[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Network Security](https://www.paloaltonetworks.com/cyberpedia/network-security?ts=markdown) 3. [What Is Q-Day, and How Far Away Is It---Really?](https://www.paloaltonetworks.com/cyberpedia/what-is-q-day?ts=markdown) Table of contents * [Why do experts disagree about when Q-Day will happen?](#why-do-experts-disagree-about-when-q-day-will-happen) * [What would actually happen if Q-Day arrived tomorrow?](#what-would-actually-happen-if-q-day-arrived-tomorrow) * [Why "harvest now, decrypt later" matters more than Q-Day itself](#why-harvest-now-decrypt-later-matters-more-than-q-day-itself) * [How close are we based on today's progress?](#how-close-are-we-based-on-todays-progress) * [What are governments and standards bodies doing to prepare?](#what-are-governments-and-standards-bodies-doing-to-prepare) * [How to prepare for Q-Day (without overreacting)](#how-to-prepare-for-q-day) * [Will Q-Day be a crisis, or a milestone we're ready for?](#will-q-day-be-a-crisis-or-a-milestone) * [Q-Day FAQs](#q-day-faqs) # What Is Q-Day, and How Far Away Is It---Really? 4 min. read Table of contents * [Why do experts disagree about when Q-Day will happen?](#why-do-experts-disagree-about-when-q-day-will-happen) * [What would actually happen if Q-Day arrived tomorrow?](#what-would-actually-happen-if-q-day-arrived-tomorrow) * [Why "harvest now, decrypt later" matters more than Q-Day itself](#why-harvest-now-decrypt-later-matters-more-than-q-day-itself) * [How close are we based on today's progress?](#how-close-are-we-based-on-todays-progress) * [What are governments and standards bodies doing to prepare?](#what-are-governments-and-standards-bodies-doing-to-prepare) * [How to prepare for Q-Day (without overreacting)](#how-to-prepare-for-q-day) * [Will Q-Day be a crisis, or a milestone we're ready for?](#will-q-day-be-a-crisis-or-a-milestone) * [Q-Day FAQs](#q-day-faqs) 1. Why do experts disagree about when Q-Day will happen? * [1. Why do experts disagree about when Q-Day will happen?](#why-do-experts-disagree-about-when-q-day-will-happen) * [2. What would actually happen if Q-Day arrived tomorrow?](#what-would-actually-happen-if-q-day-arrived-tomorrow) * [3. Why "harvest now, decrypt later" matters more than Q-Day itself](#why-harvest-now-decrypt-later-matters-more-than-q-day-itself) * [4. How close are we based on today's progress?](#how-close-are-we-based-on-todays-progress) * [5. What are governments and standards bodies doing to prepare?](#what-are-governments-and-standards-bodies-doing-to-prepare) * [6. How to prepare for Q-Day (without overreacting)](#how-to-prepare-for-q-day) * [7. Will Q-Day be a crisis, or a milestone we're ready for?](#will-q-day-be-a-crisis-or-a-milestone) * [8. Q-Day FAQs](#q-day-faqs) "Q-Day" refers to the moment when quantum computers can break today's public-key cryptography. It's not a calendar date but a milestone---one most experts expect in the 2030s or later. It marks the point when a cryptographically relevant quantum computer (CRQC) can run algorithms like Shor's to break RSA and elliptic-curve encryption, forcing a global shift to quantum-safe standards. ## Why do experts disagree about when Q-Day will happen? Experts disagree because there's no single path to building a cryptographically relevant quantum computer. The timeline depends on progress across several independent challenges. "There is large variability among the opinions of the experts: some lean towards optimism, while others are more cautious about the pace at which quantum computers will be developed." [- Global Risk Institute, Quantum Threat Timeline Report 2024](https://globalriskinstitute.org/publication/2024-quantum-threat-timeline-report/) **Starting with hardware.** Different types of quantum computers use different physical approaches. Such as superconducting circuits, trapped ions, or photons. Each has its own trade-offs. Some can be built up quickly but are unstable. Others are more accurate but difficult to produce in large numbers. That's why progress varies by design. **Then there's error correction.** Quantum bits are fragile. They lose coherence in microseconds. That means a quantum computer can't simply add more qubits and expect better performance. To perform long calculations, millions of physical qubits must work together to create a few thousand logical ones. Estimates of when that will happen vary from the 2030s to beyond 2045. **Finally, algorithmic efficiency adds more uncertainty.** Breakthroughs in quantum algorithms---or classical countermeasures---could shift the timeline in either direction. **To put it simply, experts disagree because they're betting on different breakthroughs.** Some focus on physics. Others on engineering. Others on math. Each discipline defines "close" differently. Here's the consensus: The exact date doesn't matter as much as the preparation window. The risk begins long before Q-Day itself, when stolen data can be stored now and decrypted later. ## What would actually happen if Q-Day arrived tomorrow? ![Chart titled 'Why organizations are turning to hybrid cryptography' divided into four colored quadrants surrounding a central circular icon with an abstract network symbol. The top left orange box is labeled 'Redundancy \& resilience' with the text 'Remains secure if one algorithm fails or is broken.' The top right blue box reads 'Migration readiness' with the text 'Enables a gradual shift toward post-quantum cryptography.' The bottom left light blue box is labeled 'Interoperability' with the text 'Bridges classical and post-quantum systems without disruption.' The bottom right teal box reads 'Protection from harvest now, decrypt later' with the text 'Keeps sensitive data secure against future quantum decryption.'Infographic titled 'If Q-Day happened tomorrow'. Subheading reads 'Would the internet collapse? Not quite.' A faint world map forms the background. Four white rectangular boxes with icons and black connecting arrows describe sequential concepts. Top left box labeled 'What breaks first' contains a broken lock icon and states 'RSA and elliptic-curve encryption would fail. Keys could be derived. Digital signatures could be forged.' Top right box labeled 'What survives' shows a key icon and reads 'Symmetric encryption like AES and hashing algorithms like SHA-2 stay secure with longer keys. Most systems keep running.' Middle right box labeled 'Where the real risk lies' displays a circular network icon and says 'The issue isn't downtime—it's trust. Public-key infrastructures, certificate authorities, and digital identities would need rapid replacement.' Lower left box labeled 'How recovery happens' includes a gear icon and notes 'Recovery depends on speed of migration. Post-quantum standards—FIPS 203, 204, 205—enable replacement of vulnerable algorithms.' A final red box at bottom right labeled 'Disruption, not collapse' carries a triangular warning icon and text stating 'Q-Day would be disruptive, but survivable. Preparation determines how fast trust is restored.'](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-q-day/q-day-01.png) If Q-Day happened tomorrow, the internet wouldn't go dark. But [encryption](https://www.paloaltonetworks.com/cyberpedia/data-encryption) based on RSA and elliptic curves would no longer be secure. Why? Because a cryptographically relevant quantum computer could solve the math problems those algorithms rely on. Keys protecting everything from emails to [VPNs](https://www.paloaltonetworks.com/cyberpedia/what-is-a-vpn) could be derived. Digital signatures could be forged. The first systems at risk would be those using older or static keys. Especially ones that secure data meant to stay private for decades. Think financial archives, intellectual property, and government records. However: This wouldn't mean instant chaos. Most symmetric encryption and hashing algorithms would remain safe with longer keys. Systems using AES or SHA-2 could continue operating if rekeyed appropriately. The real concern would be trust. Public key infrastructures, certificate authorities, and identity systems would all need immediate transition. Communication could continue, but verification would be uncertain until new keys and algorithms were deployed. And that's the primary [quantum security](https://www.paloaltonetworks.com/cyberpedia/what-is-quantum-security) risk. In short: Q-Day would cause disruption, not collapse. Recovery would depend on how quickly organizations could replace vulnerable algorithms with post-quantum standards finalized by NIST. | ***Further reading:** [8 Quantum Computing Cybersecurity Risks \[+ Protection Tips\]](https://www.paloaltonetworks.com/cyberpedia/what-is-quantum-computings-threat-to-cybersecurity)* ## Why "harvest now, decrypt later" matters more than Q-Day itself The real threat isn't Q-Day. It's what's happening before it. Attackers are already collecting encrypted data today. They know that once quantum computers reach decryption capability, that data can be unlocked. Which means the information being stolen now---financial records, personal data, intellectual property---could be exposed years from now. That's what "harvest now, decrypt later" means. It's the practice of stealing encrypted traffic today to decrypt it later with quantum computing. ![Horizontal process diagram titled 'Harvest now, decrypt later (HNDL)' showing five sequential steps connected by arrows. Step 1, in a blue square, reads 'Data exfiltration' with subtext 'Steals encrypted traffic or files.' Step 2, in a lighter blue square, reads 'Cold storage' with subtext 'Keeps ciphertext for years.' Step 3, in an orange square, reads 'Advances in quantum computing' with subtext 'Waits for quantum systems.' Step 4, in a white square with a blue lock icon, reads 'Decrypt later' with subtext 'Shor's breaks RSA/ECC.' Step 5, in a purple square, reads 'Use the plaintext' with subtext 'Read, sell, or forge identities.' Small text under several steps notes 'Years can pass' to indicate elapsed time between stages.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-q-day/harvest-now-decrypt-later-2.png "Horizontal process diagram titled 'Harvest now, decrypt later (HNDL)' showing five sequential steps connected by arrows. Step 1, in a blue square, reads 'Data exfiltration' with subtext 'Steals encrypted traffic or files.' Step 2, in a lighter blue square, reads 'Cold storage' with subtext 'Keeps ciphertext for years.' Step 3, in an orange square, reads 'Advances in quantum computing' with subtext 'Waits for quantum systems.' Step 4, in a white square with a blue lock icon, reads 'Decrypt later' with subtext 'Shor's breaks RSA/ECC.' Step 5, in a purple square, reads 'Use the plaintext' with subtext 'Read, sell, or forge identities.' Small text under several steps notes 'Years can pass' to indicate elapsed time between stages.") The risk is simple. Data with long confidentiality lifespans---like government archives, trade secrets, or medical research---will still matter when Q-Day arrives. So delaying migration increases exposure. Important: Quantum readiness isn't just about future encryption standards. It's about protecting what's already in motion. | ***Further reading:** [Harvest Now, Decrypt Later (HNDL): The Quantum-Era Threat](http://paloaltonetworks.com/cyberpedia/harvest-now-decrypt-later-hndl)* ## How close are we based on today's progress? We're not there yet---but we're getting closer. A cryptographically relevant quantum computer remains years, likely decades, away. No one can pinpoint when Q-Day will happen. But current evidence gives a sense of scale. ![Chart titled 'Quantum threat \& readiness timeline'. The chart presents a two-track horizontal timeline spanning 2024 through 2035, showing parallel developments in quantum technology progress and cybersecurity readiness milestones. The top track, labeled 'Quantum technology progress', uses light blue background accents and lists milestones by year group. For 2024, it states that industry investment in quantum technology grows by nearly 50 percent to about $2 billion, with research shifting from scaling qubits to improving stability and error correction. The 2025 entry notes expert consensus that a cryptographically relevant quantum computer could emerge within a decade and mentions early hybrid quantum-classical systems demonstrating reliable logical qubits. The 2026–2028 group describes steady progress in qubit coherence and fault-tolerant design with public and private research advancing scalable prototypes. The 2029–2031 group highlights fault-tolerant systems achieving multi-day stability and global discussions on estimating Q-Day and assessing geopolitical implications. The 2032–2035 group shows large-scale quantum computers reaching commercial viability and legacy public-key encryption becoming increasingly vulnerable to quantum attack. The lower track, labeled 'Cybersecurity readiness milestones', uses orange highlights and lists corresponding security responses. For 2024, it cites NIST finalizing the first post-quantum cryptography standards FIPS 203–205 and governments beginning formal cryptographic inventories. The 2025 milestone mentions agencies publishing quantum-readiness roadmaps and hybrid cryptography pilots in cloud and network systems. The 2026–2028 span lists expanding cryptographic agility frameworks and vendor certification programs. The 2029–2031 range shows large-scale migration to quantum-safe cryptography and a growing focus on supply-chain coordination. The 2032–2035 period notes that PQC and hybrid encryption become global standards and fully integrated into enterprise and government infrastructure. The chart concludes with color bars separating the two tracks and a small caption attributing data sources from Global Risk Institute, IBM, McKinsey, NIST, CISA, NSA, and related quantum-readiness publications.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-q-day/Quantum-threat-readiness-timeline-2.png "Chart titled 'Quantum threat & readiness timeline'. The chart presents a two-track horizontal timeline spanning 2024 through 2035, showing parallel developments in quantum technology progress and cybersecurity readiness milestones. The top track, labeled 'Quantum technology progress', uses light blue background accents and lists milestones by year group. For 2024, it states that industry investment in quantum technology grows by nearly 50 percent to about $2 billion, with research shifting from scaling qubits to improving stability and error correction. The 2025 entry notes expert consensus that a cryptographically relevant quantum computer could emerge within a decade and mentions early hybrid quantum-classical systems demonstrating reliable logical qubits. The 2026–2028 group describes steady progress in qubit coherence and fault-tolerant design with public and private research advancing scalable prototypes. The 2029–2031 group highlights fault-tolerant systems achieving multi-day stability and global discussions on estimating Q-Day and assessing geopolitical implications. The 2032–2035 group shows large-scale quantum computers reaching commercial viability and legacy public-key encryption becoming increasingly vulnerable to quantum attack. The lower track, labeled 'Cybersecurity readiness milestones', uses orange highlights and lists corresponding security responses. For 2024, it cites NIST finalizing the first post-quantum cryptography standards FIPS 203–205 and governments beginning formal cryptographic inventories. The 2025 milestone mentions agencies publishing quantum-readiness roadmaps and hybrid cryptography pilots in cloud and network systems. The 2026–2028 span lists expanding cryptographic agility frameworks and vendor certification programs. The 2029–2031 range shows large-scale migration to quantum-safe cryptography and a growing focus on supply-chain coordination. The 2032–2035 period notes that PQC and hybrid encryption become global standards and fully integrated into enterprise and government infrastructure. The chart concludes with color bars separating the two tracks and a small caption attributing data sources from Global Risk Institute, IBM, McKinsey, NIST, CISA, NSA, and related quantum-readiness publications.") Let's consider the latest assessments. [The Global Risk Institute's Quantum Threat Timeline 2024](https://globalriskinstitute.org/publication/2024-quantum-threat-timeline-report/) finds most specialists expect cryptographically relevant quantum computers sometime in the 2030s or later. Even in optimistic forecasts, the probability of such a machine arriving within ten years remains under 20%. Recent technical progress supports that view. Both the Quantum Threat Timeline 2024 and [McKinsey's Quantum Monitor 2025](https://www.mckinsey.com/~/media/mckinsey/business%20functions/mckinsey%20digital/our%20insights/the%20year%20of%20quantum%20from%20concept%20to%20reality%20in%202025/quantum-monitor-2025.pdf) note measurable advances in qubit stability and error correction over the past year. But even with those gains, cryptographically relevant systems remain far off---requiring millions of fault-tolerant qubits, compared with the hundreds available today. Migration planning is already under way. Following the release of NIST's post-quantum standards in 2024---ML-KEM (FIPS 203), ML-DSA (FIPS 204), and SLH-DSA (FIPS 205)---governments and vendors began adopting these algorithms. It's worth noting, though, that readiness varies widely, with larger institutions beginning pilot deployments while others wait for regulatory deadlines. Here's the key takeaway: Q-Day isn't imminent, but it's not theoretical either. The point is that while a cryptographically relevant system is still decades away, the migration window is now. Transitioning this decade ensures data protected today will remain secure when that milestone finally arrives. | ***Further reading:** [What Is Post-Quantum Cryptography (PQC)? A Complete Guide](https://www.paloaltonetworks.com/cyberpedia/what-is-post-quantum-cryptography-pqc)* ## What are governments and standards bodies doing to prepare? ![Chart titled 'Global quantum readiness landscape' showing major government and standards-body initiatives shaping post-quantum migration. The diagram includes four labeled boxes positioned over a light blue world map background. The left box, titled 'United States,' lists 'NIST-FIPS 203–205: ML-KEM, ML-DSA, SLH-DSA, FN-DSA (draft)' followed by 'NSA – CNSA 2.0,' 'NSM-10,' and 'CISA / NSA / NIST Roadmap,' each with concise descriptions about mandates, federal directives, and migration guidance. The center box, titled 'Europe,' includes 'ETSI TR 103 967,' 'ENISA,' and 'ISO / ITU / JTC 1,' with notes on frameworks for post-quantum migration, coordination across EU member states, and early global standard alignment. The right box, titled 'Japan \& Canada,' states 'National initiatives aligning with NIST standards and conducting independent PQC trials.' Above it, a smaller orange box labeled 'Shared global challenge' explains that readiness is advancing unevenly across jurisdictions and emphasizes the need for aligned timelines and consistent implementation.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-q-day/Global-quantum-readiness-landscape-2.png) Governments and standards bodies are no longer just studying the quantum threat. They're executing coordinated migration plans. As mentioned, in the United States, NIST has finalized the first post-quantum cryptography standards, FIPS 203-205: * [Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM)](https://csrc.nist.gov/pubs/fips/203/final) * [Module-Lattice-Based Digital Signature Algorithm (ML-DSA)](https://csrc.nist.gov/pubs/fips/204/final) * [Stateless Hash-Based Digital Signature (SLH-DSA)](https://csrc.nist.gov/pubs/fips/205/final) ML-KEM, ML-DSA, and SLH-DSA are established as the new federal baseline. Those standards align with broader guidance in [NIST SP 800-131A r3](https://csrc.nist.gov/pubs/sp/800/131/a/r3/ipd), which outlines the transition from classical to quantum-resistant algorithms. Policy direction is equally clear. As discussed, National Security Memorandum-10 requires all federal agencies to complete their post-quantum migration by 2035. [The NSA's Commercial National Security Algorithm Suite 2.0](https://media.defense.gov/2025/May/30/2003728741/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS.PDF) supports that goal, defining approved algorithm families and timelines for defense and national security systems. This effort extends globally. ENISA and ETSI are leading European initiatives to harmonize post-quantum adoption and interoperability. [ISO/IEC 23837](https://www.iso.org/standard/77097.html) defines shared testing and evaluation criteria for technologies such as quantum key distribution. The World Economic Forum has emphasized the governance side of quantum readiness, encouraging collaboration across industries and integrating quantum risk into existing cybersecurity strategies. The direction is set. Global standards are converging, timelines are published, and implementation is underway. What varies now is pace. Some nations are ahead, others are still planning, but the transition to quantum-safe infrastructure has already begun. For enterprises, that means migration planning must now align with these public timelines to avoid falling behind the broader shift. ## How to prepare for Q-Day (without overreacting) "A successful post-quantum cryptography migration will take time to plan and conduct. CISA, NSA, and NIST urge organizations to begin preparing now by creating quantum-readiness roadmaps, conducting inventories, applying risk assessments and analysis, and engaging vendors. Early planning is necessary as cyber threat actors could be targeting data today that would still require protection in the future (or in other words, has a long secrecy lifetime), using a catch now, break later or harvest now, decrypt later operation." [- NIST, NSA, CISA, Quantum-Readiness: Migration to Post-Quantum Cryptography](https://www.cisa.gov/resources-tools/resources/quantum-readiness-migration-post-quantum-cryptography) Quantum readiness isn't about panic. It's about preparation. * **Start with leadership.** Accountability at the executive level ensures readiness isn't an isolated project. * **Next comes visibility.** Organizations need a complete inventory of where and how cryptography is used across applications, APIs, and devices. Without that baseline, you can't prioritize what to protect or migrate. * **Then triage.** Identify long-life data that must remain confidential for decades. Those assets should move first, since they're already vulnerable to harvest-now-decrypt-later exposure. * **Focus on flexibility.** Crypto-agility lets you replace algorithms and keys without rebuilding entire systems. It's the foundation for adopting post-quantum standards safely. * **Testing matters too.** Hybrid models that combine classical and post-quantum algorithms allow organizations to validate performance before scaling broadly. * **Finally, governance keeps progress sustainable.** Define ownership for cryptographic management and align internal policy with emerging standards. Ultimately, the goal isn't to future-proof everything overnight. It's to build systems ready to evolve. So when Q-Day comes, migration is planned, not improvised. And the collective result of that preparation is what determines whether Q-Day becomes a crisis or a milestone we're ready for. | ***Further reading:*** * [*Quantum Readiness: What It Means and How to Achieve It*](https://www.paloaltonetworks.com/cyberpedia/quantum-readiness) * [*Cryptographic Agility: The Key to Quantum Readiness*](https://www.paloaltonetworks.com/cyberpedia/what-is-cryptographic-agility) ## Will Q-Day be a crisis, or a milestone we're ready for? Q-Day won't be a single moment of collapse. It'll be a milestone that measures how well the world prepared. The transition to quantum-safe encryption is meant to be managed. Not improvised. The algorithms, timelines, and coordination frameworks are already defined. So: When a cryptographically relevant quantum computer finally arrives, the systems built for flexibility will adapt. The ones that planned early will transition with minimal disruption. In the end, Q-Day isn't a surprise waiting to happen. It's the predictable outcome of a process already in motion. The challenge isn't the day itself. It's making sure readiness keeps pace with technology. Because preparation only matters if execution continues until the transition is complete. ![Quantum assessment icon](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-quantum-security/icon-quantum-readiness.svg) ## Explore the future of quantum security Dive into an interactive overview of quantum threats, post-quantum cryptography, and NIST's new standards. [Launch experience](https://www.paloaltonetworks.com/resources/ebooks/quantum-security) ## Q-Day FAQs #### What does Q-Day mean? Q-Day refers to the point when quantum computers can break today's public-key cryptography, such as RSA and elliptic-curve algorithms. It marks a capability milestone---not a literal date---and signals when post-quantum encryption must fully replace classical systems to keep digital communications secure. #### How do you prepare for the quantum apocalypse? The term "quantum apocalypse" exaggerates the risk. The real challenge is migration. Preparation means inventorying cryptographic systems, prioritizing long-life data, adopting post-quantum and hybrid algorithms, and building crypto-agility. Done gradually and strategically, this transition prevents disruption and ensures readiness long before large-scale quantum computers exist. #### Can we defend against quantum attacks? Yes. Post-quantum cryptography (PQC) provides mathematically secure alternatives resistant to quantum decryption. NIST's FIPS 203-205 standards---ML-KEM, ML-DSA, and SLH-DSA---are the new baselines for encryption and digital signatures. Combining PQC with strong symmetric encryption and proper key management mitigates quantum threats effectively. #### How long until we have quantum computers? No one knows precisely. Most experts expect cryptographically relevant quantum computers decades away. Hardware progress is steady, but scaling to millions of stable qubits remains unresolved. That's why governments target migration completion by 2035---ensuring systems are ready well before such machines emerge. Related content [YouTube playlist: A CISO's Guide to Quantum Security Binge a 6-video series breaking down why quantum computing is closer than you think but not as difficult.](https://www.youtube.com/playlist?list=PLqATPiC_Bcl8ZGx_EAxQHq0PKa2ii6pNE) [Podcast: Threat Vector | Is the Quantum Threat Closer Than You Think? Hear how to start your transition to quantum-resistant cryptography now.](https://www.paloaltonetworks.com/resources/podcasts/threat-vector-is-the-quantum-threat-closer-than-you-think) [TechDocs: Quantum Security Concepts Get the facts on resisting the quantum computing threat straight from PANW's solutions documentation.](https://docs.paloaltonetworks.com/network-security/quantum-security/administration/quantum-security-concepts) [Blog: Palo Alto Networks Announces New Quantum Security Innovations Learn about the new crypto inventory tool, quantum-optimized firewalls and PAN-OS 12.1 enabled quantum readiness.](https://www.paloaltonetworks.com/blog/2025/08/securing-the-quantum-age/) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Q-Day%2C%20and%20How%20Far%20Away%20Is%20It%E2%80%94Really%3F&body=Q-Day%20is%20when%20quantum%20computers%20can%20break%20today%E2%80%99s%20encryption.%20The%20milestone%20is%20expected%20in%20the%202030s.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-q-day) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language