[](https://www.paloaltonetworks.com/idira?ts=markdown) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Idira logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/idira-logo-dark.svg)](https://www.paloaltonetworks.com/idira?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/idira?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions [Human Identities](https://www.paloaltonetworks.com/idira/human?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) [Machine Identities](https://www.paloaltonetworks.com/idira/machine?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) \[![Secure the next wave of autonomous, self-reasoning agents with Idira.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/nav-agentic-banner.jpg) Secure the next wave of autonomous, self-reasoning agents with Idira. Identity's role in securing AI\](https://www.paloaltonetworks.com/idira/agentic ?ts=markdown) * [Blog](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) * Resources ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Resources Resources * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia/identity-security?ts=markdown) * [Live Community](https://live.paloaltonetworks.com/) * [Technical Documentation](https://docs.paloaltonetworks.com) * [Support](https://support.paloaltonetworks.com/Support/Index) * [Technical Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * [Resource Center](https://www.paloaltonetworks.com/resources?ts=markdown) * [Events](https://events.paloaltonetworks.com) [Blog Get expert insights on modern threats and trends Learn more](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) [Idira in Action See how our AI platforms stop threats in real time. Learn more](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) [Customer Stories Discover how leading organizations solve identity challenges. Learn more](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * Get In Touch ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Get In Touch Get in Touch * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Find a Partner](https://technologypartners.paloaltonetworks.com/English/directory) * [Join our Community](https://live.paloaltonetworks.com/) * * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) ![palo alto networks logo icon](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-default.svg) ![white arrow icon pointing left to return to main Palo Alto Networks site](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) [](https://www.paloaltonetworks.com/idira?ts=markdown) Search Close search modal When AI Acts Alone, Identity Is the Only Control === Secure the next wave of autonomous, self-reasoning agents with Idira^®^. * [Identity's role in securing AI](https://www.paloaltonetworks.com/idira/idira-the-roadmap-to-securing-agentic-ai?ts=markdown) ChallengesWhat We OfferKey CapabilitiesIdira in Action [Challenges](#challenges) [What We Offer](#offerings) [Key Capabilities](#capabilities) [Idira in Action](#demo) {#challenges} CHALLENGES ## Agentic AI is expanding. So are your security risks. New hybrid identity class. ![New hybrid identity class](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/agentic/icons-1.svg) ### New hybrid identity class. AI agents blend human reasoning with machine scale and speed. This hybrid identity class without guard rails amplifies organizational risk. Exploding attack surface. ![Exploding attack surface](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/agentic/icons-2.svg) ### Exploding attack surface. Agents require broad permissions across your sensitive resources, turning a single compromised agent into a master key for your entire environment. Privilege Drift. ![Privilege Drift](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/agentic/icons-3.svg) ### Privilege Drift. Agents operate outside traditional human controls and are known to hallucinate and escalate privileges to achieve goals. Invisible workforce. ![Invisible workforce](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/agentic/icons-4.svg) ### Invisible workforce. The ease of creating AI agents leads to shadow AI. Without secure onboarding to a controlled registry, you're blind to risks of your agentic workforce. Scale without scrutiny. ![Scale without scrutiny.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/agentic/icons-5.svg) ### Scale without scrutiny. As AI agents and MCP servers proliferate across your environment, lack of controls and governance creates blind spots and burdens your security team. Accountability gap. ![Accountability gap](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/agentic/icons-6.svg) ### Accountability gap. Without a clear view of agent activities, you can't prove who or what authorized an action, putting your organization at compliance risk. {#offerings} WHAT WE OFFER An identity-first approach to agentic AI security built on tight privilege controls. --- Discover, control and govern AI agents with the right level of privilege control. ### Discover and centrally manage agents Expose your hidden AI attack surface and reclaim visibility. Idira Secure AI Agents scans SaaS, cloud and developer environments to identify active agents, enriching them with vital context, from ownership and purpose to status and permission levels. ### Control agent access and enforce least privilege Enforce precision guardrails through a dedicated agent identity broker. Idira acts as a dynamic enforcement point, granting agents access only for the duration of a specific task. By automatically revoking permissions the moment a job is done, you eliminate standing privileges and reduce attack surface. ### Govern and audit agent actions to support compliance Get visibility and auditability into the actions agents are taking. Idira Secure AI Agents logs agents' actions and communications, allowing you to see what actions were performed by what agent and on behalf of which user. ![Executive Guide](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/agentic/prisma-airs.png) Native integration with Prisma AIRS 3.0 (coming soon) Access Agent Identity Security through Prisma AIRS interface and enforce identity security controls via the AI Gateway [Learn more](https://www.paloaltonetworks.com/prisma/agent-security?ts=markdown) {#capabilities} KEY CAPABILITIES \& FEATURES ## The identity control plane for your agentic workforce Transform AI risk into business agility with a unified platform designed to discover, control and govern agentic identities at scale. *** ** * ** *** Volume Play *** ** * ** *** * Agent Registry * Agent Context * Agent Identity Broker * Agent Kill Switch * Agent Lifecycle Management * Agent Audit \& Governance Select a topicAgent RegistryAgent ContextAgent Identity BrokerAgent Kill SwitchAgent Lifecycle ManagementAgent Audit \& Governance ### Discover the invisible agent workforce. Idira Secure AI Agents discovers agents across SaaS, cloud and developer environments and onboards into a centralized repository --- giving you visibility into what's running and where. ### Understand agent actions and behaviors. With Idira Secure AI Agents, each agent is enriched with context, such as ownership, purpose description, status and permissions, helping you understand who owns each agent, what it does and what it can access. ### Enforce privilege controls for agentic identities. Our Agent Identity Broker enforces dynamic access policies, ensuring you're extending the principle of least privilge and just-in-time access to your agents. ### Detect anomalous agent behavior and revoke access in real time. When an agent deviates from its mission, every second counts. Our Agent Identity Broker can act as a kill switch and deny access when an agent goes rogue. ### Control agent lifecylce from creation to decomission. Easily onboard agents, audit their actions, understand what permissions are in use and improve lifecycle management with automated ownership workflows. ### Stay compliant with a clear audit trail. See what actions agents perform and on behalf of what user. Get comprehensive access reviews that highlight what resources each agent can access and which permissions are in use. {#why-now} WHY NOW ## Are you ready for the identity challenges of AI agents? 99 out of 100 organizations have adopted AI agents.^[1](#inline-stats-sources1)^ \<10% of organizations have critical controls like agent registries and authorization.^[2](#inline-stats-sources2)^ 66% of CISOs rank agentic AI among their top three cybersecurity risks.^[2](#inline-stats-sources2)^ 40% of AI agents have access to organizational data.^[1](#inline-stats-sources1)^ {#demo} Idira in Action ## Request an agent identity workshop Join a virtual workshop with our Agentic Identity Experts to get a free assessment of your agent identity maturity, learn about identity security best practices for agents and get a demo of the solution. First NameLast NameBusiness EmailCompanyJob LevelSelect a job levelJob RoleSelect a job functionPhoneCountryCountryStateStateProvinceProvinceZip CodeDepartment Continue Sign me up to receive news, product updates, sales outreach, event information and special offers about Palo Alto Networks and its partners. By submitting this form, I understand my personal data will be processed in accordance with [Palo Alto Networks Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) and [Terms of Use.](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. Back Sign up THANK YOU! A Palo Alto Networks specialist will reach out to you shortly. We look forward to connecting with you! {#resources} Resources ## Get the latest agentic identity security insights [![AI Agents: Third-Party Risks \& Insider Threats](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/ai-agents-as-third-party-risk-and-insider-threats.png) ![mobile AI Agents: Third-Party Risks \& Insider Threats](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/ai-agents-as-third-party-risk-and-insider-threats.png) E-Book AI Agents: Third-Party Risks \& Insider Threats](https://www.paloaltonetworks.com/resources/ebooks/ai-agents-as-both-third-party-risk-and-insider-threat?ts=markdown) [![Securing Agentic AI: Identity as the Emerging Foundation for Defense](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/securing-agentic-ai.webp) ![mobile Securing Agentic AI: Identity as the Emerging Foundation for Defense](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/securing-agentic-ai.webp) Whitepaper Securing Agentic AI: Identity as the Emerging Foundation for Defense](https://www.paloaltonetworks.com/resources/whitepapers/securing-agentic-ai?ts=markdown) [![Secure AI Agents](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/secure-ai-agents.webp) ![mobile Secure AI Agents](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/secure-ai-agents.webp) Solution Brief Secure AI Agents](https://www.paloaltonetworks.com/resources/techbriefs/secure-ai-agents?ts=markdown) [![When AI Acts Alone, You Need Identity to Maintain Control](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/when-ai-acts-alone-you-need-identity-to-maintain-control.png) ![mobile When AI Acts Alone, You Need Identity to Maintain Control](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/when-ai-acts-alone-you-need-identity-to-maintain-control.png) Infographic When AI Acts Alone, You Need Identity to Maintain Control](https://www.paloaltonetworks.com/resources/infographics/when-ai-acts-alone-you-need-identity-to-maintain-control?ts=markdown) [![Secure Your Agentic AI Coworker](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/webinar.png) ![mobile Secure Your Agentic AI Coworker](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/webinar.png) Webinar Secure Your Agentic AI Coworker](https://www.paloaltonetworks.com/resources/webcasts/secure-agentic-ai-coworker?ts=markdown) [![Securing Agentic AI: Why Identity Is the First Step](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/webinar.png) ![mobile Securing Agentic AI: Why Identity Is the First Step](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/webinar.png) Webinar Securing Agentic AI: Why Identity Is the First Step](https://www.paloaltonetworks.com/resources/webcasts/securing-agentic-ai-why-identity-is-the-first-step?ts=markdown) [![Securing AI Agents: Privileged Machine Identities at Unprecedented Scale](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) ![mobile Securing AI Agents: Privileged Machine Identities at Unprecedented Scale](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) Blog Securing AI Agents: Privileged Machine Identities at Unprecedented Scale](https://www.paloaltonetworks.com/blog/identity-security/securing-ai-agents-privileged-machine-identities-at-unprecedented-scale/?ts=markdown) [![Agentic AI Security: What Business Leaders Can’t Afford to Ignore](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) ![mobile Agentic AI Security: What Business Leaders Can’t Afford to Ignore](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) Blog Agentic AI Security: What Business Leaders Can't Afford to Ignore](https://www.paloaltonetworks.com/blog/identity-security/agentic-ai-security-what-business-leaders-cant-afford-to-ignore/?ts=markdown) [![What's Shaping the AI Agent Security Market in 2026](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) ![mobile What's Shaping the AI Agent Security Market in 2026](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) Blog What's Shaping the AI Agent Security Market in 2026](https://www.paloaltonetworks.com/blog/identity-security/whats-shaping-the-ai-agent-security-market-in-2026/?ts=markdown) PreviousNext {#faq} Frequently asked questions about Idira agentic identity security --- Do I need to worry about AI security now? What if my organization doesn't have AI agents deployed? Yes. It's important to have an AI security strategy before any agents are deployed. Today's low-code/no-code platforms mean almost anyone can develop and deploy agents, and your organization needs to implement security policies and controls early, as it's much more difficult to add them after the fact. What makes agentic AI security so challenging? Agentic AI agents can be a security challenge for many reasons, including: * AI agents are nondeterministic, meaning they can produce different results for the same input, which can break traditional security models. * AI agents require elevated privileges to access sensitive resources like databases, APIs, financial systems and customer data. * AI agents make decisions independently, introducing unpredictability. * Developers can create agents without security oversite (shadow AI). * And more. Where should I start to figure out my organization's agentic security strategy? For a successful AI security strategy, we recommend: * Adopting an identity-first approach with discovery, inventory and classification of agents. * Enforcing least privilege for agents, ensuring they only have the access for the specific action and the specific time window needed. * Establishing governance and lifecycle management, including clear policies, regular audits and alignment with regulations. To get started, check out our whitepaper Key Requirements to Secure AI Agent Identities, Privilege, and Access. What are the risks of not securing access privileges of AI agents? The risks of AI agents stem from ensuring these identities have the right level of privilege access --- just as you need to do with humans and machines. AI risks increase: * As your agents evolve from simple AI assistants to agentic AI with increased access privileges to sensitive enterprise resources. * As you start granting more autonomy to agents with humans in a supervisory role. * As agents start delegating tasks to other agents and the risk is no longer contained to one system. Without the right security guardrails in place, you're creating vulnerability points in your environment, which could lead to breach. What are the key benefits of Idira Secure AI Agents? Idira Secure AI Agents can help you: * Deliver cyber risk reduction with a clear view of the AI agents in your environment and the ability to enforce least-privileged access. * Enable business resilience by unlocking the productivity benefits of AI without the business risk. * Satisfy audit and compliance with lifecycle management and audit tools. * Increase efficiency and automation by freeing up security teams from the manual work of managing AI identities. What AI agent actions does the Idira Secure AI Agents solution track? What information will be shown in the audit? Audits show which human user initiated the agent, which AI agent identity acted, which tools ran and which resource was touched. Show more + * ^1.^[2026 Identity Security Landscape, Idira by Palo Alto Networks, May 2026](https://www.paloaltonetworks.com/idira/identity-security-landscape-report?ts=markdown). * ^2.^[Securing Agentic AI: Identity as the Foundation of Defense, Idira by Palo Alto Networks, May 2026](https://www.paloaltonetworks.com/idira/idira-the-roadmap-to-securing-agentic-ai?ts=markdown). {#footer} Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/ai-security?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Next-Generation Identity Security](https://www.paloaltonetworks.com/idira?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language