* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [Company \& Culture](https://www2.paloaltonetworks.com/blog/category/company-culture/) * Automation in Action --- Ho... # Automation in Action --- How 3 Customers Revolutionized SecOps with XSOAR [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2024%2F11%2Fhow-3-customers-revolutionized-secops-with-xsoar%2F) [](https://twitter.com/share?text=Automation+in+Action+%E2%80%94+How+3+Customers+Revolutionized+SecOps+with+XSOAR&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2024%2F11%2Fhow-3-customers-revolutionized-secops-with-xsoar%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2024%2F11%2Fhow-3-customers-revolutionized-secops-with-xsoar%2F&title=Automation+in+Action+%E2%80%94+How+3+Customers+Revolutionized+SecOps+with+XSOAR&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2024/11/how-3-customers-revolutionized-secops-with-xsoar/&ts=markdown) \[\](mailto:?subject=Automation in Action — How 3 Customers Revolutionized SecOps with XSOAR) Link copied By [Dena De Angelo](https://www.paloaltonetworks.com/blog/author/ddeangelo/?ts=markdown "Posts by Dena De Angelo") Nov 20, 2024 9 minutes [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [Cortex XSOAR](https://www.paloaltonetworks.com/blog/tag/cortex-xsoar/?ts=markdown) [use cases](https://www.paloaltonetworks.com/blog/tag/use-cases/?ts=markdown) Picture this: It's 4 a.m. A security analyst jolts awake to a ping on their phone. Another alert. Another potential threat. Another disrupted night of tackling manual processes and painstaking investigations. Another day, another strong pot of coffee. This scene, unfortunately, is all too common in today's cybersecurity landscape. But, there is a way to transform fire drills into smooth, automated processes. Security teams can spend less time chasing false positives and more time strategizing against real threats. See how three of our customers across various industries and regions are leveraging Cortex XSOAR. They transform their security operations from a constant state of firefighting into a strategic tool that anticipates and neutralizes threats *before* they escalate. # Unifying Security Operations with Cortex XSOAR [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar)simplifies security operations by unifying automation, case management, real-time collaboration and threat intelligence management. This integrated approach allows security teams to manage alerts across all sources, standardize processes with playbooks, take action on threat intelligence, and automate response for virtually any use case. ## Customer Story \#1 --- BCA: Standardizing Security Response and Boosting Efficiency [PT Bank Central Asia Tbk (BCA)](https://www.paloaltonetworks.com/customers/transforming-the-soc-for-bank-central-asia), Indonesia's largest lender by market value, faced significant challenges with multiple security tools and manual processes. Like many large organizations, BCA's security team was grappling with a multitude of security tools, each with its own set of guidelines and configurations. This fragmented approach led to inefficiencies, increased the potential for human error, and hindered the team's ability to respond quickly to threats. Hans Christianto, AVP of IT Security at BCA, explained their predicament: "We did not have a standardized method for security response, as we had multiple tools from various brands. We needed to integrate these numerous solutions and use automation to achieve our goal of faster detection and response capabilities." By deploying XSOAR, BCA achieved significant improvements across multiple areas: * Automated 30,000 out of 740,000 security tickets handled in 2023, reducing the manual workload for the SOC team. * Developed and deployed 85 custom playbooks, streamlining security processes and enhancing operational efficiency. * Decreased incident response times by replacing limited Java-based scripts with comprehensive war room capabilities, improving both mean time to detect (MTTD) and mean time to respond (MTTR). BCA's implementation aligned with best practices for security automation: * **Starting Simple** **--** BCA began by focusing on integrating their existing security tools and automating repetitive tasks. This approach allowed them to achieve quick wins and demonstrate the value of automation to their organization. * \*\*Gradual Implementation --\*\*Following the "crawl-walk-run" approach, BCA steadily expanded their use of XSOAR, developing and customizing playbooks to suit their stakeholders' specific needs. * **Leveraging Prebuilt Content** **--** BCA took advantage of XSOAR's extensive library of prebuilt integrations and playbooks, which helped accelerate their automation journey. * **Standardizing Processes** **--** Created consistent, repeatable workflows for incident response, improving efficiency and reducing errors. Lily Wongso, EVP of IT Security at BCA, highlighted the platform's comprehensive capabilities: "Cortex XSOAR marries threat intelligence with SOAR, providing us with extensive threat intelligence capabilities and complete control over threat data management." ## Customer Story \#2 --- State of North Dakota: Automation Helps Staff Scale [The State of North Dakota Information Technology (NDIT)](https://www.paloaltonetworks.com/customers/north-dakota-it-safeguards-citizens-with-ai-driven-secops) faced the monumental task of scaling security from 20,000 endpoints to 250,000 while maintaining their current staffing levels and budget. They also needed to unify over 600 state entities, each with its own siloed security tooling and unique processes. Their objectives were clear and without automation, seemingly impossible to achieve. By implementing Cortex XSOAR, NDIT achieved remarkable results: * 57% reduction in false positives for phishing incidents, leading to 21,000 fewer incidents a year. * Automated 60% of total incidents with the help of 196 playbooks. * Achieved operational efficiencies equivalent to 8-10 SOC analysts. These impressive outcomes were the result of a well-planned, strategic approach to implementing Cortex XSOAR. Let's delve into the key elements of NDIT's implementation strategy that drove their success: **Starting with Core Integrations**: NDIT began by integrating XSOAR with their most critical security tools. This allowed them to immediately address the challenge of unifying the disparate security systems across state entities. **Scalable Automation**: To meet their ambitious scaling goals, NDIT focused on creating scalable automation workflows. They started with high-volume, low-complexity tasks to quickly demonstrate the value of automation. **Leveraging Threat Intelligence**: NDIT took advantage of XSOAR's threat intelligence capabilities to enhance their detection and response times, contributing to their dramatic improvement in identifying true positives. **Standardizing Across Entities**: With XSOAR, NDIT created standardized playbooks that could be applied statewide. This not only improved efficiency but also ensured consistent security practices across all entities. These strategic implementations allowed NDIT to efficiently manage their expanded security responsibilities, showcasing the power of automation in improving large-scale security operations. > We had a vision to build, manage and maintain the best state cyber operations center in the United States. Working with Palo Alto Networks, we've been able to bring that forward. *---Michael Gregg, chief information security officer North Dakota IT* ## Customer Story \#3 -- Playtika: Transforming Incident Response and Resource Allocation [Playtika](https://www.paloaltonetworks.com/customers/playtika-manages-security-with-fewer-resources-using-palo-alto-networks-cortex-xsoar), a leading global gaming company, struggled with limited visibility and delayed incident response times. Liran Sheinbox, Head of Cyber Security at Playtika, described their goal: "We wanted a consistent, holistic approach to cybersecurity, using modern technologies, like AI and automation to efficiently safeguard the organization." To achieve this vision, Playtika implemented a similar approach with Cortex XSOAR: **Focused Use Case Implementation** **--** Playtika began their XSOAR journey by targeting their most pressing challenge: phishing responses. This allowed them to quickly demonstrate value and gain buy-in for further automation initiatives. **Gradual Expansion of Automation** **--** Following initial successes, Playtika steadily expanded their use of XSOAR. This measured approach allowed them to refine their processes and adapt to the new workflow. **Customizing for Gaming-Specific Needs** **--** Playtika leveraged XSOAR's flexibility to create custom playbooks tailored to the unique security challenges of the gaming industry, integrating with their game analytics and performance marketing tools. **Empowering Analysts with a Chatbot** **--** In an innovative move, Playtika implemented the XSOAR chatbot to assist analysts, providing guided assistance for various security tasks and facilitating team upskilling. This strategic implementation yielded impressive results, upleveling Playtika's security operations: * Reduced mean time to respond (MTTR) from 3.5 hours to 45 minutes. * Automated 50% of average daily incidents within six months. * Achieved an estimated 15% time savings for analysts through the Cortex XSOAR chatbot. The impact of these improvements was substantial, as Sheinbox emphasized: "Without Cortex XSOAR, we'd need twice the number of people we have now to manage events." By leveraging Cortex XSOAR's capabilities, Playtika not only enhanced their security posture but also optimized resource allocation, allowing their team to focus on more strategic initiatives while maintaining robust incident response capabilities. ### Automating Phishing Response Across these organizations, one of the most impactful use cases for Cortex XSOAR has been automating phishing responses. BCA, for example, developed a playbook that parses information from reported phishing emails, checks against threat intelligence, and responds accordingly. It even blocks incidents on their Palo Alto Networks firewall if necessary. Playtika also highlighted their phishing response playbook as their most frequently used automation. This playbook handles specific cases and automates the entire process, allowing analysts to mitigate incidents with a single click. ### Proactive Integrated Threat Intelligence Cortex XSOAR's ability to ingest and act on threat intelligence has been a game-changer for many organizations. BCA leveraged this capability to automate the detection of anomalies within their threat intelligence database. Christianto explained, "By integrating this data with our internal systems, we are able to identify and promptly block any malicious activities, thereby providing a robust safeguard against potential threats." This proactive approach to threat intelligence has allowed organizations to stay ahead of potential threats, reducing the risk of successful attacks. ### Shifting Left --- Integrating Security Earlier in the Development Lifecycle For organizations like Playtika that develop their own software, Cortex XSOAR's integration with other Palo Alto Networks products, like [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud), has enabled a "shift left" approach to security. This means incorporating security testing earlier in the development lifecycle, leading to faster and safer software development. Sheinbox emphasized the importance of this approach, "I'm a shift-left guy. With Palo Alto Networks Prisma Cloud, we can mitigate vulnerabilities earlier in the development lifecycle. This in turn helps us create exciting, compliant video games more quickly and at lower risk." ### Upskilling Security Teams An often-overlooked benefit of implementing SOAR solutions, like Cortex XSOAR, is the opportunity for security team upskilling. By automating routine tasks, analysts have more time to focus on complex problems and continuous learning. BCA noted that their analysts are being upskilled on an ongoing basis, with the latest automation processes through the use of the XSOAR war room and communication between team members. This addresses the common challenge of skill shortages in the cybersecurity industry. ### Automation Fuels the Future of Security Operations With Cortex XSOAR, automation takes center stage to revolutionize security operations, dramatically reducing response times, minimizing human error and empowering security teams to focus on strategic initiatives rather than repetitive tasks. This intelligent automation not only streamlines workflows but also enhances threat detection capabilities, enables consistent execution of security protocols, and provides scalability to handle the ever-increasing volume of security alerts without proportionally increasing staff. Regardless of industry or size, SecOps teams can leverage automation to improve efficiencies and strengthen their security posture. The experiences of BCA, the State of North Dakota and Playtika demonstrate the transformative power of Cortex XSOAR in modern security operations. By unifying security functions, increasing automation capabilities and centralizing incident management, organizations can significantly enhance their security posture while improving operational efficiency. These implementation strategies underscore several key principles for successful XSOAR deployments: * Start with clear objectives and focus on areas where automation can provide the most significant impact. * Leverage prebuilt content while also customizing for industry-specific needs. * Customize playbooks to fit your organization's unique requirements. * Invest in training to ensure your team can leverage the full potential of your SOAR platform. * Continuously review and refine your automated processes to stay ahead of evolving threats. * Start with high-impact, achievable goals to demonstrate value quickly. * Gradually expand automation capabilities, allowing teams to adapt and learn. * Focus on standardizing processes to improve efficiency and consistency. * Think creatively about how to use XSOAR's features to address unique organizational challenges beyond the SOC. As cyberthreats become increasingly sophisticated, the adoption of advanced SOAR platforms, like Cortex XSOAR, is no longer just an option; it's a necessity for organizations seeking to stay ahead in the cybersecurity race. By embracing automation and orchestration, security teams can not only keep pace with the growing volume of alerts but also preemptively defend against emerging threats, allowing them to focus on strategic initiatives that drive business value. ## Don't Just Take Our Word for It. See What the Experts Are Saying See why [KuppingerCole](https://www.kuppingercole.com/) has once again ranked Cortex XSOAR as the Overall Leader in their [2024 SOAR Leadership Compass.](https://start.paloaltonetworks.com/kuppingercole-soar-report.html) Download the[SANS product review](https://start.paloaltonetworks.com/cortex-xsoar-sans-review)on Cortex XSOAR. *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Palo Alto Networks Recognized in Critical Capabilities Report](https://www2.paloaltonetworks.com/blog/2023/05/recognized-in-critical-capabilities-report/) ### [AI Application Security](https://www.paloaltonetworks.com/blog/network-security/category/ai-application-security/?ts=markdown), [AI Governance](https://www.paloaltonetworks.com/blog/category/ai-governance/?ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Palo Alto Networks Announces Support for NVIDIA Enterprise AI Factory](https://www2.paloaltonetworks.com/blog/2026/01/support-nvidia-enterprise-ai-factory/) ### [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Education](https://www.paloaltonetworks.com/blog/category/education/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Crush It, Don't Get Crushed --- Combat SOC Analyst Burnout with AI](https://www2.paloaltonetworks.com/blog/2024/09/combat-soc-analyst-burnout-with-ai/) ### [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### AI Provides an Rx for Cybersecurity in Healthcare](https://www2.paloaltonetworks.com/blog/2024/07/ai-provides-an-rx-for-cybersecurity-in-healthcare/) ### [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Leverage Platformization -- Strengthen, Unify and Simplify Cybersecurity Tools](https://www2.paloaltonetworks.com/blog/2024/06/platformization-unified-platforms/) ### [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Customer Spotlight](https://www.paloaltonetworks.com/blog/category/customer-spotlight/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) [#### AI Powers Sabre's Enhanced Threat Detection \& Response](https://www2.paloaltonetworks.com/blog/2024/05/precision-ai-powers-sabres-enhanced-threat-detection-response/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language