* [Blog](https://www2.paloaltonetworks.com/blog) * [Network Security](https://www2.paloaltonetworks.com/blog/network-security/) * [Announcement](https://www2.paloaltonetworks.com/blog/category/announcement/) * Securing Healthcare Lifel... # Securing Healthcare Lifelines with Medical IoT Security [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fsecuring-healthcare-lifelines-with-medical-iot-security%2F) [](https://twitter.com/share?text=Securing+Healthcare+Lifelines+with+Medical+IoT+Security&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fsecuring-healthcare-lifelines-with-medical-iot-security%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fsecuring-healthcare-lifelines-with-medical-iot-security%2F&title=Securing+Healthcare+Lifelines+with+Medical+IoT+Security&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/network-security/securing-healthcare-lifelines-with-medical-iot-security/&ts=markdown) \[\](mailto:?subject=Securing Healthcare Lifelines with Medical IoT Security) Link copied By [Prerna Shankar](https://www.paloaltonetworks.com/blog/author/prerna-shankar/?ts=markdown "Posts by Prerna Shankar") and [Kalyan Siddam](https://www.paloaltonetworks.com/blog/author/kalyan-siddam/?ts=markdown "Posts by Kalyan Siddam") Mar 31, 2025 8 minutes [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [healthcare cybersecurity](https://www.paloaltonetworks.com/blog/tag/healthcare-cybersecurity/?ts=markdown) [internet of medical things security](https://www.paloaltonetworks.com/blog/tag/internet-of-medical-things-security/?ts=markdown) [IoMT](https://www.paloaltonetworks.com/blog/tag/iomt/?ts=markdown) [IoMT Security](https://www.paloaltonetworks.com/blog/tag/iomt-security/?ts=markdown) [Medical IoT](https://www.paloaltonetworks.com/blog/tag/medical-iot/?ts=markdown) [medical IoT security](https://www.paloaltonetworks.com/blog/tag/medical-iot-security/?ts=markdown) ## New Capabilities That Protect Vulnerable Medical Devices without Disrupting Patient Care In today's hyperconnected healthcare environment, medical devices aren't just endpoints---they're lifelines. The explosion of connected medical devices is transforming patient care---but it's also creating a growing attack surface that cybercriminals are actively exploiting. With the number of connected medical devices expected to reach 1.3 billion by 2030, hospitals and healthcare organizations are increasingly at risk from vulnerabilities in these critical assets. Since medical devices aren't architected for security, many may have [inherent vulnerabilities](https://unit42.paloaltonetworks.com/infusion-pump-vulnerabilities/) and run outdated software, making them prime targets for cyberattacks. As threats continue to rise, healthcare providers need a robust and scalable security solution that helps ensure their critical medical devices remain secure while minimizing disruptions to their clinical operations. To address this, we're excited to announce recent innovations in our [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-iot-security) product designed to protect these vital but vulnerable lifelines: * New end-to-end risk management workflow with Guided Virtual Patching for accurate risk assessment and network-level protection of vulnerable medical, internet of things (IoT) and operational technology (OT) devices. * Enhanced Query Builder, combined with [Strata Copilot](https://www.paloaltonetworks.com/blog/network-security/strata-copilot-is-here/), gives users two powerful ways to simplify their device security posture management and compliance reporting. ## Track Effective Risk and Protect Vulnerable Medical Devices at the Network Level with Guided Virtual Patching CISA, the FDA, and the FBI have repeatedly warned of the risk posed by vulnerable, [unpatched and outdated medical devices](https://www.ic3.gov/CSA/2022/220912.pdf). The most recent warning alerted to vulnerabilities found in [patient monitors](https://live.paloaltonetworks.com/t5/community-blogs/healthcare-monitors-at-risk-beyond-a-backdoor/ba-p/1223375). In the EU, the [NIS2 directive](https://nis2directive.eu/health/#:~:text=NIS2%20requires%20healthcare%20organizations%20to,proper%20storage%20and%20handling%20practices.)also cites aging technology and outdated systems as one of the main reasons healthcare systems are increasingly vulnerable to cyberattacks. Devices, like infusion pumps and patient monitors, which administer life-saving medications and track vital signs, can't be taken offline to update or patch for extended periods without risking patient safety. When a vulnerability is found in these devices, healthcare security teams face a dilemma: If they apply patches immediately, they may have to take critical devices offline for extended periods, delaying essential treatments and disrupting hospital operations. If they wait, they risk leaving the devices exposed to potential exploitation, putting patient data and lives at risk. ### Guided Virtual Patching Provides Real-Time Protection Without Disrupting Device Operations This is where our Guided Virtual Patching provides a game-changing solution. Instead of forcing hospitals to choose between security and patient care, this AI-driven approach applies virtual patches in real-time---protecting vulnerable medical devices at the network level without disrupting their operation. Government agencies like the [NIH](https://pmc.ncbi.nlm.nih.gov/articles/PMC7728878/)and [ENISA](https://www.enisa.europa.eu/sites/default/files/publications/Smart%20Hospitals.pdf) also agree that implementing least-privileged access and using intrusion detection systems (IDS) and intrusion prevention systems (IPS) at the network level via the [NGFW](https://www.paloaltonetworks.com/network-security/next-generation-firewall) is a best practice approach to securing medical devices at scale. ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/03/word-image-336659-1.png) *The new end-to-end risk management workflow with Guided Virtual Patching.* Guided Virtual Patching is a cornerstone of our new end-to-end risk management workflow. The process starts with comprehensive asset visibility, risk assessment and attack surface mapping of all connected medical, IoT and OT devices. The next step in the workflow is a risk-based prioritization of critical vulnerabilities based on a [multifactor risk score.](https://www.paloaltonetworks.com/blog/network-security/risk-based-vulnerability-prioritization/) This goes beyond just vulnerability metrics, taking into account factors like exploitability and asset criticality within the customer's environment. Risk-based vulnerability prioritization enables overburdened security teams to focus their remediation efforts on the most critical vulnerabilities. Then, Guided Virtual Patching leverages our [Advanced Threat Prevention (ATP)](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention) to stop zero-day attacks inline in real time. This proactive approach incorporates tailored threat prevention profiles and least-privileged access policies to minimize exposure and effectively secure hard-to-patch medical devices, such as infusion pumps, patient monitors (collectively representing the biggest attack surface in hospitals), and imaging systems like MRI scanners---which represent some of the most expensive equipment. With Guided Virtual Patching, healthcare organizations can benefit from robust, scalable network-level protection for medical and IoT devices. This not only ensures device protection at scale but also buys network security and biomedical teams much-needed time to apply software updates or patches to extend the useful cyber lifespan of these devices. And finally, our new Risk Adjustment feature enables healthcare organizations to understand and customize the effective risk exposure of their connected devices to make informed and adaptive security decisions that reduce the attack surface. Not all medical devices pose the same risk, and their impact varies across different healthcare environments. For example, a typically low-risk infusion pump, which lacks endpoint security, located in an intensive care unit (ICU) might become a high-priority risk if connected to the internet. In contrast, a more traditionally critical imaging system, such as an MRI scanner, might pose a lower risk if it is isolated within a segmented network and has endpoint security. Factors like asset criticality, network exposure and existing security controls can significantly alter a device's actual risk to a healthcare organization. Customizable risk scores enable security teams to tailor risk parameters based on various factors, such as a device's criticality, existing compensating controls and other elements contributing to asset risk. These factors include whether a device is connected to the internet, lacks endpoint security, or has other vulnerabilities. Each risk factor is assigned a specific weight, ensuring that the overall effective risk score accurately reflects the actual threat to the healthcare organization. This fine-tuning allows security teams to better assess risks and implement effective mitigation strategies. ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/03/Screen-Recording-2025-03-27-at-3.38.37 PM-1.gif) *The risk score details page shows the breakdown of the device risk score and the contributing risk factors.* ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/03/Screen-Recording-2025-03-27-at-4.52.27 PM.gif) ![Screen Recording 2025-03-24 at 8.54.55 PM.gif](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/03/screen-recording-2025-03-24-at-8-54-55-pm-gif.png)*The risk score configuration page enables users to customize the weight of each risk factor, ensuring an accurate calculation of the effective risk score.* Medical IoT Security automatically detects risks, weak security posture and potential mitigations. Customers can use the flexible rules to modify or assign weights to the risk factors and compensating controls. This streamlined, end-to-end workflow helps healthcare organizations cut through the noise, focus on top-priority vulnerabilities, and manage risks effectively and efficiently to help ensure mission-critical medical devices remain secure and fully operational without disrupting patient care. ## Simplify Device Security Posture Management and Compliance Reporting with Strata Copilot and Enhanced Query Builder Today, healthcare organizations face a cumbersome, manual and error-prone approach to managing their device security hygiene reporting and compliance. This can significantly strain their IT and security resources and impact their ability to protect their patient lifelines effectively. With this in mind, we're offering users two powerful ways that simplify how they retrieve, analyze and report on medical and IoT device security-related data: * Strata Copilot enables users to access actionable device security insights using simple conversational prompts * Enhanced Query Builder makes it easy for users to build and repeat structured queries ensuring consistency and precision ### Strata Copilot [Strata Copilot](https://www.paloaltonetworks.com/blog/network-security/strata-copilot-is-here/) provides users with a simple natural-language interface to access actionable device security insights. This powerful tool draws from real-time product data and a broad set of almost 50,000 vetted sources, including Palo Alto Networks [technical documentation](https://docs.paloaltonetworks.com/strata-cloud-manager) and [LIVEcommunity blogs](https://live.paloaltonetworks.com/), to put all that knowledge at network security practitioners' fingertips. With Strata Copilot, healthcare organizations can quickly assess device security posture through natural-language queries and customize how the information is displayed. ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/03/word-image-336659-4.png) *Strata Copilot provides a conversational interface for users to access device security hygiene insights and customize the visualization.* ### Query Builder Our enhanced Query Builder tool enables users who prefer a more structured query language to fine-tune their analysis with precise device and risk attributes. Users can now easily perform complex and targeted searches in a consistent and repeatable way using our refined Query Library to pinpoint device security hygiene issues. Maintaining and reporting on security compliance is now easier than ever with our new scheduled queries, custom dashboards and out-of-box compliance reports. ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/03/word-image-336659-5.png) *The query library within Query Builder offers prewritten standardized queries that users can select and execute immediately, saving time and effort.* These enhancements provide customers with precise device security hygiene insights instantly at their fingertips empowering hospitals to proactively manage their device security posture and help ensure compliance. ### The Management Benefits of Strata Copilot and Query Builder Strata Copilot and Query Builder radically simplify medical device security posture management through: * **Proactivity**that allows for early detection of vulnerabilities and compliance issues. * **Precision**to tailor the data retrieved to exact specifications, reducing noise and focusing on areas of concern. * **Efficiency**with automated data retrieval processes allows healthcare cybersecurity professionals to act swiftly on findings rather than manually compiling reports. ## Keep Healthcare Lifelines Secure with Palo Alto Networks Medical IoT Security Integrating these innovative features into Medical IoT Security not only sets a new standard in medical device security, but also transforms how healthcare professionals manage and interact with their connected devices. Register for our upcoming [hands-on workshops](https://register.paloaltonetworks.com/medicaliotsecurity-how) or [sign up for a free trial](https://start.paloaltonetworks.com/medical-iot-security-free-trial.html) to experience how enhanced Medical IoT Security can revolutionize your medical device security strategy. *** ** * ** *** ## Related Blogs ### [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### Palo Alto Networks Medical IoT Security Named LEADER in Frost RADAR™](https://www2.paloaltonetworks.com/blog/network-security/netsec-iot-security-frost-radar/) ### [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### Putting More Cure In Secure With Medical IoT Security](https://www2.paloaltonetworks.com/blog/network-security/medical-iot-enhancements/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Healthcare Cybersecurity --- Three Trends to Watch in 2024](https://www2.paloaltonetworks.com/blog/2024/01/healthcare-cybersecurity-trends/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Announcing Device Security: Supercharging Proactive Device Protection](https://www2.paloaltonetworks.com/blog/network-security/announcing-device-security-supercharging-proactive-device-protection/) ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Hybrid Cloud Data Center](https://www.paloaltonetworks.com/blog/network-security/category/hybrid-cloud-data-center/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Network Perimeter](https://www.paloaltonetworks.com/blog/network-security/category/network-perimeter/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Strata Network Security Platform](https://www.paloaltonetworks.com/blog/network-security/category/strata-network-security-platform/?ts=markdown), [Zero Trust Security](https://www.paloaltonetworks.com/blog/network-security/category/zero-trust-security/?ts=markdown) [#### Palo Alto Networks Leads the Way with Quantum and Multicloud Security](https://www2.paloaltonetworks.com/blog/2025/08/paves-way-for-quantum-ready-security/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown) [#### Palo Alto Networks Recognized as a Leader in Omdia Market Radar](https://www2.paloaltonetworks.com/blog/2025/02/leader-omdia-market-radar/) ### Subscribe to Network Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language