[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security?ts=markdown) 4. [What Is Infrastructure as a Service?](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-a-service?ts=markdown) Table of contents * [What Is Cloud Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security?ts=markdown) * [Why Is Cloud Security Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security#why?ts=markdown) * [Essential Elements of a Cloud Security Strategy](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security#essential?ts=markdown) * [The Three Pillars of Cloud Security](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security#pillars?ts=markdown) * [How Does Cloud Security Work?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security#how?ts=markdown) * [Three Categories of Cloud Service Models](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security#categories?ts=markdown) * [The Shared Responsibility Model](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security#model?ts=markdown) * [Top Cloud Security Risks and Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security#challenges?ts=markdown) * [Cloud Security Tools](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security#tools?ts=markdown) * [Cloud Security Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security#practices?ts=markdown) * [Cloud Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security#faqs?ts=markdown) * [What Is a Cloud Service Provider?](https://www.paloaltonetworks.com/cyberpedia/cloud-service-provider?ts=markdown) * [Cloud Service Providers Explained](https://www.paloaltonetworks.com/cyberpedia/cloud-service-provider#cloud?ts=markdown) * [Types of Cloud Providers](https://www.paloaltonetworks.com/cyberpedia/cloud-service-provider#types?ts=markdown) * [Benefits of Cloud Service Providers](https://www.paloaltonetworks.com/cyberpedia/cloud-service-provider#benefits?ts=markdown) * [Challenges of Cloud Service Providers](https://www.paloaltonetworks.com/cyberpedia/cloud-service-provider#challenges?ts=markdown) * [Cloud Service Provider Platform FAQs‍](https://www.paloaltonetworks.com/cyberpedia/cloud-service-provider#faqs?ts=markdown) * [Defining Organizational Cloud Security Responsibilities](https://www.paloaltonetworks.com/cyberpedia/defining-organizational-cloud-security-responsibilities?ts=markdown) * What Is Infrastructure as a Service? * [Benefits of IaaS and Security Implications](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-a-service#benefits?ts=markdown) * [Securing IaaS](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-a-service#securing?ts=markdown) * [Infrastructure as a Service FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-a-service#faqs?ts=markdown) * [Top 3 Cloud Security Considerations](https://www.paloaltonetworks.com/cyberpedia/top-3-cloud-security-considerations?ts=markdown) * [Cloud Computing Does Not Lessen Existing Network Security Risks](https://www.paloaltonetworks.com/cyberpedia/top-3-cloud-security-considerations#https://www.paloaltonetworks.com/cyberpedia/what-is-a-data-center?ts=markdown) * [Why You Need Cloud Security](https://www.paloaltonetworks.com/cyberpedia/why-you-need-cloud-security?ts=markdown) * [17 Tips to Securely Deploy Cloud Environments](https://www.paloaltonetworks.com/cyberpedia/17-ways-to-secure-when-deploying-cloud-environments?ts=markdown) * [Four Ways to Improve Cloud Security and Compliance](https://www.paloaltonetworks.com/cyberpedia/four-ways-to-improve-cloud-security-and-compliance?ts=markdown) * [Cloud Security Glossary \& FAQs](https://www.paloaltonetworks.com/cyberpedia/cloud-security-glossary-faqs?ts=markdown) * [Cloud Deployment and Computing Models](https://www.paloaltonetworks.com/cyberpedia/cloud-security-glossary-faqs#deployment?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security-glossary-faqs#security?ts=markdown) * [Compliance in the Cloud](https://www.paloaltonetworks.com/cyberpedia/cloud-security-glossary-faqs#compliance?ts=markdown) * [Cloud Migration](https://www.paloaltonetworks.com/cyberpedia/cloud-security-glossary-faqs#migration?ts=markdown) * [Cloud-Native Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security-glossary-faqs#native?ts=markdown) * [Careers in Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security-glossary-faqs#careers?ts=markdown) * [The Changing Cloud Landscape](https://www.paloaltonetworks.com/cyberpedia/cloud-security-glossary-faqs#landscape?ts=markdown) * [How to Assess Risk in the Cloud](https://www.paloaltonetworks.com/cyberpedia/how-to-assess-risk-in-the-cloud?ts=markdown) * [Assessing Risk in the Cloud Explained](https://www.paloaltonetworks.com/cyberpedia/how-to-assess-risk-in-the-cloud#assessing?ts=markdown) * [Technical Approaches to Risk Assessment](https://www.paloaltonetworks.com/cyberpedia/how-to-assess-risk-in-the-cloud#technical?ts=markdown) * [Identifying Cloud Risks](https://www.paloaltonetworks.com/cyberpedia/how-to-assess-risk-in-the-cloud#identifying?ts=markdown) * [Assess Potential Risks](https://www.paloaltonetworks.com/cyberpedia/how-to-assess-risk-in-the-cloud#assess?ts=markdown) * [Data Compliance FAQs](https://www.paloaltonetworks.com/cyberpedia/how-to-assess-risk-in-the-cloud#faqs?ts=markdown) * [Cloud Security Is a Shared Responsibility](https://www.paloaltonetworks.com/cyberpedia/cloud-security-is-a-shared-responsibility?ts=markdown) * [What Is the Shared Responsibility Model?](https://www.paloaltonetworks.com/cyberpedia/cloud-security-is-a-shared-responsibility#what?ts=markdown) * [The Shared Responsibility Model Explained](https://www.paloaltonetworks.com/cyberpedia/cloud-security-is-a-shared-responsibility#the?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security-is-a-shared-responsibility#cloud?ts=markdown) * [Shared Responsibility FAQs](https://www.paloaltonetworks.com/cyberpedia/cloud-security-is-a-shared-responsibility#faqs?ts=markdown) * [ASPM Best Practices for Enhancing Your Security Posture](https://www.paloaltonetworks.com/cyberpedia/aspm-best-practices?ts=markdown) * [ASPM Foundations and Strategic Benefits in Cloud Environments](https://www.paloaltonetworks.com/cyberpedia/aspm-best-practices#aspm?ts=markdown) * [Establishing Centralized Visibility and Data Organization for Continuous Monitoring](https://www.paloaltonetworks.com/cyberpedia/aspm-best-practices#monitoring?ts=markdown) * [DevSecOps Culture Integration and Shift-Left Security Practices](https://www.paloaltonetworks.com/cyberpedia/aspm-best-practices#practices?ts=markdown) * [KPI Alignment and Remediation Workflows for Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/aspm-best-practices#kpi?ts=markdown) * [Advanced ASPM Optimization and Proactive Risk Management](https://www.paloaltonetworks.com/cyberpedia/aspm-best-practices#advanced?ts=markdown) * [ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-best-practices#faqs?ts=markdown) # What Is Infrastructure as a Service? Discover how Infrastructure as a Service (IaaS) revolutionizes computing by providing scalable, on-demand resources that power modern cloud environments. 3 min. read [Download The CNAPP Buyer's Guide](https://start.paloaltonetworks.com/cnapp-buyers-guide.html) Table of contents * * [Benefits of IaaS and Security Implications](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-a-service#benefits?ts=markdown) * [Securing IaaS](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-a-service#securing?ts=markdown) * [Infrastructure as a Service FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-a-service#faqs?ts=markdown) 1. Benefits of IaaS and Security Implications * * [Benefits of IaaS and Security Implications](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-a-service#benefits?ts=markdown) * [Securing IaaS](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-a-service#securing?ts=markdown) * [Infrastructure as a Service FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-a-service#faqs?ts=markdown) Infrastructure as a service, sometimes referred to as "hardware as a service" -- IaaS and HaaS, respectively -- is the [most impactful computing paradigm](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology?ts=markdown) to emerge since the boom of the internet and the growth of "as a service" delivery models. Alongside [software as a service](https://www.paloaltonetworks.com/cyberpedia/what-is-saas?ts=markdown) and platform as a service -- SaaS and PaaS -- it is one of the three most common forms of cloud computing that provides third-party computing resources, such as hardware, storage, servers, and networking components for data center space, via the internet. In the case of IaaS, third-party providers offer computing infrastructure in a virtual environment so that any user in an organization can access it. Google Cloud, Amazon Web Services and Microsoft Azure® are some of the more notable examples of public cloud IaaS providers. ## Benefits of IaaS and Security Implications The move to the public cloud is driven strongly by the speed at which companies can build and deploy globally available, highly scalable applications. Businesses often choose IaaS because it enables them to replicate familiar on-premises architectures in cloud environments. By simply renting the resources they need without the costly upfront burden of building data centers, organizations save significant upfront costs and avoid the hardware maintenance and refresh logistics. IaaS poses few limitations in terms of what applications or services can run since many of the foundational resources available are the same as those in on-premises environments. However, as with any other cloud service, IaaS comes with security risks organizations must understand. Users can have direct access to the cloud infrastructure, hardware and networks. Therefore, an organization's employees are all "privileged insiders" and can become security liabilities if identity and access control policies are not tightly controlled. IaaS is also vulnerable to attackers gaining access via encryption breaking, potentially performing man-in-the-middle attacks to steal or modify data. Furthermore, attackers may try to hijack IaaS resources to run botnets, mine cryptocurrency or launch [denial-of-service](https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos?ts=markdown) attacks. ## Securing IaaS Although deploying cloud services can vastly accelerate business growth and innovation, security cannot become a secondary consideration in these highly dynamic, distributed environments. When it comes to the security of IaaS environments, businesses tend to lean one of two ways: they rely solely on the service provider for security, or they extend in-house security measures to the cloud. Services like AWS® and Azure may offer security controls for their own cloud environments, but users are on their own to piece together the provided tools into functioning security coverage. Compounded by the fact that most businesses use multiple cloud environments at once, this approach quickly becomes overwhelming to effectively build and manage. Consequently, simply extending on-premises security to the cloud negates a lot of the cloud's agile scalability. On-premises security products are designed to act as central points of control across an environment, but forcing all traffic through a single central control point in a highly distributed cloud environment introduces significant friction. Therefore, IT managers need to create strong IaaS security strategies that implement security technologies purpose-built for the cloud. Applications and data in the public cloud need to be protected at least as diligently as private networks and on-premises software, hardware, applications, and data. By working with a trusted partner experienced in combining native tools from cloud services with proven, next-generation security technologies, organizations will be able to better protect their cloud environments and prevent cyber breaches. ## Infrastructure as a Service FAQs ### What is virtual machine provisioning in IaaS? Virtual machine provisioning in IaaS involves creating and configuring virtual instances to run applications and services. It automates the allocation of compute resources, storage, and network settings. Tools like Terraform and Ansible streamline this process, enabling rapid deployment and scaling. Provisioning includes selecting an operating system, configuring security policies, and installing necessary software. Users can define resource requirements, ensuring optimal performance and cost-efficiency. Efficient VM provisioning minimizes downtime, accelerates development cycles, and enhances the flexibility of cloud infrastructure. ### What is scalability in IaaS? Scalability in IaaS refers to the ability to dynamically adjust computing resources based on demand. It allows organizations to scale up by adding more virtual machines, storage, or network capacity during peak usage, and scale down during low demand periods. Auto-scaling features, offered by platforms like AWS Auto Scaling and Azure Scale Sets, automate this process. Scalability ensures consistent performance, cost efficiency, and resource optimization. It supports business growth and fluctuating workloads without the need for significant upfront investments in physical infrastructure. ### What is multitenancy in IaaS? Multitenancy in IaaS enables multiple customers, or tenants, to share the same physical infrastructure while maintaining data isolation and security. It maximizes resource utilization and cost efficiency for cloud providers and users. Each tenant operates in a logically isolated environment, ensuring that one tenant's activities do not affect others. Technologies like virtualization and containerization facilitate multi-tenancy. Effective multi-tenancy management includes implementing strict access controls, encryption, and monitoring to prevent unauthorized access and ensure compliance with security standards. ### What is a hypervisor? A hypervisor, or virtual machine monitor (VMM), is a software layer that enables the creation and management of virtual machines on a physical host. It abstracts hardware resources, allowing multiple VMs to run simultaneously on a single server. Hypervisors can be classified as Type 1 (bare-metal) or Type 2 (hosted). Type 1 hypervisors, like VMware ESXi and Microsoft Hyper-V, run directly on the hardware, offering better performance. Type 2 hypervisors, like Oracle VirtualBox, run on a host operating system. Hypervisors are fundamental to IaaS, enabling virtualization and resource efficiency. ### What is cloud orchestration? Cloud orchestration in IaaS involves automating the management, coordination, and organization of complex cloud services and resources. Orchestration tools, like Kubernetes and OpenStack, streamline processes such as provisioning, configuration, and scaling. They enable users to define workflows and policies for deploying applications and managing infrastructure. Orchestration ensures consistency, reduces manual intervention, and enhances operational efficiency. It supports multi-cloud environments, enabling seamless integration and management of services across different cloud platforms. Effective orchestration optimizes resource utilization and accelerates application delivery. ### What is a virtual private cloud (VPC)? A Virtual Private Cloud (VPC) in IaaS provides a logically isolated section of the cloud where users can deploy resources in a virtual network. VPCs offer control over network settings, such as IP address ranges, subnets, and route tables. Users can establish secure connections to on-premises data centers via VPN or Direct Connect. VPCs enhance security by segmenting resources and implementing network access controls. Platforms like AWS VPC, Azure Virtual Network, and Google VPC enable organizations to build flexible, scalable, and secure cloud environments tailored to their specific needs. ### What is elasticity in IaaS? Elasticity in IaaS refers to the ability to automatically scale computing resources up or down based on demand. It ensures that applications can handle varying workloads without manual intervention. Elasticity leverages auto-scaling features provided by cloud platforms, such as AWS Auto Scaling and Azure Virtual Machine Scale Sets. Resources are dynamically allocated and deallocated, optimizing performance and cost-efficiency. Elasticity supports high availability and fault tolerance by distributing workloads across multiple instances. It enables organizations to respond quickly to changing business requirements and maintain seamless user experiences. ### What is load balancing? Load balancing in IaaS distributes incoming network traffic across multiple servers to ensure optimal resource utilization, minimize response times, and prevent any single server from being overwhelmed. Load balancers, such as AWS Elastic Load Balancer and Azure Load Balancer, monitor server health and reroute traffic to healthy instances. They support various algorithms like round-robin, least connections, and IP hash. ### What is disaster recovery? Disaster recovery involves strategies and tools to ensure business continuity in the event of a catastrophic failure. It includes automated backups, data replication, and failover mechanisms to secondary locations. Services like AWS Disaster Recovery and Azure Site Recovery provide real-time replication and automated recovery processes. Disaster recovery plans outline recovery point objectives (RPO) and recovery time objectives (RTO) to minimize data loss and downtime. Implementing robust disaster recovery ensures quick restoration of services and data integrity, maintaining operational resilience. ### What is network security? Network security encompasses measures to protect data, applications, and resources from cyber threats. It includes implementing firewalls, intrusion detection and prevention systems (IDPS), and virtual private networks (VPNs). Cloud providers offer tools like AWS Security Groups, Azure Network Security Groups, and Google Cloud Firewalls to control inbound and outbound traffic. Encryption protocols secure data in transit, while network segmentation isolates sensitive workloads. Continuous monitoring and threat intelligence integration enhance proactive defense. Effective network security mitigates risks and ensures compliance with regulatory requirements. ### What is resource pooling? Resource pooling in IaaS involves aggregating computing resources such as CPU, memory, and storage to serve multiple clients dynamically. Virtualization technologies enable the creation of virtual machines and containers that share underlying physical resources. Cloud providers like AWS, Azure, and Google Cloud manage these pooled resources, allocating them based on demand. Resource pooling ensures efficient utilization, scalability, and cost-effectiveness. It supports multi-tenancy, allowing multiple customers to share the same infrastructure while maintaining logical isolation and security. Optimal resource pooling enhances flexibility and performance in cloud environments. ### What is automated scaling? Automated scaling in IaaS dynamically adjusts the number of active instances based on real-time demand. It includes vertical scaling, which increases resource capacity of existing instances, and horizontal scaling, which adds or removes instances. Tools like AWS Auto Scaling and Azure VM Scale Sets monitor performance metrics and trigger scaling actions. Automated scaling ensures applications maintain optimal performance and availability during traffic spikes or drops. It reduces manual intervention, minimizes costs by efficiently using resources, and enhances the user experience by preventing latency and downtime. ### What is usage-based pricing? Usage-based pricing in IaaS charges customers based on their actual consumption of computing resources. This model offers flexibility and cost efficiency, as users pay for what they use rather than provisioning fixed capacity. Metrics like compute hours, storage usage, and data transfer determine billing. Cloud providers like AWS, Azure, and Google Cloud offer detailed pricing calculators and billing dashboards. Usage-based pricing supports scalability, enabling organizations to adjust resource usage without incurring unnecessary costs. It aligns expenses with business needs, optimizing budget management and resource allocation. ### What is a service-level agreement (SLA)? A service-level agreement (SLA) in IaaS is a formal contract between a cloud service provider and a customer that defines the expected level of service. It includes metrics such as uptime guarantees, response times, and performance standards. SLAs also outline remedies for service failures, such as service credits or penalties. Cloud providers like AWS, Azure, and Google Cloud publish SLAs to ensure transparency and accountability. Adhering to SLAs helps maintain trust, sets clear expectations, and provides a framework for addressing service issues, ensuring reliable and consistent cloud services. ### What is infrastructure management? Infrastructure management in IaaS involves overseeing and optimizing virtualized computing resources, including servers, storage, and networking. Tools like AWS Management Console, Azure Portal, and Google Cloud Console facilitate resource provisioning, monitoring, and scaling. Automation scripts and IaC frameworks, such as Terraform and Ansible, streamline deployments and updates. Effective management ensures high availability, performance, and security. Administrators must constantly monitor resource usage, apply patches, and enforce policies to maintain an efficient and secure infrastructure. ### What is API-driven infrastructure? API-driven infrastructure in IaaS enables programmatic control over cloud resources through application programming interfaces (APIs). Cloud providers like AWS, Azure, and Google Cloud expose APIs for tasks such as provisioning virtual machines, configuring networks, and managing storage. Developers can integrate these APIs into their applications and automation scripts, enhancing flexibility and scalability. API-driven infrastructure supports IaC practices, allowing for consistent and repeatable deployments. ### What is a hybrid cloud in the context of IaaS? Hybrid cloud in the context of IaaS combines on-premises infrastructure with public and private cloud resources, providing a unified and flexible environment. Organizations can seamlessly extend their data centers to the cloud, leveraging services like AWS Outposts, Azure Arc, and Google Anthos. Hybrid cloud enables workload portability, optimized resource utilization, and disaster recovery. It supports data sovereignty and regulatory compliance by allowing sensitive data to remain on-premises while offloading less critical workloads to the cloud. ### What is a bare metal server? A bare metal server in IaaS provides dedicated physical hardware without a hypervisor layer, offering direct access to the underlying resources. Providers like AWS (EC2 Bare Metal), IBM Cloud, and Oracle Cloud offer bare metal servers. They deliver higher performance, lower latency, and enhanced security compared to virtualized instances. Ideal for high-performance computing (HPC), big data analytics, and applications requiring specific hardware configurations, bare metal servers allow for full customization and control. Users can install hypervisors or run container orchestration platforms like Kubernetes directly on the hardware. Related Content [Continuous Monitoring and Compliance in the Cloud Ensuring consistent security controls across cloud environments, such as GCP, AWS and Azure, requires new methodologies for security and auditing teams.](https://start.paloaltonetworks.com/continuous-monitoring-cloud-compliance.html) [Remove IaaS and PaaS Cloud Risks Infrastructure-as-a-service and platform-as-a-service offerings are gaining traction for application development, but they also create new risks. Learn how you can protect and segm...](https://www.paloaltonetworks.com/resources/videos/remove-iaas-paas-cloud-risks?ts=markdown) [Use Case: Protect IaaS Hybrid Cloud Many companies have extended their private data centers to the public cloud for competitive benefits, but alignment of security and resiliency to enterprise standards and policies ...](https://www.paloaltonetworks.com/resources/whitepapers/financial-services-use-case-protect-iaas-hybrid-cloud?ts=markdown) [Shift-Left Security: A DevSecOps Checklist Infrastructure as code (IaC) allows DevOps teams to apply the same guidelines used to manage application code to infrastructure. The result is faster and more frequent deployment, ...](https://start.paloaltonetworks.com/code-shift-left-security-checklist.html) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Infrastructure%20as%20a%20Service%3F&body=Discover%20how%20Infrastructure%20as%20a%20Service%20%28IaaS%29%20revolutionizes%20computing%20by%20providing%20scalable%2C%20on-demand%20resources%20that%20power%20modern%20cloud%20environments.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-a-service) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/defining-organizational-cloud-security-responsibilities?ts=markdown) Defining Organizational Cloud Security Responsibilities [Next](https://www.paloaltonetworks.com/cyberpedia/top-3-cloud-security-considerations?ts=markdown) Top 3 Cloud Security Considerations {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language