[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Threats](https://www.paloaltonetworks.com/cyberpedia/threat?ts=markdown) 3. [Malware and Ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware?ts=markdown) 4. [What is Malware vs. Ransomware?](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware?ts=markdown) Table of contents * [What is Malware? Detecting, Preventing \& Managing Threats](https://www.paloaltonetworks.com/cyberpedia/what-is-malware?ts=markdown) * [What Is Malware? Definition, Types, and Examples](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#what?ts=markdown) * [How Malware Works](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#malware-works?ts=markdown) * [Types of Malware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#types?ts=markdown) * [How Malware Spreads: Common Attack Vectors](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#cav?ts=markdown) * [Signs of a Malware Infection](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#signs?ts=markdown) * [Comprehensive Malware Protection Strategies](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#comprehensive?ts=markdown) * [Business Impact of Malware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#impact?ts=markdown) * [Malware FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-malware#faq?ts=markdown) * [Malware vs. Exploits](https://www.paloaltonetworks.com/cyberpedia/malware-vs-exploits?ts=markdown) * [What is Ransomware as a Service (RaaS)?](https://www.paloaltonetworks.com/cyberpedia/what-is-ransomware-as-a-service?ts=markdown) * [What is Multi-Extortion Ransomware?](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-extortion-ransomware?ts=markdown) * [What Is Ransomware?](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-extortion-ransomware#what?ts=markdown) * [The Evolution of Modern Ransomware Attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-extortion-ransomware#evolution?ts=markdown) * [What Are the Phases of Ransomware Extortion?](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-extortion-ransomware#phases?ts=markdown) * [Four New Multi-Extortion Methods](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-extortion-ransomware#new?ts=markdown) * [How to Protect Your Organization from Ransomware Attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-extortion-ransomware#protect?ts=markdown) * [Multi Extortion Ransomware FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-extortion-ransomware#faq?ts=markdown) * What is Malware vs. Ransomware? * [What Is Malware?](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#malware?ts=markdown) * [What Is Ransomware?](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#ransomware?ts=markdown) * [Key Differences Between Malware and Ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#differences?ts=markdown) * [Is Ransomware Worse Than Malware?](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#worse?ts=markdown) * [Emerging Trends in Malware and Ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#trends?ts=markdown) * [Malware vs. Ransomware FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#faqs?ts=markdown) * [What Is Malware Protection? Best Practices for Modern Businesses](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection?ts=markdown) * [Malware Protection Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#explained?ts=markdown) * [How Malware Protection Works](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#how?ts=markdown) * [Key Components of an Enterprise Malware Protection Strategy](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#key?ts=markdown) * [Common Types of Malware Threats](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#common?ts=markdown) * [Implementing Effective Malware Protection](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#effective?ts=markdown) * [Malware Protection FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection#faq?ts=markdown) * [Expanding Targets for New SunOrcal Malware Variant](https://www.paloaltonetworks.com/cyberpedia/expanding-targets-for-new-sunorcal-malware-variant?ts=markdown) * [What Are Fileless Malware Attacks and "Living Off the Land"? Unit 42 Explains](https://www.paloaltonetworks.com/cyberpedia/what-are-fileless-malware-attacks?ts=markdown) # What is Malware vs. Ransomware? 5 min. read Table of contents * * [What Is Malware?](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#malware?ts=markdown) * [What Is Ransomware?](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#ransomware?ts=markdown) * [Key Differences Between Malware and Ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#differences?ts=markdown) * [Is Ransomware Worse Than Malware?](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#worse?ts=markdown) * [Emerging Trends in Malware and Ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#trends?ts=markdown) * [Malware vs. Ransomware FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#faqs?ts=markdown) 1. What Is Malware? * * [What Is Malware?](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#malware?ts=markdown) * [What Is Ransomware?](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#ransomware?ts=markdown) * [Key Differences Between Malware and Ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#differences?ts=markdown) * [Is Ransomware Worse Than Malware?](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#worse?ts=markdown) * [Emerging Trends in Malware and Ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#trends?ts=markdown) * [Malware vs. Ransomware FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware#faqs?ts=markdown) Malware is a broad term that refers to any malicious software designed to harm or exploit any programmable device or network. Ransomware, a specific type of malware, encrypts a victim's files and demands a ransom payment to restore access. While all ransomware is malware, not all malware is ransomware; other types of malware may steal data, corrupt files, or hijack system functions without demanding a ransom. ## What Is Malware? Short for "malicious software," malware refers to any software intentionally designed to damage a computer, server, client, or computer network. It's a broad term that encompasses a variety of harmful or intrusive software types, including viruses, worms, Trojan horses, ransomware, spyware, adware, and others. Malware's primary intent is to harm devices, steal data, bypass access controls, or disrupt computer operations. Although each malware strain behaves uniquely, automated spreading behavior is most commonly associated with worms. Most malware today is delivered over email by way of a link or file attachment, but more and more adversaries are beginning to leverage non-email communication platforms such as social media and instant messaging for malware delivery. Malware spreads to systems through self-replication like viruses and worms or by deceiving users, as seen with Trojans. Its impact varies from minor annoyances to severe issues like data theft, encryption, or unauthorized system control. Malware propagates via methods like email attachments, malicious downloads, USB drives, and software vulnerabilities. It often evades detection by disguising as legitimate software or hiding its presence. Some malware, such as ransomware and adware, generates revenue for creators through ransoms or ads. It exploits security weaknesses in systems to gain access or cause damage. Given its risks, robust cybersecurity measures, including antivirus software, regular updates, and user education, are essential to prevent infections and protect data. ### Types of Malware Malware comes in various forms, each designed for specific malicious purposes. Here are some common types of malware: * **Viruses:** Infect and corrupt files or systems and spread when these files are shared or accessed. * **Trojans:** Disguised as legitimate software, tricking users into installing them. Once in, they can perform various malicious activities, like stealing data or providing unauthorized access to the system. * **Worms:** Self-replicating programs that spread across networks, exploiting vulnerabilities to infect other computers and endpoints. * **Ransomware:** Specialized malware used to extort organizations or individuals by encrypting files on a system and making them inaccessible until a ransom is paid. Notorious examples include WannaCry and Ryuk. * **Spyware:** Designed to spy on a user's activity, spyware gathers sensitive information without the user's consent by monitoring keystrokes, tracking browsing history, and more. * **Adware:** Displays unwanted advertisements on the infected device, typically in the form of pop-ups. * **Botnets:** Comprise networks of infected computers controlled by a single entity, often used for large-scale attacks like [distributed denial of service (DDoS)](https://www.paloaltonetworks.com/cyberpedia/what-is-a-ddos-attack?ts=markdown). * **Rootkits:** Designed to gain unauthorized access while hiding its presence from typical security measures. * **Keyloggers:** Record keystrokes, capturing sensitive information such as passwords and credit card details. * **Fileless Malware:** Operates in a system's RAM, leaving few traces on the hard drive, making it harder to detect. ## What Is Ransomware? Ransomware is a type of malware used by cybercriminals for financial gain. It is delivered in the same way malware can make its way onto targeted systems (e.g., through known vulnerabilities, already compromised systems, social engineering tactics, etc.). Once deployed, the ransomware will encrypt the organization's files and render them unusable to the organization. The attacker demands a ransom in exchange for a decrypter and a promise to keep the victim's data or identity confidential. Ransomware is distinct from malware because it is the triggering encryption tool in extortionate criminal acts. All ransomware is malware, but not all malware is ransomware. Ransomware is malicious software that encrypts a victim's data or locks them out of their system, demanding a ransom, typically in cryptocurrency, for access restoration. This type of malware, often spread through phishing emails or exploiting network vulnerabilities, targets various entities, including individuals and organizations. The consequences of a ransomware attack range from minor disruptions to severe operational and financial damage, especially for those without robust backups or cybersecurity measures. Recovering from such attacks can be difficult and costly, emphasizing the need for strong preventive strategies like regular data backups, employee training on security threats, and updated software defenses. ### How Has Ransomware Evolved? Ransomware attacks have become increasingly common in recent years, with cybercriminals targeting businesses, organizations, and individuals alike. A decade ago, ransomware attacks tended to be straightforward incidents. The malicious actors encrypted the victim's data and handed over the decryption key once the ransom was paid. Today's ransomware attacks are far more complex. In fact, ransomware as a business model has become highly refined and is now usually carried out by dedicated groups that may use a host of cloud-based encryption malware rather than one specific type of ransomware---or no malware at all. Threat actors increasingly pair extortion with encryption (sometimes including added threats of informing customers or the press or conducting a distributed denial-of-service attack). At the same time, some attackers focus on extortion alone. For example, 4% of cases tracked by Palo Alto Networks' Unit 42 strategic advisory group involved extortion without encryption---a technique distinct from ransomware that can be simpler to execute. In these cases, attackers coerce organizations into paying by threatening the release of customers' data. ## Key Differences Between Malware and Ransomware Malware and ransomware are related but distinct concepts within the realm of cyber threats. Here are their key differences: | **Key Differences** | **Malware** | **Ransomware** | |----------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | Definition and Scope | A broad term that encompasses all types of malicious software designed to harm or exploit any programmable device, system, or network. Malware includes viruses, worms, Trojans, spyware, adware, and more. | A specific type of malware that encrypts a victim's files or systems and demands a ransom for their release. It's a subset of malware with a specific mode of operation and purpose. | | Method of Impact | The impact varies greatly depending on the type. It can range from minor annoyances to significant damage to systems and data. | Primarily impacts by encrypting data and rendering systems unusable until a demand (usually financial) is met. | | Purpose | Can have a variety of purposes, such as stealing sensitive data, damaging systems, creating botnets, or simply causing disruption. | Specifically aims to extort money from victims by denying access to files or systems until a ransom is paid. | | Revenue Generation | Not all malware is designed to generate revenue. Some are intended to cause disruption or damage without financial gain. | Directly focused on revenue generation, with attackers demanding payment (usually in cryptocurrency) for decryption keys. | | Recovery | Depending on the type, recovery might involve removing the malicious software, restoring systems to an earlier state, or implementing other security measures. | Recovery often hinges on paying the ransom (not recommended as it doesn't guarantee data recovery and encourages further attacks) or restoring data from backups. | ## Is Ransomware Worse Than Malware? In many cases, yes, ransomware is worse than malware. The effects of ransomware can be far more dire and far-reaching than a typical malware infection. The damage associated with malware includes degraded systems performance, deleted files or data, and in some cases, loss of control over systems. Antivirus and anti-malware solutions are generally quite effective at stopping or mitigating the worst effects of malware. Damage from most worm- or Trojan-style exploits can be contained in most cases. The critical difference with ransomware is that malicious human actors back the initial malware attack. Once an attack has reached the encryption stage, victims often have a limited number of complicated options to reverse the worst effects. ## How Are Malware and Ransomware Delivered? In summary, while malware and ransomware can be delivered easily, especially to less secure or unprepared systems, the actual ease of delivery varies and is influenced by the interplay of attacker tactics, software vulnerabilities, and user awareness and behaviors. Attackers are always looking for easy ways to get into systems. Threat actors' top three access vectors are phishing, exploitation of common vulnerabilities and exposures (CVEs), and brute-force credential attacks---focused primarily on the remote desktop protocol (RDP). Variants on the classic phishing model are becoming more prevalent. [Business email compromise (BEC)](https://www.paloaltonetworks.com/cyberpedia/what-is-business-email-compromise-bec-tactics-and-prevention?ts=markdown) has become recognized as a significant new threat vector in recent years. A category of threat activity involving sophisticated scams, BEC attacks target legitimate business email accounts through social engineering (e.g., phishing) or other computer intrusion activities. Once businesses are compromised, cybercriminals leverage their access to initiate or redirect the transfer of business funds for personal gain. This variability underscores the importance of comprehensive cybersecurity practices. ## Emerging Trends in Malware and Ransomware Cybercriminals have demonstrated significant innovation---introducing sophisticated attack tools, extortion techniques, and marketing campaigns. On the other hand, the Ransomware as a Service (RaaS) business model has lowered the technical bar for entry by making powerful tools accessible to wannabe cyber extortionists with easy-to-use interfaces and online support. At the same time, attack groups increasingly embrace brazen extortion methods that only use ransomware as a jumping-off point for more wide-ranging criminal activity. Multi-extortion techniques, including double extortion, occur when attackers not only encrypt an organization's files but also name and shame the targets and/or threaten to launch additional attacks. This pressure motivates organizations to pay more quickly. Many ransomware groups maintain dark web leak sites for double extortion. Emerging trends in malware and ransomware reflect the continuously evolving landscape of cyber threats. Technological advancements, changes in cybercriminal tactics, and the global digital environment shape these trends. Some notable trends include: * **Ransomware-as-a-Service (RaaS):** This model allows individuals without technical expertise to deploy ransomware. Cybercriminals rent out ransomware tools, making it easier for more attackers to launch ransomware campaigns. * **Targeted Ransomware Attacks:** Cybercriminals are shifting away from widespread, indiscriminate attacks and focusing on specific industries or organizations deemed more likely to pay larger ransoms. * **Double Extortion Tactics:** Beyond encrypting data, attackers are escalating pressure on victims by threatening to leak sensitive data if the ransom is not paid publicly. * **Sophisticated Evasion Techniques:** Malware is becoming more adept at evading detection, using techniques like polymorphism (changing its code) and living off the land (using legitimate system tools for malicious purposes). * **Exploiting Remote Work Vulnerabilities:** The rise of remote work has increased focus on exploiting vulnerabilities in remote access tools and software, such as VPNs and remote desktop protocols. * **Supply Chain Attacks:** Attackers target software suppliers or service providers to distribute malware more widely, exploiting trusted relationships between businesses and their suppliers. * **Increased Use of AI and Machine Learning:** Both cybercriminals and cybersecurity professionals are leveraging AI and machine learning. Malware may use these technologies to optimize attack strategies or evade detection. * **Cryptojacking:** Cryptojacking, the use of malware to hijack computing resources to mine cryptocurrency, continues to be a significant trend, especially with the fluctuating values of cryptocurrency. * **IoT Device Targeting:** The growing number of Internet of Things (IoT) devices presents new targets for malware, often because these devices lack robust security. * **Fileless Malware:** This type of attack, where malware resides in a computer's memory and not in files, makes detection more complex and is an increasing trend. These trends demonstrate an arms race between cybercriminals and cybersecurity professionals, with each side continuously adapting to the tactics and technologies of the other. As threats evolve, so too must the strategies and tools used to combat them, making ongoing vigilance and adaptation essential in cybersecurity. ## Malware vs. Ransomware FAQs ### What are the main differences between malware and ransomware? Malware is a broad category of malicious software designed to disrupt, damage, or gain unauthorized access to systems, while ransomware is a specific type of malware that encrypts a victim's files and demands payment for their release. While all ransomware is malware, not all malware demands a ransom---some steal data, spy on users or cause other disruptions. ### How do malware and ransomware typically infect systems? Malware and ransomware can enter systems through phishing emails, malicious links or attachments, exploited software vulnerabilities, or compromised websites. Attackers also use tactics like social engineering, brute-force credential attacks, or supply chain vulnerabilities to deliver their payloads. ### Can antivirus software protect against ransomware and malware? Antivirus software can help prevent many types of malware, including some ransomware, by detecting and blocking known threats. However, advanced malware and ransomware often use sophisticated evasion techniques, so additional measures like endpoint detection and response, regular backups, and user training are crucial for comprehensive protection. ### Why is ransomware considered more dangerous than other types of malware? Ransomware often has more severe and immediate consequences, such as encrypting critical files or systems and halting operations. The financial and reputational impact of ransomware attacks can be significant, especially if sensitive data is stolen and used for extortion. Unlike other malware, recovering from ransomware often involves paying a ransom or rebuilding systems entirely. ### What are some emerging trends in malware and ransomware attacks? Recent trends include RaaS (ransomware-as-a-service), where attackers encrypt data and threaten to leak it. Other trends include fileless malware, which resides in system memory to avoid detection, and increased targeting of IoT devices and remote work tools. Attackers are also leveraging artificial intelligence to evade security measures and optimize their attacks. As a result, proactive security and monitoring is as essential as ever to intercepting malware or ransomware attacks before they affect your environment. Related Content [What is Malware? An overview of the how, what, why of malware and how to protect against it.](https://www.paloaltonetworks.com/cyberpedia/what-is-malware?ts=markdown) [Cortex XDR Block advanced malware, exploits and fileless attacks with the industry's most comprehensive endpoint protection platform.](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) [The Essential Guide to Automating Malware Investigations Leverage machine learning and playbook automation tools for faster response times, enhanced accuracy, and freeing analysts to focus on more critical tasks.](https://www.paloaltonetworks.com/resources/guides/the-essential-guide-to-automating-malware-investigations?ts=markdown) [Mitigating Cyber Risks with MITRE ATT\&CK This Unit 42^®^ report leverages incident response data to expose common ransomware and extortion TTPs and provide actionable recommendations for strengthening securit...](https://www.paloaltonetworks.com/resources/research/2023-unit42-mitre-attack-recommendations?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20is%20Malware%20vs.%20Ransomware%3F&body=Learn%20the%20differences%20between%20malware%2C%20a%20broad%20category%20of%20malicious%20software%2C%20vs.%20ransomware%2C%20a%20specialized%20category%20of%20malware%20used%20to%20carry%20out%20extortion.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-malware-vs-ransomware) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-extortion-ransomware?ts=markdown) What is Multi-Extortion Ransomware? [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-malware-protection?ts=markdown) What Is Malware Protection? Best Practices for Modern Businesses {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language