* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate) * Uncategorized # Palo Alto Networks ## Uncategorized [![A Day in the Life with Your AgentiX Automation Engineer Agent](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2026/01/AdobeStock_1246251272-scaled.jpeg)](https://www2.paloaltonetworks.com/blog/security-operations/a-day-in-the-life-with-your-agentix-automation-engineer-agent/) [A Day in the Life with Your AgentiX Automation Engineer Agent \-------------------------------------------------------------](https://www2.paloaltonetworks.com/blog/security-operations/a-day-in-the-life-with-your-agentix-automation-engineer-agent/) Stop coding, start conversing. Introducing the Automation Engineer Agent, your new AI partner for instant script generation in Cortex AgentiX [AI and Cybersecurity](https://www.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/?ts=markdown) [Automation of the Week](https://www.paloaltonetworks.com/blog/security-operations/category/automation-of-the-week/?ts=markdown) [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) Feb 05, 2026 By [Ron Ben Chen](https://www.paloaltonetworks.com/blog/author/ron-ben-chen/?ts=markdown "Posts by Ron Ben Chen") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** ![Beyond the Cloud Dashboard: Exposure Management Requires Full-Scope Visibility and Real Action](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2026/01/AdobeStock_742402688-scaled.jpeg) [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [Beyond the Cloud Dashboard: Exposure Management Requires Full-Scope Visibil...](https://www2.paloaltonetworks.com/blog/security-operations/beyond-the-cloud-dashboard-exposure-management-requires-full-scope-visibility-and-real-action/) Cortex Exposure Management: Unify visibility from Code to Cloud to SOC. Prioritize real risk across your entire attack surface and eliminate cloud-onl... Jan 13, 2026 By [Elad Koren](https://www.paloaltonetworks.com/blog/author/elad-koren/?ts=markdown "Posts by Elad Koren") and [Brendan Powers](https://www.paloaltonetworks.com/blog/author/brendan-powers/?ts=markdown "Posts by Brendan Powers") ![From ILOVEYOU to AI Defenders – 25 Years of Email Evolution](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/12/AdobeStock_1590352091-scaled.jpeg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [From ILOVEYOU to AI Defenders -- 25 Years of Email Evolution](https://www2.paloaltonetworks.com/blog/security-operations/from-iloveyou-to-ai-defenders-25-years-of-email-evolution/) Email security evolution: From ILOVEYOU to AI-powered phishing. Advanced Email Security stops threats with cross-domain correlation \& automated defens... Dec 11, 2025 By [Yitzy Tannenbaum](https://www.paloaltonetworks.com/blog/author/yitzy-tannenbaum/?ts=markdown "Posts by Yitzy Tannenbaum") and [Guy Mazaltrim](https://www.paloaltonetworks.com/blog/author/guy-mazaltrim/?ts=markdown "Posts by Guy Mazaltrim") [](https://www2.paloaltonetworks.com/blog/security-operations/reframing-vulnerability-management-in-an-age-of-overload/) [AI and Cybersecurity](https://www.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [Reframing Vulnerability Management in an Age of Overload](https://www2.paloaltonetworks.com/blog/security-operations/reframing-vulnerability-management-in-an-age-of-overload/) Overwhelmed by vulnerability alerts? Learn how the Cortex Vulnerability Risk Score (CVRS) cuts through the noise, reducing alerts by up to 99% to find true risks. Nov 11, 2025 By [Brendan Powers](https://www.paloaltonetworks.com/blog/author/brendan-powers/?ts=markdown "Posts by Brendan Powers") and [Anil Yelamarty](https://www.paloaltonetworks.com/blog/author/anil-yelamarty/?ts=markdown "Posts by Anil Yelamarty") ![The 3Cs of AI Red Teaming: Comprehensive, Contextual \& Continuous](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/11/GettyImages-691555348-edit_800x600.png) [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [The 3Cs of AI Red Teaming: Comprehensive, Contextual \& Continuous](https://www2.paloaltonetworks.com/blog/network-security/the-3cs-of-ai-red-teaming-comprehensive-contextual-continuous/) Shift from generic to custom AI security. Prisma AIRS AI Red Teaming provides contextual, continuous, comprehensive risk assessment at scale. Nov 05, 2025 By [Ankita Kumari](https://www.paloaltonetworks.com/blog/author/ankita-kumari/?ts=markdown "Posts by Ankita Kumari") and [Sailesh Mishra](https://www.paloaltonetworks.com/blog/author/sailesh-mishra/?ts=markdown "Posts by Sailesh Mishra") ![Securing Shadow AI with Cortex Xpanse](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/11/Man-using-Computer-2.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [Securing Shadow AI with Cortex Xpanse](https://www2.paloaltonetworks.com/blog/security-operations/securing-shadow-ai-with-cortex-xpanse/) Rapid AI adoption creates "Shadow AI" and hidden risks. See how Cortex Xpanse discovers unmanaged AI infrastructure to secure your complete attack surface. Nov 04, 2025 By [Brendan Powers](https://www.paloaltonetworks.com/blog/author/brendan-powers/?ts=markdown "Posts by Brendan Powers") and [Alexis Godwin](https://www.paloaltonetworks.com/blog/author/alexis-godwin/?ts=markdown "Posts by Alexis Godwin") ![SIEM Replacement Made Easy (Yes, Really!)](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/10/Man-Working-2-2.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [SIEM Replacement Made Easy (Yes, Really!)](https://www2.paloaltonetworks.com/blog/security-operations/siem-replacement-made-easy-yes-really/) Deploy Cortex XSIAM in 3 months or less with AI-powered migration tools. Replace your SIEM faster with automated onboarding and ready-to-use analytics. Oct 15, 2025 By [Brendan Powers](https://www.paloaltonetworks.com/blog/author/brendan-powers/?ts=markdown "Posts by Brendan Powers") ![Breaking Down Security Silos: How XDL Powers Advanced Threat Operations](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/10/iStock-1125595211-edit-1280x1280-1.jpeg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [Breaking Down Security Silos: How XDL Powers Advanced Threat Operations](https://www2.paloaltonetworks.com/blog/security-operations/breaking-down-security-silos-how-xdl-powers-advanced-threat-operations/) Learn how Cortex XDL unifies vulnerability management and email security through shared intelligence to stop coordinated attacks at enterprise scale. Oct 14, 2025 By [Brendan Powers](https://www.paloaltonetworks.com/blog/author/brendan-powers/?ts=markdown "Posts by Brendan Powers") and [Yitzy Tannenbaum](https://www.paloaltonetworks.com/blog/author/yitzy-tannenbaum/?ts=markdown "Posts by Yitzy Tannenbaum") ![Why Securing Web Sessions is the Missing Link in Zero Trust](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/09/GettyImages-1194430840-800x600-1.png) [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [Why Securing Web Sessions is the Missing Link in Zero Trust](https://www2.paloaltonetworks.com/blog/sase/why-securing-web-sessions-is-the-missing-link-in-zero-trust/) Identity has become the new battleground. In a world where work happens everywhere and applications live in the cloud, passwords, passwordless authent... Sep 17, 2025 By [Elad Gavra](https://www.paloaltonetworks.com/blog/author/elad-gavra/?ts=markdown "Posts by Elad Gavra"), [Monique Lance](https://www.paloaltonetworks.com/blog/author/monique-lance/?ts=markdown "Posts by Monique Lance") and [Daniel Alkobi](https://www.paloaltonetworks.com/blog/author/daniel-alkobi/?ts=markdown "Posts by Daniel Alkobi") ![SCCM: Enterprise Backbone or Attack Vector? Part 2](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/09/Thinking-2.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ## [SCCM: Enterprise Backbone or Attack Vector? Part 2](https://www2.paloaltonetworks.com/blog/security-operations/sccm-enterprise-backbone-or-attack-vector-part-2/) Learn how attackers exploit Microsoft SCCM infrastructure through LDAP, WMI enumeration \& detection strategies to secure enterprise environments. Sep 17, 2025 By [Lee Azrati Edri](https://www.paloaltonetworks.com/blog/author/lee-azrati-edri/?ts=markdown "Posts by Lee Azrati Edri") and [Shachar Roitman](https://www.paloaltonetworks.com/blog/author/shachar-roitman/?ts=markdown "Posts by Shachar Roitman") ![SCCM: Enterprise Backbone or Attack Vector?](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/09/Professional-6.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ## [SCCM: Enterprise Backbone or Attack Vector?](https://www2.paloaltonetworks.com/blog/security-operations/sccm-enterprise-backbone-or-attack-vector/) Learn how attackers exploit Microsoft SCCM infrastructure through LDAP, WMI enumeration \& detection strategies to secure enterprise environments. Sep 16, 2025 By [Lee Azrati Edri](https://www.paloaltonetworks.com/blog/author/lee-azrati-edri/?ts=markdown "Posts by Lee Azrati Edri") and [Shachar Roitman](https://www.paloaltonetworks.com/blog/author/shachar-roitman/?ts=markdown "Posts by Shachar Roitman") ![Palo Alto Networks and MITRE ATT\&CK® Evaluations: Enterprise 2025](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/09/Right-Here-2.jpg) [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [Palo Alto Networks and MITRE ATT\&CK® Evaluations: Enterprise 2025](https://www2.paloaltonetworks.com/blog/security-operations/palo-alto-networks-and-mitre-attck-evaluations-enterprise-2025/) To further accelerate innovation for our customers, Palo Alto Networks will not participate in the 2025 MITRE ATT\&CK® Evaluations after two years of leading results. Sep 12, 2025 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks/?ts=markdown "Posts by Palo Alto Networks") ![Disrupting Legacy Vulnerability Management](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/07/Pen-Pointing-5.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ## [Disrupting Legacy Vulnerability Management](https://www2.paloaltonetworks.com/blog/security-operations/disrupting-legacy-vulnerability-management/) Introducing the general availability of Cortex Exposure Management, a groundbreaking solution that will redefine traditional vulnerability management. Jul 21, 2025 By [Madhuresh Anur](https://www.paloaltonetworks.com/blog/author/madhuresh-anur/?ts=markdown "Posts by Madhuresh Anur") and [Yvonne Le](https://www.paloaltonetworks.com/blog/author/yvonne-le/?ts=markdown "Posts by Yvonne Le") ![Cortex Advanced Email Security – Built for Today’s AI Threats](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/07/GettyImages-524759829-edit-3-scaled.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ## [Cortex Advanced Email Security -- Built for Today's AI Threats](https://www2.paloaltonetworks.com/blog/security-operations/cortex-advanced-email-security-built-for-todays-ai-threats/) Cortex Advanced Email Security uses AI to stop sophisticated phishing, BEC, and GenAI-powered attacks that bypass traditional email security solutions... Jul 20, 2025 By [Yitzy Tannenbaum](https://www.paloaltonetworks.com/blog/author/yitzy-tannenbaum/?ts=markdown "Posts by Yitzy Tannenbaum") ![Beyond the Label: How AI-Driven Explanations Supercharge Malware Detection](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/06/Working-Hard.jpg) [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [Beyond the Label: How AI-Driven Explanations Supercharge Malware Detection](https://www2.paloaltonetworks.com/blog/security-operations/beyond-the-label-how-ai-driven-explanations-supercharge-malware-detection/) Go beyond 'malicious' or 'benign'. Learn how Palo Alto Networks uses AI explanations to enhance the development of our malware detection to get more accurate verdicts. Jun 10, 2025 By [Pamela Toman](https://www.paloaltonetworks.com/blog/author/pamela-toman/?ts=markdown "Posts by Pamela Toman"), [Yinnon Meshi](https://www.paloaltonetworks.com/blog/author/yinnon-meshi/?ts=markdown "Posts by Yinnon Meshi") and [Bob Jung](https://www.paloaltonetworks.com/blog/author/bob-jung/?ts=markdown "Posts by Bob Jung") ![No More Guessing: Accurate AI Security with Palo Alto Networks](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/04/See-This-2.jpg) [AI and Cybersecurity](https://www.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ## [No More Guessing: Accurate AI Security with Palo Alto Networks](https://www2.paloaltonetworks.com/blog/security-operations/no-more-guessing-accurate-ai-security-with-palo-alto-networks/) Learn how our rigorous evaluation techniques ensure that Palo Alto Networks' precision AI solutions deliver the accuracy and reliability you need. Apr 30, 2025 By [Pamela Toman](https://www.paloaltonetworks.com/blog/author/pamela-toman/?ts=markdown "Posts by Pamela Toman") ![Flexible Security Data Management with Cortex XSIAM \& Cribl](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/04/Woman-Smiling-at-Computer-4.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Partner Integrations](https://www.paloaltonetworks.com/blog/security-operations/category/partner-integrations/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [Flexible Security Data Management with Cortex XSIAM \& Cribl](https://www2.paloaltonetworks.com/blog/security-operations/cortex-xsiam-integration-with-cribl-brings-flexible-data-management-to-security-operations/) Cortex XSIAM now integrates with Cribl to help security teams route high-quality data, fuel AI-driven operations, and detect threats fast with full vi... Apr 29, 2025 By [John Moran](https://www.paloaltonetworks.com/blog/author/john-moran/?ts=markdown "Posts by John Moran") ![Automating Response to Unauthorized Scheduled Task Executions](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/02/iStock-1249211557-edit-1280x1280-1-472x300-1.jpeg) [Playbook of the Week](https://www.paloaltonetworks.com/blog/security-operations/category/playbook-of-the-week/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [Automating Response to Unauthorized Scheduled Task Executions](https://www2.paloaltonetworks.com/blog/security-operations/automating-response-to-unauthorized-scheduled-task-executions/) Discover how Cortex XSIAM automates detection and response to malicious scheduled tasks that reference external HTTP/FTP sources for improved security... Apr 03, 2025 By [Omri Itzhak](https://www.paloaltonetworks.com/blog/author/omri-itzhak/?ts=markdown "Posts by Omri Itzhak") ![Automating Response to Unauthorized Tor Logins](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/03/Double-Checking-2.jpg) [Playbook of the Week](https://www.paloaltonetworks.com/blog/security-operations/category/playbook-of-the-week/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [Automating Response to Unauthorized Tor Logins](https://www2.paloaltonetworks.com/blog/security-operations/automating-response-to-unauthorized-tor-logins/) The A Successful Login from Tor playbook in Cortex XSIAM enhances security teams' ability to detect and respond to unauthorized access attempts using Tor. By automating identity verification, automated remediat... Mar 27, 2025 By [Arik Day](https://www.paloaltonetworks.com/blog/author/arik-day/?ts=markdown "Posts by Arik Day") [](https://www2.paloaltonetworks.com/blog/security-operations/automating-response-to-credential-dumping-attacks/) [Playbook of the Week](https://www.paloaltonetworks.com/blog/security-operations/category/playbook-of-the-week/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [Automating Response to Credential Dumping Attacks](https://www2.paloaltonetworks.com/blog/security-operations/automating-response-to-credential-dumping-attacks/) Automated playbook designed to detect, contain and remediate credential dumping activity. Feb 27, 2025 By [Omri Itzhak](https://www.paloaltonetworks.com/blog/author/omri-itzhak/?ts=markdown "Posts by Omri Itzhak") ![Cortex Xpanse Protects Against Malicious Domain Takeover Techniques](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/02/Professional-5.jpg) [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ## [Cortex Xpanse Protects Against Malicious Domain Takeover Techniques](https://www2.paloaltonetworks.com/blog/security-operations/cortex-xpanse-protects-against-malicious-domain-takeover-techniques/) Malicious domain takeovers have become an increasing concern for businesses as attackers exploit vulnerabilities by gaining unauthorized access to a d... Feb 26, 2025 By [Yvonne Le](https://www.paloaltonetworks.com/blog/author/yvonne-le/?ts=markdown "Posts by Yvonne Le") Load more blogs Load more blogs ### Subscribe to the Newsletter! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language