[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Network Security](https://www.paloaltonetworks.com/cyberpedia/network-security?ts=markdown) 3. [What Is IT/OT Convergence?](https://www.paloaltonetworks.com/cyberpedia/what-is-it-ot-convergence?ts=markdown) Table of Contents * [What Is OT?](#ot) * [What Is the Difference Between IT and OT?](#difference) * [How and Why IT and OT Are Converging](#converging) * [Types of IT/OT Convergence](#types) * [The Role of IoT and IIoT in IT/OT Convergence](#convergence) * [IT/OT Security Convergence](#security) * [Impacts of IT/OT Convergence on ICS Security](#icssecurity) * [IT/OT Convergence Benefits](#benefits) * [IT/OT Convergence Challenges](#challenges) * [IT/OT Convergence Use Cases and Examples](#cases) * [IT/OT Convergence Best Practices](#practices) * [IT/OT Convergence FAQs](#faq) # What Is IT/OT Convergence? 5 min. read Table of Contents * [What Is OT?](#ot) * [What Is the Difference Between IT and OT?](#difference) * [How and Why IT and OT Are Converging](#converging) * [Types of IT/OT Convergence](#types) * [The Role of IoT and IIoT in IT/OT Convergence](#convergence) * [IT/OT Security Convergence](#security) * [Impacts of IT/OT Convergence on ICS Security](#icssecurity) * [IT/OT Convergence Benefits](#benefits) * [IT/OT Convergence Challenges](#challenges) * [IT/OT Convergence Use Cases and Examples](#cases) * [IT/OT Convergence Best Practices](#practices) * [IT/OT Convergence FAQs](#faq) 1. What Is OT? * [1. What Is OT?](#ot) * [2. What Is the Difference Between IT and OT?](#difference) * [3. How and Why IT and OT Are Converging](#converging) * [4. Types of IT/OT Convergence](#types) * [5. The Role of IoT and IIoT in IT/OT Convergence](#convergence) * [6. IT/OT Security Convergence](#security) * [7. Impacts of IT/OT Convergence on ICS Security](#icssecurity) * [8. IT/OT Convergence Benefits](#benefits) * [9. IT/OT Convergence Challenges](#challenges) * [10. IT/OT Convergence Use Cases and Examples](#cases) * [11. IT/OT Convergence Best Practices](#practices) * [12. IT/OT Convergence FAQs](#faq) IT/OT convergence is the integration of data management systems (IT) with industrial operation systems (OT). This integration allows for real-time data exchange, enhancing the efficiency and effectiveness of both systems. Industries benefit from improved decision-making and operational processes, grounded in accurate, timely data. ## What Is OT? ![Six icons representing Operational Technology components: Machinery, Monitoring, HMIs, RTUs, PLCs, SCADA Software.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/operational-technology-ot.png "Six icons representing Operational Technology components: Machinery, Monitoring, HMIs, RTUs, PLCs, SCADA Software.") Operational Technology (OT) refers to the combination of hardware and software designed to manage, control, and oversee physical equipment and processes in sectors like manufacturing, energy, and telecommunications. It utilizes technologies including Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems to oversee, manage, and automate industrial activities in real time. Although legacy systems are still prevalent in OT, there is a noticeable shift towards more contemporary integrations due to technological advancements. OT plays a crucial role in amplifying the efficiency, security, and dependability of industrial processes. It achieves this by offering instantaneous feedback and control mechanisms, reducing downtime and boosting output. Distinct from Information Technology (IT), OT is characterized by its direct engagement with industrial machinery and procedures, with a concentration on tangible environments and operational necessities. ## What Is the Difference Between IT and OT? ![Comparison chart of IT versus OT highlighting differences in focus, environment, connectivity, and data management.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/it-vs-ot.png "Comparison chart of IT versus OT highlighting differences in focus, environment, connectivity, and data management.") IT and OT serve distinct roles within an organization. IT is primarily concerned with managing and processing data to ensure its availability, confidentiality, and integrity. Its domain includes computers, servers, and similar devices that handle data storage, retrieval, and transmission tasks. OT, on the other hand, is tasked with controlling and monitoring physical processes and equipment, ensuring operational effectiveness and safety within industrial settings. The environments in which IT and OT operate are markedly different. IT functions within a general computing environment and deals with standard operating systems for data-centric tasks. In contrast, OT is tailored for industrial settings, employing specialized, often proprietary systems to meet specific operational requirements. Security considerations also vary. IT security emphasizes data confidentiality, while OT security is centered on the safety and availability of physical processes and equipment. System maintenance and updates in IT are frequent and regular, whereas OT prioritizes uninterrupted operation, scheduling updates during specific maintenance windows to avoid operational disruptions. Connectivity and data use and processing distinguish IT and OT as well. IT is characterized by its connectivity, enabling data exchange and communication over networks. OT has traditionally been more isolated but is becoming increasingly connected due to the integration of Industrial Internet of Things (IIoT) technologies. While IT handles a diverse range of data types and focuses on broader business data needs, OT is concentrated on real-time data processing essential for monitoring and controlling industrial equipment and processes. The specific and immediate use of data in OT is crucial for maintaining operational efficiency and safety. ## How and Why IT and OT Are Converging Traditionally, Information Technology (IT) and Operational Technology (OT) have existed in separate domains within organizations, each performing distinct functions. However, a transformation is underway, characterized by the systematic integration of these two previously isolated worlds, leading to what is known as IT/OT convergence. This convergence is propelled by digital transformation and advances in technologies like the Internet of Things (IoT) and big data analytics. The merging of IT and OT enables a seamless flow of data between the digital and physical worlds, bridging the gap between data management systems and industrial operations. The digital information world can now not only visualize but also influence the physical operational world, leading to enhanced efficiency and innovation in business processes. One of the core advantages of IT/OT convergence is increased efficiency. It facilitates the integration of different technologies to work as a single, cohesive system, reducing errors and enhancing workflows. This integration means that data from physical operations (OT) can be quickly analyzed and influenced by IT systems, allowing for more informed decision-making and autonomous operation which improves accuracy and uptime. The core of IT/OT convergence is the ability to enhance the value delivered by both IT and OT systems. It fosters a level of interconnectivity that streamlines operations, fosters innovation, and introduces new services. This integration is becoming increasingly pivotal in the era of Industry 4.0 and IIoT. ## Types of IT/OT Convergence ![Venn diagram showing types of IT/OT convergence: physical, organizational, and software.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/types-of-convergence.png "Venn diagram showing types of IT/OT convergence: physical, organizational, and software.") IT/OT convergence is not a monolithic concept, but a multifaceted initiative tailored to the specific organizational needs and goals. Each type of convergence---physical, software, and organizational---addresses distinct aspects of the integration process. For example, this includes direct connection of devices, seamless data flow, and the harmonization of organizational workflows. ### Physical Convergence Physical convergence is a fundamental type of IT/OT integration where OT devices are directly connected to IT networks. It often involves modernizing or retrofitting older OT equipment to facilitate this connection. In this setup, OT devices enhanced with connectivity features can transmit data directly to IT systems for analysis and decision-making. ### Software Convergence Software convergence allows OT data to integrate with IT systems, promoting efficient information flow. The data from OT systems is collected and analyzed digitally by IT systems to improve operational efficiency. This process is crucial for real-time data processing that enhances operational control and decision-making. ### Organizational Convergence Organizational convergence involves merging the workflows of IT and OT departments to build a unified operational system. Even though IT and OT can function separately, sharing information consistently is essential. The process requires refining business operations to let IT and OT support and enhance each other's work, aiming to improve communication and teamwork. ## The Role of IoT and IIoT in IT/OT Convergence The advancement of the Internet of Things (IoT) and Industrial Internet of Things (IIoT) significantly influences IT/OT convergence. Traditional OT devices, such as sensors, were not designed for network connectivity. This limits their function to data collection without the ability to transmit this data over a network. IoT devices are networked computing entities. They are adept at collecting, transferring, and analyzing data, and play a pivotal role in facilitating IT/OT convergence. In the industrial context, IIoT enhances the potential of IT/OT convergence by empowering OT devices with real-time data processing capabilities. This transformation is realized through the incorporation of smart sensors on industrial equipment, enabling these devices to collect and transmit data to IoT hubs or gateways. For example, on a factory floor, enhanced sensors can gather operational data and relay it over wireless networks to back-end system applications. Applications then interpret data to inform immediate actions, such as equipment maintenance, ensuring timely interventions and minimizing downtime. The synergy of IoT and edge computing amplifies the efficacy of IT/OT convergence in industrial settings. Edge computing allows IIoT devices to process data in real time closer to the source. This reduces the need to transmit vast amounts of data over networks to centralized locations for processing. This capability is crucial in distributed network architectures common in industrial environments. In industrial environments, immediate data insights are essential for monitoring ## IT/OT Security Convergence ![Comparison chart of IT vs. OT security priorities: confidentiality, integrity, and availability.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/comparing-it-and-ot-security-priorities.png "Comparison chart of IT vs. OT security priorities: confidentiality, integrity, and availability.") As IT and OT environments converge, there's an adjacent convergence of IT and OT security. Traditionally, IT security focuses on protecting data and maintaining the confidentiality, integrity, and availability of information. OT security is more concerned with ensuring the availability, integrity, and reliability of industrial processes in addition to the safety of human lives and the environment. In the context of IT/OT convergence, security must be holistic, addressing vulnerabilities and risks inherent in both environments. This convergence involves the integration of security policies, practices, and technologies to protect the entire organization's ecosystem, covering data and industrial processes. This is important because as OT systems become more connected, they become more vulnerable to cyber threats that have traditionally targeted IT systems. A unified approach to security that covers both IT and OT environments is critical in today's interconnected, increasingly digital world. IT/OT convergence brings about significant efficiency and data utilization advancements, but also introduces security challenges. With IT systems designed for data processing and OT focusing on the control of physical processes, their convergence creates a complex landscape. Security protocols of one may not seamlessly integrate with the other. The integration often exposes OT to cybersecurity threats, increasing the need for comprehensive security strategies that encompass both realms. A notable challenge stems from OT systems' enduring nature compared to the shorter lifecycle of IT infrastructures. OT systems are designed to last decades. Because of this, they often lack the built-in security features inherent in their IT counterparts. A prolonged lifecycle, coupled with proprietary designs, complicates advanced security protocol integration. The legacy nature necessitates thorough security assessments, and in some instances, comprehensive upgrades to meet converged environment security demands. Updates frequently require revisiting the concept of air gapping -- the division between operational technology and IT systems that are connected to the internet. The continuous, mission-critical nature of OT systems poses further security complexities. OT environments often cannot afford downtimes for updates or maintenance without incurring substantial operational and financial impacts. This can sometimes lead to postponed security updates, which creates vulnerabilities. The incorporation of IoT and IIoT enhances real-time data processing and analytics but also expands the attack surface for potential cyber threats. For secure IT/OT integration, security strategies must evolve to safeguard the integrity, confidentiality, and availability of data. Organizations must balance the need for operational continuity with stringent security protocols. [What Is OT Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-ot-security?ts=markdown) ## Impacts of IT/OT Convergence on ICS Security With the arrival of IIoT, every ICS sensor, instrument and device accessible over an IT/OT network is susceptible to weaponization. ICS sensors can be vulnerable to botnets used to launch targeted attacks on critical infrastructure. This includes energy grids, power plants, water and waste management systems, food processing plants, and transportation networks. The human-machine interface (HMI) that connect operators to industrial control systems are also typically networked to various IT infrastructures. Accessibility to HMIs from internet-facing business networks poses a risk to ICS security, making HMIs susceptible to IP-based vulnerabilities. IP-based vulnerabilities can include authentication bypass, weak session management, unsecured ICS communication protocoling and insufficient control traffic encryption. Attackers typically infiltrate ICS systems with both generic malware and malware designed specifically to target and attack critical infrastructure. These infiltrations often result in denial-of-service, or DoS, attacks that paralyze or halt industrial operations. ICS and connected IIoT devices are also high-value targets for hackers looking to collect ransoms or sabotage rival nations by gaining access to confidential data. ![Comparison of IT and OT systems on connectivity, security priorities, standards, patching, forensics, and breach impacts.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/ot-and-ot-systems-comparison.png "Comparison of IT and OT systems on connectivity, security priorities, standards, patching, forensics, and breach impacts.") ICS security breaches come with vastly different consequences than standard breaches. The severe impacts of a cyberattack can include disabling a city's power grid, triggering an explosion in a nuclear plant by undermining safety systems, or rerouting sewage into an urban area's water supply. ## IT/OT Convergence Benefits The fusion of IT and OT is a practical response to the demand for increased efficiency and innovation in various industries. By aligning data analytics with core operational processes, organizations are achieving measurable improvements and overcoming complex challenges. This synergy is proving essential for cost reduction, improved decision accuracy, and adherence to regulatory standards. ### Enhanced Operational Efficiency The integration facilitates real-time data analytics and monitoring, expediting responses and decisions. It streamlines operations, delivering precise and timely insights that improve efficiency across various sectors, including manufacturing and transportation. ### Cost Reduction By incorporating predictive maintenance and automation, IT/OT convergence mitigates unexpected operational and maintenance expenses. It preemptively identifies potential issues, reducing the need for extensive repairs and downtime. ### Improved Decision Making Access to real-time, comprehensive data enables informed decisions. Clarity and information accessibility allow for adjustments that align operations with market demands and organizational goals. ### Regulatory Compliance and Risk Management IT/OT convergence enhances visibility into operations, aiding in adherence to regulatory standards. Real-time monitoring and auditing facilitate the identification and mitigation of risks, bolstering security and resilience. ### Innovation and Competitiveness IT and OT integration fosters an environment ripe for innovation. Access to diverse and comprehensive data insights unveils opportunities for developing novel solutions, strengthening competitiveness, and exploring new market horizons. ## IT/OT Convergence Challenges IT and OT integration involves navigating through a complex terrain of technological and organizational complexities. It demands a blend of varied technologies and unification of diverse professional cultures and operational standards. ### Security Concerns OT systems vulnerability during IT integration poses a significant challenge due to increased risks of data breaches and industrial espionage. The combination of legacy OT systems with IT networks exposes larger attack surfaces. ### Integration Complexity Aligning IT and OT involves overcoming issues stemming from varied communication protocols and technology standards. Ensuring seamless data collection and connectivity from diverse OT equipment while developing APIs for cloud integration is critical. ### Skill Gaps The emergence of IT/OT convergence highlights evident skill gaps. The absence of standardized training and certifications leads to inconsistencies in managing converged systems, requiring enhanced training for IT and OT personnel. ### Organizational Barriers Traditional silos separating IT and OT necessitate a shift in organizational culture. Enhanced collaboration and communication, along with integrated business policies and workflows, are essential to bridging this gap. ### Equipment Compatibility Balancing the modernization and replacement of legacy OT equipment with current IT technologies is crucial to optimizing cost and performance. Addressing incongruences ensures a streamlined operational environment. ### Network Management The management of connectivity and networks in a converged setting raises concerns about energy use, data transmission costs, and security. Organizations aim to achieve optimal performance while bolstering security protocols. ### Supply Chain Obstacles While IT/OT convergence offers enhanced visibility and control over the supply chain, it introduces challenges in data security, interoperability, and real-time management. The increased connectivity demands robust security protocols to protect sensitive supply chain data and ensure uninterrupted operations. ## IT/OT Convergence Use Cases and Examples ![IT/OT convergence use cases in sectors: Manufacturing, Utility, Transport, Retail, Healthcare, Military.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/IT-OT-convergence-use-cases.png "IT/OT convergence use cases in sectors: Manufacturing, Utility, Transport, Retail, Healthcare, Military.") ### Manufacturing Sector In the manufacturing domain, IT/OT convergence enhances real-time data utilization, boosting efficiency. Sensors and automated systems, integrated into manufacturing processes, facilitate instantaneous data collection and analysis. This integration aids in predictive maintenance, reducing downtime, and ensuring optimal utilization of machinery, leading to cost-effective and streamlined operations. ### Utility and Energy Sector Utility and energy companies benefit from remote access to operational data enabled by IT integration. This convergence facilitates real-time monitoring and equipment control, enhancing the efficiency of inspections, damage assessments, and inventory management. IT and OT fusion contributes to optimal resource allocation and improved service delivery. ### Transportation Industry In transportation, IT/OT convergence underscores enhanced asset management. Real-time data from integrated systems guide maintenance, route optimization, and long-term planning. Enhanced visibility into asset coordination, condition, and utilization ensures timely repairs and replacements, bolstering safety and operational efficiency. ### Retail Sector The retail industry leverages IT/OT convergence for inventory and sales floor optimization. IoT devices and OT equipment, such as cameras and point-of-sale devices, provide data for real-time analysis. This integration yields insights for inventory management, cost savings, and enhanced shopper experiences, driving revenue generation. ### Healthcare and Pharmaceuticals In healthcare, IT/OT convergence enables real-time data exchange among medical devices, enhancing patient analysis and outcomes. Pharmaceutical manufacturing also benefits from this integration, ensuring quality control, streamlined production, and compliance with regulatory standards. ### Military and Law Enforcement The defense and security sectors utilize IT/OT convergence for rapid deployment and resource coordination. Enhanced insight into equipment condition and maintenance ensures operational readiness. The integration of IT data analytics with OT systems amplifies situational awareness and decision-making efficacy. ## IT/OT Convergence Best Practices ### Clear Communication Transparent communication of objectives is foundational. Each stakeholder, including IT and OT teams, should understand the convergence goals. This clarity fosters alignment in strategies and operations, ensuring a unified approach in merging the two technological spheres. ### Role Definition Outlining roles and responsibilities is key to efficient collaboration. A set structure ensures each team understands its scope of work and collaboration areas. Role definition prevents overlaps and operations gaps. ### Comprehensive Training Training is instrumental in equipping both IT and OT personnel with the necessary skills and knowledge. Cross-training initiatives nurture a mutual understanding of each domain's operational nuances. It fosters adaptability and proficiency in managing the merged technological ecosystem. ### Utilization of Appropriate Tools Strategic tool selection is pivotal for effective IT/OT convergence. Tools tailored to provide visibility and control over assets are especially essential. Functionalities must include discovery, management, configuration, and security solutions to ensure complete oversight and control. ### Phased Implementation Organizations will benefit from a structured, phased approach to implementation. Organizational, technical, and operational phases offer a systematic roadmap. An implementation roadmap encompasses collaboration, architectural design, and operation. ### Network Integration Strategy Deciding on the network integration approach is key. Options range from partitioned to fully integrated networks for IT and OT. Organizations must consider the specific requirements and constraints of the systems involved and plan accordingly. ### Expertise Engagement Involving professionals with expertise in IT/OT convergence, especially those with certifications in IoT management, will result in more informed decision making. Professional insights and experience allow for a successful and secure convergence. ## IT/OT Convergence FAQs ### What does IT and OT convergence mean? IT and OT convergence refers to the combination of information technology systems, responsible for data processing and management, with operational technology systems, which manage industrial operations. This integration enables immediate data exchange and improved efficiency, leading to enhanced decision-making and optimized operational processes supported by real-time data. ### What are the benefits of IT and OT convergence? Benefits of IT and OT convergence include: * Enhanced operational efficiency * Cost reduction * Improved decision making * Regulatory compliance and risk management * Innovation and competitiveness ### What is the connection between OT and IT? The connection between OT and IT lies in the integration of systems that manage and process data (IT) with those controlling industrial operations (OT). This union facilitates real-time data sharing, enhancing the efficiency and decision-making processes in various industries. ### What is the difference between IT network and OT network? An IT network focuses on data processing and communication systems, ensuring the secure and efficient flow of information within an organization. In contrast, an OT network involves systems that monitor and control physical processes and operations, often seen in industrial and manufacturing environments. ### What is an example of IT and OT convergence? An example of IT and OT convergence is found in modern manufacturing where sensors on machinery (OT) collect real-time data on equipment performance and efficiency. This data is then integrated and analyzed by IT systems to inform decision-making, optimize operations, and predict maintenance needs, enhancing both productivity and cost-effectiveness. Related Content [What is IoT Security? IoT security can be understood as a cybersecurity strategy and protection mechanism that safeguards against cyberattacks targeting physical IoT devices.](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security?ts=markdown) [Zero Trust Security for Zero Operational Downtime Protect every connected asset with OT security that keeps operations up 24/7, not CISOs.](https://www.paloaltonetworks.com/network-security/industrial-ot-security?ts=markdown) [4 Steps to Reducing IoT \& OT Security Threats in the Enterprise CSOs can immediately act to reduce their organizations' exposure to IoT-initiated attacks by taking four crucial steps.](https://www.paloaltonetworks.com/resources/infographics/4-steps-to-reducing-iot-ot-security-threats-in-the-enterprise?ts=markdown) [Analyzing the Economic Benefits of Palo Alto Networks Industrial OT Security This report includes findings from ESG experts based on interviews with Palo Alto Networks Industrial OT Security customers.](https://www.paloaltonetworks.com/resources/whitepapers/economic-validation-report-industrial-ot-security?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20IT%2FOT%20Convergence%3F&body=Bridge%20IT%20and%20OT%20security%20gaps%20with%20IT%2FOT%20convergence.%20Learn%20how%20integrating%20information%20and%20operational%20technologies%20enhances%20cybersecurity%20and%20efficiency.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-it-ot-convergence) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language