[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Threats](https://www.paloaltonetworks.com/cyberpedia/threat?ts=markdown) 3. [MDR](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response?ts=markdown) 4. [What is the Difference Between EDR vs MDR?](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr?ts=markdown) Table of Contents * [What Is Managed Detection and Response (MDR)?](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response?ts=markdown) * [How MDR Fills the Gaps from Traditional Services](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response#mdr?ts=markdown) * [The Framework of MDR Services](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response#services?ts=markdown) * [Types of Detection and Response Solutions](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response#types?ts=markdown) * [MDR vs. EDR vs. MSSPs](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response#edr?ts=markdown) * [Implementing MDR](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response#implement?ts=markdown) * [The Impact of MDR on Modern Cybersecurity Strategies](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response#impact?ts=markdown) * [Managed Detection and Response (MDR) FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response#faqs?ts=markdown) * What is the Difference Between EDR vs MDR? * [What is the Difference Between MDR and EDR?](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#difference?ts=markdown) * [Benefits of EDR](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#benefits-edr?ts=markdown) * [Benefits of MDR](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#benefits-mdr?ts=markdown) * [Should I Use EDR, MDR, or Both?](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#should?ts=markdown) * [What is Extended Detection and Response (XDR)?](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#xdr?ts=markdown) * [MDR vs. EDR FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#faqs?ts=markdown) * [What is MDR vs MSSP?](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences?ts=markdown) * [Why Organizations Need MDR/MSSP](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences#why?ts=markdown) * [Exploring Managed Detection and Response (MDR)](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences#mdr?ts=markdown) * [Exploring Managed Security Service Providers (MSSP)](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences#mssp?ts=markdown) * [Key Differences Between MDR vs MSSP](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences#vs?ts=markdown) * [Assessing Your Needs: MDR or MSSP?](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences#assessing?ts=markdown) * [MDR vs. MSSP FAQs](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences#faqs?ts=markdown) * [What are Managed Detection and Response Services (MDR)?](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr?ts=markdown) * [What is MDR?](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#mdr?ts=markdown) * [Categories of MDR Services](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#mdr-services?ts=markdown) * [Features Offered by MDR Service Providers](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#features?ts=markdown) * [Why are MDR Services Important?](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#why?ts=markdown) * [How MDR Services Work](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#how-mdr-services-work?ts=markdown) * [Do Smaller Businesses Need MDR Services?](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#do-smaller-businesses-need-mdr-services?ts=markdown) * [MDR Services FAQs](https://www.paloaltonetworks.com/cyberpedia/managed-detection-and-response-services-mdr#faq?ts=markdown) # What is the Difference Between EDR vs MDR? 5 min. read Table of Contents * * [What is the Difference Between MDR and EDR?](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#difference?ts=markdown) * [Benefits of EDR](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#benefits-edr?ts=markdown) * [Benefits of MDR](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#benefits-mdr?ts=markdown) * [Should I Use EDR, MDR, or Both?](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#should?ts=markdown) * [What is Extended Detection and Response (XDR)?](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#xdr?ts=markdown) * [MDR vs. EDR FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#faqs?ts=markdown) 1. What is the Difference Between MDR and EDR? * * [What is the Difference Between MDR and EDR?](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#difference?ts=markdown) * [Benefits of EDR](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#benefits-edr?ts=markdown) * [Benefits of MDR](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#benefits-mdr?ts=markdown) * [Should I Use EDR, MDR, or Both?](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#should?ts=markdown) * [What is Extended Detection and Response (XDR)?](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#xdr?ts=markdown) * [MDR vs. EDR FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr#faqs?ts=markdown) Managed detection and response (MDR) and endpoint detection and response (EDR) aim to enhance cybersecurity through advanced security solutions, emphasizing improved visibility. However, EDR focuses on detecting and responding to threats at the endpoints, while MDR often includes EDR and offers security monitoring typically by a third party. Many companies benefit from implementing EDR and MDR solutions to effectively address their diverse security challenges. ## What is the Difference Between MDR and EDR? | EDR | MDR | | Scope | EDR focuses primarily on detecting and securing individual endpoints, such as desktops, laptops, servers, and mobile devices. It provides visibility and security controls at the endpoint level. | MDR is a service that includes monitoring and responding to threats across endpoints. | | Responsibility | EDR solutions are typically deployed and managed by the organization's IT or security team. They provide the tools and capabilities for in-house security professionals to detect and respond to threats at the endpoint level. | MDR is a full or partial managed service provided by a third-party provider--a managed security service provider (MSSP) or MDR provider. The MDR provider is typically responsible for monitoring, detecting, and responding to threats on behalf of the organization, reducing the organization's internal workload. | | Monitoring and Detection | EDR solutions focus on endpoint-specific monitoring and threat detection. They collect data and analyze endpoint activities to identify suspicious or malicious behavior. | MDR services often encompass advanced processes, threat hunting, threat intelligence, and human expertise to detect and respond to threats. | | Response Capability | EDR solutions provide tools for endpoint containment and response. They allow security teams to take actions like isolating infected endpoints or removing malicious files from individual devices. | MDR providers offer comprehensive threat response capabilities, which may include not only endpoint containment but also broader incident response, investigation, and guidance to mitigate threats. | | Expertise | EDR solutions require organizations to have their own cybersecurity expertise to utilize the tools and respond to threats effectively. | MDR providers bring their own team of cybersecurity experts skilled in threat detection, analysis, and incident response. They provide organizations with access to specialized knowledge and experience. | | Cost Structure | Organizations typically purchase EDR tools and may incur ongoing operational costs for maintaining and managing the solution. | MDR services are subscription-based and often include the cost of both the technology and the expertise of the managed service provider. This can make it a more predictable cost model for organizations. | | Proactive vs. Reactive | EDR solutions are often a reactive approach, requiring organizations to respond to threats once detected. | MDR services are a more proactive approach, with the MDR provider actively monitoring and hunting for threats and quickly taking action to detect and mitigate threats before they escalate. | |--------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| ## Benefits of EDR EDR offers deep visibility into endpoint activities, enabling rapid threat detection and efficient incident response. Additionally, it may support regulatory compliance and offer centralized management, customization options, and seamless integration with other security tools, enhancing overall cybersecurity measures and helping organizations maintain a strong security posture. ### Key Capabilities of EDR An EDR solution should have the following capabilities to ensure robust endpoint security: * Integration with other security tools, such as incident response, antivirus/anti-malware, and firewalls, to promote shared threat intelligence and easy linking to other software through APIs. * Scalability to cope with a growing number and diversity of types of endpoints (Windows, macOS, Linux), both in local and remote locations and to handle a growing number and type of threats and attacks and protecting against new vulnerabilities. * Advanced threat detection that enables fast response to threats before, during, and after they take hold. * Automated data collection and processing to quickly understand the nature of the threat or attack and take appropriate action as quickly as possible. * Easy-to-use tools with a user-friendly interface, clear alerts, and a centralized management console that allows EDR admins to view the security status of every endpoint, configure policies, and investigate and respond to security incidents. ## Benefits of MDR Managed detection and response (MDR) offers significant advantages in cybersecurity. One of its primary benefits is outsourcing threat detection and response to specialized security experts, alleviating the burden on in-house teams. MDR providers typically offer 24/7 monitoring, ensuring that threats are identified and addressed promptly, even during non-business hours. This continuous monitoring, combined with the expertise of MDR professionals, enhances an organization's threat detection capabilities, enabling it to detect and respond to advanced and emerging threats effectively. MDR services often include threat hunting, which involves actively seeking out potential threats within an environment, further bolstering security. Additionally, MDR can provide valuable insights into an organization's security posture and suggest improvements to strengthen overall defenses. Ultimately, MDR enables businesses to proactively protect their digital assets and sensitive data, making it a crucial component of a robust cybersecurity strategy. ### Key Capabilities of MDR MDR service providers must be able to: * Connect alerts and telemetry data for analysis * Cover managed and unmanaged devices with user entity behavior analysis (UEBA), network threat analysis (NTA), EDR, and endpoint protection platform (EPP) * Quickly switch from threat hunting to incident response * Provide 24/7 coverage with mean time to detect (MTTD) and mean time to respond (MTTR) objectives In addition, potential providers should be evaluated for research and development capabilities, financial stability, service policies, SLOs/SLAs, and references. The relationship between the provider and the organization's security operations center (SOC) and cybersecurity team is also critical - trust and confidence must be established and maintained. ## Should I Use EDR, MDR, or Both? The decision on whether to use MDR, EDR, or a combination of both depends on the organization's specific security needs, available resources, budget, IT environment complexity, and compliance requirements. EDR is ideal for improving the security of individual endpoints. MDR provides a holistic view of security threats, making it suitable for organizations lacking or wanting to enhance their specialized cybersecurity skills. EDR is cost-effective for simpler IT infrastructures, and MDR is beneficial for a wide range of organizations especially those without resources or expertise in house. It is often considered suitable for organizations with complex setups, distributed networks, a mix of on-premises and cloud resources or any organization concerned about advanced threats. In many cases, a combination of EDR and MDR is the most effective approach as it addresses different aspects of an organization's cybersecurity needs. Ultimately, the decision should align with the organization's unique risk profile, IT environment, and available resources. ## What is Extended Detection and Response (XDR)? XDR augments the capabilities of EDR by providing a comprehensive and integrated security approach that spans multiple security vectors. It enhances threat detection, incident response, and visibility across an organization's entire IT environment, making it an attractive option for organizations seeking a robust defense against evolving cyberthreats. (figure 1) ![XDR encompasses multiple security components beyond endpoints](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-mdr-vs-edr/mdr-built-on-corext-xdr.png "XDR encompasses multiple security components beyond endpoints") XDR encompasses multiple security components beyond endpoints, such as networks, email, cloud services, and more. Organizations should assess their specific security needs, IT environment, and resources to determine whether XDR, MDR, EDR, or a combination of these solutions is most appropriate for their cybersecurity strategy. Explore XDR further by reading our article, [What is Extended Detection and Response (XDR)](https://www.paloaltonetworks.com/cyberpedia/what-is-extended-detection-response-XDR?ts=markdown)? ## MDR vs. EDR FAQs ### What is the difference between EDR and malware protection? Antivirus software is typically used to detect and respond to malware on an infected computer. EDR, however, uses antivirus software and other endpoint security tools and features to provide more robust protection against malware and other threats. ### Why must we work with an MDR service provider if our organization has a security operations center? SOC professionals, although extremely talented and dedicated, have had to deal with big expansions in their workloads; threats have become more numerous, specialized, and unpredictable. Working with an MDR provider greatly expands an organization's capabilities and enables 24/7/365 coverage without having to hire a large number of new employees directly. Additionally, an MDR provider's services can usually be expanded faster and more cost-efficiently than an in-house SOC team can do. ### How does XDR fit into this? MDR service providers often use XDR solutions to give the service providers' analysts substantial greater visibility into the organization's data assets, including endpoints, networks, clouds, identity, and more. Using XDR helps MDR service providers gain broader visibility and context to quickly identify, stop, and remediate malicious activity that could impact the organization. Related Content [What is Managed Detection and Response MDR services built on Cortex XDR give you a head start against cyberthreats.](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response?ts=markdown) [Boyne Resorts achieves game-changing SOC improvements with Cortex XSIAM and Unit 42 MDR Boyne Resorts had a legacy SIEM that overloaded its security team with false positives while making it difficult and expensive to integrate data sources. See their results after im...](https://www.paloaltonetworks.com/customers/boyne-resorts-achieves-game-changing-soc-improvements-with-cortex-xsiam-and-unit-42-mdr?ts=markdown) [Unit 42^®^ Managed Detection and Response (MDR) Service Unit 42 Managed Detection and Response service helps you monitor security events and proactively detect and respond to threats to minimize their impact.](https://www.paloaltonetworks.com/resources/datasheets/unit42-managed-detection-and-response?ts=markdown) [Unit 42 MDR Whitepaper : Supercharge your Defenses With the Unit 42 Managed Detection and Response service, Unit 42 experts work for you to detect and respond to cyberattacks 24/7, so your team can focus on what matters most.](https://www.paloaltonetworks.sg/resources/whitepapers/supercharge-your-defenses) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20is%20the%20Difference%20Between%20EDR%20vs%20MDR%3F&body=Explore%20the%20distinctions%20among%20EDR%20vs%20MDR%20and%20how%20Managed%20Detection%20and%20Response%20complements%20Endpoint%20Detection%20and%20Response%20for%20enhanced%20threat%20management.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-mdr-vs-edr) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-managed-detection-and-response?ts=markdown) What Is Managed Detection and Response (MDR)? [Next](https://www.paloaltonetworks.com/cyberpedia/mdr-vs-mssp-the-key-differences?ts=markdown) What is MDR vs MSSP? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language