Our next generation security platform breaks down the barriers to enterprise adoption of public and hybrid cloud services. Our security platform prevents successful attacks on public, private and hybrid cloud infrastructure:

  • High scale perimeter defense
  • Zero trust segmentation of east west traffic
  • Pervasive security for the software defined data center
  • Zero touch security orchestration


Cloud providers secure their businesses using our platform, and are able to offer their customers strong security assurance that their assets are protected:

  • We prevent attacks from spreading across the cloud infrastructure.
  • We stop zero day malware from getting into the data center.
  • We enable the mobile, BYOD workforce to securely access the cloud.
  • We stop malware from executing on servers.
  • We enable zero touch security orchestration.
  • We enable profitable, scalable tiers of security services that support a broad base of business customers.

    • Our security platform is the only one that enables a positive security architecture, based on application, user and content. That is the foundation of Zero Trust security.
    • A software defined data center needs software defined security. Our virtualized platform family, rich set of APIs and integrations with leading orchestration systems enable security automation that is unmatched in the industry.
    • A complete solution. Our platform secures the perimeter, the data center core and the server end points under unified management and orchestration.
    • Our CSSP usage-based licensing enables profitable new business models. Cloud providers can offer on-demand, utility billing models for Security as a Service, and easily create tiers of security offerings that serve a wide variety of business customers.


    Interested in reading more? View all Cloud Provider Resources


    AWS Reference Architecture

    This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud.

    • 1
    • 2228

    GlobalProtect Cloud Service Demo

    Protect your remote networks and mobile users with GlobalProtect cloud service. Find out how by watching this demonstration.

    • 5
    • 2931

    GlobalProtect Cloud Service

    Global expansion, mobile workforces and cloud computing are shifting the locations of your applications, data and users. These changes introduce new opportunities for business efficiencies, but they also create a set of unique cybersecurity challenges.

    • 2
    • 3849

    Azure Reference Architecture

    This document provides architectural guidance for solution architects and engineers who are familiar with the next-generation firewall but not Azure.

    • 1
    • 1999

    VM-Series for Amazon Web Services

    Key features, performance capacities and specifications of VM-Series for Amazon Web Services.

    • 0
    • 9171

    Protecting the Extended Perimeter with GlobalProtect Cloud Service

    Your Perimeter Is Everywhere. The world you need to secure is undergoing tremendous transformation. Global expansion, mobile workforces and cloud computing are shifting the location of your applications, data and users. These changes introduce new opportunities for business, but they also create a set of cybersecurity risks. These tectonic shifts in location strain an organization’s ability to protect data and stop threats consistently. The mandate for security has not changed, but the ability to deliver protection at each location is at a crossroads. Many organizations, faced with the rising costs of extending the perimeter using conventional methods, are left with few other choices. These consequences place organizations at risk. It is important to understand where the risks lie to evaluate what must be done to bring security back into balance.

    • 0
    • 2703