[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Network Security](https://www.paloaltonetworks.com/cyberpedia/network-security?ts=markdown) 3. [Data Security](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security?ts=markdown) 4. [What Is Data Security? \[Definition, Overview, \& Why It Matters\]](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security?ts=markdown) Table of contents * What Is Data Security? \[Definition, Overview, \& Why It Matters\] * [Why does data security matter?](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#why-does-data-security-matter?ts=markdown) * [What makes data security complex in practice?](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#what-makes-data-security-complex-in-practice?ts=markdown) * [What are the main approaches to data security?](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#what-are-the-main-approaches-to-data-security?ts=markdown) * [What regulations, standards, and frameworks guide data security?](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#what-regulations-standards-and-frameworks-guide-data-security?ts=markdown) * [Comparing data security with related security domains](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#comparing-data-security-with-related-security-domains?ts=markdown) * [Data Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#data-security-faqs?ts=markdown) * [How DSPM Is Evolving: Key Trends to Watch](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends?ts=markdown) * [From Static Discovery to Dynamic Intelligence](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#static?ts=markdown) * [The Convergence of DSPM with Cloud-Native Security Architectures](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#native?ts=markdown) * [Real-Time Data Detection and Response](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#response?ts=markdown) * [AI Security and Generative AI Data Protection](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#protection?ts=markdown) * [Automation, Policy-as-Code, and DevSecOps Integration](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#automation?ts=markdown) * [DSPM Key Trends FAQs](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#faq?ts=markdown) * [What Is Data Loss Prevention (DLP) Compliance?](https://www.paloaltonetworks.com/cyberpedia/data-loss-prevention-dlp-compliance?ts=markdown) * [Why Is DLP Compliance Important?](https://www.paloaltonetworks.com/cyberpedia/data-loss-prevention-dlp-compliance#why?ts=markdown) * [DLP Regulatory Compliance Explained](https://www.paloaltonetworks.com/cyberpedia/data-loss-prevention-dlp-compliance#dlp?ts=markdown) * [Types of Data Threats](https://www.paloaltonetworks.com/cyberpedia/data-loss-prevention-dlp-compliance#types?ts=markdown) * [How Does DLP Work?](https://www.paloaltonetworks.com/cyberpedia/data-loss-prevention-dlp-compliance#how?ts=markdown) * [DLP Compliance Management Strategies](https://www.paloaltonetworks.com/cyberpedia/data-loss-prevention-dlp-compliance#compliance?ts=markdown) * [Legal and Ethical Considerations in DLP](https://www.paloaltonetworks.com/cyberpedia/data-loss-prevention-dlp-compliance#legal?ts=markdown) * [Future Predictions for DLP Compliance](https://www.paloaltonetworks.com/cyberpedia/data-loss-prevention-dlp-compliance#future?ts=markdown) * [DLP and Compliance FAQs](https://www.paloaltonetworks.com/cyberpedia/data-loss-prevention-dlp-compliance#faqs?ts=markdown) * [Top Cloud Data Security Solutions](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions?ts=markdown) * [The Modern Cloud Data Security Landscape](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#modern?ts=markdown) * [The Anatomy of Modern Cloud Security](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#cloud?ts=markdown) * [Evaluating Data Protection Platforms for Enterprise Deployment](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#data?ts=markdown) * [Leading Cloud Data Security Solutions and Market Positioning](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#security?ts=markdown) * [Strategic Implementation and Platform Selection](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#platform?ts=markdown) * [Top Cloud Data Security Solutions FAQs](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#faq?ts=markdown) * [DSPM Market Size: 2025 Guide](https://www.paloaltonetworks.com/cyberpedia/dspm-market?ts=markdown) * [DSPM Market Size and Financial Overview](https://www.paloaltonetworks.com/cyberpedia/dspm-market#dspm?ts=markdown) * [Growth Drivers Reshaping the DSPM Market](https://www.paloaltonetworks.com/cyberpedia/dspm-market#growth?ts=markdown) * [Market Segmentation and Adoption Patterns](https://www.paloaltonetworks.com/cyberpedia/dspm-market#market?ts=markdown) * [Palo Alto Networks DSPM Market Position](https://www.paloaltonetworks.com/cyberpedia/dspm-market#position?ts=markdown) * [DSPM Market Forecast Through 2030](https://www.paloaltonetworks.com/cyberpedia/dspm-market#dspm?ts=markdown) * [DSPM Market FAQs](https://www.paloaltonetworks.com/cyberpedia/dspm-market#faqs?ts=markdown) * [What Is Data Encryption?](https://www.paloaltonetworks.com/cyberpedia/data-encryption?ts=markdown) * [Data Encryption Explained](https://www.paloaltonetworks.com/cyberpedia/data-encryption#data?ts=markdown) * [Types of Encryption](https://www.paloaltonetworks.com/cyberpedia/data-encryption#types?ts=markdown) * [What Are the Benefits of Data Encryption?](https://www.paloaltonetworks.com/cyberpedia/data-encryption#what?ts=markdown) * [Data Encryption Use Cases](https://www.paloaltonetworks.com/cyberpedia/data-encryption#usecases?ts=markdown) * [Key Selection](https://www.paloaltonetworks.com/cyberpedia/data-encryption#key?ts=markdown) * [Data Encryption and Algorithms](https://www.paloaltonetworks.com/cyberpedia/data-encryption#algorithms?ts=markdown) * [Encryption Best Practices](https://www.paloaltonetworks.com/cyberpedia/data-encryption#best-practices?ts=markdown) * [Data Encryption FAQs](https://www.paloaltonetworks.com/cyberpedia/data-encryption#faqs?ts=markdown) * [What Is Data Storage?](https://www.paloaltonetworks.com/cyberpedia/data-storage?ts=markdown) * [Data Storage Explained](https://www.paloaltonetworks.com/cyberpedia/data-storage#data?ts=markdown) * [What Are Different Types of Data Storage?](https://www.paloaltonetworks.com/cyberpedia/data-storage#what?ts=markdown) * [What Is Structured Data?](https://www.paloaltonetworks.com/cyberpedia/data-storage#structured?ts=markdown) * [What Is Unstructured Data?](https://www.paloaltonetworks.com/cyberpedia/data-storage#unstructured?ts=markdown) * [What Is Semi-Structured Data?](https://www.paloaltonetworks.com/cyberpedia/data-storage#semi-structured?ts=markdown) * [Data Storage in the Cloud](https://www.paloaltonetworks.com/cyberpedia/data-storage#cloud?ts=markdown) * [Data Storage FAQs](https://www.paloaltonetworks.com/cyberpedia/data-storage#faqs?ts=markdown) * [What Is Data Risk Assessment?](https://www.paloaltonetworks.com/cyberpedia/data-risk-assessment?ts=markdown) * [Data Risk Assessment Explained](https://www.paloaltonetworks.com/cyberpedia/data-risk-assessment#data?ts=markdown) * [Why Data Risk Assessment Is Crucial](https://www.paloaltonetworks.com/cyberpedia/data-risk-assessment#why?ts=markdown) * [When Assessing Risk is Necessary](https://www.paloaltonetworks.com/cyberpedia/data-risk-assessment#when?ts=markdown) * [What Are the Benefits of Assessing Data Risk?](https://www.paloaltonetworks.com/cyberpedia/data-risk-assessment#what?ts=markdown) * [Assessing Risk in Cloud Data](https://www.paloaltonetworks.com/cyberpedia/data-risk-assessment#assessing?ts=markdown) * [Data Risk Assessment FAQs](https://www.paloaltonetworks.com/cyberpedia/data-risk-assessment#faqs?ts=markdown) * [What Is Database Security?](https://www.paloaltonetworks.com/cyberpedia/database-security?ts=markdown) * [Database Security in Public Clouds](https://www.paloaltonetworks.com/cyberpedia/database-security#database?ts=markdown) * [Elements of Database Security](https://www.paloaltonetworks.com/cyberpedia/database-security#elements?ts=markdown) * [Database Security: 8 Best Practices](https://www.paloaltonetworks.com/cyberpedia/database-security#security?ts=markdown) * [Database Security FAQs](https://www.paloaltonetworks.com/cyberpedia/database-security#faqs?ts=markdown) * [What Is Cloud Data Loss Prevention (DLP)?](https://www.paloaltonetworks.com/cyberpedia/cloud-data-loss-prevention?ts=markdown) * [Cloud Data Loss Prevention (DLP) Explained](https://www.paloaltonetworks.com/cyberpedia/cloud-data-loss-prevention#cloud?ts=markdown) * [How Cloud DLP Works](https://www.paloaltonetworks.com/cyberpedia/cloud-data-loss-prevention#how?ts=markdown) * [Traditional DLP Vs. Cloud DLP](https://www.paloaltonetworks.com/cyberpedia/cloud-data-loss-prevention#traditional?ts=markdown) * [Benefits of Cloud DLP](https://www.paloaltonetworks.com/cyberpedia/cloud-data-loss-prevention#benefits?ts=markdown) * [‍Cloud Data Loss Prevention FAQ](https://www.paloaltonetworks.com/cyberpedia/cloud-data-loss-prevention#faqs?ts=markdown) * [What Is a Data Lake?](https://www.paloaltonetworks.com/cyberpedia/data-lake?ts=markdown) * [Data Lakes Explained](https://www.paloaltonetworks.com/cyberpedia/data-lake#data?ts=markdown) * [Data Lake vs. Data Warehouse](https://www.paloaltonetworks.com/cyberpedia/data-lake#vs?ts=markdown) * [What Are the Benefits of Data Lakes?](https://www.paloaltonetworks.com/cyberpedia/data-lake#what?ts=markdown) * [Challenges of Using Data Lakes](https://www.paloaltonetworks.com/cyberpedia/data-lake#challenges?ts=markdown) * [‍Use Cases For Data Lakes](https://www.paloaltonetworks.com/cyberpedia/data-lake#usecases?ts=markdown) * [Data Lake FAQs](https://www.paloaltonetworks.com/cyberpedia/data-lake#faqs?ts=markdown) * [What Is a Data Security Platform?](https://www.paloaltonetworks.com/cyberpedia/data-security-platform?ts=markdown) * [Data Security Platform Explained](https://www.paloaltonetworks.com/cyberpedia/data-security-platform#data?ts=markdown) * [How a Data Security Platform Solves the Complexity of Data Protection](https://www.paloaltonetworks.com/cyberpedia/data-security-platform#how?ts=markdown) * [A Data Protection Platform Reduces Risk](https://www.paloaltonetworks.com/cyberpedia/data-security-platform#protection?ts=markdown) * [Benefits of a Data Protection Platform](https://www.paloaltonetworks.com/cyberpedia/data-security-platform#benefits?ts=markdown) * [Data Security Platform FAQs](https://www.paloaltonetworks.com/cyberpedia/data-security-platform#faqs?ts=markdown) * [What Is a Data Warehouse?](https://www.paloaltonetworks.com/cyberpedia/data-warehouse?ts=markdown) * [Data Warehouses Explained](https://www.paloaltonetworks.com/cyberpedia/data-warehouse#data?ts=markdown) * [What Makes a Data Warehouse Unique?](https://www.paloaltonetworks.com/cyberpedia/data-warehouse#what?ts=markdown) * [What Are the Benefits of Data Warehouses?](https://www.paloaltonetworks.com/cyberpedia/data-warehouse#benefits?ts=markdown) * [When Are Data Warehouses Beneficial?](https://www.paloaltonetworks.com/cyberpedia/data-warehouse#beneficial?ts=markdown) * [Data Warehouse FAQs](https://www.paloaltonetworks.com/cyberpedia/data-warehouse#faqs?ts=markdown) * [What Is a Data Leak?](https://www.paloaltonetworks.com/cyberpedia/data-leak?ts=markdown) * [Data Leaks Explained](https://www.paloaltonetworks.com/cyberpedia/data-leak#explained?ts=markdown) * [Data Leaks in Public Clouds](https://www.paloaltonetworks.com/cyberpedia/data-leak#public-clouds?ts=markdown) * [Data Breach vs Data Leak](https://www.paloaltonetworks.com/cyberpedia/data-leak#vs?ts=markdown) * [Data Leak FAQs](https://www.paloaltonetworks.com/cyberpedia/data-leak#faqs?ts=markdown) * [What Is Shadow IT?](https://www.paloaltonetworks.com/cyberpedia/shadow-it?ts=markdown) * [Shadow IT Explained](https://www.paloaltonetworks.com/cyberpedia/shadow-it#shadow?ts=markdown) * [Shadow IT and Security](https://www.paloaltonetworks.com/cyberpedia/shadow-it#security?ts=markdown) * [Mitigating Shadow IT Risks](https://www.paloaltonetworks.com/cyberpedia/shadow-it#mitigating?ts=markdown) * [Shadow IT FAQs](https://www.paloaltonetworks.com/cyberpedia/shadow-it#faqs?ts=markdown) * [Data Security Policies: Why They Matter and What They Contain](https://www.paloaltonetworks.com/cyberpedia/data-security-policy?ts=markdown) * [What Is a Data Security Policy?](https://www.paloaltonetworks.com/cyberpedia/data-security-policy#what?ts=markdown) * [Data Security Policies Explained](https://www.paloaltonetworks.com/cyberpedia/data-security-policy#data?ts=markdown) * [What Is in a Data Security Policy?](https://www.paloaltonetworks.com/cyberpedia/data-security-policy#what-is?ts=markdown) * [What Data Security Controls Should a Policy Include?](https://www.paloaltonetworks.com/cyberpedia/data-security-policy#include?ts=markdown) * [Data Security Policy FAQs](https://www.paloaltonetworks.com/cyberpedia/data-security-policy#faqs?ts=markdown) * [What Is an Insider Threat?](https://www.paloaltonetworks.com/cyberpedia/insider-threat?ts=markdown) * [Insider Threat Explained](https://www.paloaltonetworks.com/cyberpedia/insider-threat#insider?ts=markdown) * [Privileged Users \& Insider Risks](https://www.paloaltonetworks.com/cyberpedia/insider-threat#privileged?ts=markdown) * [Employee Monitoring](https://www.paloaltonetworks.com/cyberpedia/insider-threat#employee?ts=markdown) * [Data Detection and Response (DDR)](https://www.paloaltonetworks.com/cyberpedia/insider-threat#data?ts=markdown) * [Insider Threat FAQs](https://www.paloaltonetworks.com/cyberpedia/insider-threat#faqs?ts=markdown) * [What Is Data Sprawl?](https://www.paloaltonetworks.com/cyberpedia/data-sprawl?ts=markdown) * [Data Sprawl Explained](https://www.paloaltonetworks.com/cyberpedia/data-sprawl#data-sprawl?ts=markdown) * [The Challenge of Data Sprawl](https://www.paloaltonetworks.com/cyberpedia/data-sprawl#challenge?ts=markdown) * [Best Practices to Overcome Data Sprawl](https://www.paloaltonetworks.com/cyberpedia/data-sprawl#best-practices?ts=markdown) * [Data Sprawl FAQs](https://www.paloaltonetworks.com/cyberpedia/data-sprawl#faq?ts=markdown) # What Is Data Security? \[Definition, Overview, \& Why It Matters\] 8 min. read Table of contents * * [Why does data security matter?](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#why-does-data-security-matter?ts=markdown) * [What makes data security complex in practice?](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#what-makes-data-security-complex-in-practice?ts=markdown) * [What are the main approaches to data security?](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#what-are-the-main-approaches-to-data-security?ts=markdown) * [What regulations, standards, and frameworks guide data security?](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#what-regulations-standards-and-frameworks-guide-data-security?ts=markdown) * [Comparing data security with related security domains](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#comparing-data-security-with-related-security-domains?ts=markdown) * [Data Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#data-security-faqs?ts=markdown) 1. Why does data security matter? * * [Why does data security matter?](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#why-does-data-security-matter?ts=markdown) * [What makes data security complex in practice?](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#what-makes-data-security-complex-in-practice?ts=markdown) * [What are the main approaches to data security?](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#what-are-the-main-approaches-to-data-security?ts=markdown) * [What regulations, standards, and frameworks guide data security?](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#what-regulations-standards-and-frameworks-guide-data-security?ts=markdown) * [Comparing data security with related security domains](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#comparing-data-security-with-related-security-domains?ts=markdown) * [Data Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security#data-security-faqs?ts=markdown) Data security is the practice of protecting digital information from unauthorized access, corruption, or loss. It involves implementing technologies, tools, and policies to ensure data remains safe throughout its lifecycle. Data security includes methods like encryption, access controls, and regular auditing to prevent breaches and ensure compliance with regulations. ## Why does data security matter? ![Diagram titled 'Importance of Data Security,' with four sections surrounding a central diamond. The first section, labeled '1,' focuses on safeguarding sensitive information. The second section, labeled '2,' emphasizes mitigating risks and vulnerabilities. The third section, labeled '3,' highlights maintaining customer trust and loyalty. The fourth section, labeled '4,' is about compliance with regulation.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-data-security/new/Importance-of-data-security.png "Diagram titled 'Importance of Data Security,' with four sections surrounding a central diamond. The first section, labeled '1,' focuses on safeguarding sensitive information. The second section, labeled '2,' emphasizes mitigating risks and vulnerabilities. The third section, labeled '3,' highlights maintaining customer trust and loyalty. The fourth section, labeled '4,' is about compliance with regulation.") Data security matters because it protects sensitive information from theft, corruption, or unauthorized access. Organizations rely on it to safeguard customer data, intellectual property, and other business-critical assets. The financial stakes are high. [Data breaches](https://www.paloaltonetworks.com/cyberpedia/data-breach) are becoming more frequent. And the costs continue to rise. "As of 2024, the global average cost of a data breach is $4.88 million, marking a 10% increase from the previous year." [- IBM, Cost of a Data Breach Report 2024](https://www.ibm.com/reports/data-breach) Regulations add another layer. Laws such as GDPR and HIPAA require organizations to follow strict requirements for protecting data. Non-compliance can result in significant penalties and legal exposure. AI has also raised the bar. These systems depend on massive datasets for training and operation. If the data is tampered with, exposed, or otherwise insecure, it can corrupt the model. That can result in biased, unreliable, or even harmful outputs. * 86% of incidents Unit 42 responded to in 2024 involved business disruption, ranging from downtime to reputational damage. * Speed of data theft: In one in five cases (19%), attackers exfiltrated data in less than one hour of compromise. Median time to exfiltration is about two days --- far faster than many organizations' detection timelines. [- Unit 42 Global Incident Response Report 2025](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report) Essentially: Data security protects against immediate risks like breaches and fines. But it also creates the conditions for long-term trust and safe use of technologies like AI. So, what are the benefits of data security? Here's what strong data security practices provide: ![The image is a semi-circular infographic titled 'Benefits of data security' in bold black text at the bottom center. Nine benefits are shown around the arc with circular icons above short text labels. Starting from the left, a gray icon with a shield and gear represents 'Prevents data tampering.' Below it, a light gray icon with a lock represents 'Protects sensitive information.' Further left, a dark gray icon with a folder and eye symbol represents 'Reduces shadow data exposure.' Moving upward, a teal icon with a shield and checkmark represents 'Protects the company's reputation.' At the top center, an orange icon with a dollar sign and coins represents 'Avoids additional costs.' To the right, a blue icon with a bar chart represents 'Provides competitive advantage.' Continuing right, a turquoise icon with a thumbs-up symbol represents 'Maintains customer trust \& confidence.' Below it, a green icon with a clipboard and checkmark represents 'Ensures legal \& regulatory compliance.' Finally, a gray icon with a database and connected nodes represents 'Supports safe data use in AI \& analytics.' Each icon is connected to the title by thin dotted lines forming a half-circle layout.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-data-security/new/Benefits-of-data-security.png "The image is a semi-circular infographic titled 'Benefits of data security' in bold black text at the bottom center. Nine benefits are shown around the arc with circular icons above short text labels. Starting from the left, a gray icon with a shield and gear represents 'Prevents data tampering.' Below it, a light gray icon with a lock represents 'Protects sensitive information.' Further left, a dark gray icon with a folder and eye symbol represents 'Reduces shadow data exposure.' Moving upward, a teal icon with a shield and checkmark represents 'Protects the company's reputation.' At the top center, an orange icon with a dollar sign and coins represents 'Avoids additional costs.' To the right, a blue icon with a bar chart represents 'Provides competitive advantage.' Continuing right, a turquoise icon with a thumbs-up symbol represents 'Maintains customer trust & confidence.' Below it, a green icon with a clipboard and checkmark represents 'Ensures legal & regulatory compliance.' Finally, a gray icon with a database and connected nodes represents 'Supports safe data use in AI & analytics.' Each icon is connected to the title by thin dotted lines forming a half-circle layout.") * Protects sensitive information * Prevents data tampering * Protects the company's reputation * Ensures legal and regulatory compliance * Maintains customer trust and confidence * Provides competitive advantage * Avoids additional costs * Supports safe data use in AI and analytics * Reduces shadow data exposure Ultimately, data security isn't only about preventing breaches. It's about staying compliant, protecting trust, and keeping pace with how fast data is created and exploited today. ## What makes data security complex in practice? On paper, the controls look simple. Encrypt data. Set access rules. Back it up. In practice, keeping data secure across a modern environment is harder than it seems. Here's why. ![The image is a circular infographic with a segmented ring surrounding the bold black title 'Data security' in the center. Around the ring, six challenges are labeled with icons. At the top left, a gray icon of a folder with an eye represents 'Data movement \& shadow data.' Directly below it, a gray silhouette of a person running represents 'Fast-moving attackers.' At the bottom left, two overlapping gray circles represent 'Human \& organizational gaps.' On the top right, a gray icon of a magnifying glass over gears represents 'Ongoing upkeep of controls.' Below it, a gray icon of a checklist represents 'Overlapping regulatory requirements.' Each label is linked to its segment of the colored ring, which is divided into red, orange, yellow, and blue sections. At the bottom right, bold black text reads 'Why data security is difficult in practice.'](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-data-security/new/Why-data-security-is-difficult-in-practice.png "The image is a circular infographic with a segmented ring surrounding the bold black title 'Data security' in the center. Around the ring, six challenges are labeled with icons. At the top left, a gray icon of a folder with an eye represents 'Data movement & shadow data.' Directly below it, a gray silhouette of a person running represents 'Fast-moving attackers.' At the bottom left, two overlapping gray circles represent 'Human & organizational gaps.' On the top right, a gray icon of a magnifying glass over gears represents 'Ongoing upkeep of controls.' Below it, a gray icon of a checklist represents 'Overlapping regulatory requirements.' Each label is linked to its segment of the colored ring, which is divided into red, orange, yellow, and blue sections. At the bottom right, bold black text reads 'Why data security is difficult in practice.'") **Data doesn't sit still.** It moves across SaaS apps, cloud storage, developer sandboxes, laptops, and vendor systems. New copies appear as teams export, transform, and test. Which means inventories drift. Discovery tools help. But they lag when data is duplicated outside official workflows. That's where "shadow data" creeps in and breaks assumptions about coverage. **Controls depend on upkeep.** Encryption is only as strong as key handling. IAM only works if privileges match the job someone does today, not last quarter. Backups only help if they restore cleanly and within the window the business expects. None of that is a one-time project. It's ongoing hygiene. And as systems and teams change, the effort compounds. **Requirements overlap.** Different data sets trigger different obligations. Customer records. Payment data. Health information. Each carries its own handling, retention, and reporting rules. So organizations layer controls to satisfy multiple frameworks at once. The result can be operational friction: more policies to enforce, more audits to pass, more places a small gap can matter. **Attackers move fast.** Incidents aren't always slow burns. In a material share of cases, data is exfiltrated within hours of initial compromise. The median time to theft is often days, not weeks. Which means detection and response timelines matter as much as preventive controls. If a control is misconfigured, there isn't much slack before it shows. **People create edges.** Real work happens in spreadsheets, exports, notebook snapshots, and test databases. Contractors need access. BYOD devices connect from anywhere. Each exception adds a little risk. None looks dramatic on its own. Together they create blind spots that policy alone won't close. In other words: the hard part isn't knowing what to do. It's keeping the right controls aligned with where the data actually lives, who can reach it, and how quickly things can go wrong. | ***Further reading:*** * [*What Is Shadow Data?*](https://www.paloaltonetworks.com/cyberpedia/shadow-data) * [*What Is Data Sprawl?*](https://www.paloaltonetworks.com/cyberpedia/data-sprawl) * [*What Is Data Movement?*](https://www.paloaltonetworks.com/cyberpedia/data-movement) ## What are the main approaches to data security? ![The diagram is titled 'Data security approaches' and shows four main categories in a circular layout with surrounding branches. At the center are four colored circles: 'Foundational protections' in teal, 'Visibility \& governance' in blue, 'Environment-specific safeguards' in purple, and 'Response \& resiliency' in green. Branching from 'Foundational protections' are 'Encryption,' 'Access control,' 'Authentication,' 'Data masking,' 'Data erasure,' 'Tokenization,' 'Key management systems (KMS),' and 'Identity \& access management (IAM).' From 'Visibility \& governance' extend 'Data classification,' 'Data loss prevention (DLP),' 'Data security posture management (DSPM),' and 'Governance, risk, \& compliance (GRC).' From 'Environment-specific safeguards' extend 'Cloud security,' 'Network access control (NAC),' 'Endpoint protection,' and 'Zero Trust.' From 'Response \& resiliency' extend 'Data resiliency \& disaster recovery' and 'Incident response.'](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-data-security/new/Data-security-approaches.png "The diagram is titled 'Data security approaches' and shows four main categories in a circular layout with surrounding branches. At the center are four colored circles: 'Foundational protections' in teal, 'Visibility & governance' in blue, 'Environment-specific safeguards' in purple, and 'Response & resiliency' in green. Branching from 'Foundational protections' are 'Encryption,' 'Access control,' 'Authentication,' 'Data masking,' 'Data erasure,' 'Tokenization,' 'Key management systems (KMS),' and 'Identity & access management (IAM).' From 'Visibility & governance' extend 'Data classification,' 'Data loss prevention (DLP),' 'Data security posture management (DSPM),' and 'Governance, risk, & compliance (GRC).' From 'Environment-specific safeguards' extend 'Cloud security,' 'Network access control (NAC),' 'Endpoint protection,' and 'Zero Trust.' From 'Response & resiliency' extend 'Data resiliency & disaster recovery' and 'Incident response.'") | ***Further reading:** [Top 12 Data Security Best Practices](https://www.paloaltonetworks.com/cyberpedia/data-security-best-practices)* ### **Foundational protections** (basic controls every environment needs) Foundational protections are the baseline of any data security program. They include methods like encryption, access rules, and authentication --- along with the systems that keep those methods consistent at scale. Encryption keeps information unreadable if stolen, but only works if keys are created and managed properly. [Access control](https://www.paloaltonetworks.com/cyberpedia/access-control) and authentication decide who can see or change data, while IAM ties those decisions to roles and reviews them over time. Other measures, like masking or tokenization, reduce exposure when real data isn't needed, and secure erasure ensures information is gone when it's no longer required. In short, these are the essential safeguards every environment needs before higher-level controls can be effective. | ***Further reading:*** * [*What Is Data Encryption?*](https://www.paloaltonetworks.com/cyberpedia/data-encryption) * [*Data Security Policies: Why They Matter and What They Contain*](https://www.paloaltonetworks.com/cyberpedia/data-security-policy) ### **Visibility and governance** (knowing where data is and how it's handled) Visibility and governance make sure you actually know what data exists and how it's being used. Without that, protections are guesswork. It starts with classification. Label information based on sensitivity and criticality, then tie those labels to policies so they mean something in practice. From there, DLP monitors how data moves and blocks risky transfers. DSPM fills the cloud and SaaS gap, mapping shadow data that older tools can't see. Finally, GRC frameworks connect all of this to regulations and internal rules so oversight stays consistent and defensible. | ***Further reading:*** * [*What Is Data Discovery?*](https://www.paloaltonetworks.com/cyberpedia/data-discovery) * [*What Is Data Classification?*](https://www.paloaltonetworks.com/cyberpedia/data-classification) * [*What Is Data Governance?*](https://www.paloaltonetworks.com/cyberpedia/data-governance) * [*What Is Data Access Governance?*](https://www.paloaltonetworks.com/cyberpedia/data-access-governance) * [*What Is DSPM?*](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm) * [*What Is DLP (Data Loss Prevention)? | Guide to DLP Security*](https://www.paloaltonetworks.com/cyberpedia/what-is-data-loss-prevention-dlp) ### **Environment-specific safeguards** (securing different layers of the enterprise) Foundational protections aren't enough once data starts moving. Every device, network, and cloud platform adds new risks and new entry points for attackers. Endpoints are the first line --- laptops, phones, and servers need protection against [malware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware) and [ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-ransomware). NAC builds on that by deciding which devices can connect in the first place, though it can be tricky in BYOD or hybrid setups. In the cloud, security focuses on stopping misconfigurations, unauthorized access, and [data leaks](https://www.paloaltonetworks.com/cyberpedia/data-leak). And across everything, [Zero Trust](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture) applies the rule of "never trust, always verify," requiring constant checks to prevent [lateral movement](https://www.paloaltonetworks.com/cyberpedia/what-is-lateral-movement). Together, these safeguards extend protection into the places where data actually lives and moves. | ***Further reading:*** * [*What Is Cloud Data Protection?*](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-data-protection) * [*What Is Cloud Data Loss Prevention?*](https://www.paloaltonetworks.com/cyberpedia/cloud-data-loss-prevention) * [*What Is Database Security?*](https://www.paloaltonetworks.com/cyberpedia/database-security) ### **Response and resiliency** (what to do when things go wrong) Even strong defenses can't stop every incident. Data may still be lost, stolen, or corrupted. Response and resiliency measures limit the damage and get operations back on track. Backups and disaster recovery ensure critical data can be restored after an outage or breach, but only if they're tested and reliable. [Incident response](https://www.paloaltonetworks.com/cyberpedia/what-is-incident-response) adds structure when something goes wrong --- defining clear roles, coordinating technical and business teams, and guiding containment and remediation. The goal is simple: Keep downtime and disruption to a minimum. | ***Further reading:*** * [*What Is Data Detection \& Response (DDR)?*](https://www.paloaltonetworks.com/cyberpedia/data-detection-response-ddr) * [*What Is Data Exfiltration?*](https://www.paloaltonetworks.com/cyberpedia/data-exfiltration) * [*What Is a Data Risk Assessment?*](https://www.paloaltonetworks.com/cyberpedia/data-risk-assessment) ## What regulations, standards, and frameworks guide data security? Data security isn't guided by a single rulebook. Organizations are accountable to a mix of laws, standards, and frameworks that define how to protect sensitive information. The specifics vary by industry and region. But the objectives are consistent: * Safeguard business-critical and [personal data.](https://www.paloaltonetworks.com/cyberpedia/personal-data) * Ensure accountability in how data is collected, stored, and shared. * Minimize the risk of breaches and other security incidents. Compliance is more than meeting a checklist. It requires implementing technical and administrative safeguards --- like encryption, access controls, and auditing --- and maintaining them over time. Done well, compliance not only helps avoid penalties but also builds trust with customers and partners. Below, we'll dive into the details of some of the most common data security regulations and frameworks: | Data security regulations, standards, and frameworks | |------------------------------------------------------| | Category | Name | Description | Applicability | |---------------|-------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------| | **Law** | [General Data Protection Regulation (GDPR)](https://eur-lex.europa.eu/eli/reg/2016/679/2016-05-04) | Protects personal data of EU citizens, requires consent for data processing, and enforces strict security measures. Violations can lead to fines of up to 4% of annual revenue or €20 million. | Organizations processing personal data of EU residents. | | **Law** | [California Consumer Privacy Act (CCPA)](https://oag.ca.gov/privacy/ccpa) | Gives California residents control over their personal data, mandates transparency on data practices, and allows opt-out of third-party data sharing. | Businesses handling personal data of California residents. | | **Law** | [Health Insurance Portability and Accountability Act (HIPAA)](https://www.hhs.gov/hipaa/index.html) | Protects patient health data, ensures secure medical records, with penalties for non-compliance reaching up to $50,000 per violation. | U.S. healthcare providers, insurers, and business associates handling protected health information. | | **Law** | [Sarbanes--Oxley Act (SOX)](https://www.govinfo.gov/content/pkg/PLAW-107publ204/pdf/PLAW-107publ204.pdf) | Mandates strict controls and audits for publicly traded companies over financial reporting systems to ensure data accuracy and security. | U.S. publicly traded companies responsible for financial reporting. | | **Standard** | [Payment Card Industry Data Security Standard (PCI DSS)](https://www.pcisecuritystandards.org/standards/pci-dss/) | Sets security standards for organizations handling credit card transactions, requiring the protection of cardholder data and strong security against breaches and fraud. | Organizations processing, storing, or transmitting cardholder data. | | **Standard** | [ISO/IEC 27001](https://www.iso.org/standard/27001) | Provides guidelines for implementing an information security management system (ISMS) to help reduce risks and protect sensitive information through best practices. | Organizations worldwide implementing an ISMS or seeking certification. | | **Framework** | [NIST Cybersecurity Framework (CSF) 2.0](https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf) | Defines risk-based outcomes across identify, protect, detect, respond, and recover. Helps organizations prioritize and manage data security activities. | Organizations across industries aligning programs with risk-based outcomes. | | **Framework** | [NIST SP 800-53 Rev. 5](https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final) | Provides a detailed catalog of security and privacy controls to protect information systems and data. Supports confidentiality, integrity, and availability objectives. | U.S. federal agencies and organizations adopting NIST-based controls. | | **Framework** | [COBIT 2019](https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004Ko9cEAC) | Offers governance guidance linking enterprise goals with IT and data security objectives. Includes control objectives, performance monitoring, and compliance alignment. | Enterprises aligning IT governance with business and compliance requirements. | | **Framework** | [CIS Controls v8](https://www.cisecurity.org/controls/v8) | Provides prioritized, implementation-focused safeguards for securing data across endpoints, networks, and users. Offers a tactical roadmap for enforcing policy. | Organizations of all sizes adopting prioritized safeguards for practical data security. | | ***Further reading:*** * [*What Is Data Compliance?*](https://www.paloaltonetworks.com/cyberpedia/data-compliance) * [*What Is Data Privacy Compliance?*](https://www.paloaltonetworks.com/cyberpedia/data-privacy-compliance) * [*What Is Data Loss Prevention (DLP) Compliance?*](https://www.paloaltonetworks.com/cyberpedia/data-loss-prevention-dlp-compliance) ## Comparing data security with related security domains Data security is only one piece of a bigger puzzle. It overlaps with---but isn't the same as---privacy, protection, or broader security disciplines. These terms are often used interchangeably, which creates confusion about scope and responsibility. Clarifying the differences makes it easier to see where data security fits and how it connects to adjacent domains. The table below highlights where each domain starts, where it overlaps, and how they reinforce one another. | Comparing data security with related security domains | |-------------------------------------------------------| | Domain | Definition | Primary focus | Tools \& methods | Overlap with data security | |-------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------| | **Data security** | Protects digital information from unauthorized access, corruption, or loss throughout its lifecycle. | Confidentiality, integrity, and availability of data. | Encryption, access control, DLP, key management. | Core subject --- overlaps with all other domains where data is in scope. | | **Data privacy** | Governs who can access and share personal or [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data), emphasizing user rights and consent. | Control over personal data handling and third-party use. | Consent management, anonymization, privacy impact assessments. | Privacy depends on security to enforce access and safeguard data. | | **Application security** | Secures software applications by preventing vulnerabilities and attacks at the code, runtime, or API level. | Reducing exploitable flaws in apps that handle data. | Secure coding, code reviews, [penetration testing](https://www.paloaltonetworks.com/cyberpedia/what-is-penetration-testing), WAFs. | Protects the environments where data is processed and stored. | | [Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security) | Broad discipline covering protection of systems, networks, and digital assets against cyber threats. | Defense of entire IT ecosystem against external and internal threats. | Firewalls, IDS/IPS, SIEM, threat intelligence. | Data security is one component of overall cybersecurity. | | **Data protection** | Combines security and recovery practices to keep data safe, intact, and available. | Preventing unauthorized access and ensuring recoverability. | Encryption, backup, redundancy, compliance programs. | Data security is part of protection; protection adds availability and recovery. | | **Information security (InfoSec)** | High-level discipline that governs security of all information assets, digital and physical. | Policies, governance, and controls across people, processes, and technology. | ISMS, security policies, audits, risk management frameworks. | Data security is a subset, focusing specifically on digital data. | | ***Further reading:** [What Is Data Privacy?](https://www.paloaltonetworks.com/cyberpedia/data-privacy)* ![Icon of a book](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-a-firewall/icon-ebook.svg) Understand the business impact of breaches Explore the *Unit 42 2025 Incident Response Report* for data on disruption, downtime, and financial consequences. --- [Read the report](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report) ## Data Security FAQs #### What is meant by data security? The role of data security is to protect digital information from unauthorized access, corruption, or loss. Data security concepts generally include using tools and policies, such as encryption and access control, to ensure the data remains secure throughout its lifecycle. #### What is the definition of data security? Data security is the practice of protecting digital information from unauthorized access, corruption, or loss. It involves implementing technologies, tools, and policies to ensure that data is kept safe throughout its life cycle. #### What is data security for business? Data security for enterprises involves safeguarding sensitive information from unauthorized access, theft, or corruption. It includes implementing strategies such as encryption, access control, and regular backups to protect customer data, intellectual property, and business operations, ensuring compliance with regulations and maintaining trust. #### What is data security in information technology? In IT, data security refers to protecting digital information through technical measures like encryption, firewalls, and access management. It ensures that data is securely stored, transmitted, and accessed, preventing unauthorized modifications, breaches, or loss, which could compromise systems and violate compliance standards. #### What is data security in networking? Data security in networking focuses on protecting data as it travels across networks. It includes methods such as encryption, VPNs, and secure protocols to prevent unauthorized interception, modification, or loss. This ensures the confidentiality, integrity, and availability of data within internal and external network communications. #### How does data security work? Data security works by implementing a combination of measures to protect sensitive information. This includes encryption, access controls, data masking, and regular audits. It aims to prevent unauthorized access, data breaches, and corruption, ensuring the confidentiality, integrity, and availability of data across its lifecycle. #### What are the 3 types of data security? The three types of data security are physical security (protecting devices), administrative security (setting policies and protocols), and technical security (using encryption, firewalls, and access control). #### What are the four elements of data security? The four elements of data security are confidentiality, integrity, availability, and accountability, ensuring that data is accessed, used, and managed securely and appropriately. #### What are 5 ways to secure data? To secure data, implement encryption, data masking, access control, disaster recovery plans, and employee training on recognizing cyber threats like phishing. #### What are the three core elements of data security? The three core elements of data security are confidentiality (ensuring only authorized access), integrity (preventing unauthorized data alteration), and availability (ensuring data is accessible when needed). #### What does good data security look like? Good data security includes using encryption, strong access control policies, regular audits, and ensuring compliance with regulations. It protects sensitive information and prevents unauthorized access or data breaches. #### What is the most common threat to data security? The most common threats to company data security include phishing, malware, and ransomware. Phishing remains widespread due to its ability to exploit human vulnerabilities, while malware and ransomware pose significant risks through direct data corruption, theft, or system disruption. #### Why do we need data security? Data security is vital to protect sensitive information from theft, corruption, and unauthorized access. It helps organizations comply with regulations, maintain customer trust, and avoid costly data breaches. Related content [Blog: A Reliable Data Protection Strategy Hinges Upon Data Detection Find out why visibility of all corporate data is fundamental to enabling data protection.](https://www.paloaltonetworks.com/blog/network-security/a-reliable-data-protection-strategy-hinges-upon-highly-accurate-data-detection/) [Blog: Maintaining Data Security When Your Workforce is Remote Learn how implementing data protection for the remote workforce is the formula to success.](https://www.paloaltonetworks.com/blog/network-security/maintaining-data-security-when-your-workforce-is-remote/) [Blog: Contain the SaaS Explosion with a Redefined Approach to CASB See why consistent SaaS security = protected users, apps, and data.](https://www.paloaltonetworks.com/blog/network-security/contain-the-saas-explosion-with-a-redefined-approach-to-casb/) [Guide: Next-Generation CASB for Dummies Discover what a next-gen CASB is and how it keeps SaaS applications and data secure.](https://www.paloaltonetworks.com/resources/guides/next-generation-casb-for-dummies) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Data%20Security%3F%20%5BDefinition%2C%20Overview%2C%20%26%20Why%20It%20Matters%5D&body=Data%20security%20is%20the%20practice%20of%20protecting%20digital%20information%20from%20unauthorized%20access%2C%20corruption%2C%20or%20loss.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-data-security) Back to Top [Next](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends?ts=markdown) How DSPM Is Evolving: Key Trends to Watch {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language