* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [Announcement](https://www2.paloaltonetworks.com/blog/category/announcement/) * Prisma Cloud Automaticall... # Prisma Cloud Automatically Secures Unprotected Cloud Workloads [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2021%2F04%2Fapril-2021-release-prisma-cloud%2F) [](https://twitter.com/share?text=Prisma+Cloud+Automatically+Secures+Unprotected+Cloud+Workloads&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2021%2F04%2Fapril-2021-release-prisma-cloud%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2021%2F04%2Fapril-2021-release-prisma-cloud%2F&title=Prisma+Cloud+Automatically+Secures+Unprotected+Cloud+Workloads&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2021/04/april-2021-release-prisma-cloud/&ts=markdown) \[\](mailto:?subject=Prisma Cloud Automatically Secures Unprotected Cloud Workloads) Link copied By [John Morello](https://www.paloaltonetworks.com/blog/author/john-morello/?ts=markdown "Posts by John Morello") and [Keith Mokris](https://www.paloaltonetworks.com/blog/author/keith-mokris/?ts=markdown "Posts by Keith Mokris") Apr 28, 2021 7 minutes [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) [Cloud Workload Protection Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection-platform/?ts=markdown) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown) [Partners](https://www.paloaltonetworks.com/blog/cloud-security/category/partners/?ts=markdown) [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [CWPP](https://www.paloaltonetworks.com/blog/tag/cwpp/?ts=markdown) [Prisma Cloud](https://www.paloaltonetworks.com/blog/tag/prisma-cloud/?ts=markdown) [Product Announcement](https://www.paloaltonetworks.com/blog/tag/product-announcement/?ts=markdown) This post is also available in: [日本語 (Japanese)](https://www2.paloaltonetworks.com/blog/2021/05/prisma-cloud-automatically-secures-unprotected-cloud-workloads/?lang=ja "Switch to Japanese(日本語)") ## The April 2021 Release for Prisma Cloud Propels Container Security Forward and Extends Our Workload Security Vision. *The April 2021 release for Prisma Cloud propels container security forward and extends our workload security vision. New functionality increases automation and detection, simplifies compliance checks and deepens visibility into malware threats for containers and hosts. Additionally, we are unveiling the industry's first cloud native attack dashboard that extends the MITRE ATT\&CK® framework.* The Prisma Cloud team wants to help ensure no workload is left unprotected, and our latest release brings us closer to that goal. Enterprises increasingly rely on diverse cloud native application portfolios as they select the cloud platform best suited to a given goal or strategy -- simultaneously leveraging hosts, containers and serverless architectures for workloads. According to the [2020 State of Cloud Native Security Report](https://www.paloaltonetworks.com/state-of-cloud-native-security), enterprises expect to run as much as 64% of their workloads in the cloud by 2022, spread nearly equally across VMs (30%), containers (24%), managed container services (21%) and serverless (22%). But because the precise composition of these portfolios can vary widely across teams and projects, holistic security will require comprehensive security platforms that can overlay centralized controls and visibility, as Gartner notes in its [Market Guide for Cloud Workload Protection Platforms (CWPP)](https://www.paloaltonetworks.com/blog/2020/05/cloud-2020-guide-cloud-workload-protection-2/). In support of this need, we are excited to announce the latest release for Cloud Workload Protection in Prisma Cloud, which includes: * [Automated detection and protection of cloud VMs.](#host-security) * [The industry's first cloud native-focused Attack framework.](#industrys-first) * [Enhanced malware analysis for hosts and containers with WildFire integration](#anti-malware-capabilities). * [An improved compliance dashboard for analyzing security posture against leading frameworks](#simplified-compliance). * [Virtual patching in the Web Application and API Security module](#web-app-and-api-security). * [Git repository scanning using the twistcli tool](#shift-left). * And more. Let's explore some of the details of these new capabilities. ## Host Security: Auto-Detect and Auto-Protect Cloud VMs Virtual machines that run in public clouds require purpose-built security to streamline protections at scale; as an organization's cloud footprint increases, it becomes harder to track and protect the growing number of VMs. To mitigate these issues, Prisma Cloud now automatically detects unprotected VMs running on Amazon Web Services (AWS), Microsoft Azure and Google Cloud. To then seamlessly deliver protection, Prisma Cloud can automatically deploy our [Defender agent](https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-reference-architecture-compute/platform_components/defender) on those VMs, giving security teams assurance that the workloads are protected against anomalous behavior and active threats. ![Figure 1. Discovering unprotected VMs in Prisma Cloud.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/04/word-image-51.png) Figure 1. Discovering unprotected VMs in Prisma Cloud. At launch, customers can enable auto-deployment for Amazon Elastic Compute Cloud (Amazon EC2) instances, with support for Azure and Google Cloud coming soon. ## The Industry's First Comprehensive Attack Framework for Cloud Native Apps Prisma Cloud delivers comprehensive workload protection with runtime defense -- automatically modeling baseline application behavior, then generating alerts for any deviation from normal activity or emerging threats. Similarly, organizations often use third-party frameworks, like the MITRE ATT\&CK Framework, to measure the effectiveness of their security procedures and to identify areas of improvement. In this latest release, Prisma Cloud offers a new interactive dashboard that correlates an attack framework to 12 distinct categories of security audits and events. This dashboard is the first of its kind -- purpose-built for cloud native applications. It provides a consolidated view of an organization's entire cloud native app portfolio, whether running on cloud VMs, containers or serverless architectures. ![Figure 2. The new Attack Explorer dashboard in Prisma Cloud.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/04/word-image-52.png) Figure 2. The new Attack Explorer dashboard in Prisma Cloud. Customers can easily track trends over a period of time and evaluate how their defense capabilities map to specific threat scenarios, better enabling potential incident response and remediation. ## Anti-Malware Capabilities and WildFire Integration Add Full-Lifecycle Malware Analysis for Hosts and Containers Prisma Cloud delivers vulnerability intelligence, advanced threat protection data and malware feeds via the [Prisma Cloud Intelligence Stream](https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/technology_overviews/twistlock_advanced_threat_protection.html). Customers get accurate, precise risk prioritization and threat prevention, [even in isolated environments](https://www.paloaltonetworks.com/blog/prisma-cloud/threat-intelligence-isolated-environments/). To bolster this intelligence, Prisma Cloud now uses [Palo Alto Networks WildFire intelligence](https://www.paloaltonetworks.com/blog/prisma-cloud/prisma-cloud-and-wildfire-integration/) to scan unknown binaries both at runtime and in CI/CD scenarios. ![Figure 3. Setting up the WildFire integration in Prisma Cloud.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/04/word-image-53.png) Figure 3. Setting up the WildFire integration in Prisma Cloud. Once customers set up a [simple policy](https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/create-a-policy.html), all unknown binaries will be sent to the WildFire engine, which runs the binaries in an isolated sandbox and determines their risk level. This gives teams an additional layer of runtime protection and deeper visibility into malware threats during CI/CD processes. Additionally, new anti-malware and exploit prevention capabilities cover hosts and containers. ## Simplified Compliance for Hosts, Containers and Serverless Apps DevOps, security and compliance teams frequently need to meet internal compliance requirements while also achieving standards for external frameworks such as PCI-DSS, [HIPAA](https://www.paloaltonetworks.com/blog/prisma-cloud/cloud-native-security-for-the-healthcare-industry/), and GDPR. To assist in meeting these requirements, this release includes an improved [Compliance Explorer](https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/compliance/compliance_explorer) UI that makes it easier to analyze your security posture against leading compliance frameworks and [CIS Benchmarks](https://www.paloaltonetworks.com/blog/2020/08/cloud-cis-controls/). ![Figure 4. The updated Compliance Explorer dashboard in Prisma Cloud.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/04/word-image-54.png) Figure 4. The updated Compliance Explorer dashboard in Prisma Cloud. This release also delivers the industry's first compliance solution for implementing the [Docker Enterprise Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG)](https://www.docker.com/blog/docker-enterprise-first-disa-stig-container-platform/). This framework provides coverage for host configurations, containers and images, and orchestrator configuration. Importantly, the STIG leverages previous National Institute of Standards and Technology (NIST) Special Publications, including NIST SP 800-53 and [NIST SP 800-190](https://www.paloaltonetworks.com/resources/webcasts/securing-containers-with-nist-sp-800-190), the latter of which was co-authored by John Morello, Prisma Cloud vice president, product, while he was CTO at [Twistlock](https://www.paloaltonetworks.com/blog/2019/11/cloud-prisma-cloud-compute-edition/). ## Web App and API Security: Virtual Patching Security teams must quickly react to new threats and enable protection across their cloud native infrastructure. To address these challenges, the [Web Application and API Security](https://www.paloaltonetworks.com/prisma/cloud/web-application-API-security) (WAAS) module now supports dynamic policy creation, also known as virtual patching, to more quickly enable protection wherever WAAS is active. ![Figure 5. Virtual patching in Prisma Cloud.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/04/word-image-55.png) Figure 5. Virtual patching in Prisma Cloud. Dynamic policies created by Prisma Cloud Labs, our own threat research and R\&D team, are distributed via the Prisma Cloud Intelligence Stream to ensure more comprehensive coverage across new and emerging attack vectors. Policies are distributed automatically based on deep knowledge of CVEs across end-user environments. ## Shift Left: Wider Git Repo Availability and Enhanced License Detection We previously added capabilities for [identifying vulnerabilities in git repositories](https://www.paloaltonetworks.com/blog/prisma-cloud/git-repo-vuln-management/) to help developers and DevOps teams address flaws earlier in the software development lifecycle. This latest release now lets users scan code repositories using the [twistcli command line interface](https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-reference-architecture-compute/platform_components/twistcli), and includes new support for scanning GitHub Enterprise repositories. This offers developers even more flexibility for scanning git repos. ![Figure 6. Customizable license alerting thresholds.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/04/word-image-56.png) Figure 6. Customizable license alerting thresholds. Additionally, we've added advanced license detection to help identify open source licenses in packages, as well as license compliance rules that are set in Prisma Cloud to monitor and manage usage within an organization. At launch, supported license categories include MIT, LGPL and GPL, along with 20 others. ## Additional Capabilities in Prisma Cloud In addition to these extensive capabilities, the April 2021 release for Prisma Cloud also delivers: * **Deeper support for AWS Fargate:** Users can now run the Prisma Cloud Compute Edition Console on AWS Fargate, and get Fargate-specific vulnerability and compliance views. * \*\*Enhanced Role-Based Access Control (RBAC):\*\*Prisma Cloud now includes customized role creation, with Assigned Collections available in Prisma Cloud Enterprise Edition for the first time. This provides DevOps and security teams more granular control over the configuration of dashboard views based on user roles. ## Next Steps for Managing Your Cloud Native Applications You can learn more about securing diverse architectures into runtime with our latest ebook, [Why and How to Add Runtime Defense to Your Cloud Security Strategy](https://www.paloaltonetworks.com/resources/whitepapers/add-runtime-defense-cloud-security.html). And for a deeper look at the cloud native Attack Framework within Prisma Cloud, join our discussion on May 25, 2021, [Cloud Native Matrix to Protect Hosts, Containers \& Serverless](https://cloudnativethreatmatrix.splashthat.com/). Led by our own product managers, we'll examine real use cases from customers while providing a demonstration of the interactive dashboard. *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security/?ts=markdown), [Cloud Security Provider](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-provider/?ts=markdown), [Cloud Workload Protection Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection-platform/?ts=markdown), [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Cloud Workload Protection Company of the Year](https://www2.paloaltonetworks.com/blog/2022/11/cloud-workload-protection-company-of-the-year/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Cloud Workload Protection Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection-platform/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Prisma Cloud: A Leader in Forrester Wave for Cloud Workload Security](https://www2.paloaltonetworks.com/blog/2022/03/prisma-cloud-leader-in-forrester-cws-wave/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Discover, Protect and Respond with AWS and Prisma Cloud](https://www2.paloaltonetworks.com/blog/2024/11/aws-and-prisma-cloud/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/cloud-security/category/announcement/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Prisma Cloud: Darwin Release Introduces Code to Cloud Intelligence](https://www2.paloaltonetworks.com/blog/2023/10/announcing-innovations-cnapp-prisma-cloud/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/cloud-security/category/announcement/?ts=markdown), [Cloud Native Security Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-native-security-platform/?ts=markdown), [Cloud Workload Protection](https://www.paloaltonetworks.com/blog/category/cloud-workload-protection/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Agentless Workload Scanning Gets Supercharged with Malware Scanning](https://www2.paloaltonetworks.com/blog/2023/06/agentless-malware-scanning/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Commercial Initiatives for Partner Success -- Breakaway 1=5](https://www2.paloaltonetworks.com/blog/2023/02/commercial-initiatives-for-partner-success/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language