[](https://www.paloaltonetworks.com/idira?ts=markdown) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Idira logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/idira-logo-dark.svg)](https://www.paloaltonetworks.com/idira?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/idira?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions [Human Identities](https://www.paloaltonetworks.com/idira/human?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) [Machine Identities](https://www.paloaltonetworks.com/idira/machine?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) \[![Secure the next wave of autonomous, self-reasoning agents with Idira.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/nav-agentic-banner.jpg) Secure the next wave of autonomous, self-reasoning agents with Idira. Identity's role in securing AI\](https://www.paloaltonetworks.com/idira/agentic ?ts=markdown) * [Blog](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) * Resources ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Resources Resources * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia/identity-security?ts=markdown) * [Live Community](https://live.paloaltonetworks.com/) * [Technical Documentation](https://docs.paloaltonetworks.com) * [Support](https://support.paloaltonetworks.com/Support/Index) * [Technical Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * [Resource Center](https://www.paloaltonetworks.com/resources?ts=markdown) * [Events](https://events.paloaltonetworks.com) [Blog Get expert insights on modern threats and trends Learn more](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) [Idira in Action See how our AI platforms stop threats in real time. Learn more](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) [Customer Stories Discover how leading organizations solve identity challenges. Learn more](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * Get In Touch ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Get In Touch Get in Touch * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Find a Partner](https://technologypartners.paloaltonetworks.com/English/directory) * [Join our Community](https://live.paloaltonetworks.com/) * * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) ![palo alto networks logo icon](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-default.svg) ![white arrow icon pointing left to return to main Palo Alto Networks site](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) [](https://www.paloaltonetworks.com/idira?ts=markdown) Search Close search modal Eliminate hard-coded credentials at scale === Idira^®^ Credential Providers remove embedded passwords from apps, scripts, and configs. Hundreds of integrations cover COTS, RPA, and custom code on Windows, Linux, AIX, z/OS, with no downtime or changes. * [Request demo](#demo) ChallengesSolutionsKey Capabilities \& FeaturesBenefits \& ValuesCustomersIdira in Action [Challenges](#challenges) [Solutions](#solutions) [Key Capabilities \& Features](#capabilities) [Benefits \& Values](#benefits) [Customers](#customers) [Idira in Action](#demo) {#challenges} Challenges ## Hard-coded credentials are your largest hidden risk Applications, scripts and automation jobs store passwords in code, config files and local caches. These credentials rarely rotate, have no audit trail and give attackers persistent access when compromised. Manual remediation at enterprise scale is impractical. Embedded secrets never expire ![Embedded secrets never expire icon](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/03-icons-1.svg) ### Embedded secrets never expire Passwords hard-coded in applications and scripts remain unchanged for years. Attackers who find them get persistent, unmonitored access to databases, servers and critical systems. COTS and legacy apps resist change ![COTS and legacy apps resist change icon](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/03-icons-2.svg) ### COTS and legacy apps resist change Commercial off-the-shelf software, RPA tools and mainframe applications store credentials in ways that are difficult to secure. Each requires different integration methods and careful handling to avoid downtime. No visibility into application credentials ![No visibility into application credentials icon](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/03-icons-3.svg) ### No visibility into application credentials Security teams cannot track which applications use which credentials, when they last rotated or who has access. Auditors ask questions nobody can answer without weeks of manual investigation. {#solutions} SOLUTIONS ## Secure every application credential from one platform Credential Providers eliminate hard-coded passwords by delivering secrets to applications at runtime. Out-of-the-box integrations cover COTS software, middleware, RPA and custom applications across server and mainframe environments. Credentials rotate on policy with zero application downtime. [![Gift box opening with bright light beams illuminating the parcel contents Generative AI](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/section-4-1.jpg)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/section-4-1.jpg?ts=markdown) ### Hundreds of out-of-the-box integrations Prebuilt integrations for commercial applications, databases, middleware, RPA platforms and automation tools. Remove hard-coded credentials from third-party software without custom development. New integrations added continuously through Idira Marketplace. ### Policy-based rotation with zero downtime Rotate application credentials automatically based on security policy. Credential Providers coordinate rotation and delivery so applications keep running without interruption, even for mission-critical systems that demand high availability. [Request a demo](#demo) [![A blue and red shield with a red dot in the middle](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/section-4-2.jpg)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/section-4-2.jpg?ts=markdown) [![Digital Safety with a blue color shield with futuristic background for change your password day](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/section-4-3.jpg)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/section-4-3.jpg?ts=markdown) ### Strong application authentication Verify the identity of every application requesting a credential before delivering it. Multiple authentication methods validate the origin of requests, ensuring only authorized applications access sensitive secrets. {#capabilities} KEY CAPABILITIES \& FEATURES ## How credential providers work Secure, high-performance credential retrieval for applications running in server and mainframe environments. Multiple provider types address different deployment and integration needs. ![Key Responsibility](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/key-responsibility-image-new.jpg) * Agent-Based Provider * Central Credential Provider * Platform Coverage * Developer Tools Select a topicAgent-Based ProviderCentral Credential ProviderPlatform CoverageDeveloper Tools ### Local caching for high-performance, mission-critical apps The Credential Provider agent runs locally and caches credentials for applications that require the highest performance and availability. If the vault is temporarily unreachable, applications continue operating from the local cache without interruption. ### REST-based credential retrieval for any application The Central Credential Provider (CCP) delivers credentials over HTTPS with no agent required on the application server. Ideal for web applications, containers and environments where installing a local agent isn't practical. Supports mutual TLS authentication. ### Windows, Linux, AIX and z/OS support Credential Providers support server and mainframe environments across Windows, Linux, AIX and z/OS. Secure credentials for enterprise applications wherever they run, including environments with strict data residency and air-gap requirements. ### SDKs and CLI tools for custom integration For applications without an out-of-the-box integration, use the CLIPasswordSDK, Java Password SDK or .NET Password SDK to retrieve credentials programmatically. Replace hard-coded passwords in custom scripts and internally developed applications. {#benefits} Benefits \& Values ## Enterprise-grade credential security Credential Providers meet the performance, availability and compliance requirements of the world's most demanding enterprises, including federal agencies and financial institutions operating in regulated, on-premises environments. ![performance](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/06-icons-1.svg) ### Mission-critical performance Built for the enterprise's most demanding applications. Local caching and high availability architecture ensure credential delivery even during network disruptions. ![rotation](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/06-icons-2.svg) ### Zero-downtime credential rotation Rotate credentials on policy while applications keep running. No maintenance windows, no manual coordination and no outages caused by expired or mismatched passwords. ![compliance](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/06-icons-3.svg) ### Audit-ready compliance Full audit trail for every credential retrieval. Track which application accessed which credential, when and from where. Meet NIST, PCI DSS, SOX and FISMA requirements. ![management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/06-icons-4.svg) ### Path to cloud-native secrets management When you're ready to modernize, Secrets Manager extends your credential management to cloud-native workloads with the same governance and policy model your teams already know. {#customers} CUSTOMERS ## Trusted by regulated enterprises worldwide Financial institutions, government agencies and Global 2000 enterprises rely on Credential Providers to secure application credentials across on-premises and hybrid environments. [![healthfirst logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/healthfirst-logo.svg)](https://www.paloaltonetworks.com/customers/healthfirst?ts=markdown)[![TIAA Bank logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/customers/TIAA-75.svg)](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) {#demo} Demo or Contact Us ## Request a demo Speak with one of our specialists on how you can eliminate hard-coded passwords by delivering secrets to applications at runtime. First NameLast NameBusiness EmailCompanyJob LevelSelect a job levelJob RoleSelect a job functionPhoneCountryCountryStateStateProvinceProvinceZip CodeDepartment Continue Sign me up to receive news, product updates, sales outreach, event information and special offers about Palo Alto Networks and its partners. By submitting this form, I understand my personal data will be processed in accordance with [Palo Alto Networks Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) and [Terms of Use.](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. Back Sign up THANK YOU! A Palo Alto Networks specialist will reach out to you shortly. We look forward to connecting with you! {#resources} Resources ## Credential provider resources ### Whitepapers, technical guides and best practices for removing hard-coded credentials across traditional and COTS applications. [![Identity Security for Software Development (O'Reilly)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/identity-security-for-software-development-oreilly.png) ![mobile Identity Security for Software Development (O'Reilly)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/identity-security-for-software-development-oreilly.png) E-Book Identity Security for Software Development (O'Reilly)](https://www.paloaltonetworks.com/resources/research/identity-security-for-software-development-oreilly?ts=markdown) [![Three Critical Use Cases for Enterprise Secrets Management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/3-critical-use-cases-for-enterprise-secrets-mgmt.jpg.png) ![mobile Three Critical Use Cases for Enterprise Secrets Management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/3-critical-use-cases-for-enterprise-secrets-mgmt.jpg.png) Whitepaper Three Critical Use Cases for Enterprise Secrets Management](https://www.paloaltonetworks.com/resources/whitepapers/three-critical-use-cases-for-enterprise-secrets-management?ts=markdown) [![2025 KuppingerCole Leadership Compass for Enterprise Secrets Management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/kuppingercole-leadership.png) ![mobile 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/application-credentials-delivery/kuppingercole-leadership.png) Analyst Report 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management](https://www.paloaltonetworks.com/resources/research/2025-kuppingercole-leadership-compass-for-enterprise-secrets-management?ts=markdown) [![Your Machines Might Be Your Weakest Link in a Security Audit](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/your-machines-might-be-your-weakest-link.png) ![mobile Your Machines Might Be Your Weakest Link in a Security Audit](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/machine/your-machines-might-be-your-weakest-link.png) E-Book Your Machines Might Be Your Weakest Link in a Security Audit](https://www.paloaltonetworks.com/resources/ebooks/your-machines-might-be-your-weakest-link-in-a-security-audit?ts=markdown) PreviousNext {#footer} Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/ai-security?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Next-Generation Identity Security](https://www.paloaltonetworks.com/idira?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![Palo Alto Networks Logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language