[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Threats](https://www.paloaltonetworks.com/cyberpedia/threat?ts=markdown) 3. [Malware and Ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware?ts=markdown) 4. [What Is Malware Protection?](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection?ts=markdown) Table of Contents * [What is Malware? Detecting, Preventing \& Managing Threats](https://www.paloaltonetworks.com/cyberpedia/what-is-malware?ts=markdown) * [What Is Malware? Definition, Types, and Examples](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#what?ts=markdown) * [How Malware Works](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#malware-works?ts=markdown) * [Types of Malware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#types?ts=markdown) * [How Malware Spreads: Common Attack Vectors](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#cav?ts=markdown) * [Signs of a Malware Infection](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#signs?ts=markdown) * [Comprehensive Malware Protection Strategies](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#comprehensive?ts=markdown) * [Business Impact of Malware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#impact?ts=markdown) * [Malware FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#faq?ts=markdown) * [Malware vs. Exploits](https://www.paloaltonetworks.com/cyberpedia/malware-vs-exploits?ts=markdown) * [What is Ransomware as a Service (RaaS)?](https://www.paloaltonetworks.com/cyberpedia/what-is-ransomware-as-a-service?ts=markdown) * [What is Multi-Extortion Ransomware?](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-extortion-ransomware?ts=markdown) * [What Is Ransomware?](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-extortion-ransomware#what?ts=markdown) * [The Evolution of Modern Ransomware Attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-extortion-ransomware#evolution?ts=markdown) * [What Are the Phases of Ransomware Extortion?](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-extortion-ransomware#phases?ts=markdown) * [Four New Multi-Extortion Methods](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-extortion-ransomware#new?ts=markdown) * [How to Protect Your Organization from Ransomware Attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-extortion-ransomware#protect?ts=markdown) * [Multi Extortion Ransomware FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-extortion-ransomware#faq?ts=markdown) * [What is Malware vs. Ransomware?](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware?ts=markdown) * [What Is Malware?](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#malware?ts=markdown) * [What Is Ransomware?](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#ransomware?ts=markdown) * [Key Differences Between Malware and Ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#differences?ts=markdown) * [Is Ransomware Worse Than Malware?](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#worse?ts=markdown) * [Emerging Trends in Malware and Ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#trends?ts=markdown) * [Malware vs. Ransomware FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#faqs?ts=markdown) * What Is Malware Protection? Best Practices for Modern Businesses * [Malware Protection Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#explained?ts=markdown) * [How Malware Protection Works](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#how?ts=markdown) * [Key Components of an Enterprise Malware Protection Strategy](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#key?ts=markdown) * [Common Types of Malware Threats](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#common?ts=markdown) * [Implementing Effective Malware Protection](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#effective?ts=markdown) * [Malware Protection FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#faq?ts=markdown) * [Expanding Targets for New SunOrcal Malware Variant](https://www.paloaltonetworks.com/cyberpedia/expanding-targets-for-new-sunorcal-malware-variant?ts=markdown) * [What Are Fileless Malware Attacks and "Living Off the Land"? Unit 42 Explains](https://www.paloaltonetworks.com/cyberpedia/what-are-fileless-malware-attacks?ts=markdown) # What Is Malware Protection? 3 min. read Table of Contents * * [Malware Protection Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#explained?ts=markdown) * [How Malware Protection Works](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#how?ts=markdown) * [Key Components of an Enterprise Malware Protection Strategy](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#key?ts=markdown) * [Common Types of Malware Threats](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#common?ts=markdown) * [Implementing Effective Malware Protection](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#effective?ts=markdown) * [Malware Protection FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#faq?ts=markdown) 1. Malware Protection Explained * * [Malware Protection Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#explained?ts=markdown) * [How Malware Protection Works](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#how?ts=markdown) * [Key Components of an Enterprise Malware Protection Strategy](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#key?ts=markdown) * [Common Types of Malware Threats](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#common?ts=markdown) * [Implementing Effective Malware Protection](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#effective?ts=markdown) * [Malware Protection FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#faq?ts=markdown) Malware protection is a set of security tools and practices designed to prevent, detect, and remove malicious software from computer systems and networks. This proactive defense mechanism safeguards data, maintains system integrity, and ensures the availability of resources against various cyber threats. It is a crucial component of a comprehensive cybersecurity strategy for both individuals and organizations. Key Points * **Malware protection** is a broad term encompassing various defenses against malicious software. \* **Layered security** is the most effective approach, combining multiple technologies and practices. \* **Behavioral analysis and machine learning** are crucial for identifying new and unknown malware strains. \* **Endpoint protection and network security** are equally critical, as both are common vectors for infections. \* **User education** is a vital, non-technical component of any robust malware protection plan. \* **Protection goes beyond** traditional antivirus and includes more advanced solutions. ## Malware Protection Explained [Malware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware?ts=markdown) protection encompasses a wide range of technologies and strategies that work together to defend against the evolving threat landscape. While traditional antivirus software primarily focused on signature-based detection of known viruses, modern malware protection extends to more sophisticated threats. This broader approach is necessary because today's malware is often fileless, polymorphic, or designed to bypass legacy defenses. Modern malware protection is built on a proactive and adaptive framework. It combines a variety of techniques to create a multi-layered defense. This layered approach ensures that if one defense mechanism fails, others are in place to detect and mitigate the threat before it can cause significant damage. ## How Malware Protection Works Malware protection has evolved from a simple list of known threats to a complex, multifaceted defense system. It now combines several methods to identify and stop malicious code. The goal is to block known threats while also recognizing and neutralizing new, unknown threats. ### Signature-Based vs. Behavioral Detection [Traditional antivirus software](https://www.paloaltonetworks.com/cyberpedia/advanced-endpoint-security-vs-antivirus?ts=markdown) relies on signature-based detection, which works much like a criminal database. It compares the file's unique digital "signature" against a database of known malware. While fast and effective for known threats, this method is useless against new, zero-day malware that has not yet been cataloged. Behavioral detection is a more advanced technique that watches for suspicious actions. Instead of looking for a signature, it monitors how a program behaves. For example, a program attempting to encrypt a large number of files or disable security services would be flagged as a potential threat, regardless of whether its signature is known. This is a crucial defense against modern, fileless, and polymorphic malware. ![Layered Cybersecurity Architecture](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-malware-protection/layered-cybersecurity-architecture.png "Layered Cybersecurity Architecture") ***Figure 1**: Layered Cybersecurity Architecture* ### A Multi-Layered Approach to Defense Effective malware protection is a multi-layered system, not a single tool. It integrates different technologies to provide overlapping security. This redundancy is essential for catching threats that may slip past one layer of defense. #### Threat Intelligence [Threat intelligence](https://www.paloaltonetworks.com/cyberpedia/what-is-cyberthreat-intelligence-cti?ts=markdown) acts as the eyes and ears of a security system. It collects and analyzes data on current and emerging cyber threats from various sources. This information helps security tools anticipate attacks and proactively update their defenses. For example, [Unit 42's threat research](https://www.paloaltonetworks.com/resources/research/2025-incident-response-report?ts=markdown) found that social engineering was the top initial access vector in 36% of their incident response cases between May 2024 and May 2025. This intelligence helps organizations prioritize defenses against human-centric attacks. #### Network Protection Network protection focuses on securing the perimeter of your digital environment. [Next-generation firewalls (NGFWs)](https://www.paloaltonetworks.com/cyberpedia/what-is-a-next-generation-firewall-ngfw?ts=markdown) inspect network traffic for malicious content and block unauthorized access attempts. This layer stops threats from entering the network in the first place. #### Endpoint Protection Endpoint protection secures individual devices, such as laptops, desktops, and mobile phones. These solutions serve as the last line of defense, employing a combination of behavioral analysis, machine learning, and signature-based detection to stop malware that has evaded other security layers. [Endpoint Detection and Response (EDR)](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-detection-and-response-edr?ts=markdown) is an evolution of traditional endpoint security, providing deeper visibility and response capabilities. #### Cloud and SaaS Security As more organizations move to cloud-based services, securing these environments is a critical layer of malware protection. Cloud and Software-as-a-Service (SaaS) security solutions monitor data and applications in the cloud. They protect against misconfigurations, unauthorized access, and malware designed to target cloud infrastructure. ### The Role of Sandboxing and Heuristics [Sandboxing](https://www.paloaltonetworks.com/cyberpedia/sandboxing?ts=markdown) is a technique that isolates suspicious files in a safe, virtual environment. The file is allowed to run, and its behavior is carefully monitored. If the file performs malicious actions, such as attempting to modify system files or connect to a command-and-control server, it is identified as malware and blocked. This is an excellent way to analyze unknown files without risking the host system. Heuristic analysis is another key component that uses a set of rules and algorithms to detect potential malware. It looks for characteristics that are common to malicious software. For example, a file might be flagged for using code obfuscation or attempting to modify the registry in an unusual manner. While it can produce false positives, it is a powerful tool for catching new and unique threats. ## Key Components of an Enterprise Malware Protection Strategy A comprehensive enterprise malware protection strategy goes far beyond basic antivirus software. It involves a suite of interconnected technologies designed to provide a cohesive defense. These components work together to detect, prevent, and respond to threats across the entire network. ### Endpoint Detection and Response (EDR) EDR is an advanced security solution that provides real-time monitoring and analysis of endpoint activity. Unlike traditional antivirus software that simply blocks threats, EDR offers deep visibility into what is happening on a device. It can track a malware's activity from initial entry to a full-blown attack. This enables security teams to investigate and contain threats more effectively, as well as to understand the full scope of a breach. ### Next-Generation Firewalls (NGFWs) Next-generation firewalls (NGFWs) are a crucial component of network protection. They go beyond basic [packet filtering](https://www.paloaltonetworks.com/cyberpedia/what-is-a-packet-filtering-firewall?ts=markdown) to provide deep packet inspection, intrusion prevention, and application awareness. An NGFW can identify and block malicious traffic based on the application it is using, not just the port. It can also integrate with threat intelligence feeds to block communication with known malicious IP addresses and domains. ### Security Information and Event Management (SIEM) A [Security Information and Event Management (SIEM)](https://www.paloaltonetworks.com/cyberpedia/what-is-siem?ts=markdown) system is a centralized tool for managing and analyzing logs. It collects security data from various sources across the network, including endpoints, firewalls, and servers. By correlating and analyzing this data, a SIEM can detect complex attack patterns that would be invisible to individual security tools. This enables a comprehensive view of the security landscape and facilitates faster incident response. ### User and Entity Behavior Analytics (UEBA) UEBA systems use machine learning to establish a baseline of normal user and device behavior. When a user or device deviates from this baseline, the system flags the activity as suspicious. For example, a UEBA tool would detect if an employee suddenly started accessing sensitive data they do not normally access. This is a powerful way to identify insider threats and compromised accounts, even if no malware signature is present. ## Common Types of Malware Threats The threat landscape is constantly evolving, with new types of malware emerging regularly. Understanding the most common threats is crucial for building an effective defense. Modern malware is often sophisticated and designed to evade detection. ### Top Threats Facing Organizations #### Ransomware [Ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-ransomware?ts=markdown) is a type of malware that encrypts a victim's files and demands a ransom payment to restore access. It has become one of the most significant threats to businesses globally. The attack often begins with a phishing email or a vulnerability in an unpatched system. A notable example is the NotPetya attack of 2017, which spread rapidly and caused over $10 billion in damages globally, paralyzing major companies like Maersk and FedEx. #### Phishing and Social Engineering [Phishing](https://www.paloaltonetworks.com/cyberpedia/what-is-phishing?ts=markdown) is a social engineering technique used to trick users into revealing sensitive information or downloading malware. Attackers send fraudulent emails or messages that appear to be from a legitimate source. These messages often contain malicious links or attachments that deliver malware to the user's system. According to [Unit 42](https://unit42.paloaltonetworks.com/), 66% of social engineering attacks in 2025 targeted privileged accounts, highlighting the critical need for comprehensive identity and access management. #### Fileless Malware Unlike traditional malware, which relies on a file, [fileless malware](https://www.paloaltonetworks.com/cyberpedia/what-are-fileless-malware-attacks?ts=markdown) operates directly in a computer's memory and utilizes legitimate tools already present on the system. It leaves no footprint on the hard drive, making it difficult for signature-based antivirus solutions to detect. This type of malware is a growing concern, highlighting the need for behavioral analysis. #### Advanced Persistent Threats (APTs) Advanced Persistent Threats (APTs) are targeted attacks conducted by highly skilled attackers. They gain access to a network and remain undetected for an extended period to steal data or disrupt operations. APTs often use a combination of different techniques, including custom-made malware, to evade detection. ### The Evolving Threat Landscape #### AI-Powered Attacks Attackers are now utilizing artificial intelligence to enhance the sophistication of their attacks. AI can automate the creation of new malware variants and enhance social engineering campaigns. It also allows attackers to quickly identify vulnerabilities in a network, making attacks more efficient. #### IoT and Mobile Malware With the proliferation of Internet of Things (IoT) devices and mobile devices, new attack vectors are emerging. IoT devices are often poorly secured, making them a prime target for botnets and other malware. Mobile malware, designed to target smartphones and tablets, is also on the rise, often stealing personal data or financial information. #### Supply Chain Attacks A supply chain attack targets an organization by compromising one of its trusted suppliers. The attacker injects malicious code into a legitimate software update or product. When the software is distributed, the malware is delivered to the unsuspecting victim, bypassing traditional defenses. ## Implementing Effective Malware Protection Building an effective malware protection strategy requires a combination of technology, processes, and people. It's not just about installing software; it's about creating a culture of security and continuous vigilance. A proactive approach is always more effective than a reactive one. ### Best Practices for Businesses #### Regular Software and System Updates One of the simplest and most effective ways to prevent malware is to keep all software and operating systems up to date. Patches often fix vulnerabilities that malware exploits. Automating this process ensures that all devices on the network are protected against known security vulnerabilities and [exploits](https://www.paloaltonetworks.com/cyberpedia/malware-vs-exploits?ts=markdown). #### Data Backup and Recovery Planning A resilient data backup and recovery plan is essential. In the event of a ransomware attack or other data-destroying malware, a good backup can be the difference between a minor inconvenience and a catastrophic loss. Regularly test your backups to ensure they are working correctly and that you can restore data quickly. #### Employee Security Awareness Training Employees are often the weakest link in a security chain. Regular security awareness training can teach employees how to spot phishing emails, use strong passwords, and follow secure browsing habits. Educating users on the risks and best practices significantly reduces the likelihood of a successful attack. #### Adopting a Zero Trust Security Model A [zero trust security model](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-security?ts=markdown) operates on the principle of "never trust, always verify." It assumes that no user or device should be trusted by default, whether inside or outside the network perimeter. All access requests are authenticated and authorized before granting access, thereby limiting the lateral movement of malware within the network. ### Malware Protection vs. Antivirus: What's the Difference? While the terms are often used interchangeably, there are important distinctions between them. Antivirus software is a core component of malware protection, but it's not the complete solution. | Feature | Antivirus Software | Malware Protection | | Primary Goal | Detect and remove known viruses and a limited scope of malware. | Prevent, detect, and respond to a wide range of cyber threats, including viruses, ransomware, and fileless malware. | | Detection Method | Primarily signature-based detection. | Multi-layered approach including signature-based, behavioral analysis, machine learning, and threat intelligence. | | Scope of Protection | Endpoint-centric, focusing on files on a single device. | Endpoint-centric, focusing on files on a single device. | | Capabilities | Basic scanning and quarantine. | Advanced capabilities like EDR, sandboxing, network traffic analysis, and incident response. | |---------------------|-----------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------| *Figure 2: Difference Between Malware Protection vs. Antivirus* ## Malware Protection FAQs ### Is malware protection the same as antivirus software? No, malware protection is a broad term that includes antivirus software as one component. Malware protection is a more comprehensive strategy that involves multiple layers of defense, including firewalls, behavioral analysis, and network security. ### Can a firewall protect me from all malware? A firewall is a critical part of a layered defense, but it cannot protect you from all malware. It primarily controls network traffic. It cannot stop malware that is delivered through an infected USB drive or that exploits a software vulnerability after it has already gained access. ### What is fileless malware, and how do I protect against it? Fileless malware operates in a computer's memory and uses legitimate software to perform malicious actions, making it difficult for traditional antivirus to detect. Protection against it requires advanced solutions that use behavioral analysis and real-time monitoring to detect suspicious activity. ### How often should I scan my network for malware? A continuous, real-time scanning approach is more effective than periodic scans. Modern malware protection solutions provide real-time monitoring, enabling the detection of threats as soon as they emerge. Regular full-system scans are a good supplement to this real-time protection. ### What is the "zero trust" model, and how does it relate to malware? The zero trust model is a security framework that assumes no user or device is inherently trustworthy. It requires strict verification for every access request. This model helps prevent malware from moving laterally within a network and compromising other systems once it has gained an initial foothold. Related Content [Cortex XDR Safeguard Your System with Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) [The Essential Guide to Automating Malware Investigations Learn how Security Analysts can perform more effective malware investigations at scale](https://www.paloaltonetworks.com/resources/guides/the-essential-guide-to-automating-malware-investigations?ts=markdown) [Nir Zuk on Modern Malware Part 1 - Video Follow along as Nir Zuk discusses how Modern Malware impacts your network security.](https://www.paloaltonetworks.com/resources/videos/nir-zuk-on-modern-malware-part-1?ts=markdown) [Seven Pillars of Ironclad Endpoint Security Help your SOC team identify the key requirements for a modern endpoint security strategy.](https://www.paloaltonetworks.com/resources/ebooks/seven-pillars-for-ironclad-endpoint-security?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Malware%20Protection%3F%20Best%20Practices%20for%20Modern%20Businesses&body=Discover%20how%20multi-layered%20malware%20protection%20safeguards%20systems%20against%20various%20threats.%20Equip%20your%20security%20team%20to%20mitigate%20critical%20cyber%20risks%20effectively.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-malware-protection) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware?ts=markdown) What is Malware vs. Ransomware? [Next](https://www.paloaltonetworks.com/cyberpedia/expanding-targets-for-new-sunorcal-malware-variant?ts=markdown) Expanding Targets for New SunOrcal Malware Variant {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language