[](https://www.paloaltonetworks.com/idira?ts=markdown) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Idira logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/idira-logo-dark.svg)](https://www.paloaltonetworks.com/idira?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/idira?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions [Human Identities](https://www.paloaltonetworks.com/idira/human?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) [Machine Identities](https://www.paloaltonetworks.com/idira/machine?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) \[![Secure the next wave of autonomous, self-reasoning agents with Idira.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/nav-agentic-banner.jpg) Secure the next wave of autonomous, self-reasoning agents with Idira. Identity's role in securing AI\](https://www.paloaltonetworks.com/idira/agentic ?ts=markdown) * [Blog](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) * Resources ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Resources Resources * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia/identity-security?ts=markdown) * [Live Community](https://live.paloaltonetworks.com/) * [Technical Documentation](https://docs.paloaltonetworks.com) * [Support](https://support.paloaltonetworks.com/Support/Index) * [Technical Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * [Resource Center](https://www.paloaltonetworks.com/resources?ts=markdown) * [Events](https://events.paloaltonetworks.com) [Blog Get expert insights on modern threats and trends Learn more](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) [Idira in Action See how our AI platforms stop threats in real time. Learn more](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) [Customer Stories Discover how leading organizations solve identity challenges. Learn more](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * Get In Touch ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Get In Touch Get in Touch * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Find a Partner](https://technologypartners.paloaltonetworks.com/English/directory) * [Join our Community](https://live.paloaltonetworks.com/) * * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) ![palo alto networks logo icon](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-default.svg) ![white arrow icon pointing left to return to main Palo Alto Networks site](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) [](https://www.paloaltonetworks.com/idira?ts=markdown) Search Close search modal Next-Generation Human Identity Security for Your AI-Enabled Workforce === Right Access. Aligned Privilege. Current Compliance. * [Read how](https://www.paloaltonetworks.com/resources/whitepapers/a-new-operating-model-for-identity-security?ts=markdown) PlatformOfferingsKey Capabilities \& FeaturesValidationIdira in Action [Platform](#platform) [Offerings](#offerings) [Key Capabilities \& Features](#features) [Validation](#customers) [Idira in Action](#contact-us) {#platform} Platform ## Idira: The only identity security solution you need. Modernize PAM. Bring discovery, control and governance to identity chaos and privilege explosion. \[Privilege Is Everywhere ![Privilege icon](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/human/03-icons-1.svg) ### Privilege Is Everywhere 96% of human identities have excessive access. Every new application and access request fuels privilege sprawl. [^2^](#inline-stats-sources2) Control privilege sprawl\](https://www.paloaltonetworks.com/resources/ebooks/buyers-guide-to-smart-privileged-identity-controls?ts=markdown) \[Blind Spots Persist ![Blind Spots icon](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/human/03-icons-2.svg) ### Blind Spots Persist Securing your identity estate is difficult when fragmented tools prevent unified visibility into access. Gain visibility\](https://www.paloaltonetworks.com/resources/techbriefs/human-identity-security?ts=markdown) \[The Result? Risk Proliferates. ![Warning icon](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/human/03-icons-3.svg) ### The Result? Risk Proliferates. Every visibility gap across your environment creates an opportunity for attackers. Today's blind spots become tomorrow's breaches. Reduce risk\](https://www.paloaltonetworks.com/idira/secure-every-identity-with-the-right-privilege-controls?ts=markdown) {#offerings} WHAT WE OFFER ## Move faster while reducing risk. Idira^®^ offers intelligent discovery, smart controls and always-on governance so you can enable productivity without sacrificing security. ### Discover every privilege and every risk. Nothing stays hidden. Unify visibility across the estate, continuously discover every identity and entitlement, surface shadow IT and bring all access under intelligent, policy-driven controls. [See how](https://www.paloaltonetworks.com/resources/techbriefs/human-identity-security?ts=markdown) ### Secure with control and flexibility, not silos. Enforce least privilege across every access path. Secure credentials, broker sessions and protect cloud, infrastructure, SaaS and endpoints without gaps. Eliminate standing access with just-in-time controls and automated rotation. Grant ephemeral access, revoke at session close and audit every action. [Read more](https://www.paloaltonetworks.com/resources/ebooks/secure-every-identity-with-the-correct-privilege-controls?ts=markdown) ### Govern with continuous intelligence. Grant the right access from day one. Continuously govern access across the lifecycle with real-time visibility into entitlements and risk. Reduce effort with AI-driven decisions and automated provisioning and reviews. Enforce least privilege continuously and deliver audit-ready compliance. [Get governance that works](https://www.paloaltonetworks.com/resources/datasheets/identity-governance-and-administration?ts=markdown) {#features} KEY CAPABILITIES \& FEATURES ## Idira delivers one platform. Idira equips your AI-ready workforce. One trusted platform to serve all of your privileged access, workforce access, endpoint management security and identity governance needs. *** ** * ** *** Volume Play *** ** * ** *** * PAM * IAM * IGA * EPM Select a topicPAMIAMIGAEPM ### Privileged access secured everywhere. Broker secure vaulted JIT and ZSP access models across modern infrastructure, cloud services, SaaS applications and third-party access with full session isolation, monitoring and control without slowing users down. [Learn more](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) ### Secure every login, session and device. Unify access across SaaS, cloud and legacy applications with passwordless authentication, phishing-resistant MFA and dynamic authorization. This reduces user friction while strengthening security. Maintain continuous visibility and control post login with session monitoring and enforcement. [Learn more](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) ### Close the governance gap across every identity. Continuously govern access across the lifecycle with full visibility into entitlements, risk and activity. Automate provisioning and reviews with AI-driven decisions to enforce least privilege and deliver audit-ready compliance at scale. [Learn more](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) ### Remove standing admin rights. Enable productivity without risk. Replace permanent admin access with policy-driven elevation for approved tasks. Block unauthorized privilege attempts instantly and enforce least privilege across every endpoint server, and AI-driven identity without slowing users down. [Learn more](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) {#validation} * 87% of organizations experienced at least two successful identity-centric breaches in the last year.^[1](#inline-stats-sources1)^ * 97% report that identity silos delay identity incident responses.^[2](#inline-stats-sources2)^ * 12 Hours is the average delay in breach response due to identity silos.^[3](#inline-stats-sources3)^ WHY NOW ## How much could identity silos cost your business? Attackers aren't breaking in. They're logging in. {#customers} CUSTOMERS [![optiv logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-7.1.svg)](https://www.paloaltonetworks.com/customers/optiv?ts=markdown) [![healthfirst logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-7.2.svg)](https://www.paloaltonetworks.com/customers/healthfirst?ts=markdown) [![pds logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/customers/pds_health_Logo-white.svg)](https://www.paloaltonetworks.com/customers/pds-health?ts=markdown) [![ecad logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-7.4.svg)](https://www.paloaltonetworks.com/customers/ecad?ts=markdown) [![cusd logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-7.6.svg)](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) [![Transgourmet logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/customers/Transgourmet_logo-small-white.png)](https://www.paloaltonetworks.com/customers/transgourmet-france?ts=markdown) {#contact-us} Idira in Action ## Talk to a human identity expert See how Idira secures human, machine and agentic identities at enterprise scale. Reduce identity risk without slowing the business. First NameLast NameBusiness EmailCompanyJob LevelSelect a job levelJob RoleSelect a job functionPhoneCountryCountryStateStateProvinceProvinceZip CodeDepartment Continue Sign me up to receive news, product updates, sales outreach, event information and special offers about Palo Alto Networks and its partners. By submitting this form, I understand my personal data will be processed in accordance with [Palo Alto Networks Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) and [Terms of Use.](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. Back Sign up THANK YOU! A Palo Alto Networks specialist will reach out to you shortly. We look forward to connecting with you! {#resources} RESOURCES ## Strengthen Your Human Identity Security [![Secure Every Identity with the Correct Privilege Controls](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/human/Resources_eBook_secure-every-identity.png) ![mobile Secure Every Identity with the Correct Privilege Controls](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/human/Resources_eBook_secure-every-identity.png) E-Book Secure Every Identity with the Correct Privilege Controls](https://www.paloaltonetworks.com/resources/ebooks/secure-every-identity-with-the-correct-privilege-controls?ts=markdown) [![A New Operating Model for Identity Security](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/a-new-operating-model-for-identity-security.png) ![mobile A New Operating Model for Identity Security](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/a-new-operating-model-for-identity-security.png) Whitepaper A New Operating Model for Identity Security](https://www.paloaltonetworks.com/resources/whitepapers/a-new-operating-model-for-identity-security?ts=markdown) [![The Future of Privilege: One Platform, Every Environment](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) ![mobile The Future of Privilege: One Platform, Every Environment](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) Video The Future of Privilege: One Platform, Every Environment](https://www.paloaltonetworks.com/resources/webcasts/the-future-of-privilege-one-platform-every-environment?ts=markdown) PreviousNext {#faq} Faqs ## Frequently Asked Questions About Idira Human Identity Security Why do I need an identity security platform? Traditional tools manage identities in silos. An identity security platform unifies governance, access and privilege controls to reduce risk, enforce least privilege and support zero trust across every identity. What do you mean by "every user is privileged"? Because privilege is no longer fixed or easy to spot, any user can quickly gain elevated access through access requests, shadow IT and unmanaged access paths outside IT's view. That makes every identity a potential route to privileged access. How does Idira support a zero trust approach? Idira enforces zero trust through continuous verification and least privilege. Access is granted based on identity, device and context, with real-time policy enforcement and no implicit trust at any step. Does Idira support just-in-time access? Yes. Idira combines governance and privileged access to deliver just-in-time access with control. Access is requested, evaluated with policy and risk checks, approved when needed, and then provisioned for the session and revoked automatically at completion. Does Idira only secure human identities? No. Idira secures human and machine identities, including applications, workloads and AI agents. All identities are governed under a unified policy model with consistent controls and visibility. How does Idira support compliance and audits? Idira delivers continuous visibility, automated controls and centralized audit trails. Generate audit-ready evidence across access, sessions and policies to support frameworks like SOX, HIPAA and ISO 27001. Can Idira integrate with my existing tools? Yes. Idira integrates with enterprise directories, cloud platforms, SaaS applications, ITSM tools and security ecosystems to unify identity data and enforce policy across your existing environment. How does Idira secure access during active sessions? Idira monitors and records sessions in real time, enforces policy midsession and captures activity for investigation and compliance. Risky behavior can trigger reauthentication or session termination. How quickly can I get started? Idira offers cloud-native deployment and rapid onboarding. Integrations and automation accelerate time to value without long, services-heavy implementations. Show more + * ^1.^[2025 Threat Landscape Report](https://www.paloaltonetworks.com/resources/ebooks/2025-identity-security-landscape?ts=markdown), Idira by Palo Alto Networks. * ^2.^[2026 Identity Security Landscape](https://www.paloaltonetworks.com/idira/identity-security-landscape-report?ts=markdown), Idira by Palo Alto Networks. * ^3.^Ibid. {#footer} Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/ai-security?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Next-Generation Identity Security](https://www.paloaltonetworks.com/idira?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![Palo Alto Networks Logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language