[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-security-solution?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.paloaltonetworks.com/deploybravely?ts=markdown) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [What Is Generative AI (GenAI)? The Definitive Guide](https://www.paloaltonetworks.com/cyberpedia/what-is-generative-ai?ts=markdown) Table of contents * [How does generative AI work?](#how-does-generative-ai-work) * [What are the different generative AI model architectures?](#what-are-the-different-generative-ai-model-architectures) * [What are the limitations and risks of generative AI?](#what-are-the-limitations-and-risks-of-generative-ai) * [Real-world use cases for generative AI](#real-world-use-cases-for-generative-ai) * [Generative AI FAQs](#generative-ai-faqs) # What Is Generative AI (GenAI)? The Definitive Guide 6 min. read Table of contents * [How does generative AI work?](#how-does-generative-ai-work) * [What are the different generative AI model architectures?](#what-are-the-different-generative-ai-model-architectures) * [What are the limitations and risks of generative AI?](#what-are-the-limitations-and-risks-of-generative-ai) * [Real-world use cases for generative AI](#real-world-use-cases-for-generative-ai) * [Generative AI FAQs](#generative-ai-faqs) 1. How does generative AI work? * [1. How does generative AI work?](#how-does-generative-ai-work) * [2. What are the different generative AI model architectures?](#what-are-the-different-generative-ai-model-architectures) * [3. What are the limitations and risks of generative AI?](#what-are-the-limitations-and-risks-of-generative-ai) * [4. Real-world use cases for generative AI](#real-world-use-cases-for-generative-ai) * [5. Generative AI FAQs](#generative-ai-faqs) Generative AI is a class of machine learning models that create new content such as text, images, or code by learning patterns from vast datasets. These models, often built on transformer or diffusion architectures, generate outputs that resemble human-created data. Unlike traditional AI, which classifies or predicts, generative AI produces original material in response to prompts or contextual inputs. ## How does generative AI work? Most generative [AI](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai) systems follow the same basic path from training to real‑world use. The details vary across models and domains. But the workflow stays similar. First a model learns broad patterns. Then it's tuned, deployed, and monitored. Each phase shapes what the model can do---and how reliably it can do it. ![A four-step vertical process explains the lifecycle of generative AI systems. Step 1: Pretraining shows models learning patterns from large, unlabeled datasets, with transformers predicting the next token and diffusion models reversing noise. Step 2: Tuning describes supervised fine-tuning, instruction tuning, RLHF, and the use of RAG to inject external knowledge at inference. Step 3: Deployment covers API/SDK delivery, fast and reliable inference, and GPU optimization. Step 4: Managing after deployment highlights ongoing monitoring, guardrails, red teaming, retraining, and evaluation to catch failures early.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-generative-ai/How-generative-AI-works.png "A four-step vertical process explains the lifecycle of generative AI systems. Step 1: Pretraining shows models learning patterns from large, unlabeled datasets, with transformers predicting the next token and diffusion models reversing noise. Step 2: Tuning describes supervised fine-tuning, instruction tuning, RLHF, and the use of RAG to inject external knowledge at inference. Step 3: Deployment covers API/SDK delivery, fast and reliable inference, and GPU optimization. Step 4: Managing after deployment highlights ongoing monitoring, guardrails, red teaming, retraining, and evaluation to catch failures early.") ### 1. Pretraining on massive datasets Most modern generative AI models start with a process called self-supervised learning. That means they learn patterns without needing labeled examples. Instead, they try to predict missing or corrupted parts of their input---like the next word in a sentence or a blurry patch in an image. To learn those patterns, models are trained on massive datasets. These might include web pages, code, images, or documents. The data doesn't need to be labeled by humans. Just collected at scale. What the model learns depends on how it's built: * Transformer models usually predict the next word. * Diffusion models learn how to turn random noise into realistic images. But the goal is the same: to create a general-purpose model that understands structure and can generate something new. ### 2. Tuning for specific tasks Pretrained models aren't well aligned to specific tasks or safety requirements by default. They have broad knowledge but no instruction. So they need to be tuned. * **That starts with supervised fine-tuning.** A curated dataset teaches the model how to behave on specific tasks. * **Then comes instruction tuning.** This step improves how models respond to natural-language instructions, like "summarize this" or "write code for that." * **To refine things further, some teams use reinforcement learning from human feedback (RLHF).** Human raters score model outputs. That feedback is then used to optimize the model's behavior. ***Note:*** *Some systems also use retrieval-augmented generation (RAG). It's not tuning in the traditional sense. But it improves quality at inference time by feeding the model fresh, relevant information.* | ***Further reading:*** * [*What Is RLHF? Reinforcement Learning from Human Feedback*](https://www.paloaltonetworks.com/cyberpedia/what-is-rlhf) * [*What Is Retrieval-Augmented Generation (RAG)? An Overview*](https://www.paloaltonetworks.com/cyberpedia/what-is-retrieval-augmented-generation) ### 3. Deploying and serving the model Once tuned, the model gets deployed, usually via API or SDK. Organizations might host it in the cloud or embed it into applications. Inference needs to be fast. But generative models are large. That means they often run on GPUs. Sometimes on clusters of them. Batching, caching, and quantization can help improve performance. The goal is to serve real-time generations reliably. Whether that's text completions, code, images, or multimodal content. ***Note:*** *Some organizations limit the model's output scope at deployment---not just for safety, but to reduce inference costs. Constraining output length, model size, or supported modalities can make serving more efficient without retraining the model itself.* ### 4. Managing the model after deployment Post-deployment is where operational risk shows up. Models may drift over time. Inputs might change. New misuse patterns may emerge. So teams monitor for quality, safety, and abuse. That includes detecting hallucinations, toxic content, jailbreak attempts, and prompt injection. Some organizations run red teaming exercises before launch. Others rely more on real-time filters and guardrails in production. Over time, many also retrain the model or update evaluation pipelines, looking for signs of drift or misuse before they cause harm. ***Note:*** *Models can become more brittle over time as input distributions shift or users adapt their prompts. Even small changes in how people interact with the system can expose blind spots the model wasn't tuned to handle.* ## What are the different generative AI model architectures? Not all generative models work the same way. Some predict the next word in a sentence. Others denoise random noise into realistic images. Each approach has its own mechanics, strengths, and weaknesses. Understanding how different model types work can help explain why they're used in different domains, from text to vision to anomaly detection. ### Transformers ![A stacked encoder–decoder diagram illustrates the transformer architecture. Input embeddings combined with positional encoding flow through repeated blocks of multi-head attention, add \& norm, and feed-forward layers. The decoder side mirrors this structure with masked attention over shifted outputs. Final layers include a linear transformation followed by softmax to produce output probabilities. The repeated blocks are labeled as Nx to indicate stacking depth.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-generative-ai/Transformer-model-architecture.png "A stacked encoder–decoder diagram illustrates the transformer architecture. Input embeddings combined with positional encoding flow through repeated blocks of multi-head attention, add & norm, and feed-forward layers. The decoder side mirrors this structure with masked attention over shifted outputs. Final layers include a linear transformation followed by softmax to produce output probabilities. The repeated blocks are labeled as Nx to indicate stacking depth.") Transformers are the backbone of most modern generative AI models. They work by comparing every part of the input to every other part so the model can understand context and meaning. That applies to text, code, or even image fragments. They're trained to predict what comes next. For example, the next word in a sentence, based on everything before it. This approach is what powers language models developed by OpenAI, Anthropic, Google, Meta, etc. Transformers are good at handling long inputs and scaling to very large datasets. That's why they've become the go-to choice for generating text, writing code, and even mixing multiple data types. **Used for:** Text generation, code completion, document summarization, chatbots, multimodal interfaces ### Generative adversarial networks (GANs) ![A two-network adversarial setup is shown. Random noise is fed into the Generator G, producing synthetic (fake) samples. Real samples from training data and fake samples are both passed to the Discriminator D, a multilayer neural network that attempts to distinguish real from fake. The diagram shows separate generator loss and discriminator loss, with dashed arrows indicating backpropagation paths that alternately train each network in opposition.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-generative-ai/Generative-adversarial-network-GAN-architecture.png "A two-network adversarial setup is shown. Random noise is fed into the Generator G, producing synthetic (fake) samples. Real samples from training data and fake samples are both passed to the Discriminator D, a multilayer neural network that attempts to distinguish real from fake. The diagram shows separate generator loss and discriminator loss, with dashed arrows indicating backpropagation paths that alternately train each network in opposition.") Generative adversarial networks (GANs) use two models working against each other. One generates new content. The other tries to tell whether that content is real or fake. As they compete, both models get better---one at generating, the other at detecting. GANs became popular for creating realistic images. But they can be hard to train. They don't always produce stable results, and sometimes they get stuck generating only a few types of output. Today, GANs are still used for things like improving image quality, translating between styles, or generating content without needing matched pairs of data. **Used for:** Image synthesis, video generation, super-resolution, style transfer, domain adaptation ### Variational autoencoders (VAEs) ![A linear pipeline illustrates the VAE workflow. An input image x is passed into an encoder, which outputs a mean and standard deviation defining a latent distribution. A latent variable z is sampled and fed into a decoder to reconstruct the image. A dotted feedback loop at the bottom emphasizes the combined reconstruction loss and KL divergence used during training to balance fidelity and latent regularization.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-generative-ai/Variational-autoencoder-VAE-architecture.png "A linear pipeline illustrates the VAE workflow. An input image x is passed into an encoder, which outputs a mean and standard deviation defining a latent distribution. A latent variable z is sampled and fed into a decoder to reconstruct the image. A dotted feedback loop at the bottom emphasizes the combined reconstruction loss and KL divergence used during training to balance fidelity and latent regularization.") Variational autoencoders (VAEs) work by first compressing the input---like an image or a file---into a simpler version with fewer details. Then they rebuild the original from that compressed version. This makes them useful for spotting unusual patterns or creating controlled variations of the original input. For example, they can be used to detect errors or generate similar-but-different outputs. The results are often less sharp than what GANs or diffusion models produce. But VAEs are easier to train and give developers more control over what the model generates. **Used for:** Anomaly detection, image reconstruction, controllable generation, representation learning ### Diffusion models ![A detailed technical diagram shows how images are generated using latent diffusion. An input image is encoded into a latent representation, then passed through a forward diffusion process that gradually adds noise over multiple time steps. A denoising UNet iteratively removes noise in reverse, guided by conditioning inputs such as semantic maps, text, representations, or images. The diagram highlights repeated time steps, UNet blocks with attention (Q, K, V), time-step embeddings, and a switch controlling conditioning. The process concludes by decoding the denoised latent back into an image.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-generative-ai/Latent-diffusion-model-architecture.png "A detailed technical diagram shows how images are generated using latent diffusion. An input image is encoded into a latent representation, then passed through a forward diffusion process that gradually adds noise over multiple time steps. A denoising UNet iteratively removes noise in reverse, guided by conditioning inputs such as semantic maps, text, representations, or images. The diagram highlights repeated time steps, UNet blocks with attention (Q, K, V), time-step embeddings, and a switch controlling conditioning. The process concludes by decoding the denoised latent back into an image.") Diffusion models create images by starting with random noise, like static on a screen. Then they remove the noise in small steps until a clear image forms. This method is now widely used in image generation tools like DALL·E, Midjourney, and Stable Diffusion. It takes longer to generate results compared to other models. But the images are often more detailed, and the process tends to be more reliable. **Used for:** Text-to-image generation, inpainting, video generation, 3D synthesis ## What are the limitations and risks of generative AI? ![A vertical, card-based layout lists six key risks using red icon tiles paired with explanatory text. These include Hallucinations \& factual gaps (fluent but false outputs without grounding), IP issues \& data provenance (unclear training data creating legal risk), Bias, abuse, \& content safety (reinforcing harmful patterns or misuse), Cost \& environmental impact (energy-intensive and expensive to scale), Prompt injection \& jailbreaks (hidden inputs overriding intent), and Post-deployment unpredictability (behavior shifts with inputs, prompts, or scale). A large title on the left anchors the section.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-generative-ai/Primary-risks-and-limitations-of-generative-AI.png "A vertical, card-based layout lists six key risks using red icon tiles paired with explanatory text. These include Hallucinations & factual gaps (fluent but false outputs without grounding), IP issues & data provenance (unclear training data creating legal risk), Bias, abuse, & content safety (reinforcing harmful patterns or misuse), Cost & environmental impact (energy-intensive and expensive to scale), Prompt injection & jailbreaks (hidden inputs overriding intent), and Post-deployment unpredictability (behavior shifts with inputs, prompts, or scale). A large title on the left anchors the section.") Generative AI systems are capable but not without tradeoffs. Their outputs may look fluent or convincing. But that doesn't mean they're accurate, fair, or safe. The underlying models aren't fully predictable. And their behavior can change based on prompts, context, or scale. Which means: the risks aren't just theoretical. They're already shaping how generative AI is built, deployed, and governed. | ***Further reading:** [Top GenAI Security Challenges: Risks, Issues, \& Solutions](https://www.paloaltonetworks.com/cyberpedia/generative-ai-security-risks)* ### Hallucinations and factual gaps Generative models often produce content that's fluent but false. These are known as hallucinations. They occur when models generate plausible-sounding text that isn't grounded in any real data. Why? Because many models are trained to predict the next word. Not to verify facts. And without an external source of truth, there's no guarantee their answers are accurate. This becomes a serious issue in high-stakes domains. Especially when users assume the output is trustworthy. ***Note:*** *Hallucinations can occur even when a model is fine-tuned for accuracy. If the training distribution lacks real-world coverage---or the prompt is vague or novel---the model may confidently generate information it was never exposed to.* | ***Further reading:** [What Are AI Hallucinations? \[+ Protection Tips\]](https://www.paloaltonetworks.com/cyberpedia/what-are-ai-hallucinations)* ### Bias, abuse, and content safety Generative models reflect the data they were trained on. That includes social bias, stereotypes, and harmful language. Which means they can amplify existing harms or introduce new ones. They can also be used maliciously. Attackers might generate misinformation, impersonate individuals, or automate abuse. And even without malicious intent, generative content can cause offense or harm if left unchecked. To manage that, many systems use content filters and moderation layers. But the underlying risk remains. ***Note:*** *Efforts to reduce harmful outputs often rely on reinforcement learning from human feedback. But annotator bias can unintentionally shape model behavior---reinforcing certain cultural norms while suppressing others.* | ***Further reading:** [What Is AI Bias? Causes, Types, \& Real-World Impacts](https://www.paloaltonetworks.com/cyberpedia/what-is-ai-bias)* ### Prompt injection and jailbreaks Generative models are susceptible to indirect prompt manipulation. That includes prompt injection---where hidden instructions override user intent. And jailbreaks---where users trick the model into bypassing safety controls. Why does this happen? Because models aren't reasoning about intent. They're following text patterns. So even minor phrasing tweaks can cause major behavior changes. These vulnerabilities are hard to detect. And even harder to fully prevent. | ***Further reading:** [What Is a Prompt Injection Attack? \[Examples \& Prevention\]](https://www.paloaltonetworks.com/cyberpedia/what-is-a-prompt-injection-attack)* ### IP issues and data provenance Many widely used generative models are trained on public web data. That includes copyrighted material, proprietary datasets, and content with unclear licensing. This raises questions about what models are allowed to generate. And what counts as derivative work. It also creates legal risk if outputs are used commercially without knowing where the underlying data came from. Provenance remains a challenge. Most models don't track which data contributed to which output. ***Note:*** *Some foundation model providers now publish partial documentation about their training sources, but none disclose a complete list of the datasets used. This makes it difficult to trace whether specific outputs overlap with any copyrighted or proprietary material in the original training mix.* ### Cost and environmental impact Training and running generative models is resource-intensive. It requires large GPU clusters, specialized hardware, and ongoing compute for deployment. That makes them expensive to scale. And it has environmental implications. Especially around energy use, water consumption, and carbon emissions. The bigger the model, the higher the cost. And not just financially. Also in terms of who has access and who doesn't. ## Real-world use cases for generative AI ![A four-quadrant layout presents common applications of generative AI. The top left highlights Security \& adversarial simulation, describing how GenAI simulates threats and stress-tests systems by mimicking attacker behavior. The top right focuses on Enterprise applications, noting use cases such as code generation, document drafting, and AI copilots embedded in business software. The bottom left covers Regulated domains, showing how GenAI supports summarization and drafting in healthcare, legal, and financial contexts. The bottom right highlights Creative industries, illustrating accelerated content production through generated images, media assets, dialogue, and design prototypes. Each quadrant includes a soft-colored illustration reinforcing the use case.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-generative-ai/Real-world-generative-AI-use-cases.png "A four-quadrant layout presents common applications of generative AI. The top left highlights Security & adversarial simulation, describing how GenAI simulates threats and stress-tests systems by mimicking attacker behavior. The top right focuses on Enterprise applications, noting use cases such as code generation, document drafting, and AI copilots embedded in business software. The bottom left covers Regulated domains, showing how GenAI supports summarization and drafting in healthcare, legal, and financial contexts. The bottom right highlights Creative industries, illustrating accelerated content production through generated images, media assets, dialogue, and design prototypes. Each quadrant includes a soft-colored illustration reinforcing the use case.") Generative AI isn't limited to research labs or experimental prototypes. It's already being used across a wide range of industries. From software development to security testing, generative systems are being embedded into everyday workflows. But the way they're used---and what they're used for---depends on the domain. Here's how the technology is showing up in practice. ### Enterprise applications In enterprise settings, generative AI is used to automate content generation and streamline internal workflows. That includes generating code, drafting documentation, and summarizing internal reports. * One of the most common patterns is embedding models into copilots. These tools help users complete tasks directly inside business applications. * Another trend is retrieval-augmented generation. That's where generative models pull in context from internal data sources to produce more accurate answers. These tools aren't just productivity boosters. They're changing how employees interact with systems and how knowledge moves inside organizations. ### Creative industries Creative teams use generative models to accelerate design and production. * In design and media, models can generate images, storyboard assets, or text-based concept drafts. * In game development, they're used to build environments, populate dialogue trees, and prototype levels. Some tools use image diffusion models. Others rely on [large language models (LLMs)](https://www.paloaltonetworks.com/cyberpedia/large-language-models-llm) or audio synthesis systems. The goal is to reduce the time between concept and usable output. It's not about replacing creative work. It's about scaling it. ### Regulated domains Healthcare, finance, and legal fields are exploring GenAI for summarization, drafting, and question-answering. * In healthcare, models are used to summarize clinical notes and assist with documentation. * In legal, they help review contracts and surface relevant clauses. * In finance, they're being tested for risk analysis and reporting. The stakes are higher in these domains. So most deployments involve strict controls, oversight, and human review. Generative models help. But they don't make decisions on their own. ### Security and adversarial simulation Generative AI is also being used in cybersecurity. One application is red teaming, where models simulate [phishing](https://www.paloaltonetworks.com/cyberpedia/what-is-phishing) attempts or generate synthetic threats to test defenses. Another is adversarial simulation. That's where teams test how models respond to indirect or hostile prompts. Some use cases are offensive. Others are defensive. Either way, generative models are helping teams test systems the way attackers might. Which means: They're no longer just targets in the security stack. They're tools too. | ***Further reading:*** * [*The Role of Generative AI in Cybersecurity*](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity) * [*What Is AI Red Teaming? Why You Need It and How to Implement*](https://www.paloaltonetworks.com/cyberpedia/what-is-ai-red-teaming) ## Generative AI FAQs ### What is generative AI in simple terms? Generative AI refers to models that create new content---like text, images, or code---by learning patterns from large datasets. Instead of classifying data or making decisions, these models generate original outputs based on the input they receive. ### Is ChatGPT a generative AI? Yes. ChatGPT is a generative AI based on a large language model. It produces human-like text by predicting the next word in a sequence, using patterns it learned during training on large-scale textual data. ### What is the difference between AI and generative AI? AI is a broad field that includes any system that mimics human intelligence. Generative AI is a subset that focuses specifically on generating new content---rather than just classifying, detecting, or optimizing based on existing data. ### What is the difference between predictive AI and generative AI? Predictive AI forecasts outcomes based on past data, like recommending products or estimating risk. Generative AI creates new content---such as text or images---based on learned patterns, often using models like transformers or diffusion networks. ### What is an example of a generative AI? Examples of generative AI include ChatGPT by OpenAI, Gemini by Google, Claude by Anthropic, and tools like DALL·E for images and Codex for code. These systems generate new outputs---such as text, images, or software---based on learned patterns rather than retrieving or copying existing content. ### How does generative AI actually generate content? Generative AI uses trained models---such as transformers or diffusion networks---to produce outputs from learned patterns. It predicts or reconstructs data step-by-step, like generating the next word in a sentence or reversing noise to form an image. Related content [White paper: AI Security: Navigating the New Frontier of Cyber Defense Find out why categorizing AI security as a standard security control can pose significant risks.](https://www.paloaltonetworks.com/resources/whitepapers/ai-security-navigating-the-new-frontier-of-cyber-defense) [Guide: The C-Suite Guide to GenAI Risk Management Learn a strategic framework for managing the risks associated with GenAI.](https://www.paloaltonetworks.com/resources/guides/the-c-suite-guide-to-genai-risk-management) [eBook: Is Your AI Ecosystem Secure? Discover the blueprint for protecting all your AI investments.](https://www.paloaltonetworks.com/resources/ebooks/is-your-ai-ecosystem-secure) [Report: The State of Generative AI 2025 Read the latest data on GenAi adoption and usage.](https://www.paloaltonetworks.com/resources/research/state-of-genai-2025) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Generative%20AI%20%28GenAI%29%3F%20The%20Definitive%20Guide&body=Generative%20AI%20is%20a%20class%20of%20machine%20learning%20models%20that%20create%20new%20content%20such%20as%20text%2C%20images%2C%20or%20code%20by%20learning%20patterns%20from%20vast%20datasets.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-generative-ai) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language