[](https://www.paloaltonetworks.com/idira?ts=markdown) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Idira logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/idira-logo-dark.svg)](https://www.paloaltonetworks.com/idira?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/idira?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions [Human Identities](https://www.paloaltonetworks.com/idira/human?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) [Machine Identities](https://www.paloaltonetworks.com/idira/machine?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) \[![Secure the next wave of autonomous, self-reasoning agents with Idira.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/nav-agentic-banner.jpg) Secure the next wave of autonomous, self-reasoning agents with Idira. Identity's role in securing AI\](https://www.paloaltonetworks.com/idira/agentic ?ts=markdown) * [Blog](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) * Resources ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Resources Resources * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia/identity-security?ts=markdown) * [Live Community](https://live.paloaltonetworks.com/) * [Technical Documentation](https://docs.paloaltonetworks.com) * [Support](https://support.paloaltonetworks.com/Support/Index) * [Technical Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * [Resource Center](https://www.paloaltonetworks.com/resources?ts=markdown) * [Events](https://events.paloaltonetworks.com) [Blog Get expert insights on modern threats and trends Learn more](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) [Idira in Action See how our AI platforms stop threats in real time. Learn more](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) [Customer Stories Discover how leading organizations solve identity challenges. Learn more](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * Get In Touch ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Get In Touch Get in Touch * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Find a Partner](https://technologypartners.paloaltonetworks.com/English/directory) * [Join our Community](https://live.paloaltonetworks.com/) * * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) ![palo alto networks logo icon](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-default.svg) ![white arrow icon pointing left to return to main Palo Alto Networks site](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) [](https://www.paloaltonetworks.com/idira?ts=markdown) Search Close search modal # Secure Vendor Privileged Access Eliminate the uncontrolled privilege gap for external users with VPN-less, agentless and passwordless access driven by Zero Standing Privileges. * [Get a demo](#contact-us) ChallengesSolutionsKey Capabilities \& FeaturesBenefits \& ValuesIdira in Action [Challenges](#challenges) [Solutions](#solutions) [Key Capabilities \& Features](#key-capabilities) [Benefits \& Values](#benefits) [Idira in Action](#contact-us) {#challenges} Challenges ## Close the uncontrolled privilege gap for external access Fragmented legacy access creates gaps attackers exploit 4x faster, exfiltrating data in 72 mins. Disconnected identity solutions blind teams to risk and create a structural defense gap. The high cost of legacy VPNs ![The high cost of legacy VPNs](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/section-icon-3-1.svg) ### The high cost of legacy VPNs Standard VPNs provide broad network access, creating an attack surface that allows compromised identities to move laterally through your critical internal systems. Dangerous identity security debt ![Dangerous identity security debt](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/section-icon-3-2.svg) ### Dangerous identity security debt Static vendor accounts often remain active long after a contract ends, creating a hidden target for extortion and data exfiltration. Crippling administrative complexity ![Crippling administrative complexity](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/section-icon-3-3.svg) ### Crippling administrative complexity Provisioning and deprovisioning vendors via Active Directory is costly and slow. This manual toil forces teams to choose between business velocity and robust security. Manual provisioning toil ![Manual provisioning toil](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/section-icon-3-4.svg) ### Manual provisioning toil Only 51% of organizations successfully verify identities at onboarding. Manual AD provisioning is slow and error-prone, forcing teams to trade security for business velocity.^[1](#inline-stats-sources1)^ Fragmented visibility and response delays ![Fragmented visibility and response delays](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/section-icon-3-5.svg) ### Fragmented visibility and response delays 97% of leaders report that fragmented identity tools delay response by an average of 12 hours. This delay is catastrophic when the fastest attacks exfiltrate data in roughly an hour.^[2](#inline-stats-sources2)^ Lack of in-session response controls ![Lack of in-session response controls](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/section-icon-3-6.svg) ### Lack of in-session response controls Only 36% of teams can instantly terminate a risky privileged session. This gap allows external identities to act outside approved limits until manual intervention occurs too late.^[1](#inline-stats-sources1)^ {#solutions} SOLUTIONS ## Unified defense for every external identity Idira^®^ unifies authentication, privileged access, and governance. Zero Standing Privileges removes attack surfaces, ensuring vendor access is validated and isolated from start to finish. ### Implement ZSP for external users Shift from static, persistent access to a model where privileges are created only at the moment of need and destroyed immediately after. This approach removes the standing credentials that attackers rely on for lateral movement and extortion. ### Seamless passwordless biometric MFA Modernize the user experience by eliminating passwords, tokens and VPN clients. Vendors scan an ephemeral QR code to authenticate via their smartphone's native biometrics, providing high-assurance security without the friction of legacy tools. ### Continuous governance and lifecycle automation Embed security into the identity lifecycle with automated vendor provisioning and deprovisioning. Access reviews transition from periodic snapshots to behavior-driven audits, ensuring third-party entitlements remain aligned with current business needs. ### Secure VPN-free session isolation Protect infrastructure by brokering sessions through an isolated browser tunnel. Credentials are never shared with or visible to the vendor workstation, and every privileged action is recorded and indexed for rapid audit and investigation. {#key-capabilities} KEY CAPABILITIES \& FEATURES ## Enterprise-grade privilege controls for every external identity Close dangerous security gaps with a unified operating model that replaces static credentials with ephemeral, context-aware external access. Extend proven foundations to your third-party workforce through automated discovery, adaptive vendor controls and continuous governance. ![Enterprise-grade privilege controls for every external identity](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/section-4-1.jpg) * Continuous Discovery * Zero Standing Privileges * Biometric MFA * Session Security * Lifecycle Automation * Threat Detection Select a topicContinuous DiscoveryZero Standing PrivilegesBiometric MFASession SecurityLifecycle AutomationThreat Detection ### Proactively uncover vendor access and privilege creep Idira uses always-on discovery to proactively assess every vendor identity and access path. Gain a correlated map of entitlements across cloud and on-premises systems to surface overprivileged users and orphaned accounts before they become a liability. ### Eliminate persistent attack surfaces with just-in-time access Shift from static accounts to an ephemeral model where privileges are created only when vendor work begins and destroyed immediately after. This model ensures that even if an identity is compromised, there is no latent access for attackers to exploit. ### Phishing-resistant authentication for the remote workforce Modernize access with a passwordless experience that removes stealable credentials. Vendors scan a one-time QR code and verify their identity via native smartphone biometrics to gain instant, secure entry into critical resources. ### Protect internal networks with agentless browser tunnels Broker vendor connections through isolated sessions that prevent credentials from reaching the endpoint. Every action is recorded and indexed to provide an audit trail that simplifies compliance for PCI DSS, HIPAA, SOC 2 and more. ### Seamless joiner-mover-leaver workflows for external identities Embed security into the access flow to eliminate manual toil. Automatic triggers revoke vault credentials and active sessions the moment a vendor contract expires or a role changes, preventing the silent accumulation of identity security debt. ### Real-time identity threat detection and response (ITDR) Detect and stop in-progress attacks by analyzing session telemetry for anomalous behavior. The platform acts instantly to terminate access or elevate authentication requirements, closing the loop that standalone products leave open. {#benefits} Benefits \& Values ## Secure third-party access at enterprise scale Replace legacy remote access bottlenecks with a unified identity operating model designed for the modern threat landscape. Idira reduces organizational risk from third-party breaches while dramatically improving technical velocity and compliance efficiency for your entire external workforce. 2 Minutes Rapid Onboarding and Provisioning Onboard and provision new external users in less than 2 minutes without shipping corporate hardware or installing security agents. 89% Respond to Modern Attack Vectors Identity weaknesses played a material role in 89% of Unit 42^®^ investigations in 2026. Idira closes these gaps by treating every identity as a potential entry point. 90% Reduce External Identity-Related Breaches of investigations involved identity weaknesses.^[3](#inline-stats-sources3)^ 65% Stop Phishing-Driven Initial Access of initial access is driven by identity-based techniques. Idira eliminates this surface with phishing-resistant, passwordless authentication.^[3](#inline-stats-sources3)^ {#contact-us} DEMO ## Idira in action Talk to an expert, and get started today. First NameLast NameBusiness EmailCompanyJob LevelSelect a job levelJob RoleSelect a job functionPhoneCountryCountryStateStateProvinceProvinceZip CodeDepartment Continue Sign me up to receive news, product updates, sales outreach, event information and special offers about Palo Alto Networks and its partners. By submitting this form, I understand my personal data will be processed in accordance with [Palo Alto Networks Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) and [Terms of Use.](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. Back Sign up THANK YOU! A Palo Alto Networks specialist will reach out to you shortly. We look forward to connecting with you! {#resources} RESOURCES ## Learn more about vendor privileged access Datasheet E-Book [![Vendor PAM Solution Brief](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/vpam-sb.jpg) ![mobile Vendor PAM Solution Brief](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/vpam-sb.jpg) Datasheet Vendor PAM Solution Brief](https://www.paloaltonetworks.com/resources/techbriefs/vendor-pam?ts=markdown) [![Remote Access Data Sheet](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/remote-access-ds.jpg) ![mobile Remote Access Data Sheet](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/remote-access-ds.jpg) Datasheet Remote Access Data Sheet](https://www.paloaltonetworks.com/resources/datasheets/remote-access?ts=markdown) [![Modern PAM with Idira](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/pam-at-a-glance.png) ![mobile Modern PAM with Idira](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/pam-at-a-glance.png) Datasheet Modern PAM with Idira](https://www.paloaltonetworks.com/resources/datasheets/privileged-access-management?ts=markdown) [![Secure the Complete User Journey with Workorce Identity Security](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/secure-the-complete-user-journey-with-workforce-identity-security.png) ![mobile Secure the Complete User Journey with Workorce Identity Security](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/secure-the-complete-user-journey-with-workforce-identity-security.png) Datasheet Secure the Complete User Journey with Workorce Identity Security](https://www.paloaltonetworks.com/resources/infographics/secure-the-complete-user-journey-with-workforce-identity-security?ts=markdown) PreviousNext [![Secure Every Identity with the Right Level of Privilege Controls](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/secure-every-identity-with-the-correct-privilege-controls.png) ![mobile Secure Every Identity with the Right Level of Privilege Controls](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/secure-every-identity-with-the-correct-privilege-controls.png) E-Book Secure Every Identity with the Right Level of Privilege Controls](https://www.paloaltonetworks.com/resources/ebooks/secure-every-identity-with-the-correct-privilege-controls?ts=markdown) [![PAM Buyer's Guide](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/buyers-guide-human-identity-security.jpg) ![mobile PAM Buyer's Guide](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/vendor-privileged-access/buyers-guide-human-identity-security.jpg) E-Book PAM Buyer's Guide](https://www.paloaltonetworks.com/resources/ebooks/buyers-guide-to-smart-privileged-identity-controls?ts=markdown) PreviousNext {#faq} FAQ ## Frequently asked questions about securing external access What is Vendor PAM? Vendor PAM is a SaaS-based solution within the Idira platform that provides secure, just-in-time privileged access for external vendors and contractors. It eliminates the need for VPNs, agents and passwords by utilizing biometric authentication and Zero Standing Privileges. Access is granted only when needed and revoked immediately after work is completed, closing the uncontrolled privilege gap. How does Vendor PAM eliminate the need for VPNs and agents? Vendor PAM brokers connections through an isolated, browser-based session that doesn't require a direct network connection or specialized software on the endpoint. This agentless model prevents credentials from ever reaching the vendor's workstation, reducing the risk of lateral movement and malware spread. Is an existing privileged access solution required to use Vendor PAM? Yes. To leverage Vendor PAM, organizations must be current customers of either Privileged Access Manager Self-Hosted or Privilege Cloud. This integration allows you to extend established internal security policies to your external third-party workforce seamlessly. How does biometric authentication work for vendors? Vendors scan a one-time QR code using an app on their smartphone, which uses the device's native facial or fingerprint recognition to confirm identity. This passwordless process ensures that only the authorized person can initiate a session and that biometric data is never stored on the SaaS service. How quickly can a new vendor be onboarded? A new vendor can be onboarded in less than 2 minutes. Because the solution is browser-based and uses the vendor's smartphone for authentication, there's no need to ship corporate hardware, manage internal directory accounts or install complex VPN clients. Does it provide an audit trail for compliance? Yes. Every session is fully isolated, monitored and recorded. All actions --- including command-level activity --- are indexed for easy searching and investigation. This provides the defensible audit evidence required to satisfy regulations like PCI DSS, HIPAA and SOC 2. What are Zero Standing Privileges (ZSP)? ZSP is a security model where no user has persistent access by default. Privileges are created at the moment of need based on context and risk, and then destroyed immediately after the task is finished. This removes the "standing" attack surface that attackers rely on to exploit static credentials or long-lived accounts. Can vendors access systems during a network outage? Yes. Authorized users can securely obtain necessary credentials for offline use during outages or in air-gapped environments. These saved passwords are encrypted locally on the mobile device using a unique private key and are never sent to the server. Show more + * ^1.^[2026 Identity Security Landscape,](https://www.paloaltonetworks.com/idira/identity-security-landscape-report?ts=markdown) Idira by Palo Alto Networks. * ^2.^[Cloud Security 2025 Report](https://www.paloaltonetworks.com/blog/2025/12/cloud-security-2025-report-insights/?ts=markdown). * ^3.^[Unit 42 Report: AI and Attack Surface Complexity Fuel Majority of Breaches](https://www.paloaltonetworks.com/company/press/2026/unit-42-report--ai-and-attack-surface-complexity-fuel-majority-of-breaches?ts=markdown) {#footer} Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/ai-security?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Next-Generation Identity Security](https://www.paloaltonetworks.com/idira?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language