[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/cyber-security?ts=markdown) 3. [Security Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture?ts=markdown) 4. [What is Cybersecurity Consolidation?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation?ts=markdown) Table of Contents * [What Is Security Architecture?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture?ts=markdown) * [Key Objectives of Security Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture#key?ts=markdown) * [Benefits of Security Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture#benefits?ts=markdown) * [Frameworks and Standards for Cybersecurity Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture#frameworks?ts=markdown) * [How to Build an Effective Security Architecture?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture#how?ts=markdown) * [Best Practices for Security Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture#best?ts=markdown) * [Cybersecurity Architecture FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-security-architecture#faq?ts=markdown) * [What is a Security Threat Assessment?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment?ts=markdown) * [Common Types of Security Threats](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#common?ts=markdown) * [Elements of a Security Threat Assessment](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#elements?ts=markdown) * [Benefits of a Security Threat Assessment](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#benefits?ts=markdown) * [Steps for Conducting a Security Threat Assessment](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#steps?ts=markdown) * [Security Threat Assessment FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment#faqs?ts=markdown) * What is Cybersecurity Consolidation? * [Why is Cybersecurity Consolidation Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#important?ts=markdown) * [What Are the Benefits of Cybersecurity Consolidation?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#benefits?ts=markdown) * [Why is Cybersecurity Consolidation a Priority in 2023?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#priority?ts=markdown) * [What Are the Challenges of Implementing Cybersecurity Consolidation?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#challenges?ts=markdown) * [Consolidated Platform vs. Best of Breed](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#platform?ts=markdown) * [Cybersecurity Consolidation FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#faqs?ts=markdown) * [What is an IT Security Policy?](https://www.paloaltonetworks.com/cyberpedia/what-is-an-it-security-policy?ts=markdown) * [What is Cybersecurity Transformation?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation?ts=markdown) * [Why Is Cybersecurity Transformation Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation#transformation?ts=markdown) * [4 Benefits of Cybersecurity Transformation](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation#benefits?ts=markdown) * [How to Implement Cybersecurity Transformation](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation#implement?ts=markdown) * [Challenges and Barriers to Cybersecurity Transformation](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation#challenges?ts=markdown) * [Future Trends in Cybersecurity Transformation](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation#trends?ts=markdown) * [Cybersecurity Transformation FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation#faqs?ts=markdown) * [Reducing Cybersecurity Risk at the Board Level](https://www.paloaltonetworks.com/cyberpedia/reducing-cybersecurity-risk-at-the-board-level?ts=markdown) * [Additional Resources](https://www.paloaltonetworks.com/cyberpedia/reducing-cybersecurity-risk-at-the-board-level#resources?ts=markdown) * [What Is a Distributed Enterprises and Why Does Cybersecurity Matter for Branch Offices?](https://www.paloaltonetworks.com/cyberpedia/what-is-distributed-enterprises-and-why-does-cybersecurity-matter?ts=markdown) * [How to Get the Most Value Out of Security Investments](https://www.paloaltonetworks.com/cyberpedia/how-to-get-the-most-value-out-of-security-investments?ts=markdown) # What is Cybersecurity Consolidation? 5 min. read Table of Contents * * [Why is Cybersecurity Consolidation Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#important?ts=markdown) * [What Are the Benefits of Cybersecurity Consolidation?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#benefits?ts=markdown) * [Why is Cybersecurity Consolidation a Priority in 2023?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#priority?ts=markdown) * [What Are the Challenges of Implementing Cybersecurity Consolidation?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#challenges?ts=markdown) * [Consolidated Platform vs. Best of Breed](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#platform?ts=markdown) * [Cybersecurity Consolidation FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#faqs?ts=markdown) 1. Why is Cybersecurity Consolidation Important? * * [Why is Cybersecurity Consolidation Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#important?ts=markdown) * [What Are the Benefits of Cybersecurity Consolidation?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#benefits?ts=markdown) * [Why is Cybersecurity Consolidation a Priority in 2023?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#priority?ts=markdown) * [What Are the Challenges of Implementing Cybersecurity Consolidation?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#challenges?ts=markdown) * [Consolidated Platform vs. Best of Breed](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#platform?ts=markdown) * [Cybersecurity Consolidation FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation#faqs?ts=markdown) Cybersecurity consolidation is the process of modernizing cybersecurity architectures to reduce the number of tools and vendors, eliminate silos, unify threat prevention and response, and shift to an integrated security approach that strengthens risk posture. With cybersecurity consolidation, security platforms protect organizations on all attack surfaces---network, cloud, IoT, endpoints, SD-WAN, and more---while sharing the same technologies and intelligence. The result is a security infrastructure that's unified, easier to manage, less costly, and future-proofed. ## Why is Cybersecurity Consolidation Important? Cyber threats are rapidly evolving, with [96% of business leaders](https://start.paloaltonetworks.com/whats-next-in-cyber-report?utm_source=google-jg-amer-portfolio&utm_medium=paid_search&utm_term=what%27s%20next%20in%20cyber&utm_campaign=google-portfolio-portfolio-amer-multi-lead_generation-en&utm_content=gs-18707974512-140675528617-646907393200&sfdcid=7014u000001VQAEAA4&gclid=CjwKCAjw3POhBhBQEiwAqTCuBhG0L0a0A6F-x1Th4S1tjdjq47H0C-MvMNOfvKh3MZzYKr8k2e-huxoCowoQAvD_BwE) experiencing a breach in 2022 and 57% of those experiencing three or more. And as threat actors increasingly leverage artificial intelligence (AI) to launch sophisticated cyberattacks, organizations have a new generation of threats to defend against. At the same time, IT environments are more complex and borderless than ever before, with many enterprises now employing multi-cloud strategies and multiple-point products. This makes traditional risk management defenses ineffective, and leaves organizations open to attacks. ![Infographic showing Palo Alto Networks’ Security Platform for Cybersecurity Consolidation](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/Cyberpedia_What-is-Cybersecurity-Consolidation.jpg "Infographic showing Palo Alto Networks’ Security Platform for Cybersecurity Consolidation") Cybersecurity consolidation strengthens risk management by protecting all attack surfaces using consolidated [security platforms](https://www.paloaltonetworks.com/paloaltonetworks-portfolio?ts=markdown). Cybersecurity consolidation offers critical security features and services---firewall, DNS security, intrusion detection, SD-WAN---all in one platform, where those tools use shared intelligence to prevent zero-day attacks. It enables security teams to maximize their use of key technologies such as automation, machine learning and artificial intelligence (AI) to accelerate response times and reduce IT complexity. ## What Are the Benefits of Cybersecurity Consolidation? Cybersecurity consolidation enhances risk posture by collectively **sharing intelligence** to prevent zero-day threats in real time. Tools share data points, dashboards and user experiences, providing security teams with a complete picture of their risk posture and an opportunity to centralize cyber threat detection and response. Cybersecurity consolidation also reduces the number of individual security tools and services deployed in a single architecture. Today's enterprises employ [31.5 security tools on average](https://start.paloaltonetworks.com/whats-next-in-cyber-report?utm_medium=earned&utm_source=Ignite-Press-Release)---each having its own procurement, implementation, and upkeep requirements. But with a consolidated architecture, those tools and services are merged into a few platforms that are simple to manage. When every part of the cybersecurity stack works together in a simpler, more unified structure, organizations are fully prepared to handle the latest cyber threats. ### Key Benefits of a Consolidated Cybersecurity Architecture * Faster threat detection and response through automation, machine learning and artificial intelligence. * Reduced time to respond to incidents via centralized cyber threat detection and response. * Reduced risk of security gaps caused by siloed solutions and human errors. * Improved productivity and morale for overworked and over-extended SOC and cybersecurity teams, resulting in reduced turnover. * Reduced time to update security policies, implement patches consistently across all environments and complete threat analyses. * Improved user experience, with a more direct path to Zero Trust architectures. * Faster speed to market by empowering DevSecOps and a "shift left" security posture that enhances innovation. ## Why is Cybersecurity Consolidation a Priority in 2023? 2023 is a mission-critical period in cybersecurity. Multi-cloud architectures are now the rule, not the exception, requiring more centralized control and enterprise-wide visibility. At the same time, hybrid work is the new workplace reality, with employees who log in from anywhere and everywhere. SIEM, IAM, threat intelligence, Zero Trust and other aspects of a modern cybersecurity system must be tightly integrated in order to deliver the benefits of security infrastructure optimization and enterprise-wide risk management. At the same time, threat actors are better funded and more sophisticated in their use of automation, machine learning and artificial intelligence. With intelligent tools, adversaries create more effective phishing emails and deep fakes, using automation to make their attacks more potent and massive in scale. Hybrid work and the Internet of Things (IoT) have increased the attack surface, and adversaries are using intelligent technologies to ramp up attacks in these areas. For example, [84% of cybersecurity decision-makers](https://start.paloaltonetworks.com/whats-next-in-cyber-report?utm_source=google-jg-amer-portfolio&utm_medium=paid_search&utm_term=what%27s%20next%20in%20cyber&utm_campaign=google-portfolio-portfolio-amer-multi-lead_generation-en&utm_content=gs-18707974512-140675528617-646907393200&sfdcid=7014u000001VQAEAA4&gclid=CjwKCAjw3POhBhBQEiwAqTCuBhG0L0a0A6F-x1Th4S1tjdjq47H0C-MvMNOfvKh3MZzYKr8k2e-huxoCowoQAvD_BwE) have seen more incidents due to hybrid work over the past 12 months. ## What Are the Challenges of Implementing Cybersecurity Consolidation? Cybersecurity consolidation is a marathon---not a sprint. Organizations will face several key challenges when adopting cybersecurity platforms. Here are a few: ### Integration Issues Integration remains a key concern when procuring new cybersecurity solutions. Organizations entrenched in existing workflows have to determine whether a consolidated platform will integrate with their current architecture. It's often not a simple "rip and replace" when implementing new solutions, and will require a cybersecurity provider that works hand-in-hand with the security team to determine if consolidation is the right answer. ### Vendor Lock-In Many security tools use proprietary technologies designed to solve specific problems---without providing an easy path to integration. At the same time, many organizations often have significant, long-term investments and training with particular vendors and technologies. Organizations must look at their current investments and determine whether a consolidated security platform makes sense from a financial and operational perspective. ### Resistance to Change Switching security solutions is a tough decision for enterprises. How do you know your next solution will be an improvement? Will a single platform model meet all of your IT and business needs? And how will end users adapt to the new tools and services? Deploying new cybersecurity tools will require a concerted effort across the entire organization to ensure the tools are properly deployed, effectively managed and understood by every end user. ## Consolidated Platform vs. Best of Breed Cybersecurity technology typically falls into two camps: **best of breed** or **platform**. The best-of-breed approach means organizations choose security tools as needed by the business. The platform approach means organizations get an entire suite of security tools that provide end-to-end security. Both approaches have their advantages and disadvantages. Let's take a look: ### Pros of Consolidated Platforms * Consolidated security architecture to reduce the number of point solutions * Single vendor, single console for endpoint protection solutions, SEIM, IAM, cyber threat detection and response * Centralized visibility to simplify risk management, security compliance, vulnerability management and cybersecurity transformation * Simpler, more straightforward path to Zero Trust * Future-proofed security architecture ### Cons of Consolidated Platforms * Possibility of missing potential innovations * Potential challenges of moving to new vendors and costs involved in migration, training, learning new tools and failing to maximize existing investments. ### Pros of Best-of Breed-solutions * Using the best technology for each point solution * Using different vendors provides extra flexibility * Ability to take advantage of new technology and product innovations as they come to market, without waiting for your platform vendor to develop it * Flexibility to leverage existing investments and training ### Cons of Best-of Breed-solutions * Lack of integration and interoperability increases cyber risk * Vendor lock-in for key products and solutions, such as SIEM or IAM * More complexity in managing governance and compliance * Makes budgeting more difficult and less predictable * Doesn't adequately address the problem of too many vendors and tools ## Cybersecurity Consolidation FAQs ### What is a cybersecurity platform? Cybersecurity platforms offer multiple security tools and services under one, unified platform. For example, a Network Security platform might include a firewall, URL filtering, DNS security, SD-WAN, and more. A Cloud Security platform might include workload protection, code security, and API security. ### How can I reduce my risk of cyberattacks? Implementing cybersecurity platforms that offer end-to-end protection for your entire organization. That includes network security, cloud security, and endpoint security. ### Is cybersecurity consolidation a tool? Cybersecurity consolidation is the idea of integrating multiple security tools under one platform. The platform is operated by a single vendor, making management and support simple. ### How does consolidation help combat AI-based cyberattacks? Consolidated platforms have a unique advantage over best-of-breed solutions: **shared intelligence**. AI-based defenses require the right sets of data, which can only come from the tight correlation with AI and ML models used in security platforms. ### How many cybersecurity platforms are there? There are many platforms in the cybersecurity space. At Palo Alto Networks, we have 3: Network Security, Prisma, and Cortex. Related Content [What is Machine Learning? Machine learning is the future of cybersecurity. Here's everything you need to know.](https://www.paloaltonetworks.com/cyberpedia/what-is-machine-learning?ts=markdown) [What is Cybersecurity Transformation? Cybersecurity is a critical part of your digital transformation journey. What steps should you take to secure your organization? And what are the benefits?](https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-transformation?ts=markdown) [Cyber Transformation: 3 Key Areas to Prioritize Ready to transform your organization's risk posture? Make these three areas your #1 priority.](https://www.paloaltonetworks.com/resources/infographics/build-your-cyber-resilience-in-3-steps?ts=markdown) [Why Consolidation Makes Sense From multicloud environments to AI-based attacks, the threat landscape is changing rapidly. Consolidating your security is key to preventing threats in 2024 and beyond.](https://start.paloaltonetworks.com/secure-from-every-angle.html) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20is%20Cybersecurity%20Consolidation%3F&body=Discover%20how%20cybersecurity%20consolidation%20integrates%20multiple%20security%20solutions%20into%20a%20unified%20system%20for%20improved%20efficiency%20and%20streamlined%20management.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-consolidation) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-threat-assessment?ts=markdown) What is a Security Threat Assessment? [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-an-it-security-policy?ts=markdown) What is an IT Security Policy? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language