* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [Endpoint](https://www2.paloaltonetworks.com/blog/category/endpoint-2/) * Traps: Protecting Resourc... # Traps: Protecting Resource Sensitive Environments [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F12%2Ftraps-protecting-resource-sensitive-environments%2F) [](https://twitter.com/share?text=Traps%3A+Protecting+Resource+Sensitive+Environments&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F12%2Ftraps-protecting-resource-sensitive-environments%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F12%2Ftraps-protecting-resource-sensitive-environments%2F&title=Traps%3A+Protecting+Resource+Sensitive+Environments&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2018/12/traps-protecting-resource-sensitive-environments/&ts=markdown) \[\](mailto:?subject=Traps: Protecting Resource Sensitive Environments) Link copied By [Danny Milrad](https://www.paloaltonetworks.com/blog/author/danny-milrad/?ts=markdown "Posts by Danny Milrad") and [Eila Shargh](https://www.paloaltonetworks.com/blog/author/eila-shargh/?ts=markdown "Posts by Eila Shargh") Dec 18, 2018 5 minutes [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint-2/?ts=markdown) [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [Cloud Security](https://www.paloaltonetworks.com/blog/tag/cloud-security/?ts=markdown) [endpoint security](https://www.paloaltonetworks.com/blog/tag/endpoint-security/?ts=markdown) [Traps](https://www.paloaltonetworks.com/blog/tag/traps/?ts=markdown) This post is also available in: [简体中文 (Chinese (Simplified))](https://www2.paloaltonetworks.com/blog/2019/02/protecting-resource-sensitive-environments-cn/?lang=zh-hans "Switch to Chinese (Simplified)(简体中文)") [繁體中文 (Chinese (Traditional))](https://www2.paloaltonetworks.com/blog/2019/02/protecting-resource-sensitive-environments-tw/?lang=zh-hant "Switch to Chinese (Traditional)(繁體中文)") [日本語 (Japanese)](https://www2.paloaltonetworks.com/blog/2019/02/protecting-resource-sensitive-environments-jp/?lang=ja "Switch to Japanese(日本語)") [한국어 (Korean)](https://www2.paloaltonetworks.com/blog/2019/02/protecting-resource-sensitive-environments-kr/?lang=ko "Switch to Korean(한국어)") Virtual endpoints and servers, whether in a VDI environment or cloud workload, encounter the same cybersecurity challenges as their physical counterparts. This has led to a slew of new operational and technical challenges for the professionals tasked with securing them. Frequent antivirus (AV) signature updates, application patches, and operating system updates, which are required to secure endpoints against known vulnerabilities, are particularly challenging in virtual environments where a "golden image" is used to provision virtual endpoints. Many of the traditional physical endpoint products can create unforeseen operational and technical complications when applied to virtual environments. Furthermore, even a purpose-built virtual security product often leaves gaps in the overall security architecture if it is not part of a cohesive security infrastructure. A new approach is needed to protect virtual and cloud environments from the ground up; one that offers continuous protection without the need for signatures, patches, or updates; one that integrates seamlessly into any "virtual" environment; and one that is part of an end-to-end security platform that encompasses physical, virtual, and cloud computing environments. [](https://players.brightcove.net/1050259881001/default_default/index.html?videoId=5739344199001) [![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2018/12/Screen-Shot-2018-12-14-at-2.05.38-PM-500x297.png)](https://players.brightcove.net/1050259881001/default_default/index.html?videoId=5739344199001) **No Patching or Signature Updates Required** In order to secure VDI and cloud workloads against known vulnerabilities, traditional security procedures require the application of the most recent antivirus signatures, application patches, and operating system updates after the initial "boot-up" from a golden image. This requirement presents several technical and operational challenges. For instance, the required AV updates, application patches, and system updates create increased network traffic that strains available bandwidth and system resources. Where immediate updates are not performed, administrators incur the operational burden of scheduling updates during off-peak hours, which is challenging in organizations with 24/7 uptime requirements. These endpoints and workloads remain vulnerable from the initial boot up from a golden image until all necessary security updates have been completed. Palo Alto Networks Traps does not use signatures, nor does it rely on or require patching or updates to protect endpoints and servers. Traps protects both physical and virtual systems. It prevents known and unknown exploits, as well as malicious executables that target operating system and application vulnerabilities -- without the need for signatures or signature updates. Endpoints and servers, whether physical, virtual, or in the cloud, are protected from the moment they become available. Urgent patches to the golden image or to live running systems are now relics of the past. Traditional security products are ill-suited for deployment in VDI and cloud environments and can require organizations to overcome unforeseen technical and operational challenges. Traps presents a new approach for protecting virtual environments that eliminates many of these challenges: * Traps does not use signatures, nor does it rely on or require patching or updates to prevent exploits and malware on virtual (and physical) endpoints and servers. * Traps protects VDI endpoints and servers from the moment they are initialized. * License elasticity and scalability are built into the Traps architecture. * Traps does not perform any system scans and, therefore, has no impact on shared storage or end-user productivity. * Traps advanced endpoint protection is fully integrated into the Palo Alto Networks Security Operating Platform, which also includes WildFire malware prevention service and the Next-Generation Firewall. **Optimized for Virtual and Cloud Environments** Deploying security products that are built for physical endpoints to virtual environments requires organizations to overcome additional logistical and architectural challenges. For instance, organizations must develop a mechanism to track and apply software and system licenses as virtual instances are spun up or down. Security products must work reliably at scale to accommodate thousands of simultaneous virtual sessions. In VDI environments where storage is commonly shared among virtual sessions, organizations must mitigate the impact of system scans that are generally at the core of "detective" security offerings. Traps is designed to work seamlessly in these environments. License elasticity and the ability to scale horizontally to tens of thousands of endpoints are built into the Traps architecture. Traps does not perform any system scans and, therefore, has no impact on shared storage or end-user productivity. **A Security Platform That Extends Beyond the Endpoint** A security product that is built solely to protect virtual endpoints often lacks the broader contextual intelligence that is a core component of an effective enterprise security architecture. Integrated threat intelligence that includes tactics, techniques, and procedures (TTP) which new and previously encountered cyberattacks have utilized is critical in successfully defending enterprise systems and networks. Traps is an integral part of the Palo Alto Networks Security Operating Platform that prevents cyberattacks, automatically and in real time, regardless of the physical or virtual nature of the endpoints and the systems deployed in an organization. WildFire is an integral part of Traps for increased contextual visibility into and protection against correlated threat actors and campaigns, no matter where in the organization they may occur. Watch the webinar "[5 Endpoint Protection Best Practices](https://www.sans.org/webcasts/109540)" to learn the essential requirements for endpoint protection, and how Traps advanced endpoint protection is simple to deploy and manage, providing a prevention-first approach that protects endpoints from malware, exploits and ransomware. *** ** * ** *** ## Related Blogs ### [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint-2/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### Protecting Endpoints From Day One](https://www2.paloaltonetworks.com/blog/2019/01/protecting-endpoints-day-one/) ### [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint-2/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Technical Documentation](https://www.paloaltonetworks.com/blog/category/technical-documentation/?ts=markdown) [#### Tech Docs: Five New Features in the Traps Management Service](https://www2.paloaltonetworks.com/blog/2018/08/tech-docs-five-new-features-traps-management-service/) ### [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint-2/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Technical Documentation](https://www.paloaltonetworks.com/blog/category/technical-documentation/?ts=markdown) [#### Tech Docs: Traps 5.0.2 and the July Traps Management Service - So Hot Right Now!](https://www2.paloaltonetworks.com/blog/2018/07/tech-docs-traps-5-0-2-july-traps-management-service-hot-right-now/) ### [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint-2/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### Introducing Traps for Android](https://www2.paloaltonetworks.com/blog/2018/06/introducing-traps-android/) ### [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint-2/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### Traps: Fighting Threats With Cloud-Based Malware Analysis](https://www2.paloaltonetworks.com/blog/2018/11/traps-fighting-fire-cloud-based-malware-analysis/) ### [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint-2/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Technical Documentation](https://www.paloaltonetworks.com/blog/category/technical-documentation/?ts=markdown) [#### Tech Docs: 3 New Features in the Latest Traps Management Service Release](https://www2.paloaltonetworks.com/blog/2018/06/tech-docs-3-new-features-latest-traps-management-service-release/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language