* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Palo Alto Networks](https://origin-researchcenter.paloaltonetworks.com/blog/corporate/) * [Announcement](https://origin-researchcenter.paloaltonetworks.com/blog/category/announcement/) * Introducing WildFire Regi... # Introducing WildFire Regional EU Cloud: Preventing Global Threats While Keeping Data in EU Borders [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2016%2F08%2Feu-cloud%2F) [](https://twitter.com/share?text=Introducing+WildFire+Regional+EU+Cloud%3A+Preventing+Global+Threats+While+Keeping+Data+in+EU+Borders&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2016%2F08%2Feu-cloud%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2016%2F08%2Feu-cloud%2F&title=Introducing+WildFire+Regional+EU+Cloud%3A+Preventing+Global+Threats+While+Keeping+Data+in+EU+Borders&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://origin-researchcenter.paloaltonetworks.com/blog/2016/08/eu-cloud/&ts=markdown) \[\](mailto:?subject=Introducing WildFire Regional EU Cloud: Preventing Global Threats While Keeping Data in EU Borders) Link copied By [Karin Shopen](https://www.paloaltonetworks.com/blog/author/karin-shopen/?ts=markdown "Posts by Karin Shopen") Aug 29, 2016 6 minutes [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown) [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) [EMEA](https://www.paloaltonetworks.com/blog/tag/emea/?ts=markdown) [Security Lifecycle Review](https://www.paloaltonetworks.com/blog/tag/security-lifecycle-review/?ts=markdown) [WildFire](https://www.paloaltonetworks.com/blog/tag/wildfire/?ts=markdown) [WildFire Analytics cloud](https://www.paloaltonetworks.com/blog/tag/wildfire-analytics-cloud/?ts=markdown) Today's complex threat landscape, combined with the diversity and volume of traffic in the modern customer environment, make accurate and effective threat prevention very challenging. This problem is compounded when considering the challenge of detecting new, never-before-seen (also known as "zero-day") malware and exploits. A global, cloud-based, community-driven approach to threat analysis is key to achieving the best possible threat intelligence and prevention in order to effectively defend against a community of attackers who, themselves, share information, attack methods and techniques. However, many organizations around the globe are limited in how they can share data with a global threat analysis cloud due to concerns around data privacy. This is the challenge we're solving today, and for starters, here are five basic questions that you should ask before sending your data to be analyzed in the cloud. ### 1. Is this the right threat analysis cloud for you? A global threat analysis cloud has several advantages over regional clouds and on-premise solutions, not only in terms of cost and deployment, but also in terms of the speed with which the cloud can be adapted to emerging threats and trends. However, not all threat analysis clouds are created equal. The use of a global cloud for threat analysis should provide you with a comprehensive view of your organization's security posture. You should look for solutions that have the capability of correlating threat information across different attack vectors, analyzing the samples both using machine learning, static and dynamic analysis techniques with a high catch-rate and automatically creating a holistic set of new preventions accounting for the full scope of the attack. And don't just stop there. In addition to identifying unknown malicious content, you should strive to have a cloud-based threat analysis solution with a bidirectional integration with all of the security technologies present in your environment. This will provide you with a unique capability to proactively populate newly created prevention across all of your enforcement points for a tightly coordinated prevention across the attack lifecycle. Last but not least, the global threat analysis cloud should also leverage community-driven threat data to properly stop threats from spreading. Threat prevention is a big numbers game---the more you know the more you can prevent and protect. You should always look for solutions that have a rich and diverse threat intelligence ecosystem. ### 2. How granular is your control over your data? You want to have control over the conditions under which content is sent to the cloud for analysis, including users, applications, source, destination, and other match conditions that are available to you based on your security posture rule base. Some examples will be your ability to determine which file types should be submitted to the cloud for analysis and the physical, regional location of the cloud to be used. Commonly, samples sent for analysis can be bundled with the network session data for the session carrying the file, including useful context around the incident, such as the hosts involved, the URL, email headers, and the application that enabled the download. This data can provide very useful information when determining the context around an infection and the attack vectors used. Configuration of session data should be done in accordance with local laws and regulations. ### 3. Where is your data going? Many organizations around the globe, and specifically in Europe, are not sharing data with a global threat analysis cloud due to concerns around data privacy. You should prefer solutions that provide you with an option to choose the location where your data will be analyzed and stored, as part of the global cloud infrastructure. If you are in a heavily regulated industry, look for solutions that have the option to augment the global cloud with an on-premise appliance for local analysis of sensitive content. This hybrid solution should have the same granular control over the type of data submitted as the one you have in your cloud, as well as the ability to generate and populate protections. In an ideal scenario, you will be able to easily apply it to your security profiles across the organization. One last point, make sure that your data remains encrypted using industry-standard encryption methods while in transit and at rest. ### 4. How long is your data stored in the cloud? When asking this question, you should expect to hear that submitted samples found to be either benign or grayware will be retained for a short time for further analysis, after which they are permanently deleted from the cloud. You should verify that your data is stored in an encrypted form and only decrypted as necessary for processing or review. Samples that are identified as malware are usually retained indefinitely for research and quality control purposes. ### 5. Who has access to your data? There are two answers to this question. First, the cloud provider research team that is responsible for auditing and reviewing customer support cases involving potentially incorrect results produced by the analysis of a "false positive" or "false negative" will have access to your files. This access is not frequent. Second, we strongly believe in the value of sharing threat intelligence information with the security industry for the global good of the customer community. However, timely sharing of emergent threat intelligence among industry partners should always be balanced with customer privacy. You will want to verify that the solution does not share data between customers or with other parties in a way that identifies who submitted the sample to the analysis cloud. In order to help protect against possible attribution to specific customers or individuals' data, look for clouds and organizations who share "analysis data" and not files. Analysis data may be tools that are learned during static and dynamic analysis of a sample, such as command-and-control domains, URLs, or IP addresses, second-stage malware downloaded and installed by a "dropper," analysis of activities or behaviors performed by the malware sample under analysis, and threat signatures for the malware file or traffic generated by the file. To address data location preferences and deliver on the benefits of threat data shared globally, we [are today introducing the WildFire regional EU cloud](https://www.paloaltonetworks.com/company/press/2016/palo-alto-networks-unveils-new-wildfire-european-cloud). This regional cloud ensures customer data will never leave EU borders while offering access to protections generated by the largest threat analysis tool in the world, used by more than 10,000 organizations, threat researchers and technology partners, as part of [Palo Alto Networks Next-Generation Security Platform](https://www.paloaltonetworks.com/products/designing-for-prevention/security-platform). This global protection capability is key to preventing cyber breaches at all stages of the attack lifecycle. Additionally, security teams across Europe and around the globe can accelerate threat hunting, analytics and response efforts, with globally correlated threat intelligence from the entire WildFire community made directly accessible through the [AutoFocus](https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/autofocus) service. [**Learn more about WildFire and our Next-Generation Security Platform**](https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/wildfire) Give it a try -- run a [Security Lifecycle Review risk assessment](https://get.info.paloaltonetworks.com/webApp/security-lifecycle-review-risk-assessment-en) today and understand what's really happening on your networks. *** ** * ** *** ## Related Blogs ### [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) [#### Welcoming the APAC WildFire Cloud](https://origin-researchcenter.paloaltonetworks.com/blog/2017/09/welcoming-apac-wildfire-cloud/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown) [#### Aperture Updates Extend SaaS Security to Europe to Help Meet Data Privacy Needs](https://origin-researchcenter.paloaltonetworks.com/blog/2017/03/aperture-updates-extend-saas-security-europe-help-meet-data-privacy-needs/) ### [Customer Spotlight](https://www.paloaltonetworks.com/blog/category/customer-spotlight/?ts=markdown), [Real Estate](https://www.paloaltonetworks.com/blog/category/real-estate/?ts=markdown), [Retail](https://www.paloaltonetworks.com/blog/category/retail/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) [#### Customer Spotlight: Delta Holding Prevents Ransomware by Upgrading Security Posture](https://origin-researchcenter.paloaltonetworks.com/blog/2016/10/customer-spotlight-delta-holding-prevents-ransomware-upgrading-security-posture/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Incident Response](https://www.paloaltonetworks.com/blog/category/incident-response/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://unit42-dev2.paloaltonetworks.com) [#### Introducing Unit 42 Managed XSIAM 2.0](https://origin-researchcenter.paloaltonetworks.com/blog/2026/02/introducing-unit-42-managed-xsiam-2-0/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### How EU Legislators Can Improve the NIS 2.0 Directive](https://origin-researchcenter.paloaltonetworks.com/blog/2022/01/how-eu-legislators-can-improve-the-nis-2-0-directive/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Network Perimeter](https://www.paloaltonetworks.com/blog/network-security/category/network-perimeter/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### WildFire Secures Your Digital Future](https://origin-researchcenter.paloaltonetworks.com/blog/2021/11/netsec-announcing-standalone-wildfire/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language