[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [Cloud Native](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native?ts=markdown) 4. [What Is Serverless Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-serverless-security?ts=markdown) Table of contents * [What Is Cloud Native?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native?ts=markdown) * [Cloud Native Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#explained?ts=markdown) * [History of Cloud Native](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#history?ts=markdown) * [What Are Cloud-Native Applications?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#applications?ts=markdown) * [What Is Cloud-Native Architecture?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#architecture?ts=markdown) * [What Is Cloud-Native Application Development?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#development?ts=markdown) * [Benefits of Cloud-Native Application Development](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#benefits?ts=markdown) * [What Is a Cloud-Native Stack?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#stack?ts=markdown) * [Cloud-Native Security Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#challenges?ts=markdown) * [Cloud-Native FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#faqs?ts=markdown) * [What Is Threat Modeling?](https://www.paloaltonetworks.com/cyberpedia/threat-modeling?ts=markdown) * [Threat Modeling Explained](https://www.paloaltonetworks.com/cyberpedia/threat-modeling#threat?ts=markdown) * [Threat Modeling Frameworks](https://www.paloaltonetworks.com/cyberpedia/threat-modeling#frameworks?ts=markdown) * [Threat Modeling: Four Question Framework](https://www.paloaltonetworks.com/cyberpedia/threat-modeling#modeling?ts=markdown) * [Benefits of Threat Modeling in Modern Enterprise Security](https://www.paloaltonetworks.com/cyberpedia/threat-modeling#benefits?ts=markdown) * [Threat Modeling Tools](https://www.paloaltonetworks.com/cyberpedia/threat-modeling#tools?ts=markdown) * [Threat Modeling FAQs](https://www.paloaltonetworks.com/cyberpedia/threat-modeling#faqs?ts=markdown) * [What Are Microservices?](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices?ts=markdown) * [Microservices Explained](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#explained?ts=markdown) * [From Service-Oriented Architecture to Microservices](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#service?ts=markdown) * [Benefits of Microservices](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#benefits?ts=markdown) * [When to Use Microservices](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#when?ts=markdown) * [Building and Deploying Microservices-Based Apps](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#deploying?ts=markdown) * [Microservices Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#best?ts=markdown) * [Adopting Microservices](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#adopting?ts=markdown) * [Securing Microservices](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#securing?ts=markdown) * [Microservices FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#faqs?ts=markdown) * [What Is Cloud-Native Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security?ts=markdown) * [Cloud-Native Security Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#explained?ts=markdown) * [Cloud Native Goes Beyond Fixed Perimeters](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#perimeters?ts=markdown) * [Diagnostic Difficulties](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#diagnostic?ts=markdown) * [Accelerating DevOps Velocity](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#velocity?ts=markdown) * [Key Elements of Cloud-Native Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#key?ts=markdown) * [Cloud Native-Security Strategies](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#strategies?ts=markdown) * [Cloud-Native Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#faqs?ts=markdown) * [What Is CNAPP?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform?ts=markdown) * [CNAPP Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#cnapp?ts=markdown) * [Key Components of a CNAPP](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#key?ts=markdown) * [CNAPP Architecture and Functionality](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#architecture?ts=markdown) * [CNAPP Implementation Strategies](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#implementation?ts=markdown) * [CNAPP Benefits](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#benefits?ts=markdown) * [The AI-Enhanced CNAPP](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#enhanced?ts=markdown) * [What's Next for CNAPP?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#next?ts=markdown) * [Cloud-Native Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#faqs?ts=markdown) * [What Is CSPM? | Cloud Security Posture Management Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management?ts=markdown) * [Cloud Security Posture Management Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management#cloud?ts=markdown) * [Why Is CSPM Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management#why?ts=markdown) * [How Does CSPM Work?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management#how?ts=markdown) * [The Evolution of CSPM](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management#the?ts=markdown) * [What Are Researchers Saying About CSPM?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management#what?ts=markdown) * [What Are the Benefits of CSPM?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management#benefits?ts=markdown) * [Cloud Security Posture Management (CSPM) FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management#faqs?ts=markdown) * [What Is Cloud Network Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-network-security?ts=markdown) * [Cloud Network Security Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-network-security#network-security?ts=markdown) * [Cloud Network Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-network-security#cns?ts=markdown) * [Kubernetes Network Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-network-security#kns?ts=markdown) * [Kubernetes Control Plane Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-network-security#control-plane-security?ts=markdown) * [Network Security Best Practices for Containers and Kubernetes](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-network-security#best-practice?ts=markdown) * [Cloud Network Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-network-security#faq?ts=markdown) * [CSP-Built Security Vs. Cloud-Agnostic Security](https://www.paloaltonetworks.com/cyberpedia/cloud-native-security-vs-3rd-party-security?ts=markdown) * [Cloud Security: The Technology Decision](https://www.paloaltonetworks.com/cyberpedia/cloud-native-security-vs-3rd-party-security#cloud?ts=markdown) * [Feature Set and Capabilities](https://www.paloaltonetworks.com/cyberpedia/cloud-native-security-vs-3rd-party-security#feature?ts=markdown) * [The Multicloud Challenge](https://www.paloaltonetworks.com/cyberpedia/cloud-native-security-vs-3rd-party-security#challenge?ts=markdown) * [Real-World Applications](https://www.paloaltonetworks.com/cyberpedia/cloud-native-security-vs-3rd-party-security#realworld?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/cyberpedia/cloud-native-security-vs-3rd-party-security#prisma-cloud?ts=markdown) * [Cloud-Native Security FAQs](https://www.paloaltonetworks.com/cyberpedia/cloud-native-security-vs-3rd-party-security#faqs?ts=markdown) * [What Is Microsegmentation?](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation?ts=markdown) * [Microsegmentation Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#micro?ts=markdown) * [Beyond Perimeter Security](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#beyond?ts=markdown) * [Network Segmentation Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#network?ts=markdown) * [How Microsegmentation Works](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#how?ts=markdown) * [Types of Microsegmentation](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#types?ts=markdown) * [Benefits of Microsegmentation](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#benefits?ts=markdown) * [Microsegmentation Use Cases](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#usecases?ts=markdown) * [Microsegmentation FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#faqs?ts=markdown) * [Core Tenets of a Cloud Native Security Platform (CNSP)](https://www.paloaltonetworks.com/cyberpedia/core-tenets-of-a-cloud-native-security-platform?ts=markdown) * [What Is a Cloud Native Security Platform?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-security-platform?ts=markdown) * [What Does 'Cloud Native' Mean?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-security-platform#what?ts=markdown) * [The Beginnings of Cloud Native Security](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-security-platform#beginning?ts=markdown) * [Enter Cloud Native Security Platforms](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-security-platform#enter?ts=markdown) * [CNSPs and the Future](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-security-platform#cnsp?ts=markdown) * [Cloud Native Security Platform FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-security-platform#faqs?ts=markdown) * [CSPM Tools: How to Evaluate and Select the Best Option](https://www.paloaltonetworks.com/cyberpedia/cspm-tools?ts=markdown) * [The Need for Cloud Security Posture Management Solutions](https://www.paloaltonetworks.com/cyberpedia/cspm-tools#need?ts=markdown) * [Components of CSPM Tools](https://www.paloaltonetworks.com/cyberpedia/cspm-tools#components?ts=markdown) * [How to Select the Right CSPM Solution](https://www.paloaltonetworks.com/cyberpedia/cspm-tools#how?ts=markdown) * [Common Challenges in Implementing CSPM](https://www.paloaltonetworks.com/cyberpedia/cspm-tools#common?ts=markdown) * [Cloud Security Posture Management (CSPM) FAQs](https://www.paloaltonetworks.com/cyberpedia/cspm-tools#faqs?ts=markdown) * [What is Platform as a Service (PaaS)?](https://www.paloaltonetworks.com/cyberpedia/platform-as-a-service-paas?ts=markdown) * [Benefits and Security Implications](https://www.paloaltonetworks.com/cyberpedia/platform-as-a-service-paas#benefits?ts=markdown) * [Platform as a Service FAQs](https://www.paloaltonetworks.com/cyberpedia/platform-as-a-service-paas#faqs?ts=markdown) * What Is Serverless Security? # What Is Serverless Security? 5 min. read [Download The CNAPP Buyer's Guide](https://start.paloaltonetworks.com/cnapp-buyers-guide.html) Serverless refers to a cloud-native development model in cloud computing that allows developers to build and run applications and services without needing to manage infrastructure, or server-side IT. Applications in the serverless model rely on a combination of managed cloud services and functions as a service (FaaS) that abstract away the need to manage, patch, and secure infrastructure and virtual machines. ### Benefits of Serverless Architecture By 2020, [40% of organizations said they had fully adopted serverless architecture](https://www.oreilly.com/radar/oreilly-serverless-survey-2019-concerns-what-works-and-what-to-expect/), according to O'Reilly. In the years since, serverless has become a dominant application execution environment. The [State of Cloud Native Security Report 2023](https://www.paloaltonetworks.com/state-of-cloud-native-security?ts=markdown) shows further growth on the horizon, as 70% of survey respondents reported planned use increases in the next 24 months. Adopting a serverless model benefits application development in several ways: * **Reduced operational overhead:** With no servers to manage, developers and DevOps don't need to worry about scaling infrastructure, installing and maintaining agents, or other infrastructure-related operations. * **Increased agility:** Since serverless applications rely heavily on managed services for things like databases and authentication, developers are free to focus on the actual business logic of the application, which will typically run on a FaaS, such as AWS^®^ Lambda or Google Cloud Functions. * **Reduced costs:** With most services used in serverless applications, the customer only pays for usage. For example, with AWS Lambda, customers pay for the executions of their functions. This typically has a significant impact on cost, as they don't have to pay for unused capacity like they would with virtual machines. ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-serverless-security-components.jpg) *Figure 1: Components of the severless model* ## Serverless Applications Require Serverless Security With every major advancement in software development and IT operations comes a shift in attack vectors and security risks. In the early days of virtualization to [containers](https://www.paloaltonetworks.com/cyberpedia/what-is-a-container?ts=markdown), security professionals had to adapt and find new ways of hardening, defending and governing their infrastructure. The concept of a serverless application presents one of the biggest paradigm shifts ever seen when it comes to application security. Traditionally, organizations would protect their applications by relying on infrastructure and network-based tools. They would inspect traffic with a firewall, try to detect malicious activity with an intrusion detection system, or protect applications with runtime application self-protection, or RASP, technology. Even with containers, organizations could still rely on the security of the underlying infrastructure to a certain degree. A serverless application consists of distributed cloud services working together, such as an S3 bucket that triggers a Lambda Function, which in turn triggers DynamoDB®. In this architecture, there's no room for firewalls, IDS/IPS tools, or any kind of instrumentation agents or server-based protection methods. Instead of focusing on network inspection and access control lists, the serverless model shifts the focus of security to IAM permissions, behavioral protection and [strong code](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security?ts=markdown). ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/serverless-2.png) *Figure 2: Application in severless model* ## Serverless Attack Vectors Adopting serverless security gives applications a strong headstart from a security perspective since organizations no longer have to worry about infrastructure, network or host security. However, new attack vectors have emerged, and familiar attacks have been reimagined for serverless environments. Let's take a look at one example (for the full list, refer to the Cloud Security Alliance's [Top 12 Risks for Serverless Applications](https://cloudsecurityalliance.org/blog/2019/02/11/critical-risks-serverless-applications/)): ### Event Data Injection Injection flaws in applications, among the most common risks to date, have been thoroughly covered in many secure coding best practice guides. At a high level, injection flaws occur when untrusted input is passed directly to an interpreter before being executed or evaluated. In the context of serverless architecture, though, function event-data injections are not strictly limited to direct user input (such as input from a [web API call](https://www.paloaltonetworks.com/cyberpedia/what-is-api-security?ts=markdown)). Most serverless architectures provide a multitude of event sources that can trigger the execution of a serverless function. Event data injection source examples include: * Cloud storage events (e.g., AWS S3^®^, Azure Blob Storage, Google Cloud Storage) * NoSQL database events (e.g., AWS DynamoDB, Azure Cosmos DB^®^) * SQL database events * Stream processing events (e.g., Amazon Kinesis^®^) * Code changes and new repository code commits * HTTP API calls Each event input might include different message formats, and various parts of these event messages can contain attacker-controlled or otherwise dangerous inputs. The rich set of event sources increases the potential attack surface and introduces complexities when attempting to protect serverless functions against event-data injections. This is especially true because serverless architectures aren't as well understood as web environments where developers know which message parts shouldn't be trusted (e.g., GET/POST parameters, HTTP headers, etc.). ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/serverless-1.png) *Figure 3: Event data injection attack surface* ## Protecting Serverless Applications Effective serverless security focuses on ensuring code integrity, tight permissions and behavioral analysis. * **Access and permissions:** Maintain [least-privileged access](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access?ts=markdown) for serverless functions and other services. For example, if an AWS Lambda function needs to access a DynamoDB table, make sure it can only perform the specific action the business logic requires. * **Vulnerability scanning:** Ensure code and [infrastructure-as-code template integrity](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-software-supply-chain-security?ts=markdown) by regularly scanning for vulnerable third-party dependencies, configuration errors, and over-permissive roles. * **Runtime protection:** Use runtime protection to detect malicious event inputs and anomalous function behavior, and limit as necessary each function's ability to access files, hosts, the internet and spawn child processes. ## Serverless FAQs **Q: What is serverless computing?** A: Serverless computing, also known as serverless architecture, is an approach to software design that allows engineers to build and run applications without having to manage the underlying infrastructure. Instead, cloud providers provision servers to run applications, databases, and storage systems for digital or cloud-native organizations. **Q: What is function as a service (FaaS)?** A: Function-as-a-Service, is a cloud-computing service that allows customers to execute code in response to events, without managing the complex... **Q: What is serverless architecture?** A: Serverless architecture is a FaaS that involves developers writing application code as sets of unique functions designed to perform specific tasks in response to HTTP requests or similar events. Once functions are deployed to the cloud provider account, the cloud provider executes the function on a server provided by the cloud provider. **Q: What are examples of serverless computing services?** A: Examples of serverless services offered by cloud providers include Google Cloud Functions, AWS Lambda, and Microsoft Azure Functions. Related content [10 Most Critical Security Risks in Serverless Architectures Organizations exploring serverless architectures will find this comprehensive guide critical for success in building robust, secure and reliable applications.](https://www.paloaltonetworks.com/resources/whitepapers/10-most-critical-security-risks-in-serverless-architectures-guide?ts=markdown) [Serverless Functions Compliance Checks In AWS Lambda, every function has an identity with permission policies that control what functions it can do in AWS. When Prisma Cloud scans the functions in your environment, it i...](https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/compliance/serverless) [Securing Your Serverless Journey In this video presentation, Securing Your Serverless Journey, we discuss the most critical challenges related to securing serverless applications - from development to deployment.](https://www.paloaltonetworks.com/resources/webcasts/securing-your-serverless-journey?ts=markdown) [Experience Prisma Cloud's Serverless Security Functions Serverless functions are event-driven code snippets running on managed infrastructure. While this allows developers to focus on the code, these applications remain vulnerable to at...](https://www.paloaltonetworks.com/prisma/cloud/serverless-security?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Serverless%20Security%3F&body=Discover%20how%20serverless%20computing%20streamlines%20application%20development%20by%20eliminating%20infrastructure%20management%2C%20enabling%20efficient%20scaling%20and%20deployment.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-serverless-security) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/platform-as-a-service-paas?ts=markdown) What is Platform as a Service (PaaS)? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language