[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberark/Seamless_IDs_small.jpg) Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-security-solution?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberark/Seamless_IDs_small.jpg) Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.paloaltonetworks.com/deploybravely?ts=markdown) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Identity Security](https://www.paloaltonetworks.com/cyberpedia/identity-security?ts=markdown) 3. [Privileged Access Management](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management?ts=markdown) 4. [Zero Standing Privileges](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges?ts=markdown) Table of Contents * [What Is Privileged Access Management (PAM)?](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management?ts=markdown) * [Privileged Access Management Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#privileged?ts=markdown) * [Why PAM Is Critical Today](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#why?ts=markdown) * [How PAM Works](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#how?ts=markdown) * [Core Pillars of Modern PAM Strategy](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#core?ts=markdown) * [Examples of Privileged Access](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#examples?ts=markdown) * [PAM Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#pam?ts=markdown) * [Common PAM Challenges and How to Solve Them](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#common?ts=markdown) * [Use Cases \& Real-World Scenarios](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#scenarios?ts=markdown) * [Emerging Trends: Where PAM Is Going](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#emerging?ts=markdown) * [Privileged Access Management FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#faqs?ts=markdown) * [What Is Defense-in-Depth?: A Layered Cybersecurity Strategy](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth?ts=markdown) * [Defense-in-Depth Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#explained?ts=markdown) * [Key Data: Threats \& Trends](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#key?ts=markdown) * [The Core Architectural Components of Defense-in-Depth](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#core?ts=markdown) * [Defense-in-Depth in the Modern Cloud and Identity Landscape](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#landscape?ts=markdown) * [Disrupting the Attack Lifecycle: Defense-in-Depth and Lateral Movement](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#disrupting?ts=markdown) * [Defense-in-Depth versus Zero Trust Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#architecture?ts=markdown) * [Best Practices for Implementing a Layered Security Model](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#best?ts=markdown) * [Defense-in-Depth FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#faqs?ts=markdown) * [What Is Just-In-Time Access?](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit?ts=markdown) * [Just-in-Time Access Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#explained?ts=markdown) * [Key Data: Threats and Trends](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#key?ts=markdown) * [Types of Just-in-Time Access](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#types?ts=markdown) * [How Just-in-Time Access Works (Conceptual Flow)](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#how?ts=markdown) * [Key Components and Capabilities](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#components?ts=markdown) * [Key Steps to Implementing Just-in-Time Access](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#steps?ts=markdown) * [Common Risks and Implementation Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#risks?ts=markdown) * [Just-in-Time Access in a Zero Trust and Modern Security Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#architecture?ts=markdown) * [Just-in-Time Access FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#architecture?ts=markdown) * Zero Standing Privileges: Protecting Enterprise Access Control * [Zero Standing Privileges Explained](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#zero?ts=markdown) * [ZSP and Other Access Models](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#vs?ts=markdown) * [The Critical Risk of Standing Privileges](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#privileges?ts=markdown) * [Key Benefits of Adopting ZSP](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#key?ts=markdown) * [A Practical Roadmap for ZSP Implementation](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#practical?ts=markdown) * [Zero Standing Privileges FAQs](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#faqs?ts=markdown) * [What Is Least Privilege Access?](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access?ts=markdown) * [Least Privilege Access, Defined](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access#definition?ts=markdown) * [Benefits of Least Privilege](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access#benefits?ts=markdown) * [Example of Least Privilege Access](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access#example?ts=markdown) * [Least Privilege vs. Zero Trust](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access#vs?ts=markdown) * [Managing Least Privilege Access](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access#manage?ts=markdown) * [Least Privilege Access FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access#faqs?ts=markdown) # What Is Zero Standing Privileges (ZSP)? 3 min. read [Explore Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) Table of Contents * * [Zero Standing Privileges Explained](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#zero?ts=markdown) * [ZSP and Other Access Models](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#vs?ts=markdown) * [The Critical Risk of Standing Privileges](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#privileges?ts=markdown) * [Key Benefits of Adopting ZSP](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#key?ts=markdown) * [A Practical Roadmap for ZSP Implementation](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#practical?ts=markdown) * [Zero Standing Privileges FAQs](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#faqs?ts=markdown) 1. Zero Standing Privileges Explained * * [Zero Standing Privileges Explained](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#zero?ts=markdown) * [ZSP and Other Access Models](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#vs?ts=markdown) * [The Critical Risk of Standing Privileges](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#privileges?ts=markdown) * [Key Benefits of Adopting ZSP](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#key?ts=markdown) * [A Practical Roadmap for ZSP Implementation](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#practical?ts=markdown) * [Zero Standing Privileges FAQs](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#faqs?ts=markdown) Zero Standing Privileges (ZSP) is an advanced [identity security](https://www.paloaltonetworks.com/cyberpedia/what-is-identity-security?ts=markdown) principle that mandates eliminating all permanent (standing) access rights for every identity, human or machine, within an organization's environment. ZSP achieves an actual zero-trust state by ensuring that all privileges are revoked immediately after use, dynamically creating or provisioning only the minimum entitlements necessary for a specific task and a limited timeframe. This paradigm shift shifts access control from a fixed, role-based model to a context-aware, and Just-in-Time (JIT), significantly reducing the threat attack surface. Key Points * **Zero Access by Default**: Every user, account, and workload starts with zero privileges; access is only granted upon verified request. \* **Next-Generation Least Privilege**: ZSP goes beyond the traditional Principle of Least Privilege (PoLP) by eliminating standing privileges, rather than merely minimizing them. \* **Dynamic Entitlements**: Access rights are not merely enabled or disabled; they are dynamically provisioned for a task and deleted upon completion or expiration. \* **Reduced Attack Surface**: Eliminating persistent privileged accounts significantly mitigates the risk of credential theft, lateral movement, and privilege escalation attacks. \* **Cloud-Native Necessity**: ZSP is particularly critical in dynamic cloud environments where identities and resources are often ephemeral and machine identities vastly outnumber human users. \* **Enforces Zero Trust**: It is the tactical, granular access-control component required to realize the strategic goal of a Zero Trust Architecture. ## Zero Standing Privileges Explained ZSP represents the ultimate goal of modern [PAM](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management?ts=markdown), building on foundational access models and [just-in-time access](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit?ts=markdown). The shift is driven by the rise of complex, multi-cloud environments where traditional network perimeters are obsolete. In these fluid ecosystems, many identities, especially service accounts, DevOps teams, and developers, require high-level, temporary access to critical resources. Static, "always-on" permissions for these accounts create a massive, 24/7 security gap. ZSP addresses this by shifting the default state from minimal persistent access to no persistent access. The system does not rely on securing an existing privileged account; it creates an ephemeral security perimeter around the identity, resource, and task. This temporary, hyper-focused granting of permission(s) eliminates standing risk and makes every privileged action traceable and auditable. ## ZSP and Other Access Models Understanding ZSP requires distinguishing it from its predecessors and related security frameworks. ### ZSP and Just-in-Time (JIT) Access ZSP is a comprehensive security philosophy, while JIT is primarily a provisioning mechanism. | **Feature** | **Just-in-Time (JIT) Access** | **Zero Standing Privileges (ZSP)** | |-----------------------|--------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------| | **Default State** | Minimal, pre-defined access (standing privilege exists). | Zero access (no standing privilege exists). | | **Action on Request** | Elevates or enables an existing privileged role or account for a set time. | Dynamically provisions net-new, temporary entitlements and roles. | | **Action on Expiry** | Revokes the elevation, restoring the account to its previous privileged state. | Deletes the temporary entitlements, returning the identity to a state of zero privileges. | | **Risk Reduction** | Reduces the window of access risk. | Eliminates the standing access risk. | ***Table 1**: ZSP vs Predecessors and Related Security Frameworks* ### ZSP and Principle of Least Privilege (PoLP) The [Principle of Least Privilege (PoLP)](https://www.paloaltonetworks.com/cyberpedia/what-is-the-principle-of-least-privilege?ts=markdown) is a foundational concept that states users should be granted only the minimum access required to perform their jobs, often resulting in accounts having some baseline level of standing access. ZSP is the complete, modern realization of PoLP, enforcing the principle not just in scope, but also in time, achieving zero persistent, unnecessary access. It is PoLP taken to its logical, most secure conclusion. ### ZSP and the Zero Trust Architecture Zero trust is a strategic security model based on the mantra "never trust, always verify." ZSP is a necessary component for successful zero trust implementation. You cannot achieve Zero Trust if high-risk standing privileges still exist. ZSP provides the granular identity controls needed to enforce "always verify" access across the control plane. This alignment creates a highly effective defense against modern threats. ## The Critical Risk of Standing Privileges Standing privileges are a high-value target for adversaries, representing a major exposure point that provides a necessary condition for advanced attacks. ### Lateral Movement and Privilege Escalation If an attacker compromises a non-privileged account, their immediate goal is to escalate to a privileged account. If a privileged administrator's credentials are stolen, often through [phishing](https://www.paloaltonetworks.com/cyberpedia/what-is-phishing?ts=markdown) or brute-force attacks, the standing privilege grants the attacker immediate, unrestricted access. [Traditional privileged access management (PAM)](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management?ts=markdown) helps, but if standing privileges exist, an attacker can move laterally across the network and access sensitive systems undetected. ### The Cloud Complexity Challenge The risk is magnified in cloud environments where entitlements are complex and interconnected across IaaS and [SaaS](https://www.paloaltonetworks.com/cyberpedia/what-is-saas?ts=markdown) platforms. Even a user with an apparently non-privileged account may possess excessive or unused entitlements via nested roles. This excess access, known as "permission sprawl," is a form of standing privilege. This complexity is why solutions like[Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cyberpedia/what-is-ciem?ts=markdown) are essential tools for identifying and eliminating these excessive, persistent permissions to enable ZSP. ## Key Benefits of Adopting ZSP Implementing a ZSP strategy delivers quantifiable security and operational benefits across the enterprise. ### Maximized Attack Surface Reduction ZSP significantly reduces the attack surface by eliminating persistent targets that threat actors seek. When privileges exist only for a few minutes and are tied to a specific, legitimate task, a compromised credential in the wrong hands is rendered useless. This proactive approach halts [Unit 42 observed tactics](https://unit42.paloaltonetworks.com/2025-unit-42-global-incident-response-report-social-engineering-edition/), such as credential misuse and lateral movement, at their earliest stages. ### Simplified Regulatory Compliance Global regulations, including GDPR, HIPAA, and SOX, strictly mandate the PoLP and comprehensive auditing of access to sensitive data. ZSP inherently aligns with and simplifies these requirements. By automatically granting and revoking time-bound access, ZSP generates a perfect, transparent audit trail that proves compliance without the need for complex, manual access reviews. ### Mitigation of Insider Threat Risk By forcing every privileged action to be authorized, monitored, and time-restricted, ZSP dramatically mitigates risk from both malicious and accidental insider threats. Even a trusted employee cannot use standing access to perform unauthorized actions outside the scope of their immediate, approved task. The system enforces the security policy, not human judgment. ## A Practical Roadmap for ZSP Implementation Transitioning to a true zero standing privileges model is a multi-step journey centered on moving away from persistent "always-on" permissions toward a model of dynamic, temporary elevation. ### Step 1: Discover and Map Standing Privileges The first step is gaining complete visibility into all effective permissions across the environment. You cannot eliminate what you haven't identified. This requires a comprehensive audit to map every human and machine identity against all granted entitlements. Use CIEM tools to analyze existing access policies, identify over-provisioned accounts, and pinpoint "dormant" privileges. This establishes a clean baseline where the default state for every identity is zero access. ### Step 2: Define Just-in-Time (JIT) Elevation Policies Instead of assigning permanent roles, create policy templates that define the conditions under which an identity can "blink" into existence or elevate its status. Policies must be governed by the PoLP but executed via time-bound triggers. You must define: * **The Scope**: Exactly which resources can be accessed. * **The Duration**: How long the window stays open (ideally measured in minutes or hours). * **The Context** : Requirements such as a valid IT support ticket number or [MFA](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-factor-authentication?ts=markdown) verification. ### Step 3: Integrate with PAM and IAM for Orchestration To prevent ZSP from becoming a bottleneck, the elevation process must be fully automated through your [Identity and Access Management (IAM)](https://www.paloaltonetworks.com/cyberpedia/what-is-identity-and-access-management?ts=markdown) and PAM stack. A request for privileged access should trigger an automated, friction-free workflow: 1. **Authentication**: Verified via your Identity Provider (IdP). 2. **Validation**: Automated policy check against the ticketing system. 3. **Dynamic Provisioning**: The system creates a temporary credential or attaches a policy to the identity in real-time. 4. **Notification**: Immediate logging and alerting for security teams. ### Step 4: Continuous Monitoring and Automated Revocation ZSP is only effective if the "cleanup" is guaranteed. Continuous monitoring ensures that sessions are tracked in real time and that no "identity sprawl" occurs after a task is finished. The system must be configured for automated and immediate revocation. Once the task is completed or the time window expires, the system must destroy the temporary credentials or detach the elevated policy. This ensures the identity instantly reverts to its zero-privileges state, effectively closing the window of exposure and leaving no standing credentials for attackers to exploit. ## Zero Standing Privileges FAQs ### What are some examples of standing privileges? Standing privileges are persistent access rights that remain active indefinitely, regardless of whether they are in use. Common examples include AWS root accounts, domain administrator accounts in Active Directory, permanent local administrator rights on a user's workstation, and service accounts with static, high-level permissions. ### Is ZSP required for Zero Trust? Yes, ZSP is functionally required for true Zero Trust. While Zero Trust is the strategic framework, ZSP is the operational security principle that enforces the "never trust, always verify" rule for privileged access. Without ZSP, the existence of always-on privileged accounts fundamentally violates the Zero Trust model. ### How does ZSP apply to machine identities? ZSP is critical for machine identities (e.g., applications, services, containers) that often need high-level access to databases or secrets. Instead of providing a long-lived API key (a standing privilege), ZSP solutions issue short-lived, dynamic tokens or certificates that expire automatically after a single transaction, minimizing the risk of a compromised secret. ### Does ZSP replace credential vaulting? No, ZSP does not fully replace credential vaulting, but it reduces the **attack surface**. ZSP aims to eliminate the need for standing credentials by using dynamic access methods. However, some foundational "break-glass" accounts (such as a cloud master key) may still need to exist and must be protected in a highly secure (PAM) vaulted environment with rigorous auditing and dual-control policies. ### What is the 'Time, Entitlements, and Approvals' (TEA) framework? The TEA framework outlines the three core pillars of a ZSP policy: Time (access is strictly limited in duration), Entitlements (access is strictly limited in scope, or Just-Enough Access), and Approvals (all access requests must be authorized before provisioning). This framework ensures context-aware, secure, and auditable access control. Related Content [Principle of Least Privilege (Cyberpedia) Learn the core access-control principle behind zero standing privileges and how it reduces attack surface and blast radius.](https://www.paloaltonetworks.com/cyberpedia/what-is-the-principle-of-least-privilege?ts=markdown) [ZTNA 2.0 (Solution Page) See how ZTNA 2.0 enables least-privilege access with continuous verification and inline inspection for users and apps.](https://www.paloaltonetworks.com/sase/ztna?ts=markdown) [Zero Trust Network Access For Dummies (eBook) Build a practical ZTNA 2.0 foundation and understand how to move from legacy remote access to Zero Trust.](https://start.paloaltonetworks.com/ztna-for-dummies.html) [ZTNA 2.0: The new standard for securing access (Whitepaper) Learn what "good" looks like for Zero Trust access and which projects to start now to modernize remote/private app access.](https://www.paloaltonetworks.com/resources/whitepapers/ztna-2-0-the-new-standard-for-securing-access?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=Zero%20Standing%20Privileges%3A%20Protecting%20Enterprise%20Access%20Control&body=Learn%20how%20Zero%20Standing%20Privileges%20%28ZSP%29%20works%20with%20Just-in-Time%20%28JIT%29%20access%20to%20minimize%20your%20cloud%20attack%20surface%20and%20achieve%20a%20true%20Zero%20Trust%20state.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/zero-standing-privileges) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit?ts=markdown) What Is Just-In-Time Access? [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access?ts=markdown) What Is Least Privilege Access? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language