[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Network Security](https://www.paloaltonetworks.com/cyberpedia/network-security?ts=markdown) 3. [What Is SoftEther (Software Ethernet)?](https://www.paloaltonetworks.com/cyberpedia/what-is-softether?ts=markdown) Table of Contents * [How Does the SoftEther VPN Protocol Work?](#softEther-vpn) * [What Is a SoftEther VPN?](#softEther) * [SoftEther VPN Architecture](#architecture) * [How Secure Is the SoftEther VPN Protocol?](#protocol) * [Pros and Cons of SoftEther](#pros-and-cons) * [How to Use SoftEther VPN](#how) * [Comparing SoftEther with Other Protocols](#comparing) * [The History of SoftEther](#history) * [Does SoftEther Work In Enterprise Environments?](#environments) * [SoftEther FAQs](#faq) # What Is SoftEther (Software Ethernet)? 5 min. read Table of Contents * [How Does the SoftEther VPN Protocol Work?](#softEther-vpn) * [What Is a SoftEther VPN?](#softEther) * [SoftEther VPN Architecture](#architecture) * [How Secure Is the SoftEther VPN Protocol?](#protocol) * [Pros and Cons of SoftEther](#pros-and-cons) * [How to Use SoftEther VPN](#how) * [Comparing SoftEther with Other Protocols](#comparing) * [The History of SoftEther](#history) * [Does SoftEther Work In Enterprise Environments?](#environments) * [SoftEther FAQs](#faq) 1. How Does the SoftEther VPN Protocol Work? * [1. How Does the SoftEther VPN Protocol Work?](#softEther-vpn) * [2. What Is a SoftEther VPN?](#softEther) * [3. SoftEther VPN Architecture](#architecture) * [4. How Secure Is the SoftEther VPN Protocol?](#protocol) * [5. Pros and Cons of SoftEther](#pros-and-cons) * [6. How to Use SoftEther VPN](#how) * [7. Comparing SoftEther with Other Protocols](#comparing) * [8. The History of SoftEther](#history) * [9. Does SoftEther Work In Enterprise Environments?](#environments) * [10. SoftEther FAQs](#faq) SoftEther (Software Ethernet) is an open source VPN protocol that provides advanced encryption and secure communication channels for data transfer. The SoftEther protocol ensures data integrity and confidentiality through strong encryption standards. Designed for speed and efficiency, it offers rapid data transmission and management ease. SoftEther's user friendly interface and support for multiple VPN protocols facilitate integration into diverse environments. ## How Does the SoftEther VPN Protocol Work? ![Flowchart of SoftEther VPN highlighting secure VPN sessions, blocked malicious attacker, and various authentication methods.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/soft-either.png "Flowchart of SoftEther VPN highlighting secure VPN sessions, blocked malicious attacker, and various authentication methods.") SoftEther VPN is a comprehensive VPN framework. It provides robust, secure client-to-server communications while facilitating rapid data transmission via its unique protocol. The multifaceted system incorporates both the SoftEther VPN Protocol, which ensures encrypted connections, and the SoftEther VPN Server, which supports a variety of VPN protocols. The protocol establishes secure client-to-server links, ensuring data integrity and confidentiality through advanced encryption. The VPN Server acts as a versatile gateway, permitting the use of multiple protocols like IPSec and L2TP, which offers flexibility and broad compatibility. A connection through SoftEther begins with a handshake between the SoftEther client and server, leading to authentication and the formation of an encrypted tunnel. The tunnel is the conduit for data. Encapsulation and AES-256 encryption protect the data from unauthorized access, while RSA-4096 bit keys prevent decryption, making VPN communications impenetrable to intrusions. The protocol offers distinct security features, including deep packet inspection, dynamic DNS, and NAT traversal capabilities. These elements ward off threats like Man-in-the-Middle attacks. The implementation of dual-stack IPv4/IPv6 ensures future proofing and compliance with evolving internet protocols. Ease of management is another critical aspect of the protocol. SoftEther provides a user friendly GUI for VPN Server and Bridge management. This simplifies the setup and administration of VPN connections for network administrators. A command line utility is also available, offering precise control for advanced users. The SoftEther VPN Client supports a wide array of operating systems. The client is equipped with features like internet connection maintenance and voice guidance, making it accessible to users with varying levels of technical proficiency. SoftEther's interoperability is notable. It supports connections from a range of devices and can integrate with other VPN technologies, ensuring a cohesive and secure network environment. ## What Is a SoftEther VPN? ![SoftEther VPN Server compatibility with various protocols like SSL VPN, L2TP/IPsec VPN, and devices across different OS platforms.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/softether-vpn.png "SoftEther VPN Server compatibility with various protocols like SSL VPN, L2TP/IPsec VPN, and devices across different OS platforms.") SoftEther VPN stands as a distinct, multifaceted VPN solution. ### How Does SoftEther VPN Work? Unlike the SoftEther protocol that underpins it, SoftEther VPN encompasses a complete VPN server and client software package, facilitating secure, flexible, and scalable networking solutions. It enables the deployment of both site-to-site and remote access VPNs with a variety of protocols such as SSL-VPN, L2TP/IPsec, and more, providing a versatile platform for secure communications and remote network management. As an integrated VPN suite, SoftEther VPN is lauded for its ability to traverse complex network barriers while maintaining high throughput and stability. *[What Is a VPN](https://www.paloaltonetworks.com/cyberpedia/what-is-a-vpn?ts=markdown)?* ## SoftEther VPN Architecture SoftEther VPN's architecture is distinct from traditional IPsec-based VPN systems, offering unique functionalities suited for enterprise networking. It uses software defined components including Virtual Hubs, which act as virtual ethernet switches. These virtual ethernet switches create isolated communication segments within a single VPN server. This contrasts with the fixed hardware dependency of traditional VPN systems, allowing separated traffic lanes for different user groups. Each Virtual Hub maintains its forwarding database like a traditional ethernet switch, but it does so through software. The software based approach extends to Virtual Network Adapters and Virtual Layer-3 Switches, which emulate hardware devices and provide advanced routing capabilities, respectively. These virtual components support a flexible, modular network design. In a Software Ethernet environment, network administrators can establish cascade connections between Virtual Hubs to seamlessly bridge separate network segments. This is a capability not typically found in IPsec systems. SoftEther's Local Bridge feature can connect these virtual segments to physical network interfaces, facilitating both site-to-site and remote access VPN configurations in a unified network topology. SoftEther's architecture is transparent to firewalls, proxies, and NATs, achieved through SSL VPN tunneling and NAT Traversal. This allows SoftEther VPNs to establish secure tunnels over HTTPS, usually using TCP/IP port 443. TCP/IP Port 443 is less likely to be blocked by firewalls because of its association with secure web traffic. SoftEther's advanced transmission mechanisms allow for multiple parallel SSL VPN tunnels, optimizing performance across slow or congested networks. Software Ether's ability to transmit VPN packets over ICMP or DNS can be beneficial for networks with stringent restrictions because it can facilitate VPN connections where traditional TCP or UDP packets are filtered. This versatility is exemplified by the SoftEther VPN Gate initiative, which uses SoftEther's architecture to provide a worldwide relay of VPN servers. ## How Secure Is the SoftEther VPN Protocol? The SoftEther VPN protocol is known for strong security measures. It utilizes OpenSSL, an open source library for SSL and TLS protocols. This ensures the encryption, decryption, and authentication processes are of a high standard. The protocol's ability to support an extensive range of encryption ciphers, including AES, RC4, DES, Triple-DES, SHA, and MDS, provides a solid foundation for safeguarding data. SoftEther security is reflected in its diverse user authentication methods. These methods can enhance security by ensuring only authorized users can access the network. The protocol offers packet filtering and security policy options, instrumental in defending against harmful traffic and network assaults. These features collectively fortify the network's defense against sophisticated cyber threats. The architecture of the SoftEther VPN protocol is designed to preempt security vulnerabilities. A comprehensive security audit conducted in the past highlighted potential weaknesses, but subsequent updates and patches have addressed these issues. The protocol's inherent design prevents unauthorized data interception and tampering, maintaining the integrity of the data in transit. ## Pros and Cons of SoftEther ![SoftEther pros (multi-protocol, open source, encryption, low latency, bypasses FWs) \& cons (complex, ltd. support, needs 3rd pty. software)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/softether-pros-and-cons.png "SoftEther pros (multi-protocol, open source, encryption, low latency, bypasses FWs) & cons (complex, ltd. support, needs 3rd pty. software)") SoftEther offers a high degree of control and security but demands a level of technical acumen and resources to deploy and manage effectively. The protocol can be an effective VPN solution for organizations with very specific use cases, but for those seeking simplicity and broad support, other protocols may be more suitable. ### Advantages of SoftEther SoftEther is multi-protocol VPN software, so it can be a robust tool. Its open source nature allows for security vetting and enhancements by a global community of developers. This transparency is viewed by some as an advantage because it allows users to audit the open source software for potential vulnerabilities. It's important to note that closed source proprietary VPN solutions are not consequently comparatively less secure. Software Ethernet ensures data in transit remains secure from eavesdropping and unauthorized access through its support for strong encryption standards, including AES-256. Adherence to high encryption benchmarks can potentially fulfill strict data security policies mandated within corporate environments. The protocol's performance is another advantage. Designed for speed, Software Ethernet minimizes latency and maximizes throughput, making it ideal for bandwidth intensive tasks. The open source software's ability to bypass firewall restrictions without detection allows for seamless remote access. ### Disadvantages of SoftEther The Software Ethernet protocol is not without its challenges. The setup and management of a SoftEther VPN can be complex, potentially requiring a steep learning curve. Unlike more widely adopted VPN solutions, it may lack the immediate support and documentation found with other protocols, leading to longer implementation times. Another limitation is the reliance on third party applications for client software. Reliance on third party applications for client software may introduce additional points of failure or security concerns. Software Ethernet is not widely supported by commercial VPN service providers, so enterprises may find themselves with fewer options for quick deployment. ## How to Use SoftEther VPN ![SoftEther VPN setup: Download software, install, config, create virtual network adapter, establish connection, test, and maintain.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/how-to-use-softether-vpn.png "SoftEther VPN setup: Download software, install, config, create virtual network adapter, establish connection, test, and maintain.") SoftEther VPN is both free and open source, so it may be an option for organizations looking to deploy their own VPN servers. Despite not being widely available in many enterprise VPN solutions, it can be set up manually since it is open source. When opting for a DIY VPN server using Software Ethernet, it is important to have the necessary technical expertise to ensure the VPN is configured securely and integrates with company network policies and infrastructure. Here is a general guide on how to use SoftEther VPN: ### 1. Download the Software Begin by downloading the SoftEther VPN Server software. It is compatible with a variety of operating systems, so choose the version that matches your server's OS. ### 2. Installation Install the VPN server software on your designated machine. The installation process might require familiarity with command line operations, especially if you are using a Linux based server. ### 3. Configuration Once installed, configure the VPN server. Software Ethernet provides a management console that can be accessed via a web interface or command line. This console allows you to create virtual hubs, manage user authentication, and set up encryption and VPN connection settings. ### 4. Create a Virtual Network Adapter For client machines that will connect to the VPN, install the SoftEther VPN Client and create a virtual network adapter. This will be used to interface with the VPN server. ### 5. Establish a Connection With the server configured and the client installed, you can establish a connection. Input the server's address, decide on the encryption and authentication method, and if needed, input the required credentials. ### 6. Testing After setting up the server and clients, test the connection for stability and security. Ensure the VPN tunnel is operational and data is being encrypted and transmitted securely. ### 7. Maintenance Regularly update software and monitor the server for any unusual activities. Keeping the software updated is crucial for security and performance. ## Comparing SoftEther with Other Protocols ### IKEv2 | SoftEther IKEv2 is stable, especially when switching networks. Stability makes it potentially useful for mobile users. IKEv2 quickly re-establishes a VPN connection without user intervention. Software Ethernet is not as seamless on mobile devices, but it provides a comparable level of security with more flexibility in configuration. It outshines IKEv2 with the ability to bypass strict firewalls using SSL VPN tunneling through HTTPS. ### L2TP | SoftEther L2TP is commonly paired with IPsec for added security, offering decent encryption. However, it is susceptible to firewall blocking and can be slower because of double encapsulation. SoftEther offers a more robust security posture with higher speeds and firewall traversal capabilities. Its adept use of AES-256 encryption and RSA-4096 bit keys positions it as a more secure alternative to L2TP/IPsec. ### PPTP | SoftEther PPTP is one of the oldest VPN protocols, known for speed but not security since it uses outdated encryption. Software Ethernet provides modern encryption techniques, making it more secure than PPTP. ### IPsec | SoftEther IPsec is a reliable choice for creating secure VPN tunnels, but it can be complex to set up and manage. SoftEther provides a similar level of security with a more user friendly approach. Software Ethernet's architecture allows for higher throughput and better performance than traditional IPsec. ### SSTP | SoftEther SSTP, primarily used on Windows, offers strong security but is limited by its OS dependency. SoftEther transcends this limitation with multi-platform support and matches SSTP in terms of security. SoftEther's performance and ability to traverse firewalls give it an edge over SSTP for users seeking flexibility and robust security. ### WireGuard | SoftEther WireGuard is a newer option in the VPN protocol arena, offering a lightweight design and high speed connections. WireGuard provides strong security and ease of use, but it is still not as widely adopted as other protocols. Software Ethernet competes with WireGuard on speed and surpasses it in terms of security features, protocol flexibility, and legacy system support. ## The History of SoftEther SoftEther began as an academic endeavor and developed into an open source networking tool. Its story started in the University of Tsukuba, Japan, where it was initially created as a master's thesis research project in 2004. The SoftEther VPN project aimed to create a VPN solution that was both flexible and powerful, capable of traversing firewalls with ease. As a protocol that supports SSL VPN, NAT traversal, and many other VPN technologies, Software Ethernet was designed to provide a versatile, secure VPN architecture. It was officially released to the public in 2014 after a decade of rigorous development and refinement. A growing community values the protocol's open source nature, allowing for continuous improvement and peer review. ## Does SoftEther Work In Enterprise Environments? SoftEther is theoretically usable in enterprise settings. However, whether enterprise VPN solution providers allow for integration with the protocol may vary. All vendors offer proprietary VPN solutions which are typically designed to integrate with their own security ecosystems. Businesses often choose such providers for a comprehensive security solution that includes VPN services. While Software Ethernet could technically be used in an enterprise environment, its integration depends on the IT infrastructure, security requirements, and whether the organization's VPN strategy allows for the use of open source software. A company would be more likely to use SoftEther for specific use cases where its features are especially beneficial, like creating an ad-hoc VPN bridge or connecting remote sites with specific needs. However, for unified threat management, policy enforcement, and global network coverage, enterprises may prefer the solutions offered by established VPN providers, which are backed by professional support and service level agreements (SLAs). While the protocol provides interesting VPN capabilities, it should be noted that the vast majority of enterprise environments require additional features like advanced threat protection, monitoring, and seamless integration with existing network infrastructure. These features are provided by solutions like enterprise VPN platforms, SASE, SD-WAN, and ZTNA products. ## SoftEther FAQs ### What is SoftEther used for? SoftEther is used to establish secure, remote access or site-to-site connections in a client-server configuration. Its design allows for flexible deployment across various network environments. ### Is SoftEther VPN safe? SoftEther is considered a safe VPN option, offering strong encryption, robust security features, and extensive protocol support. However, it is important to note that no VPN protocol can guarantee 100% security, as vulnerabilities may be discovered over time and the landscape of cyber threats continually evolves. ### What is the difference between VPN gate and SoftEther? VPN Gate is a public VPN relay service that uses SoftEther to create a network of volunteer-operated servers. Software Ethernet is the underlying VPN software enabling this service. ### Is SoftEther VPN free? Yes, SoftEther VPN is free. It is an open source, cross platform VPN solution that allows users to create secure connections over the internet. ### Is SoftEther VPN good? SoftEther VPN is considered to be a robust, efficient VPN solution. It offers a range of features such as strong encryption, high throughput, and support for multiple VPN protocols. However, "good" can be subjective and dependent on specific needs and contexts. ### What type of VPN is SoftEther? SoftEther is a multi-protocol VPN software that supports SSL-VPN, L2TP/IPsec, OpenVPN, and Microsoft SSTP, allowing for versatile VPN deployments. ### What is the difference between SoftEther VPN server and OpenVPN? The main difference between SoftEther VPN server and OpenVPN lies in their protocol design. Software Ethernet offers a multi-protocol, high-performance server that also supports OpenVPN, whereas OpenVPN server is dedicated to its protocol. ### What is the best port number for SoftEther? SoftEther VPN operates across multiple ports to accommodate its range of functions and protocols. It uses TCP Port 443, commonly associated with secure web traffic, alongside UDP Port 500 and UDP Port 4500, typically used for VPN connections. Additionally, it employs TCP Port 5555 for management purposes and UDP Port 1194, which is standard for VPN traffic. ### How many TCP connections does SoftEther VPN have? SoftEther VPN can establish up to 4096 simultaneous TCP connections, offering scalability for various network needs. Related Content [VPN Alternatives for Remote Access VPN alternatives for secure remote access, sometimes referred to as VPN replacements, are methods other than traditional virtual private networks (VPNs) employed to ensure secure c...](https://www.paloaltonetworks.com/cyberpedia/vpn-alternatives-for-remote-access?ts=markdown) \[GlobalProtect GlobalProtect is more than a VPN. It provides flexible, secure remote access for all users everywhere.\](https://www.paloaltonetworks.com/sase/globalprotect ?ts=markdown) [Accelerating Digital Transformation with SASE SASE breaks down barriers and streamlines processes, empowering organizations to securely accelerate their digital transformations.](https://www.paloaltonetworks.com/resources/ebooks/accelerating-digital-transformation-with-sase?ts=markdown) \[SASE CIO eBook: Driving the future of work through enterprise-wide SASE A CIO'S Guide to Planning and Implementation\](https://www.paloaltonetworks.com/resources/ebooks/sase-cio-ebook-driving-the-future-of-work-through-enterprise-wide-sase ?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20SoftEther%20%28Software%20Ethernet%29%3F&body=SoftEther%20%28Software%20Ethernet%29%20is%20an%20open%20source%20VPN%20protocol%20that%20provides%20advanced%20encryption%20and%20secure%20communication%20channels%20for%20data%20transfer.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-softether) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language