* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [Announcement](https://www2.paloaltonetworks.com/blog/category/announcement/) * New Highly Secure TIC 3.0... # New Highly Secure TIC 3.0 Offering for Remote Users \& Branch Offices [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2021%2F11%2Fremote-users-branch-offices%2F) [](https://twitter.com/share?text=New+Highly+Secure+TIC+3.0+Offering+for+Remote+Users+%26%23038%3B+Branch+Offices&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2021%2F11%2Fremote-users-branch-offices%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2021%2F11%2Fremote-users-branch-offices%2F&title=New+Highly+Secure+TIC+3.0+Offering+for+Remote+Users+%26%23038%3B+Branch+Offices&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2021/11/remote-users-branch-offices/&ts=markdown) \[\](mailto:?subject=New Highly Secure TIC 3.0 Offering for Remote Users \& Branch Offices) Link copied By [Dana Barnes](https://www.paloaltonetworks.com/blog/author/dana-barnes/?ts=markdown "Posts by Dana Barnes") Nov 18, 2021 4 minutes [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown) [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [AT\&T](https://www.paloaltonetworks.com/blog/tag/att/?ts=markdown) [Cortex Data Lake](https://www.paloaltonetworks.com/blog/tag/cortex-data-lake/?ts=markdown) [cybersecurity](https://www.paloaltonetworks.com/blog/tag/cybersecurity/?ts=markdown) [Prisma Access](https://www.paloaltonetworks.com/blog/tag/prisma-access/?ts=markdown) This year, the Cybersecurity and Infrastructure Security Agency (CISA) finalized two Trusted Internet Connections (TIC) 3.0 use cases. These use cases for [remote users](https://www.cisa.gov/sites/default/files/publications/CISA%20TIC%203.0%20Remote%20User%20Use%20Case_1.pdf) and[branch offices](https://www.cisa.gov/sites/default/files/publications/CISA%20TIC%203.0%20Branch%20Office%20Use%20Case.pdf) help agencies secure their external connections to federal networks and maintain compliance. The guidance outlines how remote users and branch offices can connect directly to the cloud or an external trust zone. To meet the TIC 3.0 use cases, AT\&T Cybersecurity has selected Palo Alto Networks Prisma Access as the standard offering, which will be available through its AT\&T Government Trusted Internet solution. Providing a comprehensive and scalable solution, AT\&T is combining software-defined wide area networking (SD-WAN) technology, security capabilities through Prisma Access and fiber connectivity in a 24/7 managed solution. The solution will bring highly secure TIC 3.0 access to federal remote users and branch offices. ## Enabling Consistent and Secure Connectivity [FedRAMP Moderate Authorized Prisma Access](https://www.paloaltonetworks.com/security-for/government/fedramp) offers U.S. government organizations scalable, cloud-delivered networking and security to protect their workforces, from any location and with any type of internet connection, while helping to maintain TIC 3.0 compliance. By teaming with Palo Alto Networks, AT\&T can deliver these benefits to federal customers as part of their new AT\&T Government Trusted Internet managed offering. Prisma Access consolidates all the networking and security capabilities that organizations need to enable their remote workforces into one cloud-delivered platform. It also provides security for all application traffic while ensuring an exceptional user experience. And, it's Zero Trust ready, which is essential for agencies working to meet the Zero Trust requirements outlined in the[Executive Order on Improving the Nation's Cybersecurity](https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/), which was issued by the Biden administration in May 2021. ## Transitioning From the TIC 2.2 Solution to the TIC 3.0 Solution Government customers who are already using AT\&T's TIC-compliant Managed Trusted Internet Protocol Service (MTIPS) and the TIC 2.2 reference architecture to access internet and cloud from on-premises locations can easily integrate and modernize with the AT\&T Government Trusted Internet managed offering, with Prisma Access for TIC 3.0. The existing TIC 2.2 reference architecture still works well for on-site users connecting to the internet and cloud services through the agency WAN. However, TIC 2.2 doesn't suit agencies' mobile and telework users who experience latency and other performance issues while trying to connect to internet and cloud resources. With the AT\&T Government Trusted Internet managed solution, featuring Prisma Access, agencies can modify their existing General Services Administration (GSA) Enterprise Infrastructure Solutions (EIS) contract to secure their remote users and branch offices. ## Helping Agencies Enable Security Situational Awareness In other exciting news on Prisma Access, we've been participating in the Cloud Log Aggregation Warehouse (CLAW) pilot program to assist agencies in providing CISA analysts with security situational awareness to enable incident response. CLAW is a CISA-deployed architecture for collecting and aggregating security telemetry data from agencies using commercial cloud services. It's meant to enable secure, efficient methods for processing cloud security data in a way that offers CISA situational awareness at a level similar to what's provided by current National Cybersecurity Protection System EINSTEIN on-premises deployments. The Department of Homeland Security is currently evaluating how our[Cortex Data Lake](https://www.paloaltonetworks.com/cortex/cortex-data-lake) solution, which collects, transforms and analyzes enterprise data, pushes log data to CLAW from Prisma Access. Cortex Data Lake is included in Prisma Access and is also FedRAMP Moderate Authorized. The completion of the CLAW pilot should allow departments and agencies to send telemetry data to CISA's security analytics tools. ## Learn More About the AT\&T Government Trusted Internet Solution For more details on how AT\&T and Palo Alto Networks are working together to help government organizations meet the finalized TIC 3.0 guidance for remote users and branch offices, see [AT\&T's announcemen](https://about.att.com/story/2021/att-government-trusted-internet-connection.html)t or read the [white paper](https://cybersecurity.att.com/resource-center/white-papers/tic-3.0-focuses-on-securing-how-agencies-actually-work). To learn more, [download the Prisma Access datasheet](https://www.paloaltonetworks.com/resources/datasheets/prisma-access) and [the Cortex Data Lake datasheet](https://www.paloaltonetworks.com/resources/datasheets/cortex-data-lake). *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Advancing Innovation and Harnessing AI to Secure the Homeland](https://www2.paloaltonetworks.com/blog/2024/06/advancing-innovation-and-harnessing-ai/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### SEC Rule Sparks Reimagining of Cybersecurity Operations](https://www2.paloaltonetworks.com/blog/2023/08/sec-rule-cybersecurity-operations/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown) [#### Ignite '22 -- That's a Wrap](https://www2.paloaltonetworks.com/blog/2022/12/ignite-22-thats-a-wrap/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Education](https://www.paloaltonetworks.com/blog/category/education/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### It's E-Rate Prep Season --- Shore Up Your Cybersecurity Defenses](https://www2.paloaltonetworks.com/blog/2022/10/e-rate-prep-season/) ### [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Palo Alto Networks Provides Telemetry Sharing Capability to CISA CLAW](https://www2.paloaltonetworks.com/blog/2022/07/telemetry-sharing-capability-to-cisa-claw/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Palo Alto Networks Products Added to the DoD ESI Portfolio](https://www2.paloaltonetworks.com/blog/2022/06/added-to-the-dod-esi-portfolio/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language