[](https://www.paloaltonetworks.com/idira?ts=markdown) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Idira logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/idira-logo-dark.svg)](https://www.paloaltonetworks.com/idira?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/idira?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions [Human Identities](https://www.paloaltonetworks.com/idira/human?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) [Machine Identities](https://www.paloaltonetworks.com/idira/machine?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) \[![Secure the next wave of autonomous, self-reasoning agents with Idira.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/nav-agentic-banner.jpg) Secure the next wave of autonomous, self-reasoning agents with Idira. Identity's role in securing AI\](https://www.paloaltonetworks.com/idira/agentic ?ts=markdown) * [Blog](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) * Resources ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Resources Resources * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia/identity-security?ts=markdown) * [Live Community](https://live.paloaltonetworks.com/) * [Technical Documentation](https://docs.paloaltonetworks.com) * [Support](https://support.paloaltonetworks.com/Support/Index) * [Technical Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * [Resource Center](https://www.paloaltonetworks.com/resources?ts=markdown) * [Events](https://events.paloaltonetworks.com) [Blog Get expert insights on modern threats and trends Learn more](https://www.paloaltonetworks.com/blog/identity-security/?ts=markdown) [Idira in Action See how our AI platforms stop threats in real time. Learn more](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) [Customer Stories Discover how leading organizations solve identity challenges. Learn more](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) * Get In Touch ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Get In Touch Get in Touch * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Find a Partner](https://technologypartners.paloaltonetworks.com/English/directory) * [Join our Community](https://live.paloaltonetworks.com/) * * [Request a Demo](https://www.paloaltonetworks.com/idira/request-demo?ts=markdown) ![palo alto networks logo icon](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-default.svg) ![white arrow icon pointing left to return to main Palo Alto Networks site](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) [](https://www.paloaltonetworks.com/idira?ts=markdown) Search Close search modal # Secrets Manager SaaS or Self-Hosted. Enterprise vault and lifecycle automation for secrets and credentials, with unique and universal identity for every workload across any environment. * [Request demo](#contact) ChallengesSolutionsKey Capabilities \& FeaturesBenefits \& ValuesCustomersIdira in Action [Challenges](#challenges) [Solutions](#solutions) [Key Capabilities \& Features](#capabilities) [Benefits \& Values](#benefits) [Customers](#customers) [Idira in Action](#contact) {#challenges} Challenges ## Machine identities are scaling faster than security teams can manage Modern enterprises run thousands of workloads --- applications, containers, services and automation --- across hybrid, multicloud and cloud-native environments. Every workload must be authenticated and authorized using a machine identity. As environments scale, secrets, identities and vaults multiply just as fast, creating fragmented governance, limited visibility and operational strain that traditional tools and manual processes can no longer manage. Manual processes introduce risk and inefficiency ![processes icon](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/manual-processes-icon-no-bg.svg) ### Manual processes introduce risk and inefficiency Manually rotating secrets, updating access and managing exceptions slow teams down and introduce human error. As workloads scale, these processes increase misconfigurations and create security gaps. Workload authentication is inconsistent and fragmented ![authentication icon](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/workload-authentication-icon-no-bg.svg) ### Workload authentication is inconsistent and fragmented Workloads authenticate and authorize differently across environments, relying on static credentials or platform-specific controls. This inconsistency makes it difficult to enforce least privilege and standardized security policies. Audit gaps in secrets and workload governance ![audit icon](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/audit-gaps-icon-no-bg.svg) ### Audit gaps in secrets and workload governance Security teams lack centralized visibility into workload access. Disconnected tools and inconsistent policies make it hard to prove ownership, enforce access controls and demonstrate audit compliance. {#solutions} SOLUTIONS ## Secrets management built for hybrid scale Secrets Manager gives security teams centralized control over secrets across cloud, on-premises and hybrid environments. Store, rotate and govern credentials automatically while giving developers native integrations that don't slow them down. Deploy as SaaS or self-hosted to match your operational requirements. [![Centralized secrets storage and retrieval](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/section-4-1.jpeg)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/section-4-1.jpeg?ts=markdown) ### Centralized secrets storage and retrieval Store and manage API keys, tokens, passwords, certificates and database credentials from a single platform. Secrets Manager supports hybrid and multicloud environments at enterprise scale with native integrations for applications, containers and CI/CD pipelines. [Request a Demo](#contact) ### Automated rotation and lifecycle controls Continuously rotate, expire and retire secrets based on policy. Eliminate long-lived credentials that attackers target. Automated lifecycle management replaces manual processes, reducing human error and ensuring every secret has an owner, an expirationand an audit trail. [Request a demo](#contact) [![Automated rotation and lifecycle controls](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/automated-rotation-and-lifecycle-controls.webp)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/automated-rotation-and-lifecycle-controls.webp?ts=markdown) [![One identity to access any resource](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/one-identity-to-access-any-resource.webp)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/one-identity-to-access-any-resource.webp?ts=markdown) ### One identity to access any resource Give every workload a universal cryptographic identity that retrieves secrets or authenticates directly to resources like cloud services and databases. Use identity-based access where environments support it and secrets where they don't. One identity model replaces fragmented, platform-specific authentication. [Read solution brief](https://www.paloaltonetworks.com/resources/techbriefs/secure-workload-access?ts=markdown) ### Deploy your way: SaaS or self-hosted Run Secrets Manager as a fully managed SaaS service or deploy self-hosted in your own data center for environments with strict data residency or air-gap requirements. Both options deliver the same enterprise-grade secrets management with consistent policy enforcement. [![Deploy your way: SaaS or self-hosted](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/products-saas.webp)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/products-saas.webp?ts=markdown) {#capabilities} KEY CAPABILITIES \& FEATURES ## Protect the enterprise. Secure application credentials. Empower your applications --- while keeping secrets out of attackers' hands. ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/comprehensive-secrets-management.webp) * Comprehensive Secrets Management * Robust Authorization and Audit * Enterprise Scale and Availability * Extensive Integrations Library Select a topicComprehensive Secrets ManagementRobust Authorization and AuditEnterprise Scale and AvailabilityExtensive Integrations Library ### Comprehensive Secrets Management Secure all credentials and secrets used by nonhuman users. Eliminate hard-coded credentials in applications. Rotate credentials based on policy. [Download e-book](https://www.paloaltonetworks.com/resources/ebooks/key-considerations-for-securing-different-machine-identities?ts=markdown) ### Robust Authorization and Audit Authenticate applications and containers using native application attributes and role-based access controls. Record key events with tamper-resistant audit. [Download datasheet](https://www.paloaltonetworks.com/resources/datasheets/secrets-manager-saas?ts=markdown) ### Enterprise Scale and Availability Meet stringent enterprise resiliency, scalability and performance requirements with distributed, high-availability architecture. [Download whitepaper](https://www.paloaltonetworks.com/resources/whitepapers/three-critical-use-cases-for-enterprise-secrets-management?ts=markdown) ### Extensive Integrations Library Accelerate deployment with validated integrations, including popular DevOps tools, CI/CD toolchains, automation tools, PaaS platforms and public cloud platforms. {#benefits} * 77% Increase in machine identities over next 12 months * 40% Machine identities have access to organizational data * 84% Still view security through a human lens Benefits \& Values ## Modern Secrets Management Designed to automate and simplify nonhuman credential management across any cloud provider, container platform, CI/CD pipeline, DevOps tool and on-prem. {#customers} CUSTOMERS ## Trusted by global enterprises to secure secrets and workloads [![DzBank](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/DZ-Bank-logo.svg)](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) [![TIAA Logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/customers/TIAA-75.svg)](https://www.paloaltonetworks.com/idira/customer-stories?ts=markdown) [![healthfirst](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/healthfirst-logo.svg)](https://www.paloaltonetworks.com/customers/healthfirst?ts=markdown) [![Repsol logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/customers/Repsol_logo-white.svg)](https://www.paloaltonetworks.com/customers/repsol?ts=markdown) [![encova](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/encova-insurance.svg)](https://www.paloaltonetworks.com/customers/encova?ts=markdown) {#contact} Idira in Action ## Request a demo Centrally manage all credentials. Safely automate processes while protecting the enterprise. Minimize the burden of audit and compliance. First NameLast NameBusiness EmailCompanyJob LevelSelect a job levelJob RoleSelect a job functionPhoneCountryCountryStateStateProvinceProvinceZip CodeDepartment Continue Sign me up to receive news, product updates, sales outreach, event information and special offers about Palo Alto Networks and its partners. By submitting this form, I understand my personal data will be processed in accordance with [Palo Alto Networks Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) and [Terms of Use.](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. Back Sign up THANK YOU! A Palo Alto Networks specialist will reach out to you shortly. We look forward to connecting with you! {#resources} Resources ## Secrets manager resources Analyst reports, technical guides and best practices for securing secrets across hybrid and multicloud environments. Datasheets E-Books Webinar Blog [![2025 KuppingerCole Leadership Compass for Enterprise Secrets Management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-1.png) ![mobile 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-1.png) Analyst Report 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management](https://www.paloaltonetworks.com/resources/research/2025-kuppingercole-leadership-compass-for-enterprise-secrets-management?ts=markdown) [![Three Critical Use Cases for Enterprise Secrets Management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/3-critical-use-cases-for-enterprise-secrets-mgmt.jpg.png) ![mobile Three Critical Use Cases for Enterprise Secrets Management](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/3-critical-use-cases-for-enterprise-secrets-mgmt.jpg.png) Whitepaper Three Critical Use Cases for Enterprise Secrets Management](https://www.paloaltonetworks.com/resources/whitepapers/three-critical-use-cases-for-enterprise-secrets-management?ts=markdown) PreviousNext [![Identity Security for Software Development (O'Reilly)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-4.png) ![mobile Identity Security for Software Development (O'Reilly)](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-4.png) E-Book Identity Security for Software Development (O'Reilly)](https://www.paloaltonetworks.com/resources/research/identity-security-for-software-development-oreilly?ts=markdown) [![Keeping Secrets Under Control and Secure](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-resource-3.png) ![mobile Keeping Secrets Under Control and Secure](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-resource-3.png) E-Book Keeping Secrets Under Control and Secure](https://www.paloaltonetworks.com/resources/ebooks/keeping-secrets-under-control-and-secure?ts=markdown) [![Key Considerations for Securing Different Machine Identities](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-6.png) ![mobile Key Considerations for Securing Different Machine Identities](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-6.png) E-Book Key Considerations for Securing Different Machine Identities](https://www.paloaltonetworks.com/resources/ebooks/key-considerations-for-securing-different-machine-identities?ts=markdown) [![Your Machines Might Be Your Weakest Link in a Security Audit](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-resource-4-new.jpg) ![mobile Your Machines Might Be Your Weakest Link in a Security Audit](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-resource-4-new.jpg) E-Book Your Machines Might Be Your Weakest Link in a Security Audit](https://www.paloaltonetworks.com/resources/ebooks/your-machines-might-be-your-weakest-link-in-a-security-audit?ts=markdown) PreviousNext [![Secrets Management Horror Stories from the Field: Four Security Pitfalls to Avoid](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-8.png) ![mobile Secrets Management Horror Stories from the Field: Four Security Pitfalls to Avoid](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-8.png) Webinar Secrets Management Horror Stories from the Field: Four Security Pitfalls to Avoid](https://www.paloaltonetworks.com/resources/webcasts/secrets-management-horror-stories-from-the-field-four-security-pitfalls-to-avoid?ts=markdown) [![The Future of Enterprise Secrets Management – As The Challenges Grow, How Are Security Teams Keeping Up?](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-9.png) ![mobile The Future of Enterprise Secrets Management – As The Challenges Grow, How Are Security Teams Keeping Up?](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/secrets-management/secrets-manager-9.png) Webinar The Future of Enterprise Secrets Management -- As The Challenges Grow, How Are Security Teams Keeping Up?](https://www.paloaltonetworks.com/resources/webcasts/the-future-of-enterprise-secrets-management-as-the-challenges-grow-how-are-security-teams-keeping-up?ts=markdown) PreviousNext [![Vibe check your vibe code: Adding human judgment to AI-driven development](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) ![mobile Vibe check your vibe code: Adding human judgment to AI-driven development](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) Blog Vibe check your vibe code: Adding human judgment to AI-driven development](https://www.paloaltonetworks.com/blog/identity-security/vibe-check-your-vibe-code-adding-human-judgment-to-ai-driven-development/?ts=markdown) [![A practical guide to AI-ready machine identity governance in finance](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) ![mobile A practical guide to AI-ready machine identity governance in finance](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) Blog A practical guide to AI-ready machine identity governance in finance](https://www.paloaltonetworks.com/blog/identity-security/a-practical-guide-to-ai-ready-machine-identity-governance-in-finance/?ts=markdown) [![Secrets, out: Why workload identity is essential for AI agent security](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) ![mobile Secrets, out: Why workload identity is essential for AI agent security](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/idira/resources/blog.png) Blog Secrets, out: Why workload identity is essential for AI agent security](https://www.paloaltonetworks.com/blog/identity-security/secrets-out-why-workload-identity-is-essential-for-ai-agent-security/?ts=markdown) PreviousNext {#faq} FAQs ## Frequently asked questions about securing secrets and workloads How can I see where all our secrets and workload credentials actually live? Most organizations underestimate how many secrets and vaults they operate across cloud, DevOps and third-party tools. Idira^®^ provides centralized discovery and visibility across existing vaults and environments, helping security teams understand ownership, usage and risk without forcing teams to change how they work. Will this solution slow down developers or require workflow changes? Idira is built to align with developer workflows, not disrupt them. Developers continue using familiar tools and patterns, while security teams gain the visibility, control and automation needed to reduce risk. This shared model helps security and development teams collaborate more effectively without slowing delivery. [O'Reilly](https://www.paloaltonetworks.com/resources/research/identity-security-for-software-development-oreilly?ts=markdown) How does this solution support secure access for modern, short-lived workloads? Secrets Manager SaaS assigns each workload a unique, cryptographic SPIFFE identity based on verified attributes like what it is, where it's running and who deployed it. These identities expire in hours, not years, and can't be shared or reused. Where environments support it, workloads authenticate directly with identity. Where traditional credentials are still required, they use that same identity to retrieve secrets on demand. No hardcoded keys, no standing access. [Secure Workload Access](https://www.paloaltonetworks.com/resources/techbriefs/secure-workload-access?ts=markdown) How does this solution help with audits and compliance reporting? Idira centralizes visibility, policy enforcement and audit trails across secrets and workload access. Security teams can quickly answer who accessed what, when and under which controls --- reducing audit preparation time and improving compliance across cloud, hybrid and third-party environments. Can we adopt this solution incrementally as our environment evolves? Yes. Idira supports a phased approach, allowing organizations to start with visibility and governance, then expand into automation and secure workload access over time. This flexibility helps teams modernize security at their own pace without a "rip and replace" mandate. [Idira Blueprint](https://www.paloaltonetworks.com/resources/techbriefs/identity-security-blueprint?ts=markdown) How does Idira Secrets Manager integrate with Idira Privileged Access Manager (PAM)? Idira Secrets Manager complements Idira Privileged Access Manager by extending identity security beyond human users to workloads, applications and automation. While PAM secures privileged human access and sessions, Secure Secrets and Workloads governs nonhuman identities, secrets and workload access --- giving security teams unified visibility, policy consistency and auditability across both human and machine identities. [Request Demo](#contact) Show more + {#footer} Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/ai-security?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Next-Generation Identity Security](https://www.paloaltonetworks.com/idira?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language