[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberark/Seamless_IDs_small.jpg) Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-security-solution?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberark/Seamless_IDs_small.jpg) Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.paloaltonetworks.com/deploybravely?ts=markdown) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/cyber-security?ts=markdown) 3. [Zero Trust Core Concepts](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust?ts=markdown) 4. [What Is Zero Trust?](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust?ts=markdown) Table of Contents * What is Zero Trust? Definition, Principles, and Strategy * [Zero Trust Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#trust?ts=markdown) * [Why Zero Trust Matters](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#why?ts=markdown) * [Core Principles of a Zero Trust Framework](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#core?ts=markdown) * [What Zero Trust Covers](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#what?ts=markdown) * [How Zero Trust Works: The Technical Mechanism](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#technical?ts=markdown) * [Zero Trust Architecture (NIST SP 800-207)](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#architecture?ts=markdown) * [Zero Trust Controls and Capabilities](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#zero-trust?ts=markdown) * [How to Implement Zero Trust](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#implement?ts=markdown) * [Key Benefits of Implementing Zero Trust](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#key-benefits?ts=markdown) * [Common Implementation Challenges and Mitigations](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#common?ts=markdown) * [Future Trends in Zero Trust Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#future?ts=markdown) * [Zero Trust FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#faqs?ts=markdown) * [What Is Zero Trust Architecture? Key Elements and Use Cases](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture?ts=markdown) * [Why Zero Trust Matters Now](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture#why?ts=markdown) * [The Core Tenets of Zero Trust](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture#core?ts=markdown) * [From Perimeter to Posture: A Paradigm Shift](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture#shift?ts=markdown) * [Key Components of a Zero Trust Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture#key?ts=markdown) * [The Benefits of Zero Trust Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture#benefits?ts=markdown) * [Common Use Cases for ZTA](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture#common?ts=markdown) * [How to Implement Zero Trust Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture#how?ts=markdown) * [What Are the Key Elements in a Zero Trust Architecture?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture#architecture?ts=markdown) * [How Zero Trust Architecture Works](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture#works?ts=markdown) * [The Pillars of a Successful ZTA Implementation](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture#pillars?ts=markdown) * [Zero Trust Architecture FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture#faqs?ts=markdown) * [Legacy Networks: What Was There Before Zero Trust](https://www.paloaltonetworks.com/cyberpedia/what-was-there-before-zero-trust?ts=markdown) # What Is Zero Trust? 5 min. read Table of Contents * * [Zero Trust Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#trust?ts=markdown) * [Why Zero Trust Matters](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#why?ts=markdown) * [Core Principles of a Zero Trust Framework](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#core?ts=markdown) * [What Zero Trust Covers](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#what?ts=markdown) * [How Zero Trust Works: The Technical Mechanism](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#technical?ts=markdown) * [Zero Trust Architecture (NIST SP 800-207)](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#architecture?ts=markdown) * [Zero Trust Controls and Capabilities](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#zero-trust?ts=markdown) * [How to Implement Zero Trust](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#implement?ts=markdown) * [Key Benefits of Implementing Zero Trust](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#key-benefits?ts=markdown) * [Common Implementation Challenges and Mitigations](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#common?ts=markdown) * [Future Trends in Zero Trust Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#future?ts=markdown) * [Zero Trust FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#faqs?ts=markdown) 1. Zero Trust Explained * * [Zero Trust Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#trust?ts=markdown) * [Why Zero Trust Matters](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#why?ts=markdown) * [Core Principles of a Zero Trust Framework](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#core?ts=markdown) * [What Zero Trust Covers](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#what?ts=markdown) * [How Zero Trust Works: The Technical Mechanism](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#technical?ts=markdown) * [Zero Trust Architecture (NIST SP 800-207)](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#architecture?ts=markdown) * [Zero Trust Controls and Capabilities](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#zero-trust?ts=markdown) * [How to Implement Zero Trust](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#implement?ts=markdown) * [Key Benefits of Implementing Zero Trust](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#key-benefits?ts=markdown) * [Common Implementation Challenges and Mitigations](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#common?ts=markdown) * [Future Trends in Zero Trust Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#future?ts=markdown) * [Zero Trust FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust#faqs?ts=markdown) Zero Trust is a cybersecurity strategy that removes implicit trust and requires explicit, continuous verification for every access request, across users, devices, applications, workloads, and data, regardless of location. It replaces location-based assumptions ("inside the network = trusted") with policy-based access decisions using identity and contextual signals. Key Points * **Eliminate Implicit Trust:** Removes the assumption that any entity inside the corporate network is safe or authorized. \* **Continuous Verification:** Mandates ongoing authentication and authorization for every access request, not just at initial login. \* **Least Privilege:** Restricts user and system access to the absolute minimum resources required for specific tasks. \* **Blast Radius:** Minimizes potential damage from breaches by using microsegmentation to isolate compromised segments. \* **Contextual Awareness:** Utilizes real-time data like device health, location, and behavior to make dynamic access decisions. ## Zero Trust Explained Traditional security models relied on a "castle-and-moat" approach, focusing on hardening the network perimeter while assuming that anyone inside was legitimate. In today's hybrid work landscape, cloud migration, and sophisticated supply chain attacks, this perimeter has dissolved. Zero Trust assumes that any identity, human, machine, or AI, could be compromised. As a result, every access request is evaluated in real time. The system checks who or what is making the request, what resource is being accessed, and whether the context is acceptable. Location, network, or past access does not automatically grant trust; verification happens continuously. Zero trust shifts the focus from location-centric security to a data-centric model. It treats every access attempt as a potential threat, requiring rigorous validation of [identity](https://www.paloaltonetworks.com/cyberpedia/what-is-identity-security?ts=markdown) and security posture before granting access to specific resources. The significance of zero trust lies in its ability to address the identity-related issues that drive the vast majority of modern breaches. By implementing zero trust, organizations can mitigate the risks of [credential abuse](https://www.paloaltonetworks.com/cyberpedia/what-is-a-credential-based-attack?ts=markdown), [social engineering](https://www.paloaltonetworks.com/cyberpedia/what-is-social-engineering?ts=markdown), and excessive permissions. It provides a consistent security posture across [endpoints](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-security?ts=markdown), networks, and [SaaS applications](https://www.paloaltonetworks.com/cyberpedia/what-is-saas?ts=markdown), ensuring that even if one account is compromised, the attacker's ability to move laterally and exfiltrate data is severely restricted. ## Why Zero Trust Matters [Unit 42's 2026 Global Incident Response Report](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report?ts=markdown) (based on 750+ cases) underscores why zero trust has become a priority: * **Identity weaknesses** were exploited in **89%** of investigations. * **Identity-based techniques** drove **65%** of initial access. * **87%** of attacks involved **multiple attack surfaces** (endpoints, cloud, SaaS, identity, network). * The fastest intrusions moved from initial access to **data exfiltration in 72 minutes.** Unit 42 also describes simulated AI-assisted timelines down to 25 minutes, and real-world fastest-quartile timelines at ~1.2 hours. [Zero trust architectures](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture?ts=markdown) are designed to break this timeline by preventing the [lateral movement](https://www.paloaltonetworks.com/cyberpedia/what-is-lateral-movement?ts=markdown) required to reach high-value assets. **Implication**: a zero trust strategy is not only an architectural choice; it is also an operational response to identity-driven access abuse and multi-surface intrusions. ## Core Principles of a Zero Trust Framework A zero-trust program is typically anchored in three principles, aligned with industry guidance and [NIST's Zero Trust Architecture model](https://www.nist.gov/publications/zero-trust-architecture). A successful zero trust deployment rests on these principles that redefine how security teams approach risk and access management. | Pillar | Core Objective | Key Implementation | | Verify Explicitly | Never assume trust | [MFA](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-factor-authentication?ts=markdown)/step-up, conditional access, session controls, device posture checks | | Use Least Privilege | Limit access to the minimum required | RBAC/ABAC, [just-in-time access](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit?ts=markdown), zero [standing privileges](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges?ts=markdown), scoped entitlements | | Assume Breach | Contain compromise | Segmentation/[microsegmentation](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation?ts=markdown), continuous monitoring, rapid response | |---------------------|--------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| *Table 1: Core Pillars of a Zero Trust Framework* ## What Zero Trust Covers Zero Trust applies to every access path to an enterprise resource. [NIST](https://www.paloaltonetworks.com/cyberpedia/what-is-nist-sp-800-207?ts=markdown) emphasizes resource-centric protection and policy enforcement at the resource level. | Domain | What Zero Trust changes | Typical controls | | Users | No implicit trust based on network location | MFA/step-up, conditional access, session controls | | Devices | Access depends on device posture and risk | Compliance checks, EDR signals, health evaluation | | Applications | Access becomes app/resource-specific | ZTNA, app gateways, policy enforcement points | | Data | Protect the asset directly | Encryption, [DLP](https://www.paloaltonetworks.com/cyberpedia/what-is-data-loss-prevention-dlp?ts=markdown), access governance, monitoring | | Workloads | Services must authenticate and authorize | [Workload identity](https://www.paloaltonetworks.com/cyberpedia/what-is-workload-identity?ts=markdown), certificates, service-to-service policy | |--------------|---------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------| *Table 2: What Zero Trust Covers* ## How Zero Trust Works: The Technical Mechanism Implementing zero trust requires a coordinated decision-and-enforcement process across identity systems, device posture, and enforcement controls. ### Policy Decision and Enforcement * **Policy Decision evaluates:** identity assurance, device health, request context (location/time), and resource sensitivity. * **Policy Enforcement** applies that decision consistently across environments (on-prem, cloud, SaaS). This aligns directly to the zero trust architecture components defined in NIST SP 800-207. ## Zero Trust Architecture (NIST SP 800-207) [NIST SP 800-207](https://www.paloaltonetworks.com/cyberpedia/what-is-nist-sp-800-207?ts=markdown) defines a logical model for implementing zero trust as a decision-and-enforcement loop. **Core Logical Components** | Component | Role | Practical interpretation | | Policy Engine (PE) | Evaluates requests and makes allow/deny/revoke decisions | Decision logic | | Policy Administrator (PA) | Executes the decision (session setup/teardown, configuration) | Orchestration (session setup/teardown) | | Policy Enforcement Point (PEP) | Enforces access decisions and can monitor/terminate sessions | Enforcement control at/near the resource | |--------------------------------|---------------------------------------------------------------|------------------------------------------| ## Zero Trust Controls and Capabilities A zero trust program typically maps controls to the access decision loop (verify → authorize → enforce → monitor). The core capability stack: 1. **Identity assurance and access policy:** MFA/step-up controls, conditional access, session governance 2. **Least privilege and privileged access controls** Reduce standing privileges; implement JIT and PAM practices. 3. **Device posture enforcement:** Require compliant devices for sensitive access; use [endpoint telemetry](https://www.paloaltonetworks.com/cyberpedia/extending-zero-trust-to-the-endpoint?ts=markdown). 4. **Resource-centric enforcement and segmentation:** Enforce policy near the resource; microsegment to contain compromise. 5. **Cross-surface visibility and response:** Correlate identity, endpoint, cloud, SaaS, and browser signals (This directly addresses the multi-surface reality described by Unit 42.) ## How to Implement Zero Trust Implementation should prioritize risk reduction and operational impact over broad, unscoped rollout. Unit 42's reporting on compressed attacker timelines supports an early focus on identity, access path reduction, and containment. **How to Implement Zero Trust** | Phase | Objective | Typical deliverables | | 1. Define protected surfaces | Identify crown jewels and Tier 0 assets | Inventory + access pathways map | | 2. Strengthen identity controls | Reduce credential/session abuse | MFA/step-up, conditional access, session monitoring | | 3. Modernize access | Replace broad access with app/resource access | ZTNA adoption; reduced network exposure | | 4. Enforce device posture | Reduce high-risk sessions | Compliance gates; posture-informed policy | | 5. Segment and contain | Limit blast radius | Segmentation strategy; policy enforcement near resources | | 6. Operationalize continuous verification | Detect/respond faster | Cross-surface telemetry + response playbooks | |-------------------------------------------|-----------------------------------------------|----------------------------------------------------------| ## Key Benefits of Implementing Zero Trust Beyond basic risk reduction, zero trust offers strategic advantages that align security goals with business agility and operational efficiency. * **Improved visibility:** Policy-driven access decisions increase auditability across users, devices, and applications. * **Reduced lateral movement:** Segmentation and least privilege limit an attacker's ability to expand after initial access. * **Ransomware risk reduction:** Limiting access pathways and blast radius reduces ransomware propagation. * **Stronger data protection:** DLP and resource controls reduce unauthorized movement of sensitive data. ## Common Implementation Challenges and Mitigations Transitioning to a new security model often involves navigating technical and cultural hurdles. * **Legacy Systems:** Use zero trust wrappers or gateways to secure older apps that don't support modern protocols. * **User Friction:** Implement seamless authentication, such as biometrics or FIDO2 keys, to maintain productivity. * **Policy sprawl:** Start with protected surfaces, then expand in controlled phases with clear ownership and measurement. * **Skill Gaps:** Focus on automated policy engines to reduce the manual workload on security teams. ## Future Trends in Zero Trust Architecture As threat actors adopt AI and automation, zero trust frameworks are evolving to maintain a defensive edge through smarter, more adaptive controls. * **AI-driven policy evaluation:** Risk scoring and anomaly detection influence access decisions more dynamically. * **SaaS and browser pathway protection:** Increased focus on session/token security and SaaS integrations as common attack paths. * **Supply chain and third-party access controls:** Tighter vendor and partner access governance, with stronger monitoring. ## Zero Trust FAQs ### Is Zero Trust a specific product I can buy? Zero trust is a strategic framework and architecture, not a single product. It involves integrating tools such as identity management, endpoint security, and network segmentation into a cohesive system. ### How does Zero Trust affect the user experience? When implemented correctly, zero trust can actually improve the user experience by providing seamless single sign-on access to applications from any device, reducing the need for cumbersome VPN clients. ### What is the difference between Zero Trust and ZTNA? Zero trust is the overarching philosophy, while Zero Trust Network Access (ZTNA) is a specific technology category that provides secure remote access to applications based on the zero trust model. ### Does Zero Trust require a complete network overhaul? No, zero trust can be implemented incrementally. Most organizations start by identifying their most critical data and applying zero trust principles to that specific "protect surface" before expanding. ### Is Zero Trust only for large enterprises? Zero trust is relevant for organizations of all sizes. Small and medium businesses are increasingly targets of cyberattacks and can benefit significantly from the simplified, identity-centric approach of zero trust. ### What is Zero Trust Network Access (ZTNA)? ZTNA (Zero Trust Network Access) provides users with secure, app-specific access by continuously verifying identity, device health, and context, rather than trusting anyone just because they're "on the network." Compared to a VPN, it limits access to only what's needed and reduces lateral movement, making it harder for attackers to roam if something gets compromised. ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20is%20Zero%20Trust%3F%20Definition%2C%20Principles%2C%20and%20Strategy&body=Learn%20what%20Zero%20Trust%20is%2C%20why%20identity%20is%20the%20new%20perimeter%2C%20and%20how%20to%20implement%20a%20NIST-aligned%20Zero%20Trust%20Architecture%20using%20Unit%2042%20threat%20intelligence.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-zero-trust) Back to Top [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture?ts=markdown) What Is Zero Trust Architecture? Key Elements and Use Cases {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language