[](https://www.paloaltonetworks.com/idira?ts=markdown) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Idira logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/idira-logo-dark.svg)](https://www.paloaltonetworks.com/idira?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/idira?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions [Human Identities](https://www.paloaltonetworks.com/idira/human?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) [Machine Identities](https://www.paloaltonetworks.com/idira/machine?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) \[![Secure the next wave of autonomous, self-reasoning agents with Idira.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/nav-agentic-banner.jpg) Secure the next wave of autonomous, self-reasoning agents with Idira. Identity's role in securing AI\](https://www.paloaltonetworks.com/idira/agentic ?ts=markdown) * [Blog](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) * Resources ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Resources Resources * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia/identity-security?ts=markdown) * [Live Community](https://live.paloaltonetworks.com/) * [Technical Documentation](https://docs.paloaltonetworks.com) * [Support](https://support.paloaltonetworks.com/Support/Index) * [Technical Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * [Resource Center](https://www.paloaltonetworks.com/resources?ts=markdown) * [Events](https://events.paloaltonetworks.com) [Blog Get expert insights on modern threats and trends Learn more](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) [Idira in Action See how our AI platforms stop threats in real time. Learn more](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) [Customer Stories Discover how leading organizations solve identity challenges. Learn more](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * Get In Touch ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Get In Touch Get in Touch * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Find a Partner](https://technologypartners.paloaltonetworks.com/English/directory) * [Join our Community](https://live.paloaltonetworks.com/) * * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) ![palo alto networks logo icon](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-default.svg) ![white arrow icon pointing left to return to main Palo Alto Networks site](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) [](https://www.paloaltonetworks.com/idira?ts=markdown) Search Close search modal # Identity Governance ## Automate least-privileged access, gain continuous visibility across all identities and eliminate manual work. * [See a demo](#contact-us) * [Get the buyer's guide](https://www.paloaltonetworks.com/resources/guides/the-gorilla-guide-to-modern-identity-governance-and-administration?ts=markdown) ChallengesSolutionsKey Capabilities \& FeaturesWhy Now?Idira in Action [Challenges](#challenges) [Solutions](#solutions) [Key Capabilities \& Features](#key-capabilities) [Why Now?](#why-now) [Idira in Action](#contact-us) {#challenges} Challenges ## Identities are multiplying. Governing their access is complex. Human and machine identity proliferation causes access sprawl, privilege creep and compliance gaps. Siloed, legacy IGA solutions can't keep up with this pace of growth, nor can they support tomorrow's AI-ready workforce. Manual Processes Increase Risk ![Manual Processes Increase Risk](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-governance/icon-1.svg) ### Manual Processes Increase Risk Spreadsheet-driven access reviews and ticket-based provisioning create gaps that attackers exploit and auditors flag. Identity lifecycle changes are hard to manage ![Identity lifecycle changes are hard to manage](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-governance/icon-2.svg) ### Identity lifecycle changes are hard to manage Joiners, movers and leavers move faster than manual processes can keep up, leading to access drift and orphan accounts. You can't govern what you can't see ![You can't govern what you can't see](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-governance/icon-3.svg) ### You can't govern what you can't see Incomplete visibility means periodic entitlement data is instantly out of date and governance is reactive. Integration challenges cause visibility gaps ![Integration challenges cause visibility gaps](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-governance/icon-4.svg) ### Integration challenges cause visibility gaps Complex integration requirements mean most organizations can only govern a fraction of the apps employees actually use. Siloed identity governance solutions don't work ![Siloed identity governance solutions don't work](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-governance/icon-5.svg) ### Siloed identity governance solutions don't work When IGA operates separately from PAM and authentication, organizations can't easily detect or respond to cross-system threats. Slow deployments prevent progress ![Slow deployments prevent progress](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-governance/icon-6.svg) ### Slow deployments prevent progress Lengthy, services-heavy implementations delay time to value and create project fatigue before governance even goes live. {#solutions} How We Help ## Identity governance made simple and secure Unify visibility, automate access decisions and reduce identity risk across every human and machine identity throughout the entire identity lifecycle. ### Govern every identity Idira^®^ delivers a single system of record for all entitlements, including full change history, so teams always know who has access, if it changed and why. [Read more](https://www.paloaltonetworks.com/resources/whitepapers/rethinking-identity-lifecycle-management-in-the-age-of-ai?ts=markdown) ### Define the right access, all the time AI identifies the right, least-privileged access by analyzing your environment and routing access requests via native ITSM or ticketing workflows. Continuously validate access accuracy and maintain visibility into the access estate from Idira. [Watch the webinar](https://www.paloaltonetworks.com/resources/webcasts/right-intentions-wrong-access-how-ai-transforms-lifecycle-management?ts=markdown) ### Proactively discover identity risks Continuously uncover identity risks and stay compliant by monitoring entitlements across all applications. Receive real-time alerts for high-risk access and misaligned permissions to quickly flag Segregation of Duties (SoD) violations and orphan accounts that often go unnoticed. [See how](https://www.paloaltonetworks.com/resources/datasheets/identity-governance-and-administration?ts=markdown) ### Integrate all of your applications Ensure connectivity, visibility and rapid time to value with comprehensive coverage for SaaS, on-prem and custom applications. Connect via API catalogs and use robotic process automation that can continuously sync with apps without publicly available APIs, including on-prem applications. [See it in action](https://www.paloaltonetworks.com/resources/webcasts/identity-governance-made-simple?ts=markdown) ### Use a next-generation identity security platform Eliminate siloed tools. Use a modern identity security platform that delivers continuous visibility, intelligent access decisions and automated lifecycle controls across all identities and environments. {#key-capabilities} KEY CAPABILITIES ## Unify governance with the identity security platform Extend identity governance across the Idira Identity Security Platform, aligning access reviews and lifecycle automation with privilege controls for human and machine identities. ![identity governance key capabilities](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-governance/key-capabilities.jpg) * Automate User Access Reviews * Simplify Lifecycle Management * Uncover Risk * Cross-platform integration Select a topicAutomate User Access ReviewsSimplify Lifecycle ManagementUncover RiskCross-platform integration ### Eliminate manual spreadsheets with automated, AI-assisted access reviews. Automation onboards applications, uses built-in workflows to populate missing data, generates the campaign, invites reviewers to complete their work, enables administrators to track reviewer progress and generates an audit-ready evidence package at the end of each campaign. ### Grant the right access with speed, security and efficiency. Automate joiner, mover and leaver events with AI-driven access recommendations and efficient provisioning workflows that reduce tickets, prevent access drift and improve productivity. Identities are secure at birth with the right access. ### Governance is the backbone of security. Get a unified view of human and machine identities to discover gaps before they become a breach. Create policies to detect SoD conflicts and orphan accounts, with real-time alerts to monitor and remediate risks in real time. ### Stop working in siloed tools. Governance is the backbone of strong identity security, and identity security must include robust governance processes. But this is hard to achieve across fragmented tools. Idira Human Identity Security treats authentication, privilege and governance as a single continuous motion. {#why-now} * 84% Perform IGA manually due to difficulty integrating applications. * 73% Say excess privilege is a major risk to their organization. * 55% Take 7 or more days to provision new user access. Benefits \& Values ## Close the governance gap App integration challenges keep teams stuck in manual reviews and ticket-driven provisioning, creating blind spots, excessive permissions and growing identity risk. {#contact-us} Idira in Action ## Talk to an expert, and get started today. Ready to rethink your governance strategy? First NameLast NameBusiness EmailCompanyJob LevelSelect a job levelJob RoleSelect a job functionPhoneCountryCountryStateStateProvinceProvinceZip CodeDepartment Continue Sign me up to receive news, product updates, sales outreach, event information and special offers about Palo Alto Networks and its partners. By submitting this form, I understand my personal data will be processed in accordance with [Palo Alto Networks Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) and [Terms of Use.](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. Back Sign up THANK YOU! A Palo Alto Networks specialist will reach out to you shortly. We look forward to connecting with you! {#resources} Resources ## Stop planning (or delaying) your IGA project. [![Right Intentions, Wrong Access](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) ![mobile Right Intentions, Wrong Access](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) Webinar Right Intentions, Wrong Access](https://www.paloaltonetworks.com/resources/webcasts/right-intentions-wrong-access-how-ai-transforms-lifecycle-management?ts=markdown) [![The Gorilla Guide to Modern Identity Governance and Administration](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/solution-brief.png) ![mobile The Gorilla Guide to Modern Identity Governance and Administration](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/solution-brief.png) Book The Gorilla Guide to Modern Identity Governance and Administration](https://www.paloaltonetworks.com/resources/guides/the-gorilla-guide-to-modern-identity-governance-and-administration?ts=markdown) [![Rethinking Identity Lifecycle Management in the Age of AI](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/whitepaper.png) ![mobile Rethinking Identity Lifecycle Management in the Age of AI](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/whitepaper.png) Whitepaper Rethinking Identity Lifecycle Management in the Age of AI](https://www.paloaltonetworks.com/resources/whitepapers/rethinking-identity-lifecycle-management-in-the-age-of-ai?ts=markdown) [![IGA At A Glance](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-governance/identity-governance-and-administration.png) ![mobile IGA At A Glance](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/identity-governance/identity-governance-and-administration.png) Techbrief IGA At A Glance](https://www.paloaltonetworks.com/resources/datasheets/identity-governance-and-administration?ts=markdown) PreviousNext {#customers} {#faq} ## Frequently asked questions about Idira identity governance \& administration (IGA) How is Idira IGA different from legacy IGA solutions? Traditional IGA tools were built for static, on-prem environments and rely heavily on custom professional services and filling the gaps with manual process. Idira IGA is purpose-built for modern, hybrid enterprises, using automation, AI-powered intelligence and continuous controls to make identity governance more approachable, actionable and security-focused. Is Idira Identity Governance only for large enterprises with mature IAM programs? No. Idira IGA is designed to support organizations at any stage of identity governance maturity. Teams can start with visibility or user access reviews to gain immediate value while expanding the scope over time. This approach makes it possible to achieve quick wins while building toward a more complete identity security strategy. Do I need custom professional services to onboard applications into Idira IGA? No. Idira IGA is designed to onboard applications without extensive or custom professional services. In addition to out-of-the-box integrations and flexible connectors, Idira uses robotic process automation (RPA) to help automate connection to applications that lack APIs, enabling organizations to bring more apps under governance faster. How does IGA work with Idira PAM? Idira IGA works smoothly with Idira PAM, providing deep visibility into and governance over safes, groups and users. Privileged access reviews are also easier than ever with intuitive user access review workflows, a simple interface and an auditor-ready evidence package. How does Idira IGA support compliance requirements? Idira helps organizations meet regulatory and audit requirements for frameworks such as SOX, HIPAA, PCI DSS, ISO 27001, DORA, NIST, GDPR, NYDFS, NYDOH and other global mandates by automating periodic user access reviews, enforcing Segregation of Duties (SoD) policies and delivering fully auditable decision trails and a robust evidence package. {#footer} Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/ai-security?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Next-Generation Identity Security](https://www.paloaltonetworks.com/idira?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language