WILDFIRE
Stop Malware in its Tracks
WILDFIRE
Stop Malware in its Tracks

WildFire® utilizes near real-time analysis to detect previously unseen, targeted malware and advanced persistent threats, keeping your organization protected.


Request a demo


Block Sophisticated Attacks
USE CASES
  • Block Sophisticated Attacks

    WildFire combines machine learning, dynamic and static analysis, and a custom-built analysis environment to discover even the most sophisticated threats across multiple stages and attack vectors.

    Learn more
  • Inline ML stops rapidly changing malware, such as ransomware, and fast moving threats instantly on the firewall with no required cloud analysis, no damage to content, and no loss of user productivity.

    Learn more
  • Available globally to meet strict data residency and compliance needs, WildFire can be consumed as a public service as well as deployed in hybrid and air-gapped environments.

    Learn more
Report

2021 Unit 42 Ransomware Threat Report


Find out how to identify top ransomware threats, which industries are targeted and what the future of ransomware holds.


Beyond Traditional Sandboxing

Unknown threat analysis and prevention at massive scale
Read the Report
Analytics

Automatic Protections at Cloud Scale

Cloud-based architecture automatically delivers preventive measures learned from our 42k+ customers in seconds to your network, endpoint, and cloud environments.

Multi-Stage Threat Prevention

Unlike other solutions, WildFire can follow several stages of an attack, unifying analysis across both web and file vectors to prevent multi-stage threats.

Integrated Logging, Reporting, and Forensics

Users receive integrated logs, analysis, and visibility into malicious events, enabling security teams to rapidly locate and take action on the data.


Focus on what matters most

Adopt a prevention-first posture that automatically detects and prevents unknown threats
Download Report
  • ACTIVE CUSTOMERS
    42K+
  • Unique Malware Samples
    16B +
  • THREATS BLOCKED DAILY
    260K+
  • ACTIVE CUSTOMERS
    42K+
  • Unique Malware Samples
    16B +
  • THREATS BLOCKED DAILY
    260K+

Native Integration. Increased Security.

Integration regardless of the form factor

Hardware

  • PA-Series physical firewalls

Software

  • VM-Series virtual firewalls
  • CN-Series container firewalls

Cloud Service

  • Prisma Access
Case Study
FNTS

Advancing KPIT technologies with automation at scale

Problem

FNTS needed to align information security with a micro-segmented, software defined data center to extend consistent network and endpoint security capabilities seamlessly across multi-cloud environments.

Solution

The Palo Alto Networks platform approach provided unified next-generation security capabilities and integrated global threat intelligence with WildFire, Threat Prevention and URL Filtering.

  • WildFire
  • Prisma Cloud
  • Threat Prevention
  • URL Filtering
  • Panorama
  • AutoFocus
  • Traps
  • GlobalProtect
Read full case study

Cortex XDR tiers


Cortex XDR Prevent

Cortex XDR Pro

Data sources

Get extended visibility

Endpoint


Data sources

Get extended visibility

Endpoint, network, cloud and third-party products


Endpoint protection

Stop malware, exploits and fileless attacks


Endpoint protection

Stop malware, exploits and fileless attacks


Device control

Prevent data loss and USB-based malware infections


Device control

Prevent data loss and USB-based malware infections


Disk encryption

Manage BitLocker or FileVault from the Cortex XDR console


Disk encryption

Manage BitLocker or FileVault from the Cortex XDR console


Host firewall

Reduce the attack surface on Windows and macOS endpoints


Host firewall

Reduce the attack surface on Windows and macOS endpoints


Managed Threat Hunting

Uncover the most complex threats across endpoint and network with Unit 42 experts


Managed Threat Hunting

Uncover the most complex threats across endpoint and network with Unit 42 experts

Optional


Host Insights

Monitor host inventory, find vulnerabilities and sweep across endpoints to eradicate threats


Host Insights

Monitor host inventory, find vulnerabilities and sweep across endpoints to eradicate threats

Optional


Behavioral analytics

Detect emerging attacks with patented analytics and machine learning


Behavioral analytics

Detect emerging attacks with patented analytics and machine learning


Rule-based detection

Find threats with out-of-the-box and custom rules


Rule-based detection

Find threats with out-of-the-box and custom rules


Incident management

Reduce alert fatigue 98% by intelligently grouping alerts

Endpoint alerts


Incident management

Reduce alert fatigue 98% by intelligently grouping alerts

All alert sources


Integrated response

Contain threats with multiple, flexible response options

Endpoint only


Integrated response

Contain threats with multiple, flexible response options

Endpoint, network & cloud


Threat intelligence feed

Enrich investigations with rich context from tens of thousands of customers

Optional


Threat intelligence feed

Enrich investigations with rich context from tens of thousands of customers

Optional


Alert retention

30 days


Alert retention

30 days


XDR data retention


XDR data retention

Endpoint and network, 30 days


Extended data retention

Optional

Extended data retention

Optional