The World

The cyber world is a wonderful place, with exciting new technologies that are pushing the limits of what we thought was possible, driving changes across all aspects of our lives. But this innovation also presents cybercriminals with scores of new vulnerabilities, attack vectors, and opportunities for stealthy, targeted, automated attacks.

Your World

Your job is to make your business as efficient and productive as possible by enabling your employees and customers to take advantage of the newest technologies while securing against the slew of attackers looking to infiltrate your organization and wreak havoc on your digital assets.

Our Approach

We make it easy to safely enable new technologies and applications by delivering granular traffic identification, control and security within one natively integrated platform. Our security technologies are purpose-built to communicate and share threat intelligence with each other to simplify security and effectively prevent threats.

Our security subscriptions allow you to safely enable applications, users and content by adding natively integrated protection from known and unknown threats both on and off the network.

These security subscriptions are purpose-built to share context and prevent threats at every stage of an attack, allowing you to enable singular policies and automated protection that secure your network and remote workforce while simplifying management and enabling your business.



Palo Alto Networks® AutoFocus™ threat intelligence service reimagines how security teams protect their organizations from unique, targeted attacks. The hosted security service provides the intelligence, analytics and context required to understand which attacks require immediate response, as well as the ability to make indicators actionable and prevent future attacks. AutoFocus further provides the ability to:

  • Prioritize alerts for advanced attacks that require immediate attention.
  • Understand context around attacks, adversaries and campaigns, including targeted industries.
  • Respond proactively to threats and prevent future attacks.

Threat Prevention

The Threat Prevention subscription adds integrated protection against network-borne threats, including exploits, malware, command and control traffic, and a variety of hacking tools, through IPS functionality and stream-based blocking of millions of known malware and malware variation samples.

The Threat Prevention subscription is a key component of our closed-loop detection to prevention approach, receiving protection updates from WildFire malware analysis based on our global threat intelligence. When combined with WildFire, protections are updated in as little as 5 minutes, meaning your security is always up-to-date and able to prevent the latest threats. 





URL Filtering

URL Filtering provides you with protection from web-borne threats through malicious categories like “malware” and “phishing,” as well as granular, user-based controls over web activity through URL categories and customizable white- and black-lists,

The URL Filtering subscription utilizes PAN-DB, our URL database that automatically categorizes unknown URLs. PAN-DB is constantly updated by WildFire, which means you’re always protected against malicious, high-risk and unwanted websites.


The WildFire™ cloud-based malware-analysis subscription actively analyzes unknown files and links, including malware, websites, and command and control traffic, and delivers automatically created protections and intelligence back to subscribed customers all over the world for proactive, global prevention.

WildFire protections are created to account for innovative tactics, such as polymorphism, commonly used in advanced attacks. WildFire is also natively integrated with our newest technologies, Traps™, AutoFocus™, and Aperture, keeping security across your organization both coordinated and up to date.


GlobalProtect™ mobile security extends the protection of your firewall to endpoints both inside and outside your corporate network, delivering consistent security to users in all locations.

Mobile devices can use GlobalProtect apps for iOS and Android to connect to the corporate firewall, and you can apply the state of the endpoint device as part of the context for security policy, using the Host Information Profile (HIP). GlobalProtect subscriptions can also be deployed internally to protect local and wireless network users.


Government Endpoint Use Case

Read how government endpoints can be protected against today’s threat environment with minimal disruptions to operations while meeting the needs of end users.

  • 0
  • 145

Top 3 Security Considerations for the Cloud

This brief discusses the top three considerations for securing traditional and cloud-based data centers, as well as key requirements for cloud security.

  • 1
  • 579

Cloud Security is a Shared Responsibility

This brief discusses the responsibilities of cloud vendors and organizations for securing the cloud in various environments.

  • 0
  • 69

Serbian Company Delta Holding Pushes Back on Cybercrime With Palo Alto Networks Next-Generation Security Platform

Delta Holding has selected the Palo Alto Networks Next-Generation Security Platform to prevent ransomware from disrupting business operations.

Santa Clara, Calif.
  • 0
  • 125

Delta Holding

Delta Holding eliminated ransomware and gained a comprehensive shield against malware and zero-day attacks with Palo Alto Networks Next-Gen Security Platform.

  • 0
  • 260

Credential Theft Solution Brief

Learn how to prevent the risk of credential theft in a comprehensive manner with Palo Alto Networks Next-Generation Security Platform.

  • 0
  • 99