[](https://www.paloaltonetworks.com/idira?ts=markdown) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Idira logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/idira-logo-dark.svg)](https://www.paloaltonetworks.com/idira?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/idira?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions [Human Identities](https://www.paloaltonetworks.com/idira/human?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) [Machine Identities](https://www.paloaltonetworks.com/idira/machine?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) \[![Secure the next wave of autonomous, self-reasoning agents with Idira.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/nav-agentic-banner.jpg) Secure the next wave of autonomous, self-reasoning agents with Idira. Identity's role in securing AI\](https://www.paloaltonetworks.com/idira/agentic ?ts=markdown) * [Blog](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) * Resources ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Resources Resources * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia/identity-security?ts=markdown) * [Live Community](https://live.paloaltonetworks.com/) * [Technical Documentation](https://docs.paloaltonetworks.com) * [Support](https://support.paloaltonetworks.com/Support/Index) * [Technical Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * [Resource Center](https://www.paloaltonetworks.com/resources?ts=markdown) * [Events](https://events.paloaltonetworks.com) [Blog Get expert insights on modern threats and trends Learn more](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) [Idira in Action See how our AI platforms stop threats in real time. Learn more](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) [Customer Stories Discover how leading organizations solve identity challenges. Learn more](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * Get In Touch ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Get In Touch Get in Touch * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Find a Partner](https://technologypartners.paloaltonetworks.com/English/directory) * [Join our Community](https://live.paloaltonetworks.com/) * * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) ![palo alto networks logo icon](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-default.svg) ![white arrow icon pointing left to return to main Palo Alto Networks site](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) [](https://www.paloaltonetworks.com/idira?ts=markdown) Search Close search modal Identity and Access Management === Secure your workforce and control access to every resource---from endpoints to SaaS and cloud---while defending against modern identity-based attacks. * [Get the buyer's guide](https://www.paloaltonetworks.com/resources/guides/buyers-guide-selecting-a-security-first-identity-and-access-management-solution?ts=markdown) ChallengesSolutionsKey Capabilities \& FeaturesCustomersIdira in Action [Challenges](#challenges) [Solutions](#solutions) [Key Capabilities \& Features](#capabilities) [Customers](#customers) [Idira in Action](#contact-us) {#challenges} Challenges ## Workforce identity gaps threaten security and productivity Identity is the top attack vector ![icon for Identity is the top attack vector](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-icon-3.1.svg) ### Identity is the top attack vector The rapid growth of identities, apps and devices, combined with AI-driven attacks and excessive privileges, are increasing cyber risk and expanding the attack surface. Traditional IAM ignores pre/post-auth risks ![icon for Traditional IAM ignores pre/post-auth risks](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-icon-3.2.svg) ### Traditional IAM ignores pre/post-auth risks Traditional IAM stops at authentication, overlooking device risks and leaving sessions vulnerable to hijacking, data exfiltration and postlogin attacks. Passwords continue to pose security risks ![icon for Passwords continue to pose security risks](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-icon-3.3.svg) ### Passwords continue to pose security risks Passwords remain a weak link, easily stolen, reused and exploited in phishing and brute-force attacks, leading to unauthorized access, account takeover and lateral movement. {#solutions} SOLUTIONS ## Reimagine identity and access management (IAM) for the AI-ready workforce Idira^®^ IAM secures every step of the user access journey with the right level of privilege controls. Where traditional tools stop, Idira IAM keeps going. [![Secure every device as a trusted access point](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-4.1.webp)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-4.1.webp?ts=markdown) ### Secure every device as a trusted access point Reduce ransomware risk by removing local admin rights and enforcing least-privileged access and extend MFA to endpoints to strengthen user authentication and prevent unauthorized access. [Learn more](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) ### Enable end-to-end passwordless experiences Secure every login with adaptive, phishing-resistant MFA, smarter credential management and passwordless access. Improve security posture with frictionless access for your workforce. [Learn more](https://www.paloaltonetworks.com/resources/whitepapers/reimagine-workforce-security-for-end-to-end-identity-protection?ts=markdown) [![Enable end-to-end passwordless experiences](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-4.2.webp)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-4.2.webp?ts=markdown) [![Extend protection across every session](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-4.3.webp)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-4.3.webp?ts=markdown) ### Extend protection across every session Protect sessions beyond login with layered privileged controls, visibility and session-level protections to help stop postauthentication threats and reduce risk across sensitive resources. [Learn more](https://www.paloaltonetworks.com/resources/ebooks/3-post-login-threats-that-keep-cisos-up-at-night?ts=markdown) {#capabilities} KEY CAPABILITIES \& FEATURES ## Secure access across the entire identity journey Protect every stage of access, from endpoint to authentication to session, with unified identity controls. Reduce your attack surface, eliminate passwords and continuously authenticate users and devices without hindering productivity. ![Secure Access Across the Entire Identity Journey](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/key-capabilities.jpg) * Device Access * Password Management * SSO * Adaptive MFA * Passwordless * Session Management Select a topicDevice AccessPassword ManagementSSOAdaptive MFAPasswordlessSession Management ### Enforce least privilege and secure endpoints. Remove local admin rights, enforce least-privileged access and extend MFA to endpoints to reduce attack surface, prevent privilege abuse and validate users before granting access. ### Secure and manage workforce credentials. Securely store, manage and share credentials with enterprise password management to reduce password sprawl, improve access control and support both legacy and modern applications. ### Simplify access across all applications. Enable standards-based SSO across cloud, SaaS and legacy apps to streamline access, reduce password fatigue and simplify onboarding of new applications with minimal integration effort. ### Verify users with adaptive, risk-based MFA. Apply adaptive MFA policies based on user, device and context to strengthen authentication, reduce friction and protect against credential-based and phishing attacks. ### Replace passwords with phishing-resistant access. Adopt passwordless authentication with biometrics, passkeys and device-bound credentials to reduce credential theft, strengthen security and simplify access across the workforce. ### Protect sessions beyond authentication. Extend protection beyond login with session visibility and controls to detect suspicious activity, prevent session hijacking and reduce postauthentication risk. * 87% of organizations experienced at least two successful identity-centric breaches in the past 12 months. * \#1 The #1 attack vector is stolen credentials and phishing. * 30 mins Attackers can move laterally in less than 30 minutes after initial compromise. Benefits \& Values ## Why identity and access management can't wait Attackers are moving faster, and identity remains their most consistent way in. {#customers} CUSTOMERS [![optiv logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-7.1.svg)](https://www.paloaltonetworks.com/customers/optiv?ts=markdown) [![healthfirst logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-7.2.svg)](https://www.paloaltonetworks.com/customers/healthfirst?ts=markdown) [![pds logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/customers/PDS-white.svg)](https://www.paloaltonetworks.com/customers/pds-health?ts=markdown) [![ecad logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-7.4.svg)](https://www.paloaltonetworks.com/customers/ecad?ts=markdown) [![heng-leong-hang logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/customers/heng-leong-hang.svg)](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) [![cusd logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-and-access-management/section-7.6.svg)](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) {#contact-us} Idira in Action ## Talk to an expert, and get started today. First NameLast NameBusiness EmailCompanyJob LevelSelect a job levelJob RoleSelect a job functionPhoneCountryCountryStateStateProvinceProvinceZip CodeDepartment Continue Sign me up to receive news, product updates, sales outreach, event information and special offers about Palo Alto Networks and its partners. By submitting this form, I understand my personal data will be processed in accordance with [Palo Alto Networks Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) and [Terms of Use.](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. Back Sign up THANK YOU! A Palo Alto Networks specialist will reach out to you shortly. We look forward to connecting with you! {#resources} Resources ## Essential insights and resources [![Secure the Complete User Journey](https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/infographics/secure-the-complete-user-journey-with-workforce-identity-security.pdf.transform/resourceRedesign/image.png) ![mobile Secure the Complete User Journey](https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/infographics/secure-the-complete-user-journey-with-workforce-identity-security.pdf.transform/resourceRedesign/image.png) Infographics Secure the Complete User Journey](https://www.paloaltonetworks.com/resources/infographics/secure-the-complete-user-journey-with-workforce-identity-security?ts=markdown) [![Beyond the Login: Modern Identity Security for the Workforce](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/modren-identity-and-management-for-your-workforce-thumbnail.jpg) ![mobile Beyond the Login: Modern Identity Security for the Workforce](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/modren-identity-and-management-for-your-workforce-thumbnail.jpg) E-BOOK Beyond the Login: Modern Identity Security for the Workforce](https://www.paloaltonetworks.com/resources/ebooks/modern-identity-security-for-the-workforce?ts=markdown) [![Reimagine Workforce Security for End-to-End Identity Protection](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/reimagine-workforce-security-for-end-to-end-identity-protection.webp) ![mobile Reimagine Workforce Security for End-to-End Identity Protection](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/reimagine-workforce-security-for-end-to-end-identity-protection.webp) Whitepaper Reimagine Workforce Security for End-to-End Identity Protection](https://www.paloaltonetworks.com/resources/whitepapers/reimagine-workforce-security-for-end-to-end-identity-protection?ts=markdown) [![Secure Workforce Access from Endpoint to Application](https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/datasheets/secure-workforce-access-from-endpoint-to-application.pdf.transform/resourceRedesign/image.png) ![mobile Secure Workforce Access from Endpoint to Application](https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/datasheets/secure-workforce-access-from-endpoint-to-application.pdf.transform/resourceRedesign/image.png) Tech Brief Secure Workforce Access from Endpoint to Application](https://www.paloaltonetworks.com/resources/datasheets/secure-workforce-access-from-endpoint-to-application?ts=markdown) [![A Buyer’s Guide to Selecting a Security-First Identity and Access Management Solution](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/buyers-guide-selecting-a-security-first-identity-and-access-management-solution.jpg) ![mobile A Buyer’s Guide to Selecting a Security-First Identity and Access Management Solution](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/buyers-guide-selecting-a-security-first-identity-and-access-management-solution.jpg) Buyer's Guide A Buyer's Guide to Selecting a Security-First Identity and Access Management Solution](https://www.paloaltonetworks.com/resources/guides/buyers-guide-selecting-a-security-first-identity-and-access-management-solution?ts=markdown) [![What’s Your Login Worth? Less Than a Latte](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/what-is-your-login-worth-less-than-a-latte.jpg) ![mobile What’s Your Login Worth? Less Than a Latte](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/what-is-your-login-worth-less-than-a-latte.jpg) E-book What's Your Login Worth? Less Than a Latte](https://www.paloaltonetworks.com/resources/articles/what-is-your-login-worth-less-than-a-latte?ts=markdown) PreviousNext FAQ ## Frequently asked questions about identity and access management What is Identity and Access Management (IAM)? IAM is the set of processes and controls that authenticate users and determine what they can access. NIST's digital identity guidance centers on authentication and federation as the core building blocks to help reduce the risk of breach while supporting business agility and productivity. What is phishing-resistant MFA? Phishing-resistant MFA uses stronger cryptographic sign-in methods such as passkeys, FIDO security keys, or device-based authenticators with biometrics or PINs to help stop credential theft and reduce account takeover risk. Why is it important to secure your credentials? Credential security helps protect the workforce from account takeover, phishing, and password-related risk. By combining passwordless authentication with enterprise password management, organizations can strengthen access security while reducing friction for users and IT teams. What is single sign-on (SSO)? Single sign-on gives users one secure login for multiple applications, helping improve productivity and reduce password sprawl. Modern SSO also supports standards-based integration across cloud, SaaS, and legacy systems, making it easier to secure new applications as the business grows. What is the principle of least privilege? Least privilege means giving users only the access they need to do their jobs, and nothing more. It helps reduce risk by limiting local admin rights, restricting privileged access and lowering the chance that a compromised account can be used to move across systems or cause broader damage. Why protect sessions beyond login? Authentication is only a step in the user access journey. Attackers can hijack or abuse active sessions through techniques like cookie theft and session hijacking, so protecting sessions beyond login helps detect risky behavior, control privileged activity, and stop post-authentication threats before they spread. Show more + * ^1.^[Global Incident Response Report 2026](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report?ts=markdown), by Palo Alto Networks. {#footer} Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/ai-security?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Next-Generation Identity Security](https://www.paloaltonetworks.com/idira?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language