[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) # Secure Your AI Advantage: A Guide for Business Leaders ## AI isn't just a powerful tool for business transformation; it's a strategic imperative that also introduces new security challenges. Read on for a clear playbook on how to embrace AI to drive growth and efficiency while building the governance, culture, and security frameworks needed to win in an AI-first world. Learn to leverage AI confidently and securely, turning security into a competitive advantage. Back:Top NextSection 2 AI Questions Executives Are Asking Businesses are keenly focused on understanding and leveraging AI to drive growth, efficiency and competitive advantage. Here are some of the most common questions executives are asking about AI: [What AI security terms should business leaders know?](#section-3)[What security threats and challenges to AI success should I know about?](#section-4)[What does an AI-first enterprise look like for my organization?](#section-7)[What are leaders doing differently and how are they using AI solutions to accelerate their security transformation?](#section-8)[How do I get started ... and how do I get this right?](#section-9) What AI security terms should business leaders know? Successful digital transformation requires CXOs to master core AI security terms to proactively manage and mitigate the unique risks introduced by artificial intelligence. Understanding these concepts with real-world context enables leaders to make informed decisions about AI adoption. Generative AI: An Accelerator of Innovation and Cyber Risk + ![Generative AI Image](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/generative-ai.webp) Generative AI (GenAI) is a type of artificial intelligence capable of creating new and original content across various forms, including text, images, audio, video and code. Unlike traditional AI that primarily analyzes existing data or follows predefined rules, GenAI learns patterns and structures from vast datasets to generate new outputs that are based on given prompts and often mimic human creativity. The most recognized form of GenAI is the Large Language Model (LLM), which powers tools like ChatGPT. LLMs are sophisticated prediction machines, capable of generating coherent, relevant text by statistically predicting the most likely next word in a sequence. GenAI isn't just a technological advancement, it's a strategic imperative that can fundamentally reshape business models and provide significant competitive advantages. For example, GenAI can be used to power highly sophisticated chatbots and virtual assistants that engage customers in natural, nuanced conversations. By offering personalized customer experiences at scale, organizations can enhance customer satisfaction, drive higher conversion rates and build stronger brand loyalty. Using and integrating third-party GenAI models and APIs also expands an organization's attack surface. If a model is "poisoned" with malicious data during its training, the code or content it generates could contain hidden vulnerabilities, compromising systems. [Read more](https://www.paloaltonetworks.com/perspectives/securing-ai-agents-building-the-landing-gear-while-flying-the-plane/?ts=markdown) AI Agents: An Autonomous Security Frontier + ![AI agent Image](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/agent-ai.webp) An AI agent is an advanced form of artificial intelligence designed to autonomously perceive its environment, make decisions and take actions to achieve specific goals, often without continuous human intervention. Unlike simpler AI systems that might perform a single task, an AI agent can demonstrate a level of self-direction, adapting its behavior based on new information and working toward a defined objective. Agentic AI builds on generative AI, using LLMs as a "brain" for reasoning, planning and decision-making to achieve goals autonomously. Agentic AI can be used to provide proactive, real-time strategic insights, enabling faster and more informed decision-making. For example, an AI agent can continuously monitor global news, social media, financial reports and competitor activities across multiple languages and platforms. It can then autonomously synthesize this vast information, identify emerging market trends, predict competitor moves and even generate concise strategic recommendations or risk assessments. This could empower organizations to anticipate market shifts, seize new opportunities and maintain a competitive edge, transforming raw data into actionable intelligence. The same capabilities that make AI agents revolutionary also create profound security challenges. An AI agent can save millions in losses by flagging and pausing suspicious transactions before they clear. However, if that agent is compromised, an attacker could instruct it to approve fraudulent transfers or manipulate the logic for personal gain. [Read more](https://www.paloaltonetworks.com/perspectives/the-next-great-cybersecurity-threat-agentic-ai/?ts=markdown) Shadow AI: Balancing Employee Productivity and Speed with Security and Governance + ![Shadow IT Image](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/shadow-it.webp) Shadow AI is the use of unauthorized or unvetted artificial intelligence tools, models, and platforms by employees within the enterprise, bypassing formal IT and security oversight. It's the evolution of Shadow IT, which refers to the use of any technology, including software, hardware, cloud services and applications, by employees or departments without the knowledge, approval or oversight of the official IT organization. Driven by employee desire for speed and productivity, shadow IT has become increasingly prevalent with the widespread availability of user-friendly, cloud-based tools and, more recently, generative AI services that promise to simplify and accelerate work. Shadow AI is a significant and growing enterprise risk management concern with direct implications for cybersecurity, compliance and intellectual property. For example, an employee using an unauthorized cloud-based, file-sharing service to collaborate with an external partner could inadvertently upload sensitive corporate data, such as customer lists, financial reports or product development plans. With the rise of shadow AI, an employee might paste proprietary code or confidential client data into a public large language model (LLM) to summarize or debug it. For senior leadership, the challenge of shadow AI isn't just about control; it's about balancing employee productivity and agility with the fundamental need for security and governance. Proactively addressing this requires a strategic approach that includes transparent policies, education and providing employees with approved, secure and user-friendly AI tools that meet their needs. [Read more](https://www.paloaltonetworks.com/perspectives/is-your-ai-well-engineered-enough-to-be-trusted/?ts=markdown) What AI Security Governance Means for Your Business and Data + ![AI governance Image](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/ai-governance.webp) AI security governance is the strategic framework of policies, roles, standards, and oversight mechanisms that an organization puts in place to manage the security risks associated with the development, deployment, and use of Artificial Intelligence (AI) and Machine Learning (ML) systems. It ensures that AI is used securely, ethically, and in a way that aligns with the enterprise's security posture, regulatory requirements, and business objectives. AI governance is the framework of policies, principles and practices that an organization establishes to ensure its AI systems are developed, deployed and used in a safe, ethical and compliant manner. The strategic oversight of AI prevents the technology from becoming a liability. Without AI governance, organizations are exposed to legal and regulatory risk from compliance violations (e.g., GDPR, CCPA). Lack of governance also creates a chaotic environment where unvetted and unsanctioned AI tools can introduce vulnerabilities, making it impossible to enforce a consistent security posture across the enterprise. Governance allows for responsible scaling of AI innovation. [Read more](https://www.paloaltonetworks.com/perspectives/the-board-as-thought-partner-a-new-model-for-cyber-oversight/?ts=markdown) What security threats and challenges to AI success should I know about? The benefits of GenAI will have positive business impacts for every company that adopts this revolutionary technology. But to see this impact, it must be adopted securely from the beginning. As LLMs and GenAI become deeply integrated into critical operations and decision-making processes, adversaries can exploit subtle vulnerabilities to manipulate your model outputs to coerce unauthorized behaviors or compromise sensitive information. Securing your GenAI ecosystem is critical to safeguard sensitive data, maintain regulatory compliance, protect intellectual property and ensure the continued trustworthiness and safe integration of AI into core business functions. 88% Prompt-based attacks can have a success rate as high as 88%. 10% Organizations used on average 66 GenAI apps, with 10% classified as high risk. Whether you are a business leader, developer or security professional, understanding security and privacy risks and challenges is essential. GenAI traffic experienced an explosive surge of over 890% in 2024. 890% The average monthly number of GenAI-related data security incidents increased. 2\.5X \* GenAI traffic experienced an explosive surge of over [890% in 2024](https://www.paloaltonetworks.com/resources/research/state-of-genai-2025?ts=markdown). This surge reflects growing enterprise reliance on mature AI models and measurable productivity gains. \* The average monthly number of GenAI-related data security incidents increased 2.5 times, now accounting for 14% of all data security incidents across SaaS traffic according to the [State of GenAI in 2025 report](https://www.paloaltonetworks.com/resources/research/state-of-genai-2025?ts=markdown). \* Organizations used on average 66 GenAI apps, with 10% classified as high risk. \* Prompt-based attacks can have a success rate [as high as 88%](https://www.paloaltonetworks.com/resources/whitepapers/prompt-attack?ts=markdown). Three vectors subject to attack are: Prompt attacks (specifically prompt injection) are a significant security concern for both generative and agentic AI. These attacks exploit the fact that LLMs interpret user input as instructions. Goal hijacking+ Attackers manipulate prompts to alter the model's intended behavior. For example, by framing malicious instructions as a storytelling task, an attacker can trick an LLM into generating unintended responses. Guardrail bypass+ Attackers circumvent your security controls, such as system prompts, training data constraints or input filters. This can include obfuscating disallowed instructions using encoding techniques or exploiting plugin permissions to generate harmful content or execute malicious scripts. Information leakage+ These attacks can extract your sensitive data, such as system prompts or proprietary training data. Techniques include reconnaissance on applications and replay attacks designed to retrieve confidential information from prior interactions. Infrastructure attack+ Prompts are crafted to exploit your system resources or execute unauthorized code. Examples include consuming excessive computational power or triggering remote code execution, which can compromise application integrity. Read more Read less Palo Alto Networks AI Research Key Points and Findings [Securing GenAI:](https://www.paloaltonetworks.com/resources/whitepapers/prompt-attack?ts=markdown) A Comprehensive Report on Prompt Attacks: Taxonomy, Risks, and Solutions + \* Generative AI is revolutionizing productivity, but it's introducing critical security vulnerabilities that can compromise your sensitive data and information. \* Leading LLMs remain highly vulnerable to prompt attacks. Prompt-based attacks can have a success rate as high as 88%. \* There is an urgent need for a comprehensive understanding of prompt-based threats and a taxonomy classifying all known and emerging prompt attacks. A structured framework enables organizations to systematically assess risks, develop proactive defense strategies and enhance the security of GenAI systems against adversarial manipulation. \* To effectively detect and prevent both existing and emerging prompt attacks, organizations must implement a holistic, multilayered security strategy for GenAI systems. The State of GenAI 2025 [Report](https://www.paloaltonetworks.com/resources/research/state-of-genai-2025?ts=markdown) + \* Our analysis uncovers significant security implications of third-party GenAI app use: \* GenAI traffic surged more than 890% in 2024. This surge reflects growing enterprise reliance on mature AI models and measurable productivity gains. ![Securing GenAI](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/chart-2.webp) \* Data loss prevention (DLP) incidents for GenAI more than doubled. The rise of GenAI is also correlated with an increase in data security incidents. \* The average monthly number of GenAI-related data security incidents increased 2.5 times, now accounting for 14% of all data security incidents across SaaS traffic according to the report. ![Securing GenAI](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/chart-1.webp) \* Organizations used on average 66 GenAI apps, with 10% classified as high risk. \* While GenAI unlocks innovation and accelerates competition, the proliferation of unauthorized AI tools is exposing organizations to greater risk of data leakage, compliance failures and security challenges. [Achieving a Secure AI Agent Ecosystem:](https://www.schmidtsciences.org/wp-content/uploads/2025/06/Achieving_a_Secure_AI_Agent_Ecosystem-3.pdf) A Map of Open Opportunities and Actions for Advancement + \* Prioritizing AI agent system security is essential. \* To keep AI agents from being attacked and to address the security gaps in AI agents, a "security-first" design approach is crucial and adaptive; multilayered security strategies are necessary. \* The frameworks we use to secure traditional applications aren't enough. We are encountering problems that aren't merely variations on known vulnerabilities but are fundamentally new. The attack surface has shifted. This mindset shift is why the security landscape has been organized around three core concerns: \* Protecting AI agents from third-party compromise: How to safeguard the AI agents themselves from being taken over or manipulated by external attackers. * Protecting users and organizations from the agents themselves: How to ensure that the AI agents, even when operating as intended or if they malfunction, do not harm their users or the organizations they serve. * Protecting critical systems from malicious agents: How to defend essential infrastructure and systems against AI agents that are intentionally designed and deployed to cause harm. * Securing agentic AI will not come from any single breakthrough but from a sustained, multistakeholder effort. These include researchers, policymakers, practitioners and industry leaders working together across disciplines. ![State of GenAI](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/state-of-genAI.webp) Unlock Your AI Advantage: Listen and Learn from the Experts Press play on next-level intelligence and hear security experts discuss trends and topics. Securing GenAI: A Deep Dive into Prompt Attacks and GenAI Security Solutions Watch this recorded LinkedIn Live with Dr. May Wang, Chief Technology Officer of IoT Security, as she discusses emerging prompt attacks, a new framework for understanding them and AI-driven strategies to secure your AI systems. ![thumbnail 2](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/thumb-2-bg.webp) PlayPause Podcast Threat Vector | Securing the Future of AI Agents Seek Slider 15s30s Volume Slider *00:00* *00:00* Threat Vector: Securing the Future of AI Agents AI agents have arrived, and their deployment is accelerating rapidly. In this episode of Threat Vector, David Moulton speaks with Nicole Nichols, Distinguished Engineer for Machine Learning Security at Palo Alto Networks. Nicole breaks down new research, Achieving a Secure AI Agent Ecosystem, where she outlines three foundational pillars for defending emerging agent-based systems: protecting agents from third-party compromise, ensuring user alignment, and guarding against malicious agents. [Listen now](https://www.paloaltonetworks.com/resources/podcasts/threat-vector-securing-the-future-of-ai-agents?ts=markdown) ![thumbnail 1](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/thumb-1.webp) Securing GenAI: A Deep Dive into Prompt Attacks and GenAI Security Solutions ![thumbnail 2](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/thumb-2.webp) Threat Vector: Securing the Future of AI Agents 00 / 00 What does an AI-first enterprise look like for my organization? Why Culture is the First Line of Defense in the Age of Agentic AI? The arrival of agentic AI rewrites the rules of engagement for cybersecurity. As new tools and workflows create novel attack surfaces, the velocity and sophistication of AI-driven threats now demand a response that transcends technology alone. This new reality calls for a profound shift in our thinking toward a security-conscious culture, one where trust and empowerment form our first line of defense. Every part of a business must embrace security as its own critical responsibility. This means ensuring our employees are well equipped and empowered to make sound, secure decisions. It means fostering an environment where people feel comfortable speaking up when they spot something that doesn't seem right. And, critically, it means ensuring every leader across the business knows how to communicate and collaborate effectively if the worst happens and a breach occurs. [Learn more about this page](https://www.paloaltonetworks.com/perspectives/why-culture-is-the-first-line-of-defense-in-the-age-of-agentic-ai/?ts=markdown "Primary CTA") Culture: The Ultimate Human Firewall "It goes beyond just technology. It's about acquiring the latest tools and having brilliant people concentrated solely on the security team. Fundamentally, it's about cultivating a pervasive, deeply ingrained security culture within every organization." ![Wendi Whitmore](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/whitmore_wendi.jpg) Wendi Whitmore Chief Security Intelligence Officer What does this culture look like in practice? ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/shared-responsibility.svg) Shared responsibility From the legal department to operations, finance to HR, every single part of the business must recognize and internalize that security is their responsibility too. ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/empowerment.svg) Empowerment Our employees must be well positioned and genuinely empowered to make secure decisions in their daily work. They need to feel it's both safe and encouraged to raise their hand when they see something that doesn't look right. ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/communication.svg) Communication and preparedness Our leaders across the business must clearly understand their roles and responsibilities. Crucially, they must know how to communicate effectively with one another and with security teams if a breach occurs. The more we practice and test our responses to various scenarios, the better prepared and more secure our organizations will inevitably be. ![Section 8 Image](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/section-8-bg.webp) [](https://www.paloaltonetworks.com//players.brightcove.net/1050259881001/default_default/index.html?videoId=6369953542112&ts=markdown "Play Video") What are leaders doing differently and how are they using AI solutions to accelerate their security transformation? [](https://www.paloaltonetworks.com//players.brightcove.net/1050259881001/default_default/index.html?videoId=6369953542112&ts=markdown "Play Video") How do I get started... and how do I get this right? Traditional security measures are often insufficient to address these evolving, semantically driven threats, highlighting critical blind spots and a need for a proactive, multilayered governance strategy. The Governance Gap --- Regulation and Business Risk "Compounding the risk is a fast-evolving regulatory landscape, where noncompliance with emerging AI and data laws can result in severe penalties. Governments and regulatory bodies worldwide are working to catch up with AI's rapid advancement, which can create uncertainty for businesses. Some laws demand extreme caution in the handling and sharing of personal data with GenAI applications. The uncomfortable truth is that for all its productivity gains, there are many growing concerns --- including data loss from sensitive trade secrets or source code shared on unapproved AI platforms. There's also the risk in using unvetted GenAI tools that are vulnerable to poisoned outputs, phishing scams and malware disguised as legitimate AI responses." ![Anand Oswal](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/oswal_anand.jpg) Anand Oswal Executive Vice President, Products, Palo Alto Networks [Learn more about this page](https://www.paloaltonetworks.com/blog/2025/06/genais-impact-surging-adoption-rising-risks/?ts=markdown "Primary CTA") ![Rectangle Image](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/section-9.png) "It will be important to be proactive in this capacity, as the governance and oversight practices are still being established...New paradigms and technologies are needed. Adapting existing paradigms is a critical first step in evolving to address the emerging novel differences." ![Dr. Nicole Nichols](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/nichols_nicole.jpg) Dr. Nicole Nichols Distinguished Machine Learning Engineer, Palo Alto Networks [Read moreabout this page](https://www.helpnetsecurity.com/2025/07/09/dr-nicole-nichols-palo-alto-networks-ai-agent-security/) Navigating the AI Frontier: A CXO Playbook for Secure AI Governance Artificial intelligence is not just a technological advancement; it's a fundamental shift transforming industries and driving unprecedented innovation and efficiency. Organizations are embracing AI-powered applications at a remarkable pace, with 100% of survey respondents in the report [Establishing a Governance Framework for AI-Powered Applications](https://www.paloaltonetworks.com/resources/whitepapers/ai-governance?ts=markdown) confirming their adoption of AI-assisted application development. However, this rapid integration introduces novel security risks and governance challenges that traditional cybersecurity approaches are simply not equipped to handle. For chief executive officers and senior business leaders, establishing robust AI governance is no longer optional --- it's imperative. AI governance provides the essential policies, procedures and ethical guardrails to ensure your AI initiatives operate within legal and ethical boundaries, align with organizational values and safeguard stakeholder interests. This playbook outlines key strategies to build a successful AI governance framework, prioritizing security from conception to deployment. An Essential AI Security Playbook for Business Leaders Successfully integrating AI while mitigating its inherent risks requires a proactive, security-first approach that starts at the executive level. Here's how to establish an AI governance framework that embeds security at every step, empowering your organization to harness AI's full potential responsibly: Establish Executive Vision and Mandate "Secure AI by Design"+ Begin by securing strong executive sponsorship from the board or a dedicated committee to champion AI initiatives and overcome potential barriers. Define and promote foundational guiding principles for AI development and use, ensuring they reflect your organization's strategy, culture and values, thus enabling innovation without stifling it. Crucially, embed the principle of "[Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown)" into your AI strategy from the outset, requiring close collaboration between security, legal and AI development teams to integrate necessary controls throughout the AI lifecycle. Involve your CISO early and consistently to ensure a unified understanding and definition of AI governance, balancing value and risk at every turn. Implement a Comprehensive, Data-Centric Governance Framework with Visibility and Control + A successful AI governance program hinges on unprecedented visibility and stringent control over your AI ecosystem. You must gain a clear understanding of how AI is being used across the organization by establishing comprehensive inventories of all AI models and datasets. This includes detailing their purpose, use cases, training data sources and access permissions. Develop clear policies for sanctioned and unsanctioned AI models, with rigorous vetting and approval processes for new models that assess their provenance, testing and alignment with organizational values and compliance. Crucially, implement robust data governance practices to prevent data poisoning, ensuring strong access controls and continuous data flow monitoring for all data used in training, inference and fine-tuning. Integrate AI Trust, Risk and Security Management (AI TRiSM) Holistically + Move beyond traditional cybersecurity frameworks by adopting [AI TRiSM technology](https://www.paloaltonetworks.com/resources/research/gartner-market-guide-for-ai-trust-risk-and-security-management?ts=markdown) to manage the unique trust, risk and security aspects of AI models, applications and agents. This involves implementing safety protocols for the deployment and operation of AI systems, including AI workload protection. Continuously monitor trends and threats specific to AI security, reinforcing methods to assess exposure to unpredictable threats. Your risk framework should identify potential vulnerabilities, map risks to mitigation plans and conduct regular assessments for each AI use case. Furthermore, actively manage vendor risks by collaborating with internal stakeholders to define accountability requirements and AI governance guidelines for inclusion in vendor evaluations and contracts, demanding transparency from all AI solution providers. Champion Accountability, Transparency and Regulatory Compliance+ Build an organizational culture where accountability and transparency are paramount in AI development and deployment. Clearly define roles and responsibilities for all stakeholders in AI projects and establish a dedicated AI Governance Committee with cross-departmental representation to oversee initiatives. Mandate transparency and explainability in your AI systems, ensuring that their decision-making processes are understandable to stakeholders through documentation, interpretable machine learning techniques and human monitoring. Finally, establish a proactive approach to regulatory compliance, continuously monitoring the evolving global AI legal landscape --- from GDPR and CCPA to emerging AI-specific regulations like the EU AI Act. Conduct regular audits and reviews to maintain adherence to ethical standards, legal requirements and performance benchmarks. ### Stay ahead with our resources. Thought Leadership Research Videos Blogs [![What’s next for business and technology innovators](https://www.paloaltonetworks.com/perspectives/wp-content/uploads/2025/09/DeployBravely-Healthcare-Curie-perspectives-banner-1600x700-1.jpg) ![mobile What’s next for business and technology innovators](https://www.paloaltonetworks.com/perspectives/wp-content/uploads/2025/09/DeployBravely-Healthcare-Curie-perspectives-banner-1600x700-1.jpg) Perspectives What's next for business and technology innovators](https://www.paloaltonetworks.com/perspectives?ts=markdown) [![The definitive quarterly magazine for cybersecurity executives](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/perspectives-magazine.webp) ![mobile The definitive quarterly magazine for cybersecurity executives](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/perspectives-magazine.webp) Perspectives Magazine The definitive quarterly magazine for cybersecurity executives](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine) PreviousNext [![Securing GenAI: A Comprehensive Report on Prompt Attacks: Taxonomy, Risks, and Solutions](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/securing-genai.webp) ![mobile Securing GenAI: A Comprehensive Report on Prompt Attacks: Taxonomy, Risks, and Solutions](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/securing-genai.webp) Whitepaper Securing GenAI: A Comprehensive Report on Prompt Attacks: Taxonomy, Risks, and Solutions](https://www.paloaltonetworks.com/resources/whitepapers/prompt-attack) [![The State of GenAI 2025](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/the-state-of-genai-2025.webp) ![mobile The State of GenAI 2025](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/the-state-of-genai-2025.webp) Report The State of GenAI 2025](https://www.paloaltonetworks.com/resources/research/state-of-genai-2025) [![Achieving a Secure AI Agent Ecosystem](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/ai-agent-ecosystem.webp) ![mobile Achieving a Secure AI Agent Ecosystem](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/ai-research-report/images/ai-agent-ecosystem.webp) Report Achieving a Secure AI Agent Ecosystem](https://www.schmidtsciences.org/wp-content/uploads/2025/06/Achieving_a_Secure_AI_Agent_Ecosystem-3.pdf) PreviousNext ![Securing GenAI: A Deep Dive into Prompt Attacks and GenAI Security Solutions (LinkedIn Live)](https://tv.paloaltonetworks.com/static/uploads/6374191029112-poster.jpg) ![mobile Securing GenAI: A Deep Dive into Prompt Attacks and GenAI Security Solutions (LinkedIn Live)](https://tv.paloaltonetworks.com/static/uploads/6374191029112-poster.jpg) [Securing GenAI: A Deep Dive into Prompt Attacks and GenAI Security Solutions (LinkedIn Live)](https://www.paloaltonetworks.com//players.brightcove.net/1050259881001/default_default/index.html?videoId=6374191029112&ts=markdown) Video Securing GenAI: A Deep Dive into Prompt Attacks and GenAI Security Solutions (LinkedIn Live) [![New Frontier of GenAI Threats: A Comprehensive Guide to Prompt Attacks](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/04/GettyImages-764777461-edit-scaled.jpg) ![mobile New Frontier of GenAI Threats: A Comprehensive Guide to Prompt Attacks](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/04/GettyImages-764777461-edit-scaled.jpg) Blog New Frontier of GenAI Threats: A Comprehensive Guide to Prompt Attacks](https://www.paloaltonetworks.com/blog/2025/04/new-frontier-of-genai-threats-a-comprehensive-guide-to-prompt-attacks/) [![GenAI's Impact — Surging Adoption and Rising Risks in 2025](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/06/AdobeStock_321371261-edit-Op2-5-scaled.jpg) ![mobile GenAI's Impact — Surging Adoption and Rising Risks in 2025](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/06/AdobeStock_321371261-edit-Op2-5-scaled.jpg) Blog GenAI's Impact --- Surging Adoption and Rising Risks in 2025](https://www.paloaltonetworks.com/blog/2025/06/genais-impact-surging-adoption-rising-risks/) PreviousNext {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language