[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberark/Seamless_IDs_small.jpg) Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-security-solution?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberark/Seamless_IDs_small.jpg) Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.paloaltonetworks.com/deploybravely?ts=markdown) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Identity Security](https://www.paloaltonetworks.com/cyberpedia/identity-security?ts=markdown) 3. [What is Identity Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-identity-security?ts=markdown) Table of Contents * [How Identity Security Protects the Perimeter](#how) * [Essential Pillars of an Identity Security Framework](#essential) * [Key Data: Threats and Trends](#key) * [Why Modern Organizations Prioritize Identity-Centric Security](#why) * [Implementation Roadmap to Securing Digital Identities](#identities) * [Identity Security vs. Traditional IAM: Key Differences](#differences) * [Best Practices for Securing Identities](#best) * [Common Identity Security Challenges and Remediation](#common) * [The Convergence of Identity Security and Zero Trust](#convergence) * [Advanced Optimization: AI-Powered Identity Defense](#advanced) * [Identity Security FAQs](#faqs) # What is Identity Security? 3 min. read [Explore Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) Table of Contents * [How Identity Security Protects the Perimeter](#how) * [Essential Pillars of an Identity Security Framework](#essential) * [Key Data: Threats and Trends](#key) * [Why Modern Organizations Prioritize Identity-Centric Security](#why) * [Implementation Roadmap to Securing Digital Identities](#identities) * [Identity Security vs. Traditional IAM: Key Differences](#differences) * [Best Practices for Securing Identities](#best) * [Common Identity Security Challenges and Remediation](#common) * [The Convergence of Identity Security and Zero Trust](#convergence) * [Advanced Optimization: AI-Powered Identity Defense](#advanced) * [Identity Security FAQs](#faqs) 1. How Identity Security Protects the Perimeter * [1. How Identity Security Protects the Perimeter](#how) * [2. Essential Pillars of an Identity Security Framework](#essential) * [3. Key Data: Threats and Trends](#key) * [4. Why Modern Organizations Prioritize Identity-Centric Security](#why) * [5. Implementation Roadmap to Securing Digital Identities](#identities) * [6. Identity Security vs. Traditional IAM: Key Differences](#differences) * [7. Best Practices for Securing Identities](#best) * [8. Common Identity Security Challenges and Remediation](#common) * [9. The Convergence of Identity Security and Zero Trust](#convergence) * [10. Advanced Optimization: AI-Powered Identity Defense](#advanced) * [11. Identity Security FAQs](#faqs) Identity security refers to the comprehensive framework of technologies and processes designed to protect digital identities from unauthorized access and exploitation. It ensures that only verified users, devices, and applications can access specific resources under the correct circumstances. By continuously monitoring and managing permissions, identity security mitigates risks associated with credential theft, privilege escalation, and account takeovers. Key Takeaways: * **Continuous Verification**: Implement security models that verify every access request regardless of its origin within the network. \* **Privilege Management**: Enforce the principle of least privilege to restrict user access to only the necessary resources for their specific roles. \* **Credential Protection**: Utilize advanced authentication methods like multi-factor authentication to secure entry points against compromised passwords. \* **Visibility and Control**: Maintain centralized oversight of all human and machine identities to detect and respond to suspicious behavior in real time. \* **Risk Mitigation**: Reduce the attack surface by identifying and removing orphaned accounts or excessive permissions that attackers could exploit. ![Infographic titled 'How Identity Security Works' with columns for Who(authenticate), What (authorize), Why (monitor), connected to a central shield labeled Automatic Response.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-identity-security/how-identity-security-works.webp "How Identity Security Works") ***Figure 1**: How Identity Security Works* ## How Identity Security Protects the Perimeter Modern security architectures no longer rely on a "trust but verify" model. Instead, identity security functions as an intelligent gatekeeper that assesses risk at every step of a digital interaction. It is not merely about granting access; it is about continuous verification and governance. A complete strategy involves managing the entire [identity lifecycle](https://www.paloaltonetworks.com/cyberpedia/what-is-identity-lifecycle-management?ts=markdown), from creation and provisioning through [authentication, authorization](https://www.paloaltonetworks.com/cyberpedia/what-is-authentication-and-authorization?ts=markdown), and eventual deprovisioning. The process typically follows a continuous loop: 1. **Authenticate**: Verify the identity is legitimate (preferably using phishing-resistant methods such as hardware keys). 2. **Authorize** : Grant only the minimum permissions required for the task ([least privilege](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access?ts=markdown)). 3. **Monitor** : Use [AI](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai?ts=markdown) and [behavior analytics](https://www.paloaltonetworks.com/cyberpedia/what-is-user-entity-behavior-analytics-ueba?ts=markdown) to detect anomalies, such as a user logging in from an unusual geographic location. 4. **Respond**: Automatically contain threats (terminate sessions, revoke tokens, and step up authentication). 5. **Govern**: Certify access, enforce policies, and generate audit trails for accountability. ### Dynamic Risk Scoring and Contextual Analysis Static credentials like passwords or even basic [multi-factor authentication (MFA)](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-factor-authentication?ts=markdown) are susceptible to bypass. Identity security replaces these with dynamic risk scoring. This process evaluates variables such as the user's geographic location, the health of the device being used, the time of the request, and historical behavior patterns. If a login attempt occurs from an unfamiliar IP address or at an unusual hour, the security system automatically increases the verification requirements or denies access entirely. ### The Role of Machine Learning in Identity Detection and Response (ITDR) Attackers often use ["living off the land"](https://www.paloaltonetworks.com/cyberpedia/what-are-fileless-malware-attacks?ts=markdown) techniques, where they use legitimate tools and credentials to avoid detection. [ITDR](https://www.paloaltonetworks.com/cyberpedia/identity-threat-detection-and-response-itdr?ts=markdown) uses [machine learning](https://www.paloaltonetworks.com/cyberpedia/machine-learning-ml?ts=markdown) to establish a baseline of normal activity for every identity. When an account begins accessing sensitive files it has never touched before or attempts to escalate its own privileges, the system flags the anomaly. This proactive detection is vital, as 66% of [social engineering attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-social-engineering?ts=markdown) now specifically target privileged accounts to maximize their impact. ## Essential Pillars of an Identity Security Framework A comprehensive identity security strategy is built on three foundational pillars that work in tandem to manage the identity lifecycle from creation to deletion. | **Component** | **What it does** | **Primary objective** | |--------------------------------------------------|---------------------------------------------------------|----------------------------------------------------| | **IAM (Identity \& Access Management)** | Directories, provisioning, authentication, SSO | Manage identity lifecycle and baseline access | | **PAM (Privileged Access Management)** | Vaulting, JIT access, session controls/recording | Protect high-impact privileged accounts | | **ITDR (Identity Threat Detection \& Response)** | Detects identity attacks and suspicious identity events | Identify and disrupt active identity-based threats | | **IGA (Identity Governance \& Administration)** | Access reviews, certifications, and role governance | Prove compliance and reduce privilege creep | ***Table 1**: Essential Pillars of an Identity Security Framework* ### Identity and Access Management (IAM) IAM is the front door of identity security. It defines who can access what by managing user profiles and digital credentials. Modern IAM solutions prioritize [single sign-on (SSO)](https://www.paloaltonetworks.com/cyberpedia/what-is-single-sign-on-sso?ts=markdown) and adaptive MFA to streamline the user experience while maintaining high security standards. ### Privileged Access Management (PAM) for High-Value Assets Not all identities are equal. Administrative accounts, database managers, and security officers hold the "keys to the kingdom." [PAM](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management?ts=markdown) provides an extra layer of security for these high-value targets by requiring [just-in-time (JIT) access](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit?ts=markdown), where permissions are granted only for a specific task and revoked immediately afterward. ### Identity Governance and Administration (IGA) IGA ensures long-term compliance and security by automating the process of reviewing and auditing access. It helps organizations tackle "identity sprawl"---the accumulation of unnecessary accounts and permissions over time. Without strong governance, orphaned accounts from former employees or forgotten service keys become easy targets for exploitation. ## Key Data: Threats and Trends According to [Unit 42 Incident Response](https://www.paloaltonetworks.com/blog/2025/02/incident-response-report-attacks-shift-disruption?ts=markdown) data, compromised credentials remain one of the most common initial access vectors in data breaches. Attackers have shifted focus from "hacking in" to "logging in" by leveraging sophisticated phishing, credential stuffing, and session hijacking. * **Credential Dominance**: Unit 42 research indicates that nearly half of all successful intrusions involve compromised credentials. * **The Cloud Gap** : As organizations migrate to the cloud, [machine identities](https://www.paloaltonetworks.com/cyberpedia/what-is-machine-identity?ts=markdown) (service accounts, secrets, and access keys) now outnumber human identities by roughly 82-to-1, creating a massive, unmanaged attack surface. * **MFA Bypass** : There is a growing trend of "MFA fatigue" attacks and of adversary-in-the-middle (AiTM) proxy tools designed to bypass traditional [multifactor authentication](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-factor-authentication?ts=markdown). ## Why Modern Organizations Prioritize Identity-Centric Security The shift toward identity-centric security is driven by the reality that identity is currently the most exploited link in the cyber kill chain. ### Mitigating the Impact of Credential-Based Attacks Traditional [breaches](https://www.paloaltonetworks.com/cyberpedia/data-breach?ts=markdown) often involve [malware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware?ts=markdown), but modern attacks frequently involve zero malware. Attackers use phished credentials or purchased access from initial access brokers to walk through the front door. By securing the identity layer, organizations can neutralize the value of stolen passwords, as the attacker cannot easily replicate the necessary behavioral or contextual signals required for access. ### Supporting Regulatory Compliance (GDPR, HIPAA, and SOX) Most regulatory frameworks require strict controls over who can access [personally identifiable information (PII)](https://www.paloaltonetworks.com/cyberpedia/pii?ts=markdown) or financial records. Identity security provides the necessary audit trails and automated reporting to prove that access is restricted to authorized personnel only. [Unit 42 data](https://www.paloaltonetworks.com/blog/2025/07/social-engineering-rise-new-unit-42-report/#:~:text=The%20success%20of%20social%20engineering,to%20other%20platforms%20and%20devices.?ts=markdown) shows that 60% of social engineering incidents lead to data exposure, making identity-centric controls a legal and operational necessity. ### Enabling Secure Hybrid and Multi-Cloud Environments Cloud environments are incredibly dynamic, with [machine identities](https://www.paloaltonetworks.com/cyberpedia/what-is-a-machine-identity?ts=markdown) often outnumbering human users by 82 to 1. Traditional security cannot scale at this volume. Identity security allows teams to manage permissions across [AWS](https://www.paloaltonetworks.com/cyberpedia/how-to-maintain-aws-compliance?ts=markdown), Azure, and Google Cloud from a single location, ensuring consistent policy enforcement regardless of where the resource resides. ## Implementation Roadmap to Securing Digital Identities Securing identities is a journey that moves from basic visibility to automated, proactive defense. ![Infographic titled “Lifecycle of a Non-Human Identity” showing a circular, four-step loop for JIT provisioning and decommissioning: JIT Provisioning (temporary access granted), Task Execution (automated process runs), Access Revocation (permissions automatically removed), and Decommissioning (credentials expire), with arrows connecting each step and a central icon of a robot, key, and gears.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-identity-security/just-in-time-provisioning-and-decommissioning.webp "Just-in-Time Provisioning and Decommissioning") ***Figure 1**: Just-in-Time Provisioning and Decommissioning* ### Audit and Discovery of All Human and Non-Human Identities The first step is identifying every identity within the network, both human and [non-human](https://www.paloaltonetworks.com/cyberpedia/what-is-a-non-human-identity?ts=markdown). This includes not just employees, but contractors, third-party vendors, APIs, and service accounts. Many organizations find they have a significant "permissions gap," where 99% of cloud identities have permissions they have not used in 60 days or more. ### Securing Non-Human Identities Securing non-human identities (NHIs)---such as API keys, [workloads](https://www.paloaltonetworks.com/cyberpedia/what-is-workload-identity?ts=markdown), service accounts, and secrets---is critical because these assets are often overprivileged and lack adequate monitoring. Organizations can mitigate these high-risk vulnerabilities by eliminating hardcoded credentials in favor of automated secrets management and rotating credentials at runtime. Additionally, implementing just-in-time (JIT) access and automated lifecycle management ensures that permissions are temporary, task-specific, and immediately revoked, preventing the accumulation of "ghost" accounts in ephemeral cloud environments. ### Implementing MFA and Passwordless Solutions Transitioning away from passwords to phishing-resistant MFA, such as FIDO2 security keys or biometric authentication, is one of the most effective ways to stop credential theft. [Passwordless authentication](https://www.paloaltonetworks.com/cyberpedia/what-is-passwordless-authentication?ts=markdown) solutions reduce the friction for users while significantly increasing the difficulty for attackers. ### Enforcement of the Principle of Least Privilege (PoLP) [PoLP](https://www.paloaltonetworks.com/cyberpedia/what-is-the-principle-of-least-privilege?ts=markdown) is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work. This prevents [lateral movement](https://www.paloaltonetworks.com/cyberpedia/what-is-lateral-movement?ts=markdown); even if an attacker compromises a standard user account, they are restricted from reaching high-value databases or administrative consoles. ## Identity Security vs. Traditional IAM: Key Differences While IAM provides the tools for access, Identity Security provides the intelligence to govern that access. | **Feature** | **Traditional IAM** | **Adaptive Identity Security** | |--------------------|--------------------------|-----------------------------------------| | **Trust Model** | Trust once authenticated | Never trust, always verify (Zero Trust) | | **Access Control** | Static, role-based | Dynamic, context-aware | | **Visibility** | Siloed by application | Unified across the ecosystem | | **Response** | Manual intervention | Automated detection and response (ITDR) | | **Identity Types** | Primary focus on humans | Human, machine, and AI agents | ***Table 2**: Traditional IAM vs. Adaptive Identity Security* ## Best Practices for Securing Identities Implementing a resilient identity and access management strategy requires a combination of technology, policy, and process. Organizations should prioritize the following best practices to reduce their risk surface. ### Implement Phishing-Resistant MFA MFA is a non-negotiable requirement, but not all MFA is created equal. SMS-based codes and push notifications are vulnerable to interception and "MFA fatigue" attacks, where users are bombarded with requests until they accidentally approve one. Organizations should move toward phishing-resistant MFA methods, such as FIDO2/WebAuthn hardware keys or certificate-based authentication. These methods cryptographically bind the login attempt to the specific website, making it impossible for an attacker to intercept the credentials via a fake login page. ### Adopt Just-In-Time (JIT) Access Permanent standing privileges are a liability. An administrator who needs root access to a server does not need that access 24/7. JIT access grants privileges only for the specific timeframe needed to complete a task. Once the task is finished, the privileges are automatically revoked. This significantly reduces the attacker's window of opportunity. Even if a privileged account is compromised, it cannot access critical systems without going through a request-and-approval workflow. ### Unify Identity Visibility Fragmentation is the enemy of security. Organizations often have identities scattered across on-premises Active Directory, cloud providers like AWS and Azure, and various SaaS platforms. This creates blind spots. Security teams need a unified view of all identities---human and machine---across the entire hybrid enterprise. Centralized visibility allows for consistent policy enforcement and ensures that when an employee leaves, their access is revoked across all systems simultaneously, preventing "zombie accounts" from remaining active. ### Monitor for Behavior Anomalies Static rules are insufficient against dynamic threats. Identity security systems must leverage analytics to establish a baseline of normal behavior for every user and entity. Machine learning algorithms can detect deviations from this baseline in real-time. If a user who typically accesses marketing files during business hours suddenly downloads gigabytes of financial data at 2 AM, the system should flag this as anomalous. This behavioral approach detects compromised insiders and external attackers who have successfully stolen credentials. ## Common Identity Security Challenges and Remediation As digital ecosystems grow, managing the sheer volume of identities becomes a technical hurdle for security leaders. ### Solving for Identity Sprawl in SaaS Applications Every new [SaaS](https://www.paloaltonetworks.com/cyberpedia/what-is-saas?ts=markdown) tool introduced to a company creates a new set of identities. Without a centralized identity security platform, these "shadow" identities often go unmonitored. Consolidating these into a single identity provider (IdP) ensures that when an employee leaves the company, their access is revoked across every application simultaneously. ### Securing Machine Identities and Service Accounts Machine identities are the "hidden" attack surface. These accounts often have hard-coded credentials and excessive permissions to allow different software components to communicate. Identity security tools now provide automated rotation of these [secrets](https://www.paloaltonetworks.com/cyberpedia/secrets-management?ts=markdown) and use behavioral monitoring to ensure an API isn't being misused by an external threat actor. ## The Convergence of Identity Security and Zero Trust [Zero trust](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture?ts=markdown) is a strategic framework that assumes no user or device is trustworthy by default. Identity security is the engine that makes zero trust possible. ### Continuous Authentication and Verification Mechanisms In a zero trust architecture, authentication is not a one-time event at login. Identity security systems perform continuous verification, re-evaluating the session every time a user attempts to move to a new resource or perform a sensitive action. This ensures that if a session is hijacked after the initial login, the suspicious activity is blocked in mid-stream. ## Advanced Optimization: AI-Powered Identity Defense [Artificial intelligence (AI)](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai?ts=markdown) and machine learning are transforming identity security from a reactive discipline into a proactive defense mechanism. These technologies analyze vast amounts of data to identify patterns that human analysts cannot spot manually. ### User and Entity Behavior Analytics (UEBA) [UEBA](https://www.paloaltonetworks.com/cyberpedia/what-is-user-entity-behavior-analytics-ueba?ts=markdown) establishes a baseline of "normal" behavior for every identity in the network. It tracks attributes such as typical login times, file types accessed, and data transfer volumes. If an account suddenly attempts to download a large volume of [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data?ts=markdown) from an unusual location at 3:00 AM, the UEBA system flags this as an anomaly. This behavioral approach is highly effective at detecting [insider threats](https://www.paloaltonetworks.com/cyberpedia/insider-threat?ts=markdown) and sophisticated account takeovers. ### Natural Language Queries for Identity Insights Modern security platforms are integrating [generative AI](https://www.paloaltonetworks.com/cyberpedia/generative-ai-in-cybersecurity?ts=markdown) to help practitioners search for identity-related risks. Analysts can use natural language queries, such as "Show me all service accounts with administrative privileges that haven't been used in 30 days," to get immediate results. This accessibility allows security teams to identify and remediate risks faster, reducing the specialized knowledge required to manage complex identity environments. ### Predictive Risk Modeling for Proactive Defense Predictive modeling uses historical breach data and [threat intelligence](https://www.paloaltonetworks.com/cyberpedia/what-is-cyberthreat-intelligence-cti?ts=markdown) to identify which identities are most likely to be targeted. For example, accounts belonging to executives or developers with access to source code are categorized as high-risk. Security systems can then apply more stringent authentication requirements and more frequent access reviews to these specific identities, focusing resources where they will have the greatest impact on risk reduction. ## Identity Security FAQs ### What is the difference between IAM and identity security? Identity and Access Management (IAM) is a subset of the broader identity security discipline. While IAM focuses primarily on the administrative processes of facilitating access---such as provisioning accounts and managing logins---identity security encompasses the entire strategy of securing those identities. This includes threat detection, privileged access management, and the continuous monitoring of identity infrastructure to prevent attacks. ### Why are machine identities considered a high security risk? Machine identities (such as bots, APIs, and service accounts) often outnumber human identities significantly and are frequently granted high-level privileges to perform automated tasks. Because they are not associated with a human user, they are often overlooked in governance reviews, lack multi-factor authentication, and may have passwords that are rarely rotated. This makes them attractive targets for attackers seeking persistent, stealthy access to a network. ### How does identity security support regulatory compliance? Regulations like GDPR, HIPAA, and SOX require organizations to strictly control access to sensitive data and prove who accessed what and when. Identity security provides the necessary governance and auditing capabilities to meet these mandates. By enforcing least privilege, automating access reviews, and maintaining detailed logs of all authentication and authorization events, organizations can demonstrate compliance and avoid hefty penalties. ### Can identity security prevent ransomware attacks? Yes, identity security is a critical defense against ransomware. Most ransomware attacks rely on compromising a user's credentials to gain initial access and then escalating privileges to deploy malware across the entire network. By enforcing MFA, protecting privileged accounts, and limiting lateral movement through least-privilege policies, identity security disrupts the attack chain, preventing the ransomware from spreading even if a single machine is infected. ### What is an identity fabric? An identity fabric is an architectural approach that integrates various identity tools and services into a unified framework. Rather than replacing existing identity solutions, the fabric connects them, providing a centralized layer for visibility, policy enforcement, and orchestration. This allows organizations to manage identities consistently across hybrid and multi-cloud environments, regardless of the underlying technology or identity provider. ### Why are machine identities a risk? Machine identities, such as service accounts or API keys, often have higher privileges than human users and are rarely monitored for behavioral changes. Because they are designed for automated communication, they often lack multi-factor authentication, making them a "path of least resistance" for attackers seeking to move through a network undetected. ### Can small businesses benefit from identity security? Yes. While large enterprises face greater complexity, small businesses are often targeted because they have weaker identity controls. Implementing basic identity security measures like phishing-resistant MFA and centralized identity management can prevent the majority of credential-based attacks that lead to business email compromise. Related Content [Awareness: The State of Cloud Identity Report Learn how identity has become the primary attack vector in modern breaches.](https://www.paloaltonetworks.com/prisma/unit42-cloud-threat-research-volume-three?ts=markdown) [2025 Unit 42 Global Incident Response Report Take a comprehensive look at 500+ major cyberattacks, highlighting five key trends.](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report?ts=markdown) [Evaluation: Securing Agentic AI and Machine Identities The Human Element: Social Engineering's Rise to 2025's Top Attack Vector](https://www.paloaltonetworks.com/resources/webcasts?ts=markdown) [Get the CNAPP Buyer's Guide Get the guide for security leaders looking to consolidate their stack. (a framework for evaluating ITDR within a unified security platform).](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Identity%20Security%3F%20Complete%20Guide&body=Explore%20the%20fundamentals%20of%20identity%20security%20to%20safeguard%20digital%20identities.%20Learn%20essential%20strategies%20to%20prevent%20breaches%20and%20ensure%20trusted%20access.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-identity-security) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language