Palo Alto Networks and FedRAMP Authorization

Build your agency’s cybersecurity foundation with FedRAMP Authorized cloud services

As your agency moves forward in its modernization efforts, it needs trusted cybersecurity solutions that will reduce the risk of data breaches while meeting compliance. Develop a comprehensive cloud cybersecurity strategy with solutions that protect workers, data and applications from cyber adversaries and advanced threats.


FedRAMP Authorized Services


Prisma Access

Enable consistent and secure connectivity

Simplifying and strengthening your agency’s cybersecurity foundation, Prisma Access allows you to respond to and stop sophisticated cyber attacks across endpoints, networks and cloud environments. Using Zero Trust architecture, Prisma Access protects remote workers and branch offices - while reducing TCO and improving compliance. Prisma Access is FedRAMP Moderate Authorized.

View the press release

Read the Forrester study

Read the blog

Download the datasheet

Browse the use case

Transition to TIC 3.0
Learn more


Cortex XDR

Stop stealthy attacks and simplify investigations

Stop modern attacks with an extended detection and response platform that spans your key security data sources. Cortex XDR includes endpoint protection, AI-driven threat detection and a powerful yet intuitive console for investigations. Cortex XDR has received FedRAMP Moderate Authorization.



Read the at-a-glance

Learn more


CORTEX XPANSE

Continuously discover and manage exposures in your attack surface

Manage internet-connected assets and services while monitoring and enforcing policies across a distributed network. Cortex Xpanse independently identifies assets and exposures across the entire network perimeter, and delivers the ability to enforce remediation actions. Cortex Xpanse has received FedRAMP Moderate Authorization.

Browse the Use Case
Learn more


Strata Logging Service

Fuel better analytics

Enable AI-based innovations by collecting, normalizing and integrating your agency’s cyber data with Strata Logging Service (formerly known as Cortex Data Lake). Take advantage of advanced AI and machine learning to gain insight and continually evolve defenses. Strata Logging Service is FedRAMP Moderate Authorized.
Learn more


Prisma Cloud

Prisma Cloud secures applications from Code to Cloud

Comprehensive security with both continuous visibility and proactive threat prevention throughout the application lifecycle. Prisma Cloud enables security and DevOps teams to effectively collaborate to accelerate secure cloud native application development and deployment.

Prisma Cloud is FedRAMP Moderate Authorized for cloud security posture management (CSPM) and cloud infrastructure entitlement management (CIEM).

Prisma Cloud has been accepted by the Joint Advisory Board (JAB) and is pursuing High Authorization for the entire platform.

Read the Prisma Cloud for federal data sheet
Learn more


WildFire: U.S. Government

Automatically stop unknown attacks

Detect and prevent evasive malware faster with threat models continually honed in the cloud. Prevent data breaches and downtime through automation that rapidly updates network, endpoint and cloud sensors with protections that counter the latest malware and exploits. WildFire: U.S. Government is a FedRAMP Moderate Authorized service.

Read the at-a-glance

Learn more


IoT Security
IoT Security

Secure every device on your agency’s network

IoT Security is the smartest FedRAMP certified solution for smart devices, delivering ML-powered visibility, prevention, and zero-trust enforcement in a single platform. Only IoT Security uses machine learning with crowdsourced telemetry to quickly and accurately discover all devices, assess risk, detect anomalies and automate Zero Trust based policy recommendations with enforcement. Delivered as a single platform that includes native enforcement while seamlessly integrating into existing workflows, IoT Security maximizes ROI and eases the burden on infrastructure and security teams. IoT Security is FedRAMP Moderate Authorized.

Read the press release

Read the blog

Read The Right Approach to Zero Trust for IoT Devices

Download the solution overview

Meet with us

Thank you for your interest. Contact us to get a free demo or a quote to start securing your agency today for a better tomorrow.

Contact the Federal Team

Cortex XDR tiers


Cortex XDR Prevent

Cortex XDR Pro

Data sources

Get extended visibility

Endpoint


Data sources

Get extended visibility

Endpoint, network, cloud and third-party products


Endpoint protection

Stop malware, exploits and fileless attacks


Endpoint protection

Stop malware, exploits and fileless attacks


Device control

Prevent data loss and USB-based malware infections


Device control

Prevent data loss and USB-based malware infections


Disk encryption

Manage BitLocker or FileVault from the Cortex XDR console


Disk encryption

Manage BitLocker or FileVault from the Cortex XDR console


Host firewall

Reduce the attack surface on Windows and macOS endpoints


Host firewall

Reduce the attack surface on Windows and macOS endpoints


Managed Threat Hunting

Uncover the most complex threats across endpoint and network with Unit 42 experts


Managed Threat Hunting

Uncover the most complex threats across endpoint and network with Unit 42 experts

Optional


Host Insights

Monitor host inventory, find vulnerabilities and sweep across endpoints to eradicate threats


Host Insights

Monitor host inventory, find vulnerabilities and sweep across endpoints to eradicate threats

Optional


Behavioral analytics

Detect emerging attacks with patented analytics and machine learning


Behavioral analytics

Detect emerging attacks with patented analytics and machine learning


Rule-based detection

Find threats with out-of-the-box and custom rules


Rule-based detection

Find threats with out-of-the-box and custom rules


Incident management

Reduce alert fatigue 98% by intelligently grouping alerts

Endpoint alerts


Incident management

Reduce alert fatigue 98% by intelligently grouping alerts

All alert sources


Integrated response

Contain threats with multiple, flexible response options

Endpoint only


Integrated response

Contain threats with multiple, flexible response options

Endpoint, network & cloud


Threat intelligence feed

Enrich investigations with rich context from tens of thousands of customers

Optional


Threat intelligence feed

Enrich investigations with rich context from tens of thousands of customers

Optional


Alert retention

30 days


Alert retention

30 days


XDR data retention


XDR data retention

Endpoint and network, 30 days


Extended data retention

Optional

Extended data retention

Optional