[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Network Security](https://www.paloaltonetworks.com/cyberpedia/network-security?ts=markdown) 3. [What Is WireGuard?](https://www.paloaltonetworks.com/cyberpedia/what-is-wireguard?ts=markdown) Table of Contents * [How Did the WireGuard Protocol Originate?](#how) * [How Does WireGuard Work?](#does) * [How Secure Is WireGuard?](#secure) * [WireGuard Pros and Cons](#wireguard) * [WireGuard Use Cases](#usecases) * [Comparing WireGuard with Other VPN Protocols](#comparing) * [WireGuard Setup](#setup) * [WireGuard FAQs](#faqs) # What Is WireGuard? 3 min. read Table of Contents * [How Did the WireGuard Protocol Originate?](#how) * [How Does WireGuard Work?](#does) * [How Secure Is WireGuard?](#secure) * [WireGuard Pros and Cons](#wireguard) * [WireGuard Use Cases](#usecases) * [Comparing WireGuard with Other VPN Protocols](#comparing) * [WireGuard Setup](#setup) * [WireGuard FAQs](#faqs) 1. How Did the WireGuard Protocol Originate? * [1. How Did the WireGuard Protocol Originate?](#how) * [2. How Does WireGuard Work?](#does) * [3. How Secure Is WireGuard?](#secure) * [4. WireGuard Pros and Cons](#wireguard) * [5. WireGuard Use Cases](#usecases) * [6. Comparing WireGuard with Other VPN Protocols](#comparing) * [7. WireGuard Setup](#setup) * [8. WireGuard FAQs](#faqs) WireGuard is a modern VPN protocol known for its simplicity and security. WireGuard connects devices using state-of-the-art cryptography to establish secure connections, whether in routed or bridged configurations. It is designed to be easier to deploy and manage than other VPNs, offering a lightweight solution with fewer lines of code. This reduces its attack surface and simplifies auditing. ## How Did the WireGuard Protocol Originate? WireGuard originated as a revolutionary approach to virtual private networks (VPNs) with its development beginning in 2016. Jason A. Donenfeld, security researcher and developer, identified the complexities and performance issues in existing VPN protocols. Recognizing the need for a more efficient and secure system, he embarked on developing a new protocol. WireGuard was designed to streamline network tunneling with a focus on simplicity. The protocol aims to reduce the complexities and potential security vulnerabilities inherent in the predecessors' expansive codebases and multiple configuration options. The WireGuard protocol was introduced to the public in 2017 at the Network and Distributed System Security Symposium (NDSS) and further detailed in a whitepaper by Donenfeld. The protocol's architecture is characterized by a small, easily auditable codebase, a contrast to the tens of thousands of lines of code found in traditional VPN protocols. The minimalist design was chosen to ensure higher security and more straightforward maintenance. It emphasizes a fixed set of modern cryptographic primitives to avoid the risks associated with flexible encryption methods, enhancing both its security posture and performance capabilities. ## How Does WireGuard Work? ![Various devices connected to a WireGuard VPN server, leading to a website IP through a secure tunnel.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-wireguard/wireguard.png) WireGuard works by establishing secure network tunnels using a combination of modern cryptographic techniques. It uses a streamlined approach to VPN connections, prioritizing speed and security. Its efficiency is partly due to its reliance on a single cryptographic suite for all operations, which reduces the potential for misconfiguration and security vulnerabilities. The foundation of the protocol's security model is a set of robust cryptographic primitives. For encryption, it uses the ChaCha20 algorithm, paired with Poly1305 for message authentication. This combination is particularly effective on devices without hardware acceleration for cryptography. For key exchange, the protocol uses Curve25519, offering a secure method for establishing a shared secret over an insecure channel. BLAKE2s is used for hashing. Its handshake mechanism is designed for minimal latency, involving a 1.5 Round Trip Time (1.5-RTT) process based on the Noise protocol framework. This handshake provides immediate session establishment and perfect forward secrecy. Past communication remains secure even if a key is compromised in the future The protocol identifies network peers using static public keys, similar to SSH keys. These public keys double as a means of routing within the tunnel, a method known as cryptokey routing. This mechanism streamlines the process of determining packet destinations within the VPN tunnel, enhancing data transmission efficiency. The protocol stands out for its minimalistic design. The entire protocol is implemented in less than 4,000 lines of code for the Linux kernel. This compact codebase facilitates easy auditing and contributes to the overall security by minimizing the attack surface. The straightforward nature and strong cryptographic foundation makes it an option for secure, high performance network tunneling. ## How Secure Is WireGuard? ![Diagram of WireGuard VPN with split tunneling for all traffic and specified internal network routes.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-wireguard/wireguard-encryption.png) The protocol is designed to offer a high security while maintaining performance. Its minimalistic approach ensures that each part of the protocol contributes to a secure network tunnel, making it a suitable choice for enterprise environments that prioritize security without compromising on network efficiency. WireGuard is an open source VPN protocol, which allows for transparent examination and auditing of its code by security experts and the community at large. The open development model fosters trust in its security processes and encourages ongoing improvements and widespread collaboration. The protocol's source code is freely available for anyone to review, contributing to its reputation as a trustworthy tool for secure network tunneling. The protocol's security is built on the principle of using the most modern, thoroughly vetted cryptographic protocols available. Its streamlined approach means there are fewer places where the code can be attacked, which inherently makes it more secure than more complex systems. The selection of cryptographic algorithms is fixed to avoid the pitfalls of cryptographic agility, which in other protocols can lead to insecure deployments due to the misconfiguration of cryptographic primitives. The core of WireGuard's security is its use of state-of-the-art cryptography. ChaCha20 (encryption algorithm), Poly1305 (authentication), Curve25519 (key exchange), and BLAKE2s (hashing). These choices are recognized for their strength and performance, especially on devices that lack specialized cryptographic hardware. The protocol's resistance to common attacks is bolstered by its default configuration which does not store any persistent user data, reducing exposure to data leaks. The lean codebase allows for easier code auditing and reduces the potential for undiscovered vulnerabilities. Its design incorporates an avoidance strategy for unsolicited internet traffic, making it less susceptible to certain types of denial-of-service attacks. ## WireGuard Pros and Cons ![WireGuard pros (simple, secure, fast setup, low overhead) \& cons (new, less tested, extra configuration, incompatible, less support, mixed protocols)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-wireguard/wireguard-pros-and-cons.png) | **WireGuard Pros and Cons** || | **Pros** | **Cons** | |-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | \* Simplicity \* High security \* Rapid connection setup \* Efficient performance with reduced latency \* Fast throughput \* Low overhead due to efficient encryption and handshake | \* Relative newness \* Not as battle tested as older protocols \* Default requirement for storing user IPs \* Additional configuration need for privacy \* Compatibility challenges with existing infrastructure \* Limited support from some VPN services \* May require a mixed protocol environment | WireGuard offers several advantages. Its most notable strength is its simplicity. It is also highly secure against various types of cyber threats. Its design allows for a rapid connection setup, which is beneficial for businesses with mobile workforces needing to maintain constant secure access to corporate resources. Performance is another key benefit. The VPN protocol's lean design means it operates with efficiency, reducing latency and providing faster throughput compared to traditional VPN protocols. This may be advantageous for enterprises that require the fast, secure transmission of large volumes of data across networks. The protocol has a lower overhead because of efficient encryption and handshake protocols. On the downside, the protocol's relative newness means has not endured as long as other protocols. While no major security flaws have been reported, its infancy means it has not been battle tested to the extent of older, more established protocols. As it matures and undergoes more rigorous testing, confidence in its robustness may increase. Another concern is privacy. By default, the protocol requires user IP address storage on the WireGuard server. This can be mitigated through additional configuration layers by the service provider. Compatibility may also pose challenges. While the protocol supports a range of operating systems, integration with existing network infrastructure may require additional effort. Some VPN services may not yet support WireGuard or may only offer it on certain platforms. This could require a mixed protocol environment, which can complicate deployment and management. WireGuard may be a potential option for enterprises looking for a modern VPN solution that balances security with performance. Its pros are noteworthy, offering a secure, fast, and efficient VPN experience. However, enterprises must consider the cons, including newness and the additional steps needed to ensure privacy and compatibility with existing systems. As with any technology choice, a careful assessment aligned with specific business requirements and security policies is essential. ## WireGuard Use Cases WireGuard, with its innovative design, presents itself as a candidate for various VPN related use cases within enterprise environments. One primary use case is establishing secure remote access for a workforce that is increasingly mobile. Enterprises can use the protocol to provide employees with secure access to corporate networks from any location. This is essential for maintaining business continuity and secure communications when employees are working from home or traveling. Another application is creating secure site-to-site connections. For businesses that operate multiple geographically dispersed sites, the protocol offers a way to connect sites securely over the internet. By using the protocol to create VPN tunnels between sites, enterprises can ensure data transmitted across networks remains encrypted and inaccessible to unauthorized parties. WireGuard may be well suited for deployment in environments where traditional VPN performance might lag, such as with IoT devices or scenarios where network performance is critical. Its lightweight nature allows it to run efficiently on a variety of hardware, from servers to small network appliances. The versatility makes it an option for securing the vast array of devices connected to the modern enterprise network. [What Is a VPN?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-vpn?ts=markdown) ## Comparing WireGuard with Other VPN Protocols ### WireGuard vs. OpenVPN | **OpenVPN vs. WireGuard** || | **OpenVPN** | **WireGuard** | |---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | - 600,000 lines of code - Often uses TCP - Uses AES-256 encryption - Better compatibility with older devices - Preferable for unstable connections - Highly configurable for complex environments | - 4,000 lines of code - Primarily uses UDP protocol - Uses ChaCha20 for encryption - Faster performance with less overhead - Simplicity and speed ideal for businesses - Less configurable but efficient | WireGuard's most significant advantage over OpenVPN is its lean codebase, with approximately 4,000 lines of code against OpenVPN's 600,000. This makes it more manageable for developers and auditors. The protocol is also faster than OpenVPN from a performance standpoint due to less computational overhead. Plus, it operates primarily on the UDP protocol, known for speed due to less rigorous handshake processes compared to TCP, which OpenVPN often uses. It is well suited for mobile devices due to its lightweight design and efficient use of system resources In terms of encryption, WireGuard favors modern, high speed cryptographic primitives like ChaCha20 for encryption, whereas OpenVPN typically uses AES-256. While both are secure, the former's efficiency shines in environments where quick data transmission is critical. However, OpenVPN offers a broader compatibility with older devices and systems, and its use of TCP can make it a better choice for networks where stability and reliability over unstable connections are prioritized. WireGuard's simplicity and speed make it appealing for businesses that need quick and secure connections. Still, OpenVPN's maturity in the market and its extensive configurability allow for a more customizable approach, which can be essential for complex enterprise environments. ### WireGuard vs. IKEv2 | IKEv2 vs. WireGuard || |----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | **IKEv2** | **WireGuard** | | - Known for stability, especially when switching networks - Widely supported natively across various platforms - Flexible encryption method choices - Suitable for enterprises requiring legacy system support | - Surpasses IKEv2 in speed and security with a modern cryptographic approach - Not as widely supported natively, but increasing in adoption - Uses a fixed set of secure cryptographic tools for reduced risk - Enhanced performance and simplicity for enterprise settings | IKEv2 is known for stability, especially in changing network environments like switching from Wi-Fi to mobile data. It is also widely supported across various platforms natively, which can simplify deployment. WireGuard often surpasses IKEv2 in speed and security due to its modern cryptographic approach. On the other hand, it may not be natively supported across as many platforms. IKEv2/IPsec's flexibility in encryption method choices can be a double edged sword. It provides options but can also complicate configuration and potentially introduce vulnerabilities if not properly managed. WireGuard's fixed set of secure cryptographic tools reduces this risk but at the cost of flexibility. For enterprises requiring legacy system support or specific encryption methods, IKEv2 may be more suitable. The adoption of WireGuard in enterprise settings is often driven by its promise of enhanced performance and security. However, IKEv2 continues to hold a strong position, especially in established VPN solutions where change carries risk and complexity. Ultimately, the choice may come down to specific organizational needs and the value placed on speed and simplicity versus compatibility and proven stability. ## WireGuard Setup Configuration involves a few critical steps to establish a secure VPN connection. This process requires generating cryptographic keys, creating configuration files, and installing the necessary software. Here is a general guide for configuring WireGuard clients within an enterprise network. 1. To begin, you will need to install the WireGuard software on the client device. This software is available for various operating systems and can typically be found in the respective package repositories or app stores. Once installed, the next step is to generate the cryptographic keys. This can be done using the WireGuard interface on the command line or through the graphical interface, depending on the platform. These encryption keys are essential for the secure communication between the client and the WireGuard server. 2. After key generation, you must create a client configuration file. This file includes the private key of the client, the public key of the server, the VPN server's endpoint (IP and port), and the allowed IP range that the client can use once connected. Configuration can often be done directly within the WireGuard application, or by editing a simple text file. The specific parameters will depend on the network setup and the desired security policies. 3. Once the configuration file is ready, the client interface can be activated. On a command line interface, this is often done with a command like wg-quick up \[interface\], where \[interface\] is the name of the interface you've configured. For graphical users, this may involve simply toggling a connection on within the application. 4. Finally, for the client to correctly route internet traffic through the VPN, you may need to adjust the network settings or firewall rules. This ensures that the desired traffic is securely tunneled. It's worth noting that for an enterprise environment, automating deployment configurations can be achieved through various automation tools or by integrating with a network management solution. This streamlines the process and maintains consistency across the network. Remember, the specific commands and steps can vary based on the operating system and network architecture. Always refer to the official WireGuard documentation and your enterprise's network policies when configuring clients. ## WireGuard FAQs ### What is the purpose of WireGuard? WireGuard is designed to provide a secure and easy-to-configure VPN solution. ### What is the difference between VPN and WireGuard? WireGuard is a type of VPN with a focus on simplicity and performance. ### Is WireGuard safe to use? WireGuard uses modern cryptography and is considered safe for secure communications. All software can be hacked, but the protocol aims to minimize this risk with strong encryption. ### Why not to use WireGuard? Some may opt for alternatives to WireGuard if they require legacy protocol support. ### Is WireGuard free to use? Yes, WireGuard is free and open source software. ### Can WireGuard hide my IP? WireGuard can obscure your IP from the sites and services you connect to. ### What is the vulnerability of WireGuard VPN? Like any software, WireGuard may have vulnerabilities, but none are widely recognized as of now. ### What is better than WireGuard? "Better" depends on specific needs. Alternatives include OpenVPN and IPSec. ### Does WireGuard change your IP? WireGuard does not change your IP but can mask it with the VPN server's IP. ### How do I know if WireGuard VPN is working? Successful data transfer without IP leakage indicates WireGuard is working. ### Which routers support WireGuard? Routers with modern firmware, like OpenWRT, often support WireGuard. ### What is the best port to use for WireGuard? The best WireGuard port is any open UDP port, commonly 51820. ### Is WireGuard TCP or UDP? WireGuard uses UDP for its transport protocol. ### What OSI level is WireGuard? WireGuard operates at the OSI model's Layer 3 (Network layer). ### Does WireGuard hide traffic? WireGuard encrypts traffic, making it unreadable to external observers. ### How do I make WireGuard undetectable? WireGuard's low footprint makes it less detectable, but it is not invisible. ### Is WireGuard a full tunnel? WireGuard can be configured for full tunneling, directing all internet traffic through the VPN. ### Where does WireGuard store tunnels? WireGuard stores tunnel configurations in the system's network configuration files. ### How do I check my WireGuard tunnel? Check the tunnel by verifying active connections and through network interface data. ### Is WireGuard a VPN? No. WireGuard is a VPN protocol, designed to provide a secure and efficient VPN connection. Related content [VPN Alternatives for Remote Access VPN alternatives for secure remote access, sometimes referred to as VPN replacements, are methods other than traditional Virtual Private Networks (VPNs) employed to ensure secure c...](https://www.paloaltonetworks.com/cyberpedia/vpn-alternatives-for-remote-access?ts=markdown) [GlobalProtect GlobalProtect is more than a VPN. It provides flexible, secure remote access for all users everywhere.](https://www.paloaltonetworks.com/sase/globalprotect?ts=markdown) [Accelerating Digital Transformation with SASE SASE breaks down barriers and streamlines processes, empowering organizations to securely accelerate their digital transformations.](https://www.paloaltonetworks.com/resources/ebooks/accelerating-digital-transformation-with-sase?ts=markdown) [SASE CIO eBook: Driving the future of work through enterprise-wide SASE A CIO'S Guide to Planning and Implementation.](https://www.paloaltonetworks.com/resources/ebooks/sase-cio-ebook-driving-the-future-of-work-through-enterprise-wide-sase?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20WireGuard%3F&body=WireGuard%20is%20a%20modern%20VPN%20protocol%20designed%20to%20establish%20secure%20connections%2C%20known%20for%20simplicity%2C%20speed%2C%20and%20state-of-the-art%20cryptography.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-wireguard) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language