[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [ASPM](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management?ts=markdown) 4. [What Is Software Composition Analysis (SCA)?](https://www.paloaltonetworks.com/cyberpedia/what-is-sca?ts=markdown) Table of Contents * [What Is Application Security Posture Management (ASPM)?](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management?ts=markdown) * [Application Security Posture Management (ASPM) Explained](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#application?ts=markdown) * [Why Is ASPM Important?](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#why?ts=markdown) * [The Role of ASPM in Cyber Defense](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#role?ts=markdown) * [ASPM: Business Value](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#aspm?ts=markdown) * [Comparing ASPM with Other Security Technologies](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#security?ts=markdown) * [How ASPM Works](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#works?ts=markdown) * [ASPM Use Cases](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#cases?ts=markdown) * [Top Considerations When Choosing an ASPM Solution](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#considerations?ts=markdown) * [ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#faqs?ts=markdown) * [How DSPM Is Evolving: Key Trends to Watch](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends?ts=markdown) * [From Static Discovery to Dynamic Intelligence](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#static?ts=markdown) * [The Convergence of DSPM with Cloud-Native Security Architectures](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#native?ts=markdown) * [Real-Time Data Detection and Response](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#response?ts=markdown) * [AI Security and Generative AI Data Protection](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#protection?ts=markdown) * [Automation, Policy-as-Code, and DevSecOps Integration](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#automation?ts=markdown) * [DSPM Key Trends FAQs](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#faq?ts=markdown) * [Interactive Application Testing \& ASPM: Closing DevSec Gaps](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps?ts=markdown) * [Modern Application Security Testing Architecture](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#modern?ts=markdown) * [Application Security Posture Management Fundamentals](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#application?ts=markdown) * [Technical Integration Mechanisms](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#technical?ts=markdown) * [Enhanced Detection and False Positive Reduction](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#enhanced?ts=markdown) * [Pre-Production Testing and Developer Feedback Loops](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#loops?ts=markdown) * [IAST and ASPM Integration FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#faqs?ts=markdown) * [Buy or Build: Calculating ASPM ROI for Your Organization](https://www.paloaltonetworks.com/cyberpedia/aspm-roi?ts=markdown) * [ASPM Platform Requirements and Strategic Context](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#aspm?ts=markdown) * [Build Vs. Buy Decision Framework](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#vs?ts=markdown) * [ROI Calculation Models and Financial Analysis](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#roi?ts=markdown) * [Implementation Scenarios and Trade-Off Analysis](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#analysis?ts=markdown) * [Long-Term Scalability and Strategic Considerations](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#considerations?ts=markdown) * [ASPM ROI FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#faqs?ts=markdown) * [Overcoming AppSec Chaos: 7 Modes of ASPM Adoption](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes?ts=markdown) * [Why ASPM Is Critical for Cloud-First Enterprises](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes#why?ts=markdown) * [ASPM Maturity Assessment and Organizational Readiness](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes#aspm?ts=markdown) * [7 Paths to ASPM Adoption](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes#adoption?ts=markdown) * [Operating Models and Sustained ASPM Maturity](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes#operating?ts=markdown) * [ASPM Adoption FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes#faqs?ts=markdown) * [ASPM: The Evolution Beyond ASOC](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc?ts=markdown) * [ASPM Vs. ASOC Market Evolution and Convergence Dynamics](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#aspm?ts=markdown) * [ASPM Core Features and Advantages Vs. ASOC Orchestration Capabilities](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#capabilities?ts=markdown) * [ASOC Vs. ASPM Disadvantages and Implementation Challenges](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#challenges?ts=markdown) * [ASPM Vs. ASOC Cost Analysis and Strategic Investment Planning](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#planning?ts=markdown) * [ASOC Vs. ASPM Selection Framework](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#framework?ts=markdown) * [ASPM and ASOC FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#faqs?ts=markdown) * [Top Cloud Data Security Solutions](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions?ts=markdown) * [The Modern Cloud Data Security Landscape](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#modern?ts=markdown) * [The Anatomy of Modern Cloud Security](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#cloud?ts=markdown) * [Evaluating Data Protection Platforms for Enterprise Deployment](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#data?ts=markdown) * [Leading Cloud Data Security Solutions and Market Positioning](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#security?ts=markdown) * [Strategic Implementation and Platform Selection](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#platform?ts=markdown) * [Top Cloud Data Security Solutions FAQs](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#faq?ts=markdown) * [Selecting Your ASPM Solution: Metrics That Matter](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics?ts=markdown) * [Why Opt for an ASPM solution?](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics#solution?ts=markdown) * [Not All ASPM Solutions Are Created Equal](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics#equal?ts=markdown) * [Must Have ASPM Components](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics#components?ts=markdown) * [Real World Evaluation Requirements](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics#evaluation?ts=markdown) * [Selecting ASPM Platform FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics#faq?ts=markdown) * [ASPM in Action: 8 Real‑World Use Cases](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases?ts=markdown) * [ASPM Explained](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases#explained?ts=markdown) * [ASPM Use Cases](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases#cases?ts=markdown) * [Enhancing Cloud Security with ASPM](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases#security?ts=markdown) * [The Business Value of ASPM](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases#value?ts=markdown) * [ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases#faq?ts=markdown) * [State of ASPM 2025: Key Trends \& Emerging Threats](https://www.paloaltonetworks.com/cyberpedia/aspm-trends?ts=markdown) * [ASPM Market Evolution and Adoption Trajectory](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#aspm?ts=markdown) * [AI-Native ASPM and Machine Learning Integration](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#integration?ts=markdown) * [Cloud-Native Security Challenges and Container Orchestration Threats](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#threats?ts=markdown) * [Software Supply Chain Vulnerabilities and SBOM Evolution](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#software?ts=markdown) * [DevSecOps Integration and Future ASPM Architecture](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#devsecops?ts=markdown) * [ASPM Key Trends \& Threats FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#faqs?ts=markdown) * [Application Security Best Practices You Can't Skip in ASPM](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices?ts=markdown) * [ASPM Architecture: From Tool Sprawl to Unified Intelligence](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#aspm?ts=markdown) * [Advanced Risk Correlation and Contextual Prioritization Systems](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#advanced?ts=markdown) * [Policy-Driven Security Automation and Enforcement Architecture](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#policy?ts=markdown) * [Seamless DevOps Integration and Cloud-Native Security Orchestration](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#seamless?ts=markdown) * [Enterprise Scalability, Performance Engineering, and Compliance Automation](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#enterprise?ts=markdown) * [Application Security In ASPM Best Practices FAQs](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#faqs?ts=markdown) * [How Supply Chain Threats Are Shaping ASPM Today](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats?ts=markdown) * [The Supply Chain Attack Surface in Modern ASPM](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#aspm?ts=markdown) * [Critical Supply Chain Vectors Driving ASPM Evolution](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#critical?ts=markdown) * [Software Supply Chain Risk Assessment and Prioritization](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#software?ts=markdown) * [Architectural Shifts in ASPM for Supply Chain Defense](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#defense?ts=markdown) * [Operationalizing Supply Chain Security Within ASPM Programs](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#programs?ts=markdown) * [Supply Chain Threats Are Shaping ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#faqs?ts=markdown) * [How ASPM Strengthens Your Cloud Ecosystem](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem?ts=markdown) * [ASPM's Role in Unified Cloud Security Architecture](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#architecture?ts=markdown) * [Integration Points Across the Cloud Security Stack](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#integration?ts=markdown) * [Risk Intelligence and Contextual Prioritization in Cloud Environments](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#risk?ts=markdown) * [Operational Efficiency Through Automated Cloud Security Workflows](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#workflows?ts=markdown) * [Strategic Advantages for Cloud-First Organizations](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#strategic?ts=markdown) * [ASPM Strengthening the Entire Cloud Ecosystem FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#faqs?ts=markdown) * [Developer Infrastructure Posture: Integrating ASPM Early](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture?ts=markdown) * [Understanding Developer Infrastructure Posture](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#understanding?ts=markdown) * [ASPM Fundamentals: Beyond Traditional Application Security](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#aspm?ts=markdown) * [Early Integration Strategies: Embedding ASPM in Developer Workflows](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#early?ts=markdown) * [ASPM Compliance Framework Integration](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#integration?ts=markdown) * [Risk Prioritization and Remediation at Scale](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#risk?ts=markdown) * [Developer Infrastructure Posture Management and ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#faqs?ts=markdown) * [Amplify ASPM with RBVM Risk‑Based Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability?ts=markdown) * [ASPM and RBVM Technical Convergence](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#aspm?ts=markdown) * [Enhanced API Security Through Contextual Intelligence](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#enhanced?ts=markdown) * [Runtime and Version Monitoring Convergence](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#runtime?ts=markdown) * [Build and Deploy Phase Security Amplification](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#build?ts=markdown) * [Operational Excellence and Measurable Outcomes](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#outcomes?ts=markdown) * [ASPM and RBVM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#faqs?ts=markdown) * [CNAPP and ASPM Collaboration, Not Collision](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp?ts=markdown) * [ASPM Overview](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#aspm?ts=markdown) * [The Emergence of CNAPP](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#emergence?ts=markdown) * [ASPM Vs. CNAPP: The Main Differences](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#vs?ts=markdown) * [CNAPP and ASPM: The Synergies](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#synergies?ts=markdown) * [Integrating and Coordinating Complementary Capabilities](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#integrating?ts=markdown) * [CNAPP and ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#faqs?ts=markdown) * [CSPM Vs ASPM: Where Your Focus Belongs](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm?ts=markdown) * [Core Security Foundations: A Look at CSPM and ASPM](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm#core?ts=markdown) * [Security Layer Distinctions: Infrastructure Vs. Application Focus](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm#security?ts=markdown) * [Strategic Technology Assessment: Benefits and Constraints of Each Approach](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm#strategic?ts=markdown) * [Deployment Scenarios and Implementation Strategies](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm#deployment?ts=markdown) * [CSPM and ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm#faqs?ts=markdown) * [Why You Need Static Analysis, Dynamic Analysis, and Machine Learning?](https://www.paloaltonetworks.com/cyberpedia/why-you-need-static-analysis-dynamic-analysis-machine-learning?ts=markdown) * [What Is a Software Bill of Materials (SBOM)?](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom?ts=markdown) * [Software Bill of Materials Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#sbom-explained?ts=markdown) * [Who Should Have a SBOM](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#who?ts=markdown) * [The Role of SBOMs in Cybersecurity and Compliance](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#role-of-sboms?ts=markdown) * [Why Is an SBOM Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#why-is-an-sbom-important?ts=markdown) * [Software Composition Analysis and SBOMs](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#sca-and-sboms?ts=markdown) * [How Does an SBOM Help Prevent Open-Source Supply Chain Attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#how?ts=markdown) * [SBOM Formats](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#sbom-formats?ts=markdown) * [Software Bill of Materials Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#sbom-best-practices?ts=markdown) * [SBOM FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#faq?ts=markdown) * [What Is Policy-as-Code?](https://www.paloaltonetworks.com/cyberpedia/what-is-policy-as-code?ts=markdown) * [Defining Policy-As-Code](https://www.paloaltonetworks.com/cyberpedia/what-is-policy-as-code#defining?ts=markdown) * [Policy-as-Code vs. Infrastructure as Code](https://www.paloaltonetworks.com/cyberpedia/what-is-policy-as-code#policy?ts=markdown) * [Benefits of Policy-as-Code](https://www.paloaltonetworks.com/cyberpedia/what-is-policy-as-code#benefits?ts=markdown) * [How to Use Policy-As-Code](https://www.paloaltonetworks.com/cyberpedia/what-is-policy-as-code#how?ts=markdown) * [What Is Static Application Security Testing (SAST)?](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing?ts=markdown) * [Why Is SAST Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#why?ts=markdown) * [SAST Vs. DAST](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#vs?ts=markdown) * [Software Composition Analysis and SAST](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#composition?ts=markdown) * [SAST Tools](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#tools?ts=markdown) * [Industry Guidelines](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#guidelines?ts=markdown) * [The Future of SAST](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#future?ts=markdown) * [Static Application Security Testing FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#faq?ts=markdown) * [What Is Code Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security?ts=markdown) * [IaC Security](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#iac?ts=markdown) * [Application Code Security](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#application?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#software?ts=markdown) * [Code Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#faqs?ts=markdown) * What Is Software Composition Analysis (SCA)? * [What Is Software Composition Analysis?](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#what?ts=markdown) * [What Are the Risks of Using Open Source Components?](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#components?ts=markdown) * [Software Composition Analysis Identifies Risks in Open Source Packages](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#software?ts=markdown) * [How to Use SCA in the Development Processes](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#processes?ts=markdown) * [The Benefits of Software Composition Analysis](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#analysis?ts=markdown) * [What is Infrastructure-as-Code Security](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security?ts=markdown) * [How IaC Security Works](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security#how?ts=markdown) * [Why is IaC Security Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security#why?ts=markdown) * [What is IaC?](https://www.paloaltonetworks.com/cyberpedia/what-is-iac?ts=markdown) * [Benefits of IaC](https://www.paloaltonetworks.com/cyberpedia/what-is-iac#benefits?ts=markdown) * [Challenges of IaC](https://www.paloaltonetworks.com/cyberpedia/what-is-iac#challenges?ts=markdown) * [Infrastructure as Code FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-iac#faqs?ts=markdown) * [What Is Secrets Management?](https://www.paloaltonetworks.com/cyberpedia/secrets-management?ts=markdown) * [Secrets Management Explained](https://www.paloaltonetworks.com/cyberpedia/secrets-management#secrets?ts=markdown) * [Why Is Secrets Management Important?](https://www.paloaltonetworks.com/cyberpedia/secrets-management#why?ts=markdown) * [Secrets Management Across the Enterprise](https://www.paloaltonetworks.com/cyberpedia/secrets-management#enterprise?ts=markdown) * [Secrets Management in DevOps Environments](https://www.paloaltonetworks.com/cyberpedia/secrets-management#devops?ts=markdown) * [Challenges of Secrets Management](https://www.paloaltonetworks.com/cyberpedia/secrets-management#challenges?ts=markdown) * [Secrets Management Best Practices](https://www.paloaltonetworks.com/cyberpedia/secrets-management#best?ts=markdown) * [A Comprehensive and Automated Solution](https://www.paloaltonetworks.com/cyberpedia/secrets-management#solution?ts=markdown) * [Secrets Management FAQs](https://www.paloaltonetworks.com/cyberpedia/secrets-management#faqs?ts=markdown) * [What Is Infrastructure as Code (IaC) Supply Chain Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security?ts=markdown) * [What Is GitOps? Understanding the 'DevOps' of Infrastructure Management](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security#what?ts=markdown) * [The 4 Stages for Securing Your IaC Supply Chain](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security#the?ts=markdown) * [Best Practices for Securing Your IaC Pipeline](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security#best?ts=markdown) * [Embrace Change: Automating Your Organization's Infrastructure](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security#embrace?ts=markdown) * [IaC Supply Chain Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security#faqs?ts=markdown) * [ASPM Tools: Evaluation Criteria and How to Select the Best Option](https://www.paloaltonetworks.com/cyberpedia/aspm-tools?ts=markdown) * [The Need for Application Security Posture Management Solutions](https://www.paloaltonetworks.com/cyberpedia/aspm-tools#solutions?ts=markdown) * [The Key Components of ASPM Tools](https://www.paloaltonetworks.com/cyberpedia/aspm-tools#key?ts=markdown) * [How to Select and Evaluate the Right ASPM Solution](https://www.paloaltonetworks.com/cyberpedia/aspm-tools#how?ts=markdown) * [Common Challenges Implementing ASPM](https://www.paloaltonetworks.com/cyberpedia/aspm-tools#challenges?ts=markdown) * [ASPM Tools FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-tools#faqs?ts=markdown) # What Is Software Composition Analysis (SCA)? 3 min. read [AppSec's New Horizon: A Virtual Event](https://start.paloaltonetworks.com/appsecs-new-horizon-virtual-event.html) Table of Contents * * [What Is Software Composition Analysis?](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#what?ts=markdown) * [What Are the Risks of Using Open Source Components?](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#components?ts=markdown) * [Software Composition Analysis Identifies Risks in Open Source Packages](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#software?ts=markdown) * [How to Use SCA in the Development Processes](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#processes?ts=markdown) * [The Benefits of Software Composition Analysis](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#analysis?ts=markdown) 1. What Is Software Composition Analysis? * * [What Is Software Composition Analysis?](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#what?ts=markdown) * [What Are the Risks of Using Open Source Components?](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#components?ts=markdown) * [Software Composition Analysis Identifies Risks in Open Source Packages](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#software?ts=markdown) * [How to Use SCA in the Development Processes](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#processes?ts=markdown) * [The Benefits of Software Composition Analysis](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#analysis?ts=markdown) Software composition analysis (SCA) provides a deep analysis of open source packages in use by an application. SCA highlights vulnerabilities and licenses in dependencies for risk and compliance assessments, and it can generate a software bill of materials (SBOM) of all resources to share with internal stakeholders and external customers. ## What Is Software Composition Analysis? Software composition analysis safely enables developers to leverage open source packages without exposing organizations to unnecessary vulnerabilities or legal and compliance issues. Open source components have become pervasive in modern software development, with the majority of modern applications' codebases made up of such packages. This method allows developers to move more quickly since they don't need to recreate code that is freely available and vetted by the community. However, this process also comes with its own set of risks. \  ## What Are the Risks of Using Open Source Components? Before building [container images](https://www.paloaltonetworks.com/cyberpedia/what-is-container-security?ts=markdown) with these components, developers need to be aware of security concerns stemming from previously discovered vulnerabilities in the packages. They also need to ensure they are meeting compliance requirements around software use licenses. Community members frequently find and patch vulnerabilities, but the burden is on developers to update their code. When a vulnerability is found, it's only a matter of time before a public exploit is made available, opening the door for even low-level attackers to take advantage of the issue. The problem is exacerbated by the fact that a majority of vulnerabilities in software are not in immediate or root packages but in dependencies of dependencies, multiple layers deep. Fixing just the root packages in use will not always secure the libraries in use. Additionally, there are dozens of open source licenses with a variety of rules. For example, some require attribution while others require the source code for the application that uses the component to also be published. Keeping track of all of the licenses and their rules can be difficult. ## Software Composition Analysis Identifies Risks in Open Source Packages SCA tools identify all open source packages in an application and all the known vulnerabilities of those packages. This knowledge can be used to notify developers of the issues in their code to fix them before they are exploited. A good software composition analysis process will look beyond package managers into [infrastructure as code (IaC)](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security?ts=markdown) and Kubernetes manifests, pulling images to identify vulnerabilities in those images. \*![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/prisma-cloud-what-is-sca-article-image-1-868x488.jpg)\*SCA tools with connections to IaC templates and limitless dependency scanning ensure vulnerabilities don't go undetected or unresolved. Software composition analysis tools can also be used to generate a software bill of materials (SBOM or software BOM) that includes all the open source components used by an application. The SBOM lists details about the package version as well as known vulnerabilities and licenses for each component in use. For example, for Python, the BOM will include all the packages in import statements, such as httplib2, along with the version number, discovered vulnerabilities and licenses for each package. SCA programs should enable [collaboration](https://www.paloaltonetworks.com/cyberpedia/defining-organizational-cloud-security-responsibilities?ts=markdown) among stakeholders such as engineering, DevOps, security and compliance teams. Many organizations will use these programs to create alerts and/or block code from merging into repositories if said code includes open source components that violate the organization's compliance mandates for controlling exposure. Determining an acceptable severity level for vulnerabilities and license types should involve the relevant stakeholders. ## How to Use SCA in the Development Processes A good SCA process is embedded throughout the development process. Starting in local environments, developers need to be able to check their code for vulnerabilities and license compliance as they write it. Leveraging integrated development environments (IDEs) plugins, SCA tools can notify developers about vulnerabilities as they add packages. Before code is committed to a repository, checks and automated pull request comments should inform developers of any issues being introduced and block code that does not meet requirements. This should carry over to deployments where software with predetermined levels of vulnerabilities or types of licenses can be blocked from being deployed. Security teams should also have broad visibility into the posture of the components in their environment. *![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/prisma-cloud-what-is-sca-article-image-2-868x488.jpg) Software composition analysis extends coverage from code to cloud and from infrastructure to application layers to track vulnerabilities throughout the development lifecycle.* In all areas, developers should be informed about risks to which the packages can expose them. Vulnerabilities need to be ranked and prioritized (e.g., using CVE scores and time since the vulnerability was reported) based on criticality and infrastructure impacts (e.g., if the vulnerable package is in a private VPC). Licenses should be grouped by those allowable but that require additional details, such as attribution, and those that are not allowable under organization policies, such as "[copyleft](https://opensource.com/resources/what-is-copyleft)" licenses. ## The Benefits of Software Composition Analysis It is important for teams to be aware of the posture of their application environments. By providing license compliance and vulnerability feedback early and often, software composition analysis helps alleviate some of the risks of using open source components in applications. While 100% patch rates are unlikely, knowing the risk and weighing the cost to fix a vulnerability is part of improving security posture. To learn more about securing modern development processes, check out [What Is DevSecOps?](https://www.paloaltonetworks.com/cyberpedia/what-is-devsecops?ts=markdown) ## Software Composition Analysis FAQs ### What is open-source component identification in SCA? Open-source component identification in SCA involves scanning a software codebase to detect all open-source libraries and frameworks used. This process generates an inventory of components, including their versions and origins. Accurate identification is crucial for assessing security vulnerabilities, license compliance, and potential legal issues. Tools like Snyk and WhiteSource use advanced algorithms and extensive databases to identify components accurately. By understanding the open-source components in use, organizations can manage risks effectively and ensure that their software development practices align with industry standards. ### What is vulnerability detection in SCA? Vulnerability detection in SCA involves scanning open-source components for known security vulnerabilities. SCA tools compare identified components against vulnerability databases such as the National Vulnerability Database (NVD) and proprietary sources. This process highlights security flaws, enabling developers to address them proactively. Vulnerability detection helps prevent exploitation of weaknesses in open-source libraries, reducing the risk of data breaches and cyberattacks. Tools like Black Duck and Snyk provide real-time vulnerability alerts and detailed remediation guidance, enhancing the security posture of software projects. ### What is license compliance in SCA? License compliance in SCA ensures that open-source components used in software projects adhere to legal and regulatory requirements. SCA tools analyze the licenses associated with each component, identifying potential conflicts and obligations. This process helps organizations avoid legal risks and ensure that they comply with open-source license terms. License compliance also involves tracking and managing license obligations, such as attribution and distribution requirements. Tools like WhiteSource and FOSSA provide comprehensive license compliance solutions, enabling organizations to manage open-source usage responsibly and mitigate legal risks. ### What is dependency management in SCA? Dependency management in SCA involves tracking and controlling the third-party libraries and frameworks that a software project relies on. SCA tools identify direct and transitive dependencies, providing insights into their security and compliance status. Effective dependency management ensures that components are up-to-date and free from known vulnerabilities. It also involves automating updates and resolving dependency conflicts. Tools like Snyk and Renovate offer advanced dependency management features, integrating seamlessly into development workflows to enhance software security and maintainability. ### What is risk assessment in SCA? Risk assessment in SCA evaluates the security, legal, and operational risks associated with open-source components. SCA tools analyze component vulnerabilities, license terms, and maintenance status to provide a comprehensive risk profile. This process helps organizations prioritize remediation efforts based on the severity and impact of identified risks. Effective risk assessment enables informed decision-making and proactive risk management. Tools like Black Duck and WhiteSource offer detailed risk assessment reports, empowering development teams to address critical issues and enhance the overall security of their software projects. ### What is remediation in SCA? Remediation in SCA involves addressing identified vulnerabilities and compliance issues in open-source components. SCA tools provide detailed guidance on fixing security flaws, such as upgrading to secure versions or applying patches. Remediation also includes resolving license conflicts and meeting legal obligations. Automated remediation workflows streamline the process, enabling rapid and effective responses to identified risks. Tools like Snyk and WhiteSource offer integrated remediation solutions, helping development teams maintain secure and compliant software while minimizing operational disruption. ### What is continuous monitoring in SCA? Continuous monitoring in SCA involves ongoing scanning and analysis of open-source components to detect new vulnerabilities and compliance issues. SCA tools provide real-time alerts and updates, ensuring that development teams are aware of emerging risks. Continuous monitoring enhances security by enabling proactive risk management and timely remediation. It also supports compliance by tracking changes in license terms and regulatory requirements. Tools like Black Duck and Snyk offer continuous monitoring features, integrating seamlessly into CI/CD pipelines to provide ongoing protection for software projects. ### What is integration with CI/CD in SCA? Integration with CI/CD in SCA involves embedding SCA tools into continuous integration and continuous delivery pipelines. This integration automates the scanning and analysis of open-source components during the development process, ensuring that vulnerabilities and compliance issues are detected early. CI/CD integration enhances software security by incorporating SCA into the development workflow, enabling rapid identification and remediation of risks. Tools like Snyk and WhiteSource provide robust CI/CD integration capabilities, supporting secure and efficient software delivery while maintaining compliance with industry standards. ### What is software bill of materials (SBOM) in SCA? A software bill of materials (SBOM) in SCA is a comprehensive inventory of all open-source components used in a software project, including their versions and dependencies. SBOMs provide detailed insights into the composition of software, enabling effective risk management and compliance. SCA tools generate SBOMs automatically, facilitating transparency and accountability in software development. SBOMs support vulnerability detection, license compliance, and security audits. Tools like Black Duck and WhiteSource offer SBOM generation and management features, empowering organizations to maintain secure and compliant software ecosystems. Related content [ASPM Buyer's Guide Gain a comprehensive framework for evaluating and choosing an ASPM solution that shifts your AppSec strategy from reactive to proactive.](https://start.paloaltonetworks.com/application-security-posture-management-buyers-guide.html) [Accelerate Secure Development with Prevention-First Application Security Posture Management (ASPM) Learn how Cortex Cloud's ASPM centralizes and correlates findings from disparate security scanning tools with complete context across code, application infrastructure, and cloud ru...](https://www.paloaltonetworks.com/resources/datasheets/application-security-posture-management-solution-brief?ts=markdown) [Introducing Cortex Cloud ASPM Cortex Cloud ASPM gives security and engineering teams the control to prevent exploitable risk early and respond with full context across the software lifecycle.](https://www.paloaltonetworks.com/blog/cloud-security/introducing-aspm-cortex-cloud/) [AppSec's New Horizon Join this virtual event to get a practical, prevention-first blueprint --- backed by new Unit 42 research --- to modernize your AppSec strategy.](https://start.paloaltonetworks.com/appsecs-new-horizon-virtual-event.html) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Software%20Composition%20Analysis%20%28SCA%29%3F&body=Explore%20how%20software%20composition%20analysis%20%28SCA%29%20enables%20developers%20to%20leverage%20open%20source%20packages%20without%20exposure%20to%20vulnerabilities%2C%20legal%20and%20compliance%20issues.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-sca) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security?ts=markdown) What Is Code Security? [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security?ts=markdown) What is Infrastructure-as-Code Security {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language