changes to evade traditional, signature-based defenses. | ## The Acceleration of AI-Driven Threats The impact of [Artificial Intelligence (AI)](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai?ts=markdown) and [Generative AI (GenAI)](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity?ts=markdown) on the cyber threat landscape is characterized by acceleration, sophistication, and scale. AI lowers the barrier to entry for novice cybercriminals while equipping sophisticated threat actors with tools that automate and enhance every phase of an attack. ### 1. Accelerated \& Scalable Phishing and Social Engineering ![A diagram that shows a phishing attack that begins with the attacker gathering personal data to impersonate a trusted brand and craft a personalized, convincing email. This email contains a lure, typically a malicious attachment or a compromised password reset link. When the victim interacts with the lure, it either leads to the deployment of malware or redirects the victim to a fake login page to steal their credentials. The attack concludes with the cybercriminal gaining access to capture data and inflict damage.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cyber-security/what-happens-during-a-phishing-attack.png "The Stages of a Phishing Attack") **Figure 3**: The Stages of a Phishing Attack GenAI models (such as [Large Language Models](https://www.paloaltonetworks.com/cyberpedia/what-is-llm-security?ts=markdown)) enable attackers to create hyper-realistic, highly personalized, deceptive content rapidly. * **Sophisticated Lures**: AI generates grammatically flawless and context-aware phishing emails, texts, and chat messages that mimic trusted contacts or organizational styles, making them much harder for users and traditional filters to detect. * **Scale and Speed**: Attackers can automate the research and crafting of these personalized attacks, launching campaigns against millions of targets simultaneously---a significant scale-up from traditional, manual efforts. ### 2. Autonomous and Adaptive Malware AI is used to create next-generation malicious code that can learn and change its signature to evade detection. * **Polymorphic Malware**: Attackers utilize AI to develop self-mutating malware that constantly rewrites its own code. This enables the malware to bypass traditional, signature-based antivirus and detection tools, which rely on recognizing known patterns. * **Evasion and Speed**: AI can accelerate the attack lifecycle, reducing the time from initial compromise to data exfiltration to minutes, drastically shrinking the window for defenders to respond. ### 3. Deepfakes and Credential Fraud AI's ability to generate realistic synthetic media creates new avenues for impersonation and fraud. * **Deepfake Scams** : Voice cloning and video deepfakes are used to impersonate executives, colleagues, or clients in real-time. This is often used in [Business Email Compromise (BEC)](https://www.paloaltonetworks.com/cyberpedia/what-is-business-email-compromise-bec-tactics-and-prevention?ts=markdown) or financial fraud to authorize fraudulent transfers. * [**Credential Attacks**](https://www.paloaltonetworks.com/cyberpedia/what-is-a-credential-based-attack?ts=markdown): AI automates large-scale credential stuffing and brute-force attacks by efficiently testing millions of stolen password combinations across multiple accounts, often using cloud infrastructure. ### 4. New Attack Surfaces (Attacks Against AI Systems) The AI models and their supporting data pipelines themselves become targets for specialized attacks. * [**Prompt Injection**](https://www.paloaltonetworks.com/cyberpedia/what-is-a-prompt-injection-attack?ts=markdown): Attackers can use carefully crafted inputs (prompts) to trick an AI model (like a chatbot) into ignoring its safety guidelines, leaking sensitive training data, or performing malicious actions. * [**Data Poisoning**:](https://www.paloaltonetworks.com/cyberpedia/what-is-data-poisoning?ts=markdown) Adversaries can intentionally feed bad or malicious data into an AI system's training dataset, corrupting its future behavior and causing it to produce inaccurate or harmful outputs (e.g., teaching a security model to ignore threats). ![A graphic titled 'Top 10 Cybersecurity Best Practices' lists ten key recommendations for cybersecurity.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/cybersecurity-best-practices.jpg "Top 10 Cybersecurity Best Practices") **Figure 4**: Top 10 Cybersecurity Best Practices. ## Cybersecurity Best Practices Implementing these practices is crucial for strengthening your security posture: 1. **Enable Multi-Factor Authentication (MFA)**: Enforce an extra layer of protection (e.g., a one-time code) for all critical accounts. 2. **Keep Software Updated**: Regularly patch operating systems, software, and applications to close known vulnerabilities. 3. **Back Up Data Regularly**: Perform routine backups of critical data to secure, segregated locations and test the restoration process. 4. **Enforce [Least Privilege Access](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access?ts=markdown)**: Grant users and systems only the minimum permissions necessary for their tasks. 5. **Educate Employees**: Train all users to recognize and report phishing attempts, social engineering tactics, and suspicious activity. 6. **Develop an** [**Incident Response Plan (IRP)**:](https://www.paloaltonetworks.com/cyberpedia/incident-response-plan?ts=markdown) Create a clear plan to address security incidents, including containment, restoration, and communication, and conduct regular drills. 7. **Monitor and Audit Systems**: Continuously monitor network activity for anomalies and conduct regular security audits. ## Cybersecurity Frameworks and Standards Cybersecurity frameworks provide structured guidelines for organizations to implement and manage security controls. Some prominent frameworks include: * [**NIST Cybersecurity Framework**](https://www.nist.gov/cyberframework): Provides a policy framework and computer security guidance for private-sector organizations in the United States. * **ISO/IEC 27001**: A standard for information security management systems that helps in managing the security of assets. * **CIS Controls**: A set of actions that provide specific ways to stop today's most pervasive and dangerous cyberattacks. * **GDPR and CCPA Compliance**: Frameworks for data protection and privacy requirements in Europe and California, respectively. These standards serve as benchmarks for organizations, helping them assess their security posture and identify areas for improvement. ## The Cybersecurity Workforce The industry is facing a critical global skills gap, creating tremendous career opportunities. * **High Demand** : Roles in [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security?ts=markdown), [Zero Trust Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture?ts=markdown), [AI Security](https://www.paloaltonetworks.com/cyberpedia/ai-security?ts=markdown), and [Incident Response](https://www.paloaltonetworks.com/cyberpedia/what-is-incident-response?ts=markdown) are in high demand. * **Essential Skills** : Success requires a mix of technical skills ([cloud platforms](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology?ts=markdown), security tools, Python) and non-technical skills (risk assessment, business process understanding, and communication). * **Career Growth**: The field offers highly competitive salaries and clear advancement paths, supported by certifications such as CISSP, CISM, and cloud-specific credentials. ## Cybersecurity FAQs ### What exactly does Cybersecurity do? The core functions of cybersecurity are: * Protects Sensitive Data: Safeguards personal, financial, and business information from being accessed or stolen by unauthorized individuals or malicious actors. * Prevents Cyber Threats: Detects, blocks, and mitigates threats such as malware, ransomware, phishing, and denial-of-service (DoS) attacks. * Ensures Business Continuity: Keeps systems operational by preventing disruptions caused by cyberattacks, minimizing downtime and financial losses. * Secures Digital Infrastructure: Protects critical systems like servers, databases, and cloud environments from being compromised. * Maintains Confidentiality, Integrity, and Availability (CIA Triad) * Confidentiality: Ensures information is accessible only to authorized parties. * Integrity: Protects data from being altered or corrupted. * Availability: Ensures resources are accessible when needed. * Enables Secure Communication: Encrypts data during transmission to prevent interception and unauthorized access, especially for sensitive communications. * Supports Regulatory Compliance: Helps organizations comply with data protection laws and regulations, such as GDPR, HIPAA, or PCI-DSS. * Identifies and Mitigates Risks: Monitors systems for vulnerabilities and suspicious activities, enabling proactive risk management. * Educates and Trains Users: Raises awareness about potential threats and teaches safe practices to minimize human error, which is a common cause of security breaches. * Facilitates Incident Response: Develops and executes plans to quickly detect, contain, and recover from security incidents, limiting their impact. ### What are the 7 types of cybersecurity? Cybersecurity encompasses various domains, each addressing specific threats and vulnerabilities. Here are the seven primary types: 1. Network Security 1. Focuses on protecting computer networks from unauthorized access, misuse, and cyber threats. 2. Key Measures: Firewalls, intrusion detection systems (IDS), virtual private networks (VPNs), and encryption. 2. Information Security 1. Protects data in all forms---digital and physical---from unauthorized access, modification, or destruction. 2. Key Principles: Confidentiality, integrity, and availability (CIA Triad). 3. Examples: Encryption, data masking, and access controls. 3. Endpoint Security 1. Secures devices like computers, smartphones, and tablets that connect to a network. 2. Key Tools: Antivirus software, endpoint detection and response (EDR), and device management policies. 4. Cloud Security 1. Focuses on protecting data, applications, and infrastructure in cloud environments. 2. Key Practices: Access controls, secure configuration, and encryption of data in transit and at rest. 3. Example: Securing Software as a Service (SaaS) and Infrastructure as a Service (IaaS) platforms. 5. Application Security 1. Ensures applications are secure throughout their development and lifecycle. 2. Key Practices: Secure coding, vulnerability testing, and implementing security features like authentication and authorization. 3. Examples: Web application firewalls (WAF) and penetration testing. 6. Operational Security (OpSec) 1. Focuses on protecting processes and decisions to ensure that sensitive information isn't leaked. 2. Key Elements: Risk management, secure workflows, and awareness of sharing and storing data. 3. Example: Limiting access to sensitive operational information to reduce insider threats. 7. Disaster Recovery and Business Continuity Planning 1. Ensures systems and operations can recover quickly after a cyber incident or disaster. 2. Key Elements: Backup solutions, incident response plans, and resilience strategies. 8. Examples: Offsite data storage and redundancy planning. ### What are the types of cybersecurity threats? Common threats include: malware, ransomware, phishing, denial-of-service (DoS) attacks, data breaches, insider threats, and advanced persistent threats (APTs). ### How can individuals protect themselves from cyber threats? Use strong, unique passwords, enable multi-factor authentication (MFA), avoid clicking on suspicious links, install antivirus software, and keep systems and applications updated. ### What is the difference between cybersecurity and information security? Cybersecurity focuses on protecting digital systems and networks, while information security encompasses the protection of all types of data, whether physical or digital. ### What are the key components of a cybersecurity strategy? Key components include risk assessment, incident response planning, employee training, network monitoring, secure software development practices, and data encryption. ### What is phishing, and how can it be prevented? Phishing is a cyberattack where attackers trick users into providing sensitive information by pretending to be legitimate entities. It can be prevented by verifying email authenticity, avoiding clicking on unknown links, and using anti-phishing tools. ### What is multi-factor authentication (MFA), and why is it important? MFA requires users to verify their identity using multiple methods (e.g., password and fingerprint). It adds an extra layer of security, reducing the risk of unauthorized access. ### How do businesses ensure cybersecurity in remote work environments? Businesses can secure remote work by implementing VPNs, enforcing strong password policies, providing cybersecurity training, and using endpoint security solutions. ### What should be included in an incident response plan? An incident response plan should include steps for identifying, containing, eradicating, and recovering from security incidents, along with roles and responsibilities, communication protocols, and regular drills. Related Content [What is Cybersecurity Transformation? Cybersecurity transformation is a comprehensive approach to strengthening an organization's security posture by integrating essential components like risk management, threat monito...](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation?ts=markdown) [Cortex XSIAM Extended security intelligence and automation management, or XSIAM, is a new approach to security operations that drives dramatically better security outcomes by closely integratin...](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) [The Resilient SOC: Essential Reading for CISOs Our interactive page covers C-level cybersecurity topics and trends like XDR, automation, attack surface management, SOAR and more.](https://www.paloaltonetworks.com/resources/infographics/the-resilient-soc-essential-reading-for-cisos?ts=markdown) [Unit 42 Global Incident Response Report Download the Report to discover five major emerging trends that are reshaping the threat landscape.](https://www.paloaltonetworks.com/engage/unit42-2025-global-incident-response-report) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Cybersecurity%3F%20Why%20It%20Matters%20%26%20Core%20Concepts&body=Discover%20how%20cybersecurity%20safeguards%20networks%20and%20data%20with%20insights%20on%20protection%20measures%20and%20emerging%20trends%20vital%20for%20today%27s%20security%20leaders.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-cyber-security) Back to Top [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-platformization?ts=markdown) What Is Cybersecurity Platformization? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language