* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate) * Phishing # Palo Alto Networks ## Phishing [![From ILOVEYOU to AI Defenders – 25 Years of Email Evolution](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/12/AdobeStock_1590352091-scaled.jpeg)](https://www2.paloaltonetworks.com/blog/security-operations/from-iloveyou-to-ai-defenders-25-years-of-email-evolution/) [From ILOVEYOU to AI Defenders -- 25 Years of Email Evolution \------------------------------------------------------------](https://www2.paloaltonetworks.com/blog/security-operations/from-iloveyou-to-ai-defenders-25-years-of-email-evolution/) Email security evolution: From ILOVEYOU to AI-powered phishing. Advanced Email Security stops threats with cross-domain correlation \& automated defense. [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown) [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) Dec 11, 2025 By [Yitzy Tannenbaum](https://www.paloaltonetworks.com/blog/author/yitzy-tannenbaum/?ts=markdown "Posts by Yitzy Tannenbaum") and [Guy Mazaltrim](https://www.paloaltonetworks.com/blog/author/guy-mazaltrim/?ts=markdown "Posts by Guy Mazaltrim") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** ![Cortex Email Security Module: Defending Against Evolving Email Threats](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2025/04/NetSec-Adhoc-Updated-Blog-Image-Resize-148180310-5.png) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) ## [Cortex Email Security Module: Defending Against Evolving Email Threats](https://www2.paloaltonetworks.com/blog/security-operations/cortex-email-security-module-defending-against-evolving-email-threats/) Discover how Cortex Email Security Module detects sophisticated phishing attacks through AI-powered analysis, cross-domain correlation, and automated ... Apr 28, 2025 By [Yoav Zemah](https://www.paloaltonetworks.com/blog/author/yoav-zemah/?ts=markdown "Posts by Yoav Zemah"), [Niv DavidPur](https://www.paloaltonetworks.com/blog/author/niv-davidpur/?ts=markdown "Posts by Niv DavidPur"), [Luda Lazar](https://www.paloaltonetworks.com/blog/author/luda-lazar/?ts=markdown "Posts by Luda Lazar") and [Gal Guzman](https://www.paloaltonetworks.com/blog/author/gal-guzman/?ts=markdown "Posts by Gal Guzman") ![A New Phishing Frontier: From Email to SaaS Collaboration Apps](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2024/11/iStock-1008748816-edit-800x600-1.png) [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) ## [A New Phishing Frontier: From Email to SaaS Collaboration Apps](https://www2.paloaltonetworks.com/blog/sase/a-new-phishing-frontier-from-email-to-saas-collaboration-apps/) Phishing threats have jumped from email into collaboration SaaS apps like Microsoft Teams, Slack and Zoom. Find out how to protect yourself. Nov 27, 2024 By [Arpit Bhatt](https://www.paloaltonetworks.com/blog/author/arpit-bhatt/?ts=markdown "Posts by Arpit Bhatt") ![Playbook Of The Week - New Features for Better Response to Phishing Campaigns](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/08/M-Working-at-Computer.jpg) [Playbook of the Week](https://www.paloaltonetworks.com/blog/security-operations/category/playbook-of-the-week/?ts=markdown) ## [Playbook Of The Week - New Features for Better Response to Phishing Campaig...](https://www2.paloaltonetworks.com/blog/security-operations/playbook-of-the-week-new-features-for-better-response-to-phishing-campaigns/) New capabilities in Cortex XSOAR to address phishing campaigns Aug 17, 2023 By [Arik Day](https://www.paloaltonetworks.com/blog/author/arik-day/?ts=markdown "Posts by Arik Day") ![Playbook of the Week: Microsoft Office and Windows HTML RCE CVE-2023-36884 Rapid Response](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/07/F-Thinking-1.jpg) ## [Playbook of the Week: Microsoft Office and Windows HTML RCE CVE-2023-36884 ...](https://www2.paloaltonetworks.com/blog/security-operations/playbook-of-the-week-microsoft-office-and-windows-html-rce-cve-2023-36884-rapid-response/) Learn about the CVE-2023-36884 vulnerability and Unit 42's threat brief. Automate your response with Cortex XSOAR's content packs for rapid mitigation and check out our Phishing automation pack for improved inc... Jul 20, 2023 By [Jane Goh](https://www.paloaltonetworks.com/blog/author/jane-goh/?ts=markdown "Posts by Jane Goh") ![Behind the Curtains of a Vendor Email Compromise (VEC) Attack](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/06/Double-Checking.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ## [Behind the Curtains of a Vendor Email Compromise (VEC) Attack](https://www2.paloaltonetworks.com/blog/security-operations/behind-the-curtains-of-a-vendor-email-compromise-vec-attack/) The blog describes a Phishing campaign abusing a Vendor Email Compromise (VEC) Attack Jun 21, 2023 By [Stav Setty](https://www.paloaltonetworks.com/blog/author/stav-setty/?ts=markdown "Posts by Stav Setty") and [Tom Fakterman](https://www.paloaltonetworks.com/blog/author/tom-fakterman/?ts=markdown "Posts by Tom Fakterman") ![Playbook of the Week: Speed Up Phishing Response with the Cortex XSOAR Deployment Wizard](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2023/02/Man-working-2.jpg) [Playbook of the Week](https://www.paloaltonetworks.com/blog/security-operations/category/playbook-of-the-week/?ts=markdown) ## [Playbook of the Week: Speed Up Phishing Response with the Cortex XSOAR Depl...](https://www2.paloaltonetworks.com/blog/security-operations/playbook-of-the-week-speed-up-phishing-response-with-the-cortex-xsoar-deployment-wizard/) The Cortex XSOAR deployment wizard now supports the phishing pack to enable quick adoption of Phishing playbooks. Feb 03, 2023 By [Guy Liberman](https://www.paloaltonetworks.com/blog/author/guy-liberman/?ts=markdown "Posts by Guy Liberman") ![Auto-Quarantine Phishing Threats with Cortex XSOAR and Cofense Vision](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/11/Right-There.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Partner Integrations](https://www.paloaltonetworks.com/blog/security-operations/category/partner-integrations/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ## [Auto-Quarantine Phishing Threats with Cortex XSOAR and Cofense Vision](https://www2.paloaltonetworks.com/blog/security-operations/auto-quarantine-phishing-threats-with-cortex-xsoar-and-cofense-vision/) Discover how to leverage Cofense Vision with Cortex XSOAR for automated quarantine of phishing threats Nov 17, 2022 By [Mike Saurbaugh](https://www.paloaltonetworks.com/blog/author/mike-saurbaugh/?ts=markdown "Posts by Mike Saurbaugh") ![5 Common Cybersecurity Threats and How to Prevent Them](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/10/GettyImages-1272759502-edit-1280x1280-copy.jpeg) [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Zero Trust Security](https://www.paloaltonetworks.com/blog/network-security/category/zero-trust-security/?ts=markdown) ## [5 Common Cybersecurity Threats and How to Prevent Them](https://www2.paloaltonetworks.com/blog/network-security/5-common-cybersecurity-threats/) To protect your organization, you need to know what to protect against. Here are 5 common cybersecurity threats and how you can prevent them. Oct 31, 2022 By [Hannah Rushton](https://www.paloaltonetworks.com/blog/author/hannah-rushton/?ts=markdown "Posts by Hannah Rushton") ![Why the Evolution of Ransomware Calls for Next-Level Web Protection](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/08/NetSec-Adhoc-Updated-Blog-Image-Resize-1135341681-1.png) [Network Perimeter](https://www.paloaltonetworks.com/blog/network-security/category/network-perimeter/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Zero Trust Security](https://www.paloaltonetworks.com/blog/network-security/category/zero-trust-security/?ts=markdown) ## [Why the Evolution of Ransomware Calls for Next-Level Web Protection](https://www2.paloaltonetworks.com/blog/network-security/ransomware-attacks-advanced-url-filtering/) Learn how Advanced URL Filtering secures your web access and protects you from falling victim to ransomware attacks. Aug 09, 2022 By [Ashraf Aziz](https://www.paloaltonetworks.com/blog/author/ashraf-aziz/?ts=markdown "Posts by Ashraf Aziz") ![Russia-Ukraine Cyber Activity Makes Security Best Practices Imperative](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/03/NetSec-Adhoc-Updated-Blog-Image-Resize-543362794.png) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown), [Zero Trust Security](https://www.paloaltonetworks.com/blog/network-security/category/zero-trust-security/?ts=markdown) ## [Russia-Ukraine Cyber Activity Makes Security Best Practices Imperative](https://www2.paloaltonetworks.com/blog/2022/03/russia-ukraine-cyber-activity-best-practices/) U.S. officials note that evolving intelligence points to potentially destructive cyberattacks. We encourage organization... Mar 29, 2022 By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?ts=markdown "Posts by Unit 42") ![Automate Email Incident Response with Armorblox in Cortex XSOAR](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/02/NetSec-Adhoc-Updated-Blog-Image-Resize-1126835704-1.png) [Partner Integrations](https://www.paloaltonetworks.com/blog/security-operations/category/partner-integrations/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) ## [Automate Email Incident Response with Armorblox in Cortex XSOAR](https://www2.paloaltonetworks.com/blog/security-operations/automate-email-incident-response-with-armorblox-in-cortex-xsoar/) Discover how to streamline email security with Armorblox, the new content pack in Cortex XSOAR. Feb 15, 2022 By [Alyssa VanNice](https://www.paloaltonetworks.com/blog/author/alyssa-vannice/?ts=markdown "Posts by Alyssa VanNice") ![IoT Security Concerns - How Secure Is the Hybrid Workforce?](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/11/Pan_Web_2A_V1-26139_v2.jpg) [News \& Events](https://www.paloaltonetworks.com/blog/sase/category/news-events/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) ## [IoT Security Concerns - How Secure Is the Hybrid Workforce?](https://www2.paloaltonetworks.com/blog/2021/11/iot-security-concerns/) Three main challenges are creating a perfect storm of IoT security concerns arising from work at home: unmanaged security, lack of network segmentatio... Nov 11, 2021 By [Lakshmi Kandadai](https://www.paloaltonetworks.com/blog/author/lakshmi-kandadai/?ts=markdown "Posts by Lakshmi Kandadai") ![Nightmare Email Attacks (and Tips for Blocking Them)](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/10/Serious-Man.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) ## [Nightmare Email Attacks (and Tips for Blocking Them)](https://www2.paloaltonetworks.com/blog/2021/10/email-attacks-mitigation-tips/) Email attacks leading to business email compromise can be costly, but following best practices such as proper use of MFA can help. Oct 21, 2021 By [Jenna Garbett](https://www.paloaltonetworks.com/blog/author/jenna-garbett/?ts=markdown "Posts by Jenna Garbett") and [Sama Manchanda](https://www.paloaltonetworks.com/blog/author/sama-manchanda/?ts=markdown "Posts by Sama Manchanda") ![Enable Next Level Phishing Analysis and Response with Cortex XSOAR and Cofense Triage](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/10/Show-Me.jpg) [Partner Integrations](https://www.paloaltonetworks.com/blog/security-operations/category/partner-integrations/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [Enable Next Level Phishing Analysis and Response with Cortex XSOAR and Cofe...](https://www2.paloaltonetworks.com/blog/security-operations/cofense-xsoar-marketplace/) Cortex XSOAR Marketplace, Partner Integrations, SOAR Innovation, SOAR content, Cortex XSOAR, SOC, Automation Playbooks, Security Orchestration, Securi... Oct 08, 2021 By [Mike Saurbaugh](https://www.paloaltonetworks.com/blog/author/mike-saurbaugh/?ts=markdown "Posts by Mike Saurbaugh") and [Alyssa VanNice](https://www.paloaltonetworks.com/blog/author/alyssa-vannice/?ts=markdown "Posts by Alyssa VanNice") ![SlashNext Reinvents Incident Response with Cortex XSOAR](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/06/Picture-soar.jpg) [Partner Integrations](https://www.paloaltonetworks.com/blog/security-operations/category/partner-integrations/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [SlashNext Reinvents Incident Response with Cortex XSOAR](https://www2.paloaltonetworks.com/blog/security-operations/slashnext-xsoar-marketplace/) The current security landscape is filled with targeted attacks, including sophisticated phishing and spear-phishing campaigns, and as many threat actors as defenders. Beyond stealing credentials, attackers are... Jun 07, 2021 By [Alyssa VanNice](https://www.paloaltonetworks.com/blog/author/alyssa-vannice/?ts=markdown "Posts by Alyssa VanNice") ![Cortex XSOAR for Nobelium Spear Phishing Attacks Rapid Response](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/06/keyboard1.jpeg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ## [Cortex XSOAR for Nobelium Spear Phishing Attacks Rapid Response](https://www2.paloaltonetworks.com/blog/2021/06/cortex-xsoar-nobelium-spear-phishing/) Automation helps when responding to sophisticated cyberattacks such as the Nobelium spear phishing campaign. Cortex XSOAR's playbook can assist. Jun 01, 2021 By [Pramukh Ganeshamurthy](https://www.paloaltonetworks.com/blog/author/pramukh-ganeshamurthy/?ts=markdown "Posts by Pramukh Ganeshamurthy") ![Building a Phishing Email Classifier in Cortex XSOAR](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/01/Pen-Pointing-1.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) ## [Building a Phishing Email Classifier in Cortex XSOAR](https://www2.paloaltonetworks.com/blog/security-operations/phishing-email-classifier-in-cortex-xsoar/) In the last five years or so, we have become closely acquainted with Security Operation Center (SOC) teams that use Cortex XSOAR. One of the first things we learned was that reviewing potential phishing inciden... Jan 15, 2021 By [Lior Perry](https://www.paloaltonetworks.com/blog/author/lior-perry/?ts=markdown "Posts by Lior Perry") ![Block COVID-19 Phishing Emails at Machine Speed](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2020/05/Hunter.png) [Secure the Future](https://www.paloaltonetworks.com/blog/category/secure-the-future/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ## [Block COVID-19 Phishing Emails at Machine Speed](https://www2.paloaltonetworks.com/blog/2020/07/cortex-phishing-emails/) Learn how Cortex XSOAR automated playbooks can help your organization protect against the deluge of COVID-19 phishing emails. Jul 22, 2020 By [Kamil Imtiaz](https://www.paloaltonetworks.com/blog/author/kamil-imtiaz/?ts=markdown "Posts by Kamil Imtiaz") ![Email Gateways Stop Phishing Attacks: Reality or Myth?](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2020/05/Orange-fishhook.png) [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) ## [Email Gateways Stop Phishing Attacks: Reality or Myth?](https://www2.paloaltonetworks.com/blog/2020/05/network-email-gateways/) As necessary as email gateways are, they are not enough to protect against email-related attacks including phishing. May 28, 2020 By [Manda Mafy](https://www.paloaltonetworks.com/blog/author/manda-mafy/?ts=markdown "Posts by Manda Mafy") ![Security Orchestration Use Case: Responding to Phishing Attacks](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2020/07/54979667_m-1.jpg) [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ## [Security Orchestration Use Case: Responding to Phishing Attacks](https://www2.paloaltonetworks.com/blog/security-operations/security-orchestration-use-case-phishing-enrichment-and-response/) Phishing emails are one of the most frequent, easily executable, and harmful security attacks that organizations -- regardless of size -- face today. With over 90% of all data breach... Sep 13, 2018 By [Jane Goh](https://www.paloaltonetworks.com/blog/author/jane-goh/?ts=markdown "Posts by Jane Goh") Load more blogs Load more blogs ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language