[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Network Security](https://www.paloaltonetworks.com/cyberpedia/network-security?ts=markdown) 3. [What Is Industrial Internet of Things (IIoT) Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-iiot-security?ts=markdown) Table of contents * [What is the industrial internet of things (IIoT)?](#what-is-the-industrial-internet-of-things-iiot) * [Why is IIoT security important?](#why-is-iiot-security-important) * [How is IIoT security different from IoT security?](#how-is-iiot-security-different-from-iot-security) * [What are the primary IIoT security risks?](#what-are-the-primary-iiot-security-risks) * [What are the main standards and frameworks for IIoT security?](#what-are-the-main-standards-and-frameworks-for-iiot-security) * [What does a strong IIoT security foundation look like?](#what-does-a-strong-iiot-security-foundation-look-like) * [How should IIoT security align with IT and OT programs?](#how-should-iiot-security-align-with-it-and-ot-programs) * [IIoT security FAQs](#iiot-security-faqs) # What Is Industrial Internet of Things (IIoT) Security? 6 min. read Table of contents * [What is the industrial internet of things (IIoT)?](#what-is-the-industrial-internet-of-things-iiot) * [Why is IIoT security important?](#why-is-iiot-security-important) * [How is IIoT security different from IoT security?](#how-is-iiot-security-different-from-iot-security) * [What are the primary IIoT security risks?](#what-are-the-primary-iiot-security-risks) * [What are the main standards and frameworks for IIoT security?](#what-are-the-main-standards-and-frameworks-for-iiot-security) * [What does a strong IIoT security foundation look like?](#what-does-a-strong-iiot-security-foundation-look-like) * [How should IIoT security align with IT and OT programs?](#how-should-iiot-security-align-with-it-and-ot-programs) * [IIoT security FAQs](#iiot-security-faqs) 1. What is the industrial internet of things (IIoT)? * [1. What is the industrial internet of things (IIoT)?](#what-is-the-industrial-internet-of-things-iiot) * [2. Why is IIoT security important?](#why-is-iiot-security-important) * [3. How is IIoT security different from IoT security?](#how-is-iiot-security-different-from-iot-security) * [4. What are the primary IIoT security risks?](#what-are-the-primary-iiot-security-risks) * [5. What are the main standards and frameworks for IIoT security?](#what-are-the-main-standards-and-frameworks-for-iiot-security) * [6. What does a strong IIoT security foundation look like?](#what-does-a-strong-iiot-security-foundation-look-like) * [7. How should IIoT security align with IT and OT programs?](#how-should-iiot-security-align-with-it-and-ot-programs) * [8. IIoT security FAQs](#iiot-security-faqs) IIoT security is the protection of industrial systems that use internet-connected devices to monitor, control, or automate physical processes. It focuses on preventing unauthorized access, tampering, or disruption across the network of sensors, controllers, and infrastructure used in industrial environments. Because these systems interact with real-world operations, security failures can cause physical, operational, and financial harm. ## What is the industrial internet of things (IIoT)? ![A labeled diagram of industrial internet of things (IIoT) architecture shows three layers: the cloud, the network, and the edge. At the top, the cloud layer contains functions such as analytics, reporting, planning, optimization, engineering, and human-machine interface, all connected to a central box labeled 'compute \& storage'. Below that, the network layer features a single internet connection line. At the bottom, the edge layer includes two mirrored setups of real-time control environments. Each setup connects an edge gateway and HMI to a set of three devices labeled sensor, actuator, and controller. To the right, a visual key associates HMI with a monitor icon, real-time control with a red double arrow, and shows icons for sensor, actuator, and controller.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-iiot-security/IIoT-security_1-Industrial.png "A labeled diagram of industrial internet of things (IIoT) architecture shows three layers: the cloud, the network, and the edge. At the top, the cloud layer contains functions such as analytics, reporting, planning, optimization, engineering, and human-machine interface, all connected to a central box labeled 'compute & storage'. Below that, the network layer features a single internet connection line. At the bottom, the edge layer includes two mirrored setups of real-time control environments. Each setup connects an edge gateway and HMI to a set of three devices labeled sensor, actuator, and controller. To the right, a visual key associates HMI with a monitor icon, real-time control with a red double arrow, and shows icons for sensor, actuator, and controller.") The industrial internet of things (IIoT) is a system of connected devices designed to monitor, control, and optimize industrial operations. These devices collect data from physical environments and communicate with centralized systems or other machines. !\[A labeled diagram titled 'IIoT core components and data flow' shows three vertical sections: physical devices, communications, and information processing. The physical devices section displays a vertical hierarchy of SCADA, control unit, and remote terminal units, branching into controllers and sensors. The communications section includes WLAN, cellular 4G–5G, and wired connections, with a horizontal line labeled 'device to device' connecting icons of a phone and laptop. The information processing section includes elements such as edge computing, data aggregation and storage, data analytics and processing, decision-making, and authorized entities. At the bottom, a row of labeled icons shows sectors and applications for IoT: built environment, transport, manufacturing, healthcare, energy, agriculture, and water.\](https://www.paloaltonetworks.com/content/dam/pan/en\_US/images/cyberpedia/what-is-iiot-security/IIoT-security\_2- IIoT.png "A labeled diagram titled 'IIoT core components and data flow' shows three vertical sections: physical devices, communications, and information processing. The physical devices section displays a vertical hierarchy of SCADA, control unit, and remote terminal units, branching into controllers and sensors. The communications section includes WLAN, cellular 4G–5G, and wired connections, with a horizontal line labeled 'device to device' connecting icons of a phone and laptop. The information processing section includes elements such as edge computing, data aggregation and storage, data analytics and processing, decision-making, and authorized entities. At the bottom, a row of labeled icons shows sectors and applications for IoT: built environment, transport, manufacturing, healthcare, energy, agriculture, and water.") IIoT is widely applied in sectors like manufacturing, energy, and transportation to improve efficiency and automation. ## Why is IIoT security important? Industrial operations increasingly rely on connected devices to automate and optimize physical processes. That includes systems used in manufacturing lines, power grids, water treatment plants, and transportation infrastructure. When those devices are insecure, the consequences extend beyond digital assets. They can disrupt production, damage equipment, or even compromise safety. * *81% of security leaders say their organizations experienced an IoT-focused attack in the past year.* * *Organizations hit by IoT-targeted breaches were significantly more likely to face costs between $5M--$10M than those hit by traditional IT attacks.* * *46% of organizations still struggle to gain visibility into their IoT devices, making risk management extremely difficult.* * *91% of security leaders say IoT device manufacturers do a poor job securing devices from attack.* * *Manufacturers are projected to increase their use of OT assets by 400% by 2030---most of which were not designed for secure internet connectivity.* [- Palo Alto Networks \& Starfleet Research, ​​The 2024 Benchmark Report on IoT Security](https://www.paloaltonetworks.com/resources/research/the-2024-benchmark-report-on-iot-security) More specifically, IIoT systems introduce potential attack surfaces at every layer---from low-level device vulnerabilities to application-layer exploits. Each layer must be secured to prevent cascading risk. As demonstrated here: ![A layered diagram titled 'Security vulnerabilities across IIoT system layers' illustrates cyber threats at four levels: application, processing, transport, and device. In the application layer, TCP traffic to and from the internet is shown with red arrows indicating vulnerabilities such as injecting malicious code and counterfeit commands. The processing layer shows file systems with arrows pointing to a key and folder, labeled stealing and tampering. The transport layer includes multiple interconnected systems with red lines labeled DNS spoofing, SMB session hijacking, and sending malicious control frame packets. The device layer shows hardware components and highlights vulnerabilities within ICS, including stack-based buffer overflow, out-of-bounds read/write, and uninitialized pointer vulnerabilities. A right-facing arrow labeled actuator runs across the bottom of the device layer. Each threat is marked with a red icon of a person at risk.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-iiot-security/IIoT-security_3-Security.png) Here's why that matters-- Unlike general IT systems, IIoT environments control real-world operations. A breach can trigger downtime that halts production or disables [critical infrastructure](https://www.paloaltonetworks.com/cyberpedia/what-is-critical-infrastructure). In sectors like energy or public transit, those disruptions can affect entire communities. IIoT deployments also introduce new dependencies. Devices often connect through wireless protocols, cloud platforms, and third-party tools---each with its own attack surface. If not properly secured, those components create entry points that didn't exist in traditional industrial systems. And industries can't fall back on legacy protections. Many IIoT systems operate alongside or on top of aging control technologies that weren't designed with cybersecurity in mind. That creates complexity and increases exposure. In short: IIoT security is essential because the systems it protects have a direct impact on operations, uptime, and safety. As industrial environments modernize, the need for purpose-built security grows more urgent. ## How is IIoT security different from IoT security? The difference between IIoT and IoT comes down to environment and impact: **IoT usually refers to consumer or enterprise devices---like smart thermostats or connected printers---designed to improve convenience or efficiency.** **IIoT applies those same connectivity principles to industrial operations. But the stakes are much higher because IIoT systems directly affect physical equipment and real-world processes. So security failures carry a greater risk of disruption, damage, or even harm.** Why does that matter for security? IIoT environments often include older systems, proprietary protocols, and minimal device protections. Many components were never designed to connect to the internet. Once online, they become targets for attack. And unlike a smart fridge, a compromised industrial sensor can have safety or operational consequences. Security controls also differ. IIoT networks require specialized protections that account for uptime requirements, long device lifecycles, and legacy hardware. Even basic steps like patching or authentication can be harder to implement without disrupting operations. [IoT security](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security) typically focuses on data confidentiality and network hygiene. But IIoT security must also prioritize availability, system integrity, and physical safety. That shift in focus changes [how threats are modeled](https://www.paloaltonetworks.com/cyberpedia/threat-modeling) and how controls are applied. In short: IIoT security isn't just about securing connected devices. It's about adapting cybersecurity principles to environments where uptime and safety come first. | ***Further reading:*** * [*What Is the Difference Between IoT and OT Security?*](https://www.paloaltonetworks.com/cyberpedia/iot-security-vs-ot-security) * [*IT vs. OT Security | What Are the Differences?*](https://www.paloaltonetworks.com/cyberpedia/ot-vs-it-security) ## What are the primary IIoT security risks? ![A graphic titled 'Primary IIoT security risks' features six labeled red square icons with white outlines. On the left, vertically arranged icons represent three risks: a laptop labeled 'Device-level vulnerabilities,' a bidirectional arrow between two rectangles labeled 'Unsecured communications,' and a stacked server icon labeled 'Legacy systems \& protocols.' On the right, three additional icons are horizontally aligned: a network node graphic labeled 'Lack of segmentation,' and a user ID badge with a warning symbol labeled 'Weak or absent authentication.' The layout is split between a light gray background on the left and white on the right, with icons evenly distributed across both sides.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-iiot-security/IIoT-security_4-Primary.png "A graphic titled 'Primary IIoT security risks' features six labeled red square icons with white outlines. On the left, vertically arranged icons represent three risks: a laptop labeled 'Device-level vulnerabilities,' a bidirectional arrow between two rectangles labeled 'Unsecured communications,' and a stacked server icon labeled 'Legacy systems & protocols.' On the right, three additional icons are horizontally aligned: a network node graphic labeled 'Lack of segmentation,' and a user ID badge with a warning symbol labeled 'Weak or absent authentication.' The layout is split between a light gray background on the left and white on the right, with icons evenly distributed across both sides.") Industrial systems bring unique security challenges. That's because they weren't originally designed for internet connectivity. Once connected, they inherit the same risks as traditional IT systems---but with higher consequences. Downtime, disruption, and safety hazards can all result from a single compromise. In other words: These risks aren't just about data. They're about physical processes and real-world outcomes. ### Device-level vulnerabilities Many IIoT devices are built for durability and long lifespans, not security. They often lack basic protections like secure boot, encrypted storage, or patch management. If one device is compromised, it can become a weak entry point to the rest of the network. ### Unsecured communications IIoT environments rely heavily on machine-to-machine communication. When these connections aren't encrypted or authenticated, attackers can intercept or alter [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data) in transit. This opens the door to command injection, spoofing, and data tampering. ### Legacy systems and protocols Industrial networks often include decades-old systems and proprietary protocols. These weren't built with security in mind. Many lack basic safeguards, and updating them may be difficult---or even impossible---without disrupting operations. ### Lack of segmentation Flat networks make it easier for attackers to move laterally once they've gained access. In industrial settings, this could allow them to jump from a low-value sensor to a safety-critical controller. Without [segmentation](https://www.paloaltonetworks.com/cyberpedia/what-is-network-segmentation), even minor [breaches](https://www.paloaltonetworks.com/cyberpedia/data-breach) can escalate quickly. ### Weak or absent authentication Some IIoT systems default to shared credentials or offer no user authentication at all. This creates opportunities for unauthorized access, especially in remote or distributed environments. Strong, role-based authentication is often missing. ## What are the main standards and frameworks for IIoT security? Industrial environments present distinct cybersecurity challenges. And no single framework covers every IIoT security requirement. Instead, several standards offer guidance based on the organization's industry, architecture, and risk profile. These frameworks are not always mandatory. But they help structure security controls across devices, networks, data flows, and operational processes. In other words: They give industrial organizations a way to align security efforts with established practices for operational technology (OT) and cyber-physical systems (CPS). Here's a breakdown of the most widely referenced IIoT security standards and frameworks: | IIoT security standards and frameworks || | Framework | Description | |-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [NIST SP 800-82 Rev. 3](https://csrc.nist.gov/pubs/sp/800/82/r3/final) | Provides detailed guidance on securing ICS environments, including IIoT components. Covers architecture, threats, and countermeasures for different system types. Developed by the U.S. National Institute of Standards and Technology. | | [ISA/IEC 62443](https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards) | A widely adopted international standard for industrial automation and control system security. Addresses technical, operational, and organizational controls across multiple stakeholder roles and system lifecycles. | | ENISA Guidelines: [Guidelines for Securing the Internet of Things](https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards) and [ENISA Guidelines on Cybersecurity for OT and ICS](https://www.cs2ai.org/standards-regulations/enisa-guidelines-on-cybersecurity-for-ot-and-ics) | Issued by the EU Agency for Cybersecurity, these include general IoT and OT-specific recommendations. While not exclusive to IIoT, they offer useful guidance on secure design, risk assessment, and resilience across connected and industrial systems. | | [NIST Cybersecurity Framework (CSF)](https://www.nist.gov/cyberframework) | A broad, risk-based framework for critical infrastructure protection. Often used in tandem with more specific IIoT or ICS guidance. Helps map out security priorities and assess maturity. | | [ISO/IEC 27001](https://www.iso.org/standard/27001) with [ISO/IEC 27019](https://www.iso.org/standard/85056.html) | While ISO/IEC 27001 is a general information security management standard, ISO/IEC 27019 extends it to cover control systems in energy and utility sectors. Together they offer a structured approach to security governance. | | [Industrial Internet Consortium (IIC) IIRA \& SFSA](https://www.iiconsortium.org/iira/) | The Industrial Internet Reference Architecture and Security Framework provide architectural models and layered security recommendations for IIoT systems. Useful for designing secure-by-design IIoT implementations. | | ***Further reading:** [What Is the Purdue Model for ICS Security? | A Guide to PERA](https://www.paloaltonetworks.com/cyberpedia/what-is-the-purdue-model-for-ics-security)* ## What does a strong IIoT security foundation look like? A strong IIoT security foundation isn't just about [firewalls](https://www.paloaltonetworks.com/cyberpedia/what-is-a-firewall) and patches. It's about aligning technology, people, and processes to secure highly distributed, always-on industrial systems. That means building in protections from the ground up---starting at the device layer and working up through the network, applications, and overall governance. In other words: It's not a single control or fix. It's a systemwide approach to managing risk over time. Here are the core elements: ### Visibility and asset inventory You can't protect what you don't know about. That's why IIoT security starts with complete visibility. Organizations need an accurate, up-to-date inventory of all IIoT devices and systems---including operational technology (OT), sensors, controllers, and legacy equipment. ### Network segmentation and zoning Flat networks are common in industrial settings. But they make it easier for attackers to move laterally. Segmenting IIoT networks into trusted zones---especially isolating critical systems---limits exposure and helps contain incidents. ### Secure device lifecycle management IIoT devices often lack built-in protections. That makes it critical to harden devices before deployment and maintain them over time. This includes secure onboarding, configuration, patching, and end-of-life handling. ### Strong authentication and access control Shared credentials and default passwords are still widespread in IIoT. Role-based access, [multifactor authentication](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-factor-authentication), and centralized identity management are key to preventing unauthorized access---especially across remote or distributed assets. ### Encrypted, authenticated communications Unprotected machine-to-machine traffic is one of the most overlooked risks. Secure protocols and mutual authentication help prevent command injection, spoofing, and data tampering. ### Ongoing monitoring and incident response Industrial networks need real-time monitoring to detect anomalies early. And they need an incident response plan that accounts for both IT and OT systems. Downtime and safety risks mean quick containment is critical. ### Governance and cross-functional collaboration IIoT security isn't just a technical challenge. It requires coordination between IT, OT, engineering, compliance, and executive leadership. Shared policies, risk models, and escalation procedures help ensure consistent security across teams and sites. | ***Further reading:** [What Is Cyber-Physical Systems Security (CPSSEC)?](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-physical-systems-security-cpssec)* ## How should IIoT security align with IT and OT programs? IIoT security doesn't operate in a vacuum. It spans both information technology (IT) and operational technology (OT) environments. Which means: It needs to work across both. And be coordinated from both sides. | IT, OT, and IIoT systems comparison: connectivity and security requirements |||| | | IT | OT | IIoT | |-------------------------------------------|--------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------| | **Connectivity mechanisms** | Via Telco, Wi-Fi | Via Telco, Radio, Satellite, Powerline Carrier, Wi-Fi | Via Ethernet, Wi-Fi, cellular, LPWAN, 5G | | **Security priority** | [Data security](https://www.paloaltonetworks.com/cyberpedia/what-is-data-security) with high confidentiality | Operational uptime with high availability, safety, and integrity | Data integrity and system availability; secure remote access; safety-critical M2M communication | | **Security standards** | ISO-17799, 27001, NIST SP 800-53 | ISA99, NERC CIP 002-009, NIST SP 800-53, NIST SP 800-82 | ISA/IEC 62443, NIST SP 800-82, IIRA/SFSA, ISO/IEC 27019, ENISA Guidelines | | **Security patching** | Frequent | Slow to impossible | Delayed and inconsistent; often dependent on vendor support and operational maintenance windows | | **Cyber forensics** | Available | Limited, if any | Emerging but limited; depends on integration with centralized monitoring and visibility tools | | **Overall impact from security breaches** | Business impacts | Business impacts, process fluctuations, equipment damage, environmental release, personnel safety | All of the above, plus risk of real-time disruption to remote operations, supply chains, or infrastructure | Here's why: IIoT systems are deeply embedded in OT environments. But they introduce risks that are more common in IT---like remote access, software vulnerabilities, and internet exposure. If IT and OT teams work separately, they'll miss critical gaps. Or worse, apply controls that don't fit the context. For example: IT might push frequent patching. But that may not be feasible on OT equipment that runs 24/7. On the other hand, OT might prioritize uptime above all. But that can't come at the cost of basic security hygiene. So what's the fix? Cross-functional coordination. Shared priorities. A clear chain of responsibility. IIoT security should be part of a broader IT/[OT security](https://www.paloaltonetworks.com/cyberpedia/what-is-ot-security) strategy that accounts for both digital risk and operational resilience. That includes aligned incident response plans, shared asset visibility, and security controls tailored to each environment. Important: This isn't about merging the two teams. It's about making sure they communicate, plan, and act together. That way, IIoT doesn't become the weak link between two disconnected programs. It becomes a bridge between them. | ***Further reading:*** * [*What Is IT/OT Convergence?*](https://www.paloaltonetworks.com/cyberpedia/what-is-it-ot-convergence) * [*What Is the Difference Between IT and OT? | IT vs. OT*](https://www.paloaltonetworks.com/cyberpedia/it-vs-ot) * [*What Are the Differences Between OT, ICS, \& SCADA Security?*](https://www.paloaltonetworks.com/cyberpedia/ot-vs-ics-vs-scada-security) * [*What Is ICS Security? | Industrial Control Systems Security*](https://www.paloaltonetworks.com/cyberpedia/what-is-ics-security) ![Icon of a book](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-iiot-security/icon-ebook.svg) ## A CISO's Guide to Navigating OT \& IT Convergence in the Manufacturing Industry. [Download eBook](https://start.paloaltonetworks.com/prisma-airs-demo.html) ## IIoT security FAQs ### What is IIoT in cyber security? IIoT security protects industrial systems that use internet-connected devices to monitor or control physical processes. It focuses on preventing disruption, tampering, and unauthorized access across environments where real-world safety and uptime are critical. ### What is the security of industrial IoT? Industrial IoT security involves securing connected devices, networks, and control systems used in industrial environments. It addresses risks like device vulnerabilities, network exposure, and legacy system weaknesses to prevent downtime, damage, or safety incidents. ### What is the simple definition of IIoT? The industrial internet of things (IIoT) is a network of connected devices that monitor, control, and optimize industrial operations using real-time data from physical environments. ### What are the three types of IoT security? The article does not define three official "types" of IoT security. However, IIoT security focuses on securing devices, communication protocols, and operational processes in industrial settings. ### What makes IIoT security different from traditional IT security? IIoT security prioritizes uptime, system integrity, and physical safety. It deals with legacy hardware, machine-to-machine risks, and operational constraints---unlike IT security, which emphasizes data confidentiality and fast patch cycles. ### Is IIoT security part of OT security or separate from it? IIoT security overlaps with OT security but includes IT-like risks such as internet exposure and remote access. It requires coordination between both IT and OT teams for effective protection. ### What are the biggest challenges in securing IIoT systems? Key challenges include weak device protections, lack of segmentation, legacy systems, unencrypted communications, and minimal authentication. These gaps increase the risk of operational disruption and physical harm. ### How does IIoT security relate to the Purdue Model? The article doesn't explain the Purdue Model in detail, but it notes that IIoT security aligns with ICS network architecture models like Purdue to support layered defenses across operational environments. ### Do standard IT tools work for IIoT security? Not entirely. Standard IT tools often don't fit industrial constraints. IIoT environments require specialized controls that account for uptime, long device lifecycles, and legacy technology. ### What are common frameworks used in IIoT security? Widely referenced frameworks include NIST SP 800-82, ISA/IEC 62443, ENISA Guidelines, NIST CSF, ISO/IEC 27001 with 27019, and the IIC's IIRA and SFSA. ### How do organizations get started with IIoT security? Start with complete asset visibility and segmentation. From there, establish lifecycle controls, access management, secure communications, real-time monitoring, and coordinated governance across IT and OT. Related Content [White paper: OT Security Insights: Secure OT-IT Convergence to Keep the Production Lines Working See how to implement the principles of Zero Trust for a resilient OT security framework.](https://www.paloaltonetworks.com/resources/whitepapers/ot-security-insights-secure-ot-it-convergence-to-keep-the-production-lines-working?ts=markdown) [eBook: Enterprise Buyer's Guide to IoT Security Grab an overview of the IoT device landscape + principles Zero Trust security provides.](https://www.paloaltonetworks.com/resources/ebooks/the-enterprise-buyer-guide-to-iot-security?ts=markdown) [Blog: Risk-based vulnerability prioritization for IoT, OT and IoMT devices Read about a contextual, risk-based approach to vulnerability prioritization for IoT, OT, and Medical IoT devices.](https://www.paloaltonetworks.com/blog/network-security/risk-based-vulnerability-prioritization/?ts=markdown) [Report: OMDIA: OT's Digital Transformation Report Find out what your peers are saying about selecting modern OT security technologies.](https://www.paloaltonetworks.com/resources/research/omdia-ots-digital-transformation-report?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Industrial%20Internet%20of%20Things%20%28IIoT%29%20Security%3F&body=IIoT%20security%20is%20the%20protection%20of%20industrial%20systems%20that%20use%20internet-connected%20devices%20to%20monitor%2C%20control%2C%20or%20automate%20physical%20processes.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-iiot-security) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language