[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [SD-WAN Infrastructure \& Appliances](https://www.paloaltonetworks.com/cyberpedia/what-is-wan-optimization-wan-acceleration?ts=markdown) 4. [What Is WAN Optimization? \[+ How It Works \& Modern Role\]](https://www.paloaltonetworks.com/cyberpedia/what-is-wan-optimization-wan-acceleration?ts=markdown) Table of contents * [Why does WAN optimization exist in the first place?](#why-does-wan-optimization-exist-in-the-first-place) * [How does WAN optimization actually work?](#how-does-wan-optimization-actually-work) * [Does WAN optimization still work on encrypted traffic?](#does-wan-optimization-still-work-on-encrypted-traffic) * [Where does WAN optimization live in modern architectures?](#where-does-wan-optimization-live-in-modern-architectures) * [What are the benefits of WAN optimization today?](#what-are-the-benefits-of-wan-optimization-today) * [What are the limitations of WAN optimization?](#what-are-the-limitations-of-wan-optimization) * [How does WAN optimization differ from SD-WAN and application acceleration?](#how-does-wan-optimization-differ-from-sd-wan-and-application-acceleration) * [WAN optimizations FAQs](#wan-optimization-faqs) # What Is WAN Optimization? \[+ How It Works \& Modern Role\] 4 min. read Table of contents * [Why does WAN optimization exist in the first place?](#why-does-wan-optimization-exist-in-the-first-place) * [How does WAN optimization actually work?](#how-does-wan-optimization-actually-work) * [Does WAN optimization still work on encrypted traffic?](#does-wan-optimization-still-work-on-encrypted-traffic) * [Where does WAN optimization live in modern architectures?](#where-does-wan-optimization-live-in-modern-architectures) * [What are the benefits of WAN optimization today?](#what-are-the-benefits-of-wan-optimization-today) * [What are the limitations of WAN optimization?](#what-are-the-limitations-of-wan-optimization) * [How does WAN optimization differ from SD-WAN and application acceleration?](#how-does-wan-optimization-differ-from-sd-wan-and-application-acceleration) * [WAN optimizations FAQs](#wan-optimization-faqs) 1. Why does WAN optimization exist in the first place? * [1. Why does WAN optimization exist in the first place?](#why-does-wan-optimization-exist-in-the-first-place) * [2. How does WAN optimization actually work?](#how-does-wan-optimization-actually-work) * [3. Does WAN optimization still work on encrypted traffic?](#does-wan-optimization-still-work-on-encrypted-traffic) * [4. Where does WAN optimization live in modern architectures?](#where-does-wan-optimization-live-in-modern-architectures) * [5. What are the benefits of WAN optimization today?](#what-are-the-benefits-of-wan-optimization-today) * [6. What are the limitations of WAN optimization?](#what-are-the-limitations-of-wan-optimization) * [7. How does WAN optimization differ from SD-WAN and application acceleration?](#how-does-wan-optimization-differ-from-sd-wan-and-application-acceleration) * [8. WAN optimizations FAQs](#wan-optimization-faqs) ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/wan-optimization.jpg) close WAN optimization is the process of improving how efficiently data travels across wide area networks by reducing latency, loss, and congestion. It uses techniques such as compression, traffic shaping, and error correction to make network paths behave more predictably. Today, these functions are built into SD-WAN and SASE data planes, where they enhance transport performance for cloud, SaaS, and hybrid environments. ## Why does WAN optimization exist in the first place? Wide area networks weren't designed for the kind of traffic they carry today. In the early days, data had to move between fixed sites---[data centers](https://www.paloaltonetworks.com/cyberpedia/what-is-a-data-center), branch offices, and remote users. That distance introduced delay. Each transaction required multiple acknowledgments between sender and receiver, a behavior built into TCP. And those "chatty" sessions meant high latency, slow applications, and wasted bandwidth over long links. The performance issues weren't just about distance. They were built into the protocol design itself. To overcome that, network infrastructure vendors introduced WAN acceleration appliances. These devices intercepted TCP sessions and acted as local [proxies](https://www.paloaltonetworks.com/cyberpedia/what-is-a-proxy-server). They reduced redundant data transfers through caching and compression. And they also altered TCP behavior to keep more data in flight, a process known as TCP spoofing. For a time, that approach worked. Especially in private [MPLS](https://www.paloaltonetworks.com/cyberpedia/mpls-what-is-multiprotocol-label-switching) networks where most enterprise traffic stayed within the corporate perimeter. But then the network changed. Applications moved to the cloud. Users connected from anywhere. Traffic patterns shifted from site-to-site to site-to-cloud and cloud-to-cloud. ![The diagram titled 'App connectivity pre \& post-SD-WAN' illustrates network connections for distributed applications. In the 'From' section, a branch office connects to the headquarters (HQ) via MPLS, and the HQ connects to cloud services like AWS, Azure, Google Drive, Salesforce, and Microsoft, as well as social media platforms such as TikTok, YouTube, Instagram, and Facebook. In the 'To' section, the branch office connects to MPLS/5G/broadband, which directly connects to cloud services, social media platforms, and SaaS applications, bypassing the HQ for certain connections.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-wan-optimization-wan-acceleration/App-connectivity-pre-and-post-SD-WAN.png) The traditional WAN box could no longer see---or optimize---most of that traffic. ![Architecture diagram titled 'Limitations of traditional WAN' shows multiple network paths converging through a central data center. On the left, a user icon is connected to a VPN, which leads to the internet. Three separate branch icons labeled Branch, Branch #2, and Branch #3 each connect to the central element labeled 'Oversaturated data center' in red. The Branch icon also passes through a router icon. The oversaturated data center connects to both cloud apps and local apps on the right, illustrating indirect traffic flow through the central hub. The internet and data center are also directly connected.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-wan-optimization-wan-acceleration/Limitations-of-traditional-WAN.png "Architecture diagram titled 'Limitations of traditional WAN' shows multiple network paths converging through a central data center. On the left, a user icon is connected to a VPN, which leads to the internet. Three separate branch icons labeled Branch, Branch #2, and Branch #3 each connect to the central element labeled 'Oversaturated data center' in red. The Branch icon also passes through a router icon. The oversaturated data center connects to both cloud apps and local apps on the right, illustrating indirect traffic flow through the central hub. The internet and data center are also directly connected.") Which meant that WAN optimization had to evolve. And that's why today it's no longer a standalone appliance. It's a set of capabilities embedded into [SD-WAN](https://www.paloaltonetworks.com/cyberpedia/what-is-sd-wan) and [SASE](https://www.paloaltonetworks.com/cyberpedia/what-is-sase) data planes. Its role is to make transport more efficient across hybrid networks that span private links, broadband, and the public internet. ## How does WAN optimization actually work? The problems that drove early WAN acceleration still exist. But the way optimization works has changed dramatically. Essentially, WAN optimization works by improving how data flows across long-distance network paths. It reduces latency, minimizes packet loss, and ensures that traffic moves as efficiently as possible between endpoints. The techniques used fall into several categories that together make the network behave more predictably and with higher throughput. More specifically: **Data reduction comes first.** Traditional WAN optimization appliances compressed data, removed redundant information, and cached files that users frequently requested. This reduced the amount of data that needed to travel over expensive or limited WAN links. However, most of those methods depend on seeing the contents of the traffic. Modern [encryption](https://www.paloaltonetworks.com/cyberpedia/data-encryption) protocols such as TLS 1.3 and QUIC make payload visibility limited, which means compression and deduplication now provide smaller gains. Caching still helps in a few predictable cases, but most optimization today happens at the transport level rather than the content level. **Transport optimization focuses on how data packets move.** Early systems tuned TCP behavior to allow more data to stay in transit before waiting for an acknowledgment. Later, extensions like window scaling and time-based loss detection standardized these improvements across devices. Modern networks increasingly use QUIC, which builds similar congestion control and recovery logic directly into the protocol. These refinements reduce round-trip delays and prevent unnecessary retransmissions. **Loss mitigation addresses what happens when packets are dropped.** Instead of waiting for retransmissions, many systems use forward error correction. Extra bits of information are sent with the data so the receiver can rebuild missing packets without resending them. This improves throughput on unstable links such as broadband or cellular paths. Some implementations also re-order packets on arrival to smooth out jitter introduced by varying path quality. **Traffic management ensures that the most important traffic gets priority.** [Quality of service](https://www.paloaltonetworks.com/cyberpedia/what-is-quality-of-service-qos) policies classify packets and allocate bandwidth based on real-time needs. Mechanisms defined in standards like DiffServ mark and schedule packets to meet latency and loss targets. Modern SD-WAN software extends these principles through adaptive path selection. When a link shows high delay or loss, the system automatically shifts flows to a better path. **Visibility and telemetry tie all these pieces together.** Continuous monitoring collects data on delay, jitter, and packet loss across every tunnel. That feedback loop allows the network to adjust optimization behavior dynamically. It's the difference between static configuration and real-time control. Important: All of these functions operate at the link or data-plane layer, not the control plane. They act directly on how packets move, not on how routes are chosen. In modern architectures, WAN optimization has become an embedded capability that quietly maintains performance across hybrid and cloud-based networks. ## Does WAN optimization still work on encrypted traffic? Yes, WAN optimization still works on encrypted traffic. But differently than it used to. Encryption introduced a new challenge for WAN optimization. Older techniques relied on inspecting data in transit. But now, most of that traffic is protected by protocols that hide its contents end to end. Here's why. Modern encryption standards---TLS 1.3, IPsec, and QUIC---secure nearly every session across the internet. They encrypt both the payload and most of the transport headers. And that prevents intermediaries from seeing or modifying the data as it moves. As a result, the classic optimization methods like compression and deduplication no longer apply in most cases. Those techniques depend on visibility into repeated patterns within the payload, which encrypted data intentionally conceals. So what still works? Plenty. Optimization now focuses on what remains observable without breaking encryption. Basic network characteristics such as round-trip time, packet loss, and jitter are still visible in header metadata. Those measurements allow systems to adapt traffic flow even when content is hidden. Forward error correction and pacing can also be applied below the encryption layer to prevent packet loss and smooth delivery. And quality of service policies still shape and prioritize traffic because they operate on packet behavior, not payload content. There are also new ideas on the horizon. Researchers are exploring "sidecar" models that improve transport performance without decrypting traffic. In these designs, lightweight companion protocols exchange performance feedback separately from the encrypted flow. This approach maintains privacy while still allowing in-path systems to react to congestion or loss in real time. In short: WAN optimization continues to work on encrypted networks. Just differently. It's evolving away from deep packet manipulation toward intelligent, in-path enhancement that respects encryption boundaries while keeping data moving efficiently. ## Where does WAN optimization live in modern architectures? WAN optimization no longer lives in a single device or location. It's become a distributed capability built into modern network architectures. Instead of a standalone appliance sitting between data centers, it now operates inside the same software-defined infrastructure that manages connectivity across clouds, users, and branches. Here's how that shift happened. Early WAN optimization hardware was deployed at fixed points. Often one box at the data center and another at each branch. Those systems accelerated specific links but struggled once traffic began flowing directly to cloud applications. Architectural models for modern SD-WAN replaced those fixed appliances with software functions that run where the data actually moves. Now, optimization takes place within SD-WAN edges, cloud on-ramps, and secure access service edge (SASE) points of presence distributed across regions. Important: The control and data planes are separate. Controllers handle orchestration, pushing policies, defining path preferences, and managing identity. The data plane carries out those policies in real time. WAN optimization operates in that data plane. It enhances transport efficiency within the encrypted tunnels that connect users, sites, and clouds, while the controller only dictates how and when those optimizations apply. Cloud providers also use their own middle-mile optimization. Services like global accelerators and virtual WAN fabrics route traffic through high-performance backbones with consistent latency and throughput. These capabilities mirror the principles of WAN optimization but on a global scale, reducing the variability of internet routing and improving access to SaaS and cloud workloads. Modern implementations take that even further. In distributed architectures, secure connectivity is maintained through continuous key rotation and independent data-plane rekeying. That allows large-scale meshes of branch, cloud, and user connections to stay both secure and performant. Ultimately, WAN optimization now lives everywhere traffic flows: embedded into the software, protocols, and fabrics that define today's enterprise networks. | ***Further reading:*** * [*SD-WAN vs. SASE: Where One Ends and the Other Begins*](https://www.paloaltonetworks.com/cyberpedia/sd-wan-vs-sase) * [*SD-WAN vs. SASE vs. SSE: What Are the Differences?*](https://www.paloaltonetworks.com/cyberpedia/sdwan-vs-sase-vs-sse) ## What are the benefits of WAN optimization today? WAN optimization continues to deliver measurable network performance improvements. But for different reasons than it once did. It no longer focuses on bandwidth compression. Today, its value comes from improving how traffic behaves across long or unpredictable network paths. ![Bold black text on the left reads 'Benefits of WAN optimization' against a light gray background. To the right, four turquoise square icons with white line illustrations are stacked vertically, each accompanied by a heading in black text. The top icon, showing an envelope outline, is paired with the text 'Fewer retransmissions \& less packet loss.' The second icon, a circular arrow with a gear inside, is paired with the text 'Lower latency \& faster response times.' The third icon, depicting a network connection with two nodes and a central line, is paired with the text 'Higher \& more consistent throughput.' The fourth icon, a document and gear symbol, is paired with the text 'More predictable performance for modern workloads.'](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-wan-optimization-wan-acceleration/Benefits-of-WAN-optimization.png "Bold black text on the left reads 'Benefits of WAN optimization' against a light gray background. To the right, four turquoise square icons with white line illustrations are stacked vertically, each accompanied by a heading in black text. The top icon, showing an envelope outline, is paired with the text 'Fewer retransmissions & less packet loss.' The second icon, a circular arrow with a gear inside, is paired with the text 'Lower latency & faster response times.' The third icon, depicting a network connection with two nodes and a central line, is paired with the text 'Higher & more consistent throughput.' The fourth icon, a document and gear symbol, is paired with the text 'More predictable performance for modern workloads.'") Here's what that looks like in practice: * **Fewer retransmissions and less packet loss.** Modern WAN optimization minimizes packet loss through techniques such as forward error correction and adaptive pacing. By reducing retransmit events, it shortens completion times for data flows and keeps sessions stable even when links experience jitter or brief interruptions. * **Lower latency and faster response times.** Smarter congestion control and dynamic path selection reduce round-trip delay. When delay or congestion appears on one link, traffic can move to a faster or cleaner path. That optimization directly improves application responsiveness. Especially for SaaS, cloud, and collaboration traffic. * **Higher and more consistent throughput.** By maintaining more data in flight and recovering from loss without waiting for retransmits, optimization raises effective throughput on high-latency or lossy links. That consistency keeps utilization closer to link capacity and supports large data transfers more efficiently. * **More predictable performance for modern workloads.** SaaS, video, and real-time collaboration depend on low jitter and stable delivery. WAN optimization smooths packet timing and order, producing a steadier user experience across hybrid and cloud networks. In short: Modern WAN optimization improves loss recovery, latency, throughput, and predictability. It's no longer about sending less data. It's about keeping data moving smoothly and consistently across every available path. | ***Further reading:*** * [*Breaking Down the Real-World Benefits of SD-WAN*](https://www.paloaltonetworks.com/cyberpedia/benefits-of-sd-wan) * [*What Is Hybrid SD-WAN?*](https://www.paloaltonetworks.com/cyberpedia/what-is-hybrid-sdwan) ## What are the limitations of WAN optimization? WAN optimization still has clear value. But it also has limits. Those limits don't make it obsolete. They simply define where its impact begins to taper off. ![Bold black text on the left reads 'Limitations of WAN optimization' against a light gray vertical background strip. To the right, five orange square icons with white line illustrations are paired with headings. At the top, an icon showing a magnifying glass over a fluctuating line appears beside the text 'Shrinking scope of improvement.' In the middle left, an icon of an eye with a gear is paired with the text 'Reduced visibility with encryption.' Below it, an icon showing a checklist and warning symbol appears next to the text 'Limited control over dynamic apps.' At the upper right, an icon of a dollar sign with gears appears beside the text 'Processing overhead.' At the lower right, an icon of a descending bar chart appears next to the text 'Diminishing returns with modern SD-WAN \& cloud routing.'](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-wan-optimization-wan-acceleration/Limitations-of-WAN-optimization.png "Bold black text on the left reads 'Limitations of WAN optimization' against a light gray vertical background strip. To the right, five orange square icons with white line illustrations are paired with headings. At the top, an icon showing a magnifying glass over a fluctuating line appears beside the text 'Shrinking scope of improvement.' In the middle left, an icon of an eye with a gear is paired with the text 'Reduced visibility with encryption.' Below it, an icon showing a checklist and warning symbol appears next to the text 'Limited control over dynamic apps.' At the upper right, an icon of a dollar sign with gears appears beside the text 'Processing overhead.' At the lower right, an icon of a descending bar chart appears next to the text 'Diminishing returns with modern SD-WAN & cloud routing.'") Let's take a closer look at where those limitations appear in practice: * **The scope of improvement is shrinking.** Modern traffic is already optimized at the protocol level. Technologies such as HTTP/3 and QUIC manage congestion, retransmission, and multiplexing natively. That leaves less room for external optimization tools to add measurable gains. * **Encryption reduces visibility.** Most web and application traffic is encrypted end to end. While that protects privacy, it prevents payload inspection and disables compression or deduplication techniques that rely on repeated data patterns. As a result, optimization now focuses on transport behaviors rather than content-level processing. * **Dynamic applications limit control.** SaaS and API-driven workloads often use ephemeral connections that the WAN cannot directly monitor or prioritize. Without control of both endpoints, optimization cannot consistently apply or measure its policies across all traffic types. * **Software overhead adds complexity.** Software-based optimization consumes CPU and memory resources, particularly when combined with inline security inspection and routing. Performance can also vary by deployment model---hardware, software, or cloud-native---depending on available resources. * **Diminishing returns are inevitable.** As SD-WAN, cloud routing, and middle-mile services improve path selection and congestion management, the incremental benefits of traditional optimization narrow. It remains valuable, but now as one element of a broader, software-defined performance layer. **In short:** WAN optimization delivers the most value where it can still influence transport efficiency. Its limits reflect how far protocols and architectures have evolved. Not a loss of relevance, but a natural boundary for a mature technology. ## How does WAN optimization differ from SD-WAN and application acceleration? WAN optimization, SD-WAN, and application acceleration often appear together. But they address different parts of the performance problem. They're related, but not interchangeable. Here's how they differ. * **WAN optimization improves performance at the data-plane level.** It makes the network path itself more efficient by reducing latency, packet loss, and jitter. The goal is to maximize throughput and maintain consistent transport behavior across variable links. * **SD-WAN operates above that layer.** It manages how traffic is routed between sites, clouds, and users. Controllers apply policy and analytics to decide which path each flow should take based on metrics like latency, bandwidth, or cost. In other words: SD-WAN orchestrates the path; WAN optimization enhances how data moves along it. * **Application acceleration works higher still---at the application layer.** It focuses on how individual applications behave across the network. That can include protocol-specific optimizations, caching, or QUIC-based multiplexing to improve responsiveness for SaaS and cloud workloads. | Comparison: WAN optimization vs. application acceleration vs. SD-WAN | |----------------------------------------------------------------------| | Category | WAN optimization | SD-WAN | Application acceleration | |----------------------------|-------------------------------------------------------------------|---------------------------------------------------------------|---------------------------------------------------------------------| | **Primary function** | Improves data-plane performance and transport efficiency | Orchestrates traffic paths and enforces routing policies | Enhances application responsiveness and protocol behavior | | **Layer and scope** | Operates at the data plane with packet- and flow-level visibility | Runs in the control plane with network-wide visibility | Functions at the application layer with session-level context | | **Core focus** | Reduces latency, packet loss, and jitter | Selects optimal network paths based on policy and performance | Reduces application-layer latency and improves user experience | | **Key techniques** | Forward error correction, pacing, congestion control, QoS | Dynamic path selection, traffic steering, centralized control | Protocol tuning (e.g., QUIC), caching, content optimization | | **Deployment model** | Embedded in SD-WAN/SASE data planes or as software modules | Centralized controller with distributed edge devices | Integrated into SD-WAN/SASE edges or app delivery stacks | | **Outcome** | Higher throughput and stable transport | Efficient use of WAN links and centralized management | Faster, more consistent application performance | | **Relationship to others** | Enhances performance on SD-WAN--selected paths | Provides telemetry for optimization and acceleration | Uses telemetry from SD-WAN and WAN optimization for adaptive tuning | Together, they form a layered system of performance control. SD-WAN establishes the best route for each session. WAN optimization makes that route perform smoothly and predictably. Application acceleration ensures the user experience stays responsive, even for distributed or real-time applications. In integrated architectures like SASE, these functions complement one another. Policy is managed centrally, while optimization and acceleration occur locally at the data plane or application edge. Basically, SD-WAN chooses the best path. WAN optimization makes that path behave better. ***Note:*** *Application acceleration often depends on the same network telemetry produced by SD-WAN and WAN optimization. That shared visibility reinforces how these technologies work together within a unified, data-driven performance layer.* | ***Further reading:*** * [*What Is Application Acceleration? \[+ How It Works \& Examples\]*](https://www.paloaltonetworks.com/cyberpedia/what-is-application-acceleration) * [*What Is SD-WAN Architecture? Components, Types, \& Impacts*](https://www.paloaltonetworks.com/cyberpedia/sd-wan-architecture) ![Icon of a book](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-wan-optimization-wan-acceleration/icon-ebook.svg) ## Learn more about SD-WAN in action Read Zero Trust Branch for SD-WAN For Dummies to see how SD-WAN architecture extends to branch security and SASE. [Download eBook](https://www.paloaltonetworks.com/resources/ebooks/for-dummies-zero-trust-branch-for-sd-wan) ## WAN optimizations FAQs ### What is WAN optimization? WAN optimization improves how efficiently data moves across wide area networks. It reduces latency, packet loss, and congestion through techniques like traffic shaping, forward error correction, and protocol optimization. Modern implementations operate within SD-WAN and SASE data planes to maintain consistent performance across hybrid and cloud environments. ### How does WAN optimization work? It enhances data transfer efficiency through transport and path-level improvements. Methods include TCP tuning, packet pacing, and forward error correction to prevent retransmissions. These adjustments minimize delay and jitter while maintaining throughput. WAN optimization acts at the data-plane level to ensure stable, predictable network performance. ### Why is WAN optimization important? It ensures consistent network performance across geographically distributed environments. By reducing retransmissions and delay, WAN optimization improves reliability, responsiveness, and application experience. It's especially important for cloud workloads, SaaS applications, and remote connections where long distances and variable network quality affect user productivity and data integrity. ### Is WAN optimization still relevant with SD-WAN? Yes. SD-WAN controls and routes traffic across the best available paths, while WAN optimization enhances how data travels along them. Together, they improve network efficiency, resilience, and performance. WAN optimization remains a core data-plane capability that complements SD-WAN's centralized management and policy-driven orchestration. ### Does WAN optimization work on encrypted traffic? Yes, but differently than before. While encryption limits visibility into payloads, optimization still applies to observable metrics like round-trip time, loss, and jitter. Techniques such as pacing, forward error correction, and QoS operate below the encryption layer to maintain throughput without breaking security boundaries. ### What are the benefits of WAN optimization today? Modern WAN optimization reduces packet loss, lowers latency, and stabilizes throughput across hybrid networks. It keeps data transfers efficient and predictable even on high-latency or unreliable links. These improvements enhance user experience and application responsiveness without requiring more bandwidth or infrastructure investment. ### What are the limitations of WAN optimization? WAN optimization offers limited benefit for encrypted or already-optimized traffic such as HTTP/3 over QUIC. It also adds processing overhead in software deployments and less visibility into dynamic SaaS flows. Its impact diminishes as SD-WAN and cloud routing absorb more performance management functions. ### How is WAN optimization different from SD-WAN and application acceleration? WAN optimization improves data-plane efficiency. SD-WAN manages routing and policy across multiple links. Application acceleration optimizes performance at the application or protocol layer. In modern architectures, SD-WAN chooses the best path, WAN optimization enhances transport quality, and application acceleration ensures fast, reliable user experiences. ### Where does WAN optimization fit in modern architectures? It operates within SD-WAN edges, cloud on-ramps, and SASE points of presence. WAN optimization enhances data-plane performance inside encrypted tunnels connecting users, sites, and clouds. It complements centralized control-plane policy enforcement while ensuring consistent, secure, and low-latency traffic delivery across hybrid environments. ### Can WAN optimization improve performance for cloud and SaaS applications? Yes. It stabilizes connections and improves throughput to cloud-hosted applications by minimizing latency and retransmissions. While it can't modify SaaS protocols directly, WAN optimization enhances the network conditions that support them, improving overall responsiveness and reliability for distributed and remote users. ### What techniques are used in WAN optimization? Common techniques include forward error correction, TCP window scaling, packet pacing, and QoS-based traffic shaping. These methods address latency, loss, and congestion to ensure smoother data delivery. Modern WAN optimization also relies on continuous telemetry to adapt dynamically to real-time network conditions. ### What is the future of WAN optimization? WAN optimization is evolving into embedded, adaptive data-plane functionality. Future implementations will use real-time telemetry, automation, and AI-based analytics to tune performance across SD-WAN and SASE fabrics. Its focus will remain transport efficiency---but integrated directly into software-defined, cloud-centric architectures. Related content [Podcast: Packet Pushers | Why SD-WAN is the Secret to SASE Success Hear why SD-WAN is the foundational component of a SASE solution.](https://media.blubrry.com/packetpushers/media.blubrry.com/2903570/ins.blubrry.com/2903570/TB_Palo_Alto_0701-SD-WAN.mp3) [Podcast: Packet Pushers | Can SD-WAN Solve Latency Issues for Modern Applications? Get the facts on how application acceleration helps deliver SaaS \& cloud apps with the highest level of performance.](https://media.blubrry.com/packetpushers/media.blubrry.com/2903570/ins.blubrry.com/2903570/TB_0120_PANW.mp3) [eBook: Why Next-Gen SD-WAN Is the Solution for You Discover how integrated next-gen SD-WAN improves user experience, control, and visibility.](https://start.paloaltonetworks.com/why-next-gen-sd-wan-is-the-solution-for-you.html) [eBook: The Branch of the Future, Today Find out how to securely enable branch modernization with Prisma SD-WAN.](https://www.paloaltonetworks.com/resources/ebooks/securely-enable-branch-modernization-with-prisma-sd-wan?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20WAN%20Optimization%3F%20%5B%2B%20How%20It%20Works%20%26%20Modern%20Role%5D&body=WAN%20optimization%20is%20the%20process%20of%20improving%20how%20efficiently%20data%20travels%20across%20wide%20area%20networks%20by%20reducing%20latency%2C%20loss%2C%20and%20congestion.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-wan-optimization-wan-acceleration) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language