[](https://www.paloaltonetworks.com/idira?ts=markdown) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Idira logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/idira-logo-dark.svg)](https://www.paloaltonetworks.com/idira?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/idira?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions [Human Identities](https://www.paloaltonetworks.com/idira/human?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) [Machine Identities](https://www.paloaltonetworks.com/idira/machine?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) \[![Secure the next wave of autonomous, self-reasoning agents with Idira.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/nav-agentic-banner.jpg) Secure the next wave of autonomous, self-reasoning agents with Idira. Identity's role in securing AI\](https://www.paloaltonetworks.com/idira/agentic ?ts=markdown) * [Blog](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) * Resources ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Resources Resources * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia/identity-security?ts=markdown) * [Live Community](https://live.paloaltonetworks.com/) * [Technical Documentation](https://docs.paloaltonetworks.com) * [Support](https://support.paloaltonetworks.com/Support/Index) * [Technical Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * [Resource Center](https://www.paloaltonetworks.com/resources?ts=markdown) * [Events](https://events.paloaltonetworks.com) [Blog Get expert insights on modern threats and trends Learn more](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) [Idira in Action See how our AI platforms stop threats in real time. Learn more](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) [Customer Stories Discover how leading organizations solve identity challenges. Learn more](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * Get In Touch ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Get In Touch Get in Touch * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Find a Partner](https://technologypartners.paloaltonetworks.com/English/directory) * [Join our Community](https://live.paloaltonetworks.com/) * * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) ![palo alto networks logo icon](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-default.svg) ![white arrow icon pointing left to return to main Palo Alto Networks site](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) [](https://www.paloaltonetworks.com/idira?ts=markdown) Search Close search modal # Machine Identity Security Secure every machine identity across your enterprise, from secrets to workload identities. * [Start secrets maturity assessment](#contact-us) PlatformWhat We OfferCustomersIdira in Action [Platform](#platform) [What We Offer](#offerings) [Customers](#customers) [Idira in Action](#contact-us) {#platform} Platform ## Securing the machine future. AI adoption, cloud computing, and modernization are driving mass proliferation of machine identities, and every mismanaged one is a potential point of compromise. Comprehensive machine identity security keeps your business resilient and future-ready. Comprehensive observability. ![Comprehensive observability](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/section-icon-3.1.svg) ### Comprehensive observability. Maintain visibility of the machine identities in your infrastructure using a single, consolidated platform. Advanced automation. ![Advanced automation](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/section-icon-3.2.svg) ### Advanced automation. Increase efficiency, reduce risk from manual processes and build resilience with scalable, policy-driven automation for every machine identity type. Full-spectrum protection. ![Full-spectrum protection](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/section-icon-3.3.svg) ### Full-spectrum protection. Deliver protection across the entire machine identity lifecycle, from discovery to privilege control to governance. Future-ready. ![Future-ready](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/section-icon-3.4.svg) ### Future-ready. Meet the increasingly complex needs of modern, flexible architectures, and prepare for the emerging challenges of reduced certificate lifetimes, quantum computing, agentic AI and more. {#offerings} WHAT WE OFFER Secure all the machine identities and nonhuman identities that matter, all the time. --- Only Palo Alto Networks offers full protection for every type of machine identity, including secrets, certificates, workload identities and SSH keys. [![Secrets Management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/section-4.1.jpg)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/section-4.1.jpg?ts=markdown) ### Secrets management Prevent breaches and secure digital infrastructure through simplified protection of all secrets and other machine identities for applications, DevOps pipelines and cloud workloads. [Learn more](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) ### Unified secrets governance Extend enterprise-grade governance to AWS, Azure, and GCP secrets stores with unified policy, rotation, and visibility across every vault your developers already use. [Learn more](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) [![Unified Secrets Governance](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/section-4.2.jpg)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/section-4.2.jpg?ts=markdown) [![Workload Identity Security](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/section-4.3.jpg)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/section-4.3.jpg?ts=markdown) ### Workload identity security Give every workload a unique, universal identity that replaces static secrets with short-lived, verifiable authentication across hybrid, multicloud and on-premises environments. Use identity where you can, secrets where you must. [Learn more](https://www.paloaltonetworks.com/resources/techbriefs/secure-workload-access?ts=markdown) ### Application credentials delivery Remove embedded secrets and static credentials with just-in-time secret retrieval for applications in the data center, the cloud, container platforms and everywhere in between. [Learn more](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) [![Application Credentials Delivery](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/section-4.4.jpg)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/section-4.4.jpg?ts=markdown) {#customers} CUSTOMERS ## Trusted by enterprises worldwide Organizations across industries use Idira^®^ Machine Identity Security to discover, control and govern machine identities in any environment. [![southwest logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/section-icon-7.1.svg)](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) [![dz-bank logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/section-icon-7.3.svg)](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) [![HealthFirst logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/healthfirst-logo.svg)](https://www.paloaltonetworks.com/customers/healthfirst?ts=markdown) [![Encova Insurance logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/encova-insurance-logo.svg)](https://www.paloaltonetworks.com/customers/encova?ts=markdown) [![Repsol logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/customers/Repsol_logo-white.svg)](https://www.paloaltonetworks.com/customers/repsol?ts=markdown) [![TIAA Bank logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/tiaa-bank-logo.svg)](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) {#contact-us} GET STARTED ## Talk to a machine identity expert Whether you want to talk through your machine identity strategy, run a secrets maturity assessment, or see the product in action, this form gets you to the right person on our team. First NameLast NameBusiness EmailCompanyJob LevelSelect a job levelJob RoleSelect a job functionPhoneCountryCountryStateStateProvinceProvinceZip CodeDepartment Continue Sign me up to receive news, product updates, sales outreach, event information and special offers about Palo Alto Networks and its partners. By submitting this form, I understand my personal data will be processed in accordance with [Palo Alto Networks Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) and [Terms of Use.](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. Back Sign up THANK YOU! A Palo Alto Networks specialist will reach out to you shortly. We look forward to connecting with you! {#resources} RESOURCES ## Learn more about machine identity security Solution Brief Whitepaper E-Book Webinar Analyst Report Blog [![Secure Secrets and Workloads](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/solution-brief.png) ![mobile Secure Secrets and Workloads](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/solution-brief.png) Solution Brief Secure Secrets and Workloads](https://www.paloaltonetworks.com/resources/techbriefs/secure-secrets-and-workloads?ts=markdown) [![Secure Workload Access](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/secure-workload-access.png) ![mobile Secure Workload Access](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/secure-workload-access.png) Solution Brief Secure Workload Access](https://www.paloaltonetworks.com/resources/techbriefs/secure-workload-access?ts=markdown) PreviousNext [![Three Critical Use Cases for Enterprise Secrets Management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/three-critical-use-cases.png) ![mobile Three Critical Use Cases for Enterprise Secrets Management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/three-critical-use-cases.png) Whitepaper Three Critical Use Cases for Enterprise Secrets Management](https://www.paloaltonetworks.com/resources/whitepapers/three-critical-use-cases-for-enterprise-secrets-management?ts=markdown) [![Keeping Secrets Under Control](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/keeping-secrets-under-control.png) ![mobile Keeping Secrets Under Control](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/thumbnails/keeping-secrets-under-control.png) E-Book Keeping Secrets Under Control](https://www.paloaltonetworks.com/resources/ebooks/keeping-secrets-under-control-and-secure?ts=markdown) [![Identity Security for Software Development (O'Reilly)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/solution-brief.png) ![mobile Identity Security for Software Development (O'Reilly)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/solution-brief.png) E-Book Identity Security for Software Development (O'Reilly)](https://www.paloaltonetworks.com/resources/research/identity-security-for-software-development-oreilly?ts=markdown) [![Key Considerations for Securing Machine Identities](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/solution-brief.png) ![mobile Key Considerations for Securing Machine Identities](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/solution-brief.png) E-Book Key Considerations for Securing Machine Identities](https://www.paloaltonetworks.com/resources/ebooks/key-considerations-for-securing-different-machine-identities?ts=markdown) [![Your Machines Might Be Your Weakest Link in a Security Audit](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/your-machines-might-be-your-weakest-link.png) ![mobile Your Machines Might Be Your Weakest Link in a Security Audit](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/your-machines-might-be-your-weakest-link.png) E-Book Your Machines Might Be Your Weakest Link in a Security Audit](https://www.paloaltonetworks.com/resources/ebooks/your-machines-might-be-your-weakest-link-in-a-security-audit?ts=markdown) PreviousNext [![Eliminating Vault Sprawl: Centralized Secrets Management Across AWS, Azure, Google Cloud and HashiCorp Vault](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/eliminating-vault-sprawl.png) ![mobile Eliminating Vault Sprawl: Centralized Secrets Management Across AWS, Azure, Google Cloud and HashiCorp Vault](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/eliminating-vault-sprawl.png) Webinar Eliminating Vault Sprawl: Centralized Secrets Management Across AWS, Azure, Google Cloud and HashiCorp Vault](https://www.paloaltonetworks.com/resources/webcasts/eliminating-vault-sprawl-centralized-secrets-management-across-aws-azure-gcp-and-hashicorp-vault?ts=markdown) [![Secrets Management Horror Stories from the Field: Four Security Pitfalls to Avoid](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/secrets-management-horror-stories.png) ![mobile Secrets Management Horror Stories from the Field: Four Security Pitfalls to Avoid](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/secrets-management-horror-stories.png) Webinar Secrets Management Horror Stories from the Field: Four Security Pitfalls to Avoid](https://www.paloaltonetworks.com/resources/webcasts/secrets-management-horror-stories-from-the-field-four-security-pitfalls-to-avoid?ts=markdown) [![The Future of Enterprise Secrets Management – As The Challenges Grow, How Are Security Teams Keeping Up?](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/the-future-of-enterprise-secrets.png) ![mobile The Future of Enterprise Secrets Management – As The Challenges Grow, How Are Security Teams Keeping Up?](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/the-future-of-enterprise-secrets.png) Webinar The Future of Enterprise Secrets Management -- As The Challenges Grow, How Are Security Teams Keeping Up?](https://www.paloaltonetworks.com/resources/webcasts/the-future-of-enterprise-secrets-management-as-the-challenges-grow-how-are-security-teams-keeping-up?ts=markdown) [![Tame the Vault Sprawl: Bring All Your Secrets Under Control in 60 Seconds](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) ![mobile Tame the Vault Sprawl: Bring All Your Secrets Under Control in 60 Seconds](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) Webinar Tame the Vault Sprawl: Bring All Your Secrets Under Control in 60 Seconds](https://www.paloaltonetworks.com/resources/videos/tame-the-vault-sprawl-bring-all-your-secrets-under-control-in-60-seconds?ts=markdown) PreviousNext [![2025 KuppingerCole Leadership Compass for Enterprise Secrets Management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-1.png) ![mobile 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-1.png) Analyst Report 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management](https://www.paloaltonetworks.com/resources/research/2025-kuppingercole-leadership-compass-for-enterprise-secrets-management?ts=markdown) [![Vibe Check Your Vibe Code: Adding Human Judgment to AI-Driven Development](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) ![mobile Vibe Check Your Vibe Code: Adding Human Judgment to AI-Driven Development](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) Blog Vibe Check Your Vibe Code: Adding Human Judgment to AI-Driven Development](https://www.paloaltonetworks.com/blog/identity-security/vibe-check-your-vibe-code-adding-human-judgment-to-ai-driven-development/?ts=markdown) [![A Practical Guide to AI-Ready Machine Identity Governance in Finance](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) ![mobile A Practical Guide to AI-Ready Machine Identity Governance in Finance](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) Blog A Practical Guide to AI-Ready Machine Identity Governance in Finance](https://www.paloaltonetworks.com/blog/identity-security/a-practical-guide-to-ai-ready-machine-identity-governance-in-finance/?ts=markdown) [![Secrets, Out: Why Workload Identity Is Essential for AI Agent Security](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) ![mobile Secrets, Out: Why Workload Identity Is Essential for AI Agent Security](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) Blog Secrets, Out: Why Workload Identity Is Essential for AI Agent Security](https://www.paloaltonetworks.com/blog/identity-security/secrets-out-why-workload-identity-is-essential-for-ai-agent-security/?ts=markdown) PreviousNext {#faq} Faq ## Frequently asked questions about Idira machine identity security What is machine identity security, and why does it matter now? Machine identities (certificates, secrets, workload identities) outnumber human identities 109:1 and are growing fast as organizations adopt cloud-native architectures and AI agents. Each one is an authentication credential that attackers can exploit. Machine identity security gives organizations the ability to discover, control and govern every machine identity across the enterprise from a single platform. How do secrets management and workload identity work together? Not every workload is ready for identity-based authentication today. Idira, by Palo Alto Networks. Idira lets teams use cryptographic workload identity where environments support it and keeps using secrets where they don't. Both are managed from the same Secrets Manager platform so security teams get unified governance without forcing migration. Identity where you can, secrets where you must. [Learn more](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) What role does discovery play in machine identity security? You can't secure what you can't see. Idira's discovery capabilities automatically find machine identities across the enterprise, including secrets, AI agents and workloads, and then add risk-based context so teams can prioritize what to secure first. This is critical as environments scale and AI agents introduce new autonomous identities that operate outside traditional governance frameworks. What is Idira Secrets Hub, and do I need to migrate my existing vaults to use it? No migration is required. Secrets Hub connects to your existing cloud-native vaults (AWS Secrets Manager, Azure Key Vault, Google Cloud, Secret Manager) and HashiCorp Vault through native APIs to deliver centralized discovery, unified visibility and consistent governance. Developers keep using the vaults and workflows they already have. Security gains a single control plane to enforce rotation, access and expiration policies across all of them. It bridges the gap between "managed" and "governed" without disrupting how teams work. [Learn more](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) How do I secure monolithic or COTS applications that can't be refactored to call an API? That's exactly what Idira Credential Providers are built for. They enable secure, high-performance secret retrieval for workloads and applications running in hybrid and on-premises environments without requiring code changes. The application doesn't need to know how to call a vault. The Credential Provider handles retrieval transparently so even legacy, packaged or monolithic applications get governed credentials with rotation and audit. It's the right tool for workloads that will never be rewritten but still need to stop using hardcoded passwords. [Learn more](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) {#footer} Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/ai-security?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Next-Generation Identity Security](https://www.paloaltonetworks.com/idira?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language