* [Blog](https://www2.paloaltonetworks.com/blog) * [Cloud Security](https://www2.paloaltonetworks.com/blog/cloud-security/) * [Announcement](https://www2.paloaltonetworks.com/blog/cloud-security/category/announcement/) * Prisma Cloud Innovations:... # Prisma Cloud Innovations: September's Highlights [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fcloud-security%2Ffeature-innovations-2024%2F) [](https://twitter.com/share?text=Prisma+Cloud+Innovations%3A+September%27s+Highlights&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fcloud-security%2Ffeature-innovations-2024%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fcloud-security%2Ffeature-innovations-2024%2F&title=Prisma+Cloud+Innovations%3A+September%27s+Highlights&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/cloud-security/feature-innovations-2024/&ts=markdown) \[\](mailto:?subject=Prisma Cloud Innovations: September's Highlights) Link copied By [Derek Rogerson](https://www.paloaltonetworks.com/blog/author/derek-rogerson/?ts=markdown "Posts by Derek Rogerson") Oct 07, 2024 8 minutes [Announcement](https://www.paloaltonetworks.com/blog/cloud-security/category/announcement/?ts=markdown) [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [Data Security Posture Management](https://www.paloaltonetworks.com/blog/cloud-security/category/data-security-posture-management/?ts=markdown) *Prisma Cloud's September 2024 release packs a punch with seven impactful updates to enhance your cloud security and user experience.* ## Discover the Latest Features and Important Insights to Keep Your Systems Secure Welcome to the [Prisma Cloud September 2024 release highlights](https://docs.prismacloud.io/en/enterprise-edition/rn/prisma-cloud-release-info/features-introduced-in-2024/features-introduced-in-september-2024). We're excited to share seven new updates that enhance our cloud security capabilities. Let's explore how these improvements benefit you! ## Seamless Prisma Cloud Upgrades with Backward Compatibility Prisma Cloud has announced a [backward compatibility](https://docs.prismacloud.io/en/enterprise-edition/rn/prisma-cloud-release-info/features-introduced-in-2024/features-introduced-in-september-2024#announcement) feature to enable you to upgrade to newer software versions of our platform without losing access to your existing data, applications or configurations. This feature ensures a smoother transition for users and a more user-friendly experience during upgrades. Prisma Cloud backward compatibility offers two key benefits for your business: * **Improved Business Outcomes:** Backward compatibility gives your organization the flexibility to plan upgrades and product rollouts at your pace, reducing disruption and enhancing overall operational efficiency. * **Cost Savings:** By maintaining access to your current infrastructure, backward compatibility makes it more affordable to adopt the latest features without the need for costly overhauls or replacements. With smooth communication between newer and older versions of Prisma Cloud, you gain upgrade flexibility and can adopt the latest Prisma Cloud features while ensuring continuous support for your current setup --- and without interrupting workflows. ## Minimize Operational Risk from Open-Source Packages Prisma Cloud now offers [Package Operational Risk assessments](https://docs.prismacloud.io/en/enterprise-edition/content-collections/application-security/visibility/sbom/sbom#package-op-risk), giving you the ability to identify, assess and prioritize the operational risks associated with open-source packages in your codebase. With this enhanced feature, Prisma Cloud evaluates otherwise hidden risk factors such as the package's maintainers and popularity. Prisma Cloud then classifies the package risk level as high, medium or low, helping you to prioritize overall package operational risk, accelerate remediation efforts by focusing on the most critical issues, and assess whether you should migrate to alternative, less risky packages. ![Where to view a package’s operational risk in Prisma Cloud in the SBOM Security dashboard](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/10/table.png) Table 1: Where to view a package's operational risk in Prisma Cloud in the SBOM Security dashboard By incorporating Package Operational Risk assessments, Prisma Cloud helps strengthen your cloud security and ensures that your open-source dependencies aren't introducing unnecessary risks. Start using the feature today in Prisma Cloud from the SBOM Security dashboard to prioritize and resolve issues before they affect your development and cloud operations. ![View a package’s operational risk with the Operational Risk column in the Prisma Cloud SBOM dashboard.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/10/word-image-329508-1.png) Figure 1: View a package's operational risk with the Operational Risk column in the Prisma Cloud SBOM dashboard. ## DSPM-Driven Data Context to Improve Attack Path Analysis and Prioritization Prisma Cloud now provides deeper visibility into your data security with [the integration of Data Security Posture Management (DSPM) into Attack Paths and Asset Inventory](https://www.paloaltonetworks.com/blog/prisma-cloud/dspm-attack-path-prioritization/), allowing users to see whether specific attack paths put their sensitive data at risk. We know data is the most frequent target for cyberattacks. With this new Attack Path integration in Prisma Cloud, DSPM can better assess and prioritize potential impacts on your [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data) and datastores. It surfaces key details such as data sensitivity level, sensitivity labels, data types and a record of the data for that specific datastore --- all within the existing Prisma Cloud Attack Path view. Now when Prisma Cloud detects risks like asset misconfigurations, risky permissions or software vulnerabilities, it will also detect and identify the data affected by each risk. If Prisma Cloud Attack Path shows an internet-accessible AWS S3 bucket that also includes [PII data](https://www.paloaltonetworks.com/cyberpedia/pii), for example, our [DSPM](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm) integration will now prioritize the AWS S3 bucket alert with 'high risk', accelerating remediation to protect your sensitive data. By minimizing the time your most critical assets remain exposed, you can improve your data security posture and regulatory compliance. The DSPM module from Prisma Cloud currently supports sensitive data visibility into the following data inventory assets that may appear in Attack Paths. **Amazon Web Services** * Amazon S3 * Amazon EC2 * Amazon Relational Database Service (RDS) * Amazon DynamoDB * Amazon Redshift **Microsoft Azure** * Azure Blob Storage * Cosmos DB * Azure Virtual Machine **Google Cloud** * Cloud SQL * Spanner * Cloud Storage * Bigtable With this Prisma Cloud DSPM integrated into Attack Path, providing a clearer view of how data security intersects with your attack surface, you can fortify the security of your most valuable cloud assets. ![View the Attack Path analysis in Prisma Cloud Console to see multiple data risk factors](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/10/word-image-329508-2.jpeg) Figure 2: View the Attack Path analysis in Prisma Cloud Console to see multiple data risk factors ## Easily Share and Manage Custom Prisma Cloud Dashboard Views Prisma Cloud now makes it easier to manage and share custom dashboard views through its enhanced Saved Views feature. You can create Saved Views to prioritize and organize alerts by specific threat vectors, and with the latest Prisma Cloud update, sharing these custom views with your team is effortless. As the creator of a custom view, you can set the default visibility when sharing. Simply go to *Home \> Alerts \> Manage Views* and use the checkbox to make the Saved View visible to everyone by default. This eliminates the need to individually toggle visibility for Shared Views. If needed, you can still toggle visibility off. These [Prisma Cloud Saved Views](https://docs.prismacloud.io/en/enterprise-edition/content-collections/alerts/saved-views) improvements streamline collaboration, keeping your team aligned on key security metrics. ![Improved Shared Views management and easier sharing of customized dashboards in Prisma Cloud](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/10/word-image-329508-3.png) Figure 3: Improved Shared Views management and easier sharing of customized dashboards in Prisma Cloud ### Enhanced Jira Integration for Versions 9.0 and Above Prisma Cloud now supports alert notifications for all Jira accounts, including Jira Cloud and Jira On-Premises, versions 9.0 and above. This upgrade enhances your ability to seamlessly integrate Prisma Cloud alerts into your existing Jira workflows, helping you automate the process of generating Jira tickets for security incidents. To start using this new feature, [configure the Jira integration](https://docs.prismacloud.io/en/enterprise-edition/content-collections/administration/configure-external-integrations-on-prisma-cloud/integrate-prisma-cloud-with-jira#configure-pc-on-jira-for-9-0-and-above) directly in Prisma Cloud for versions 9.0 and above. Please note that existing integrations can't be edited to support the newer versions, so a new configuration is required. By integrating Prisma Cloud with Jira, you can streamline your security operations and improve issue tracking across your cloud environments. If you have questions or need assistance with the setup, feel free to reach out to our support team. ![Configure Prisma Cloud to receive alert notifications in their Jira accounts, including all Jira Cloud and Jira On-Premises versions.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/10/word-image-329508-4.png) Figure 4: Configure Prisma Cloud to receive alert notifications in their Jira accounts, including all Jira Cloud and Jira On-Premises versions. ## Transition to Red Hat's VEX Format for Security Data As part of Red Hat's shift to improve vulnerability reporting, Red Hat introduced VEX files in July 2024 and will deprecate the older OVAL format by the end of the year. In response to this update, Prisma Cloud is transitioning from OVAL to the new VEX format to continue providing up-to-date security data for Red Hat artifacts. To stay aligned with this change, we recommend upgrading your Prisma Cloud Console and Defenders to the 33.xx release. For users who haven't upgraded yet, Prisma Cloud will continue supporting OVAL-based vulnerability scanning through two major versions (v33.xx and v34.xx). After upgrading, Prisma Cloud will use the VEX format for vulnerability reporting. You may notice differences in the number of reported CVEs, as VEX consolidates vulnerabilities. For instance, Prisma Cloud will now report a single vulnerability for the source package, including information about related binaries, which will reduce duplicate entries for the same CVE ID. For more details on this transition, check out our [Transition from OVAL to VEX Files](https://docs.prismacloud.io/en/compute-edition/assets/pdf/lookahead-transition-to-vex-format.pdf) document or [reach out to us](mailto:support@paloaltonetworks.com). We're here to assist you throughout the update to ensure your vulnerability scanning remains effective and streamlined. ![With the new VEX format, the number of vulnerabilities with the same CVE-ID will be reduced to a single vulnerability for the RPM package, instead of multiple reports for each binary.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/10/word-image-329508-5.png) Figure 5: With the new VEX format, the number of vulnerabilities with the same CVE-ID will be reduced to a single vulnerability for the RPM package, instead of multiple reports for each binary. Figure 5 shows the glibc package (used in binaries: glibc-devel, glibc-common, glibc, glibc-headers), for example. ## Enhanced Support for AWS Application Load Balancers (ALBs) with WAAS Agentless Prisma Cloud extends agentless Web Application and API Security (WAAS) rules support to include AWS Application Load Balancers (ALBs), in addition to EC2 instances. This enhancement provides broader coverage for securing your AWS environment. To take advantage of this feature, ensure your AWS account is onboarded to Prisma Cloud. Then simply navigate to *Defend \> WAAS \> Add Rule \> Add Configuration* to set up the ALB rule. Be sure your CloudFormation template includes the necessary permissions for the region where your ALB is hosted. Once configured, you can easily monitor and manage ALB traffic inspection through the Prisma Cloud console, giving you greater visibility into your application traffic and potential threats. The enhanced support feature is available on request. Please reach out to your Account team, and we'll ensure you have this latest capability to elevate the security and compliance of your cloud environment. ## Learn More About Prisma Cloud We hope you're as excited about these [Prisma Cloud September 2024 innovations](https://docs.prismacloud.io/en/enterprise-edition/rn/prisma-cloud-release-info/features-introduced-in-2024/features-introduced-in-september-2024) as we are. Please let us know what you think about the new features and improvements and don't hesitate to reach out to us with any suggestions or questions. Prisma Cloud introduces new features and enhancements every month. For a guided tour of the latest innovations in Code to Cloud security, [request a demo](https://www.paloaltonetworks.com/prisma/cloud/request-a-prisma-cloud-demo) with a Prisma Cloud expert. Or, if you'd prefer a self-guided tour, start a [free 30-day Prisma Cloud trial](https://www.paloaltonetworks.com/prisma/request-a-prisma-cloud-trial) today. *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/cloud-security/category/announcement/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [Code to Cloud to SOC](https://www.paloaltonetworks.com/blog/cloud-security/category/code-to-cloud-to-soc/?ts=markdown) [#### Introducing Cortex Cloud 2.0: Smarter Cloud Security for an AI-Driven World](https://www2.paloaltonetworks.com/blog/cloud-security/cloud-security-platform-cortex-cloud-2-0/) ### [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Cloud-Native Application Protection Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-native-application-protection-platform/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [#### How Auto-Remediation Shifts the Odds in Cloud Security](https://www2.paloaltonetworks.com/blog/cloud-security/auto-remediation-cnapp/) ### [Cloud Detection and Response](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-detection-and-response/?ts=markdown), [Cloud Runtime Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-runtime-security/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Cloud Workload Protection](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [#### Taking Cloud Security from Visibility to Prevention with eBPF](https://www2.paloaltonetworks.com/blog/cloud-security/ebpf-cloud-security-real-time-protection/) ### [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Data Security Posture Management](https://www.paloaltonetworks.com/blog/cloud-security/category/data-security-posture-management/?ts=markdown) [#### Use Microsoft Sensitivity Labels in Your Multicloud Security Strategy with Cortex Cloud DSPM](https://www2.paloaltonetworks.com/blog/cloud-security/mpip-sensitivity-labels-dspm/) ### [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [Code to Cloud](https://www.paloaltonetworks.com/blog/cloud-security/category/code-to-cloud/?ts=markdown) [#### Overcoming Cloud Security Consolidation Challenges](https://www2.paloaltonetworks.com/blog/cloud-security/cloud-security-consolidation-challenges/) ### [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Cloud Workload Protection Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection-platform/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [KSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/kspm/?ts=markdown) [#### Anatomy of a Kubernetes Attack: How Cortex Cloud Provides End-to-End Protection](https://www2.paloaltonetworks.com/blog/cloud-security/kubernetes-attack-detection-response/) ### Subscribe to Cloud Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language