* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Palo Alto Networks](https://origin-researchcenter.paloaltonetworks.com/blog/corporate/) * Cloud Computing # Palo Alto Networks ## Cloud Computing [![Cloud NGFW is Essential for AWS \& Azure Cloud Traffic Protection](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2025/06/Woman-in-Server-Room.jpg)](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/cloud-ngfw-is-essential-for-aws-azure-cloud-traffic-protection/) [Cloud NGFW is Essential for AWS \& Azure Cloud Traffic Protection \-----------------------------------------------------------------](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/cloud-ngfw-is-essential-for-aws-azure-cloud-traffic-protection/) Get unparalleled threat prevention, operational simplicity and significant TCO savings with Cloud NGFW. [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown) [Cloud NGFW](https://www.paloaltonetworks.com/blog/network-security/category/cloud-ngfw/?ts=markdown) [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) Jun 24, 2025 By [Ashley Delfonso](https://www.paloaltonetworks.com/blog/author/ashley-hood/?ts=markdown "Posts by Ashley Delfonso") and [Pranesh Neelakrishnan](https://www.paloaltonetworks.com/blog/author/pranesh-neelakrishnan/?ts=markdown "Posts by Pranesh Neelakrishnan") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** ![Elevate Cloud Security with the Flexibility and Simplicity of Custom Dashboards](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2023/10/cq5dam.web_.1280.1280-11.jpeg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [Code to Cloud](https://www.paloaltonetworks.com/blog/cloud-security/category/code-to-cloud/?ts=markdown) ## [Elevate Cloud Security with the Flexibility and Simplicity of Custom Dashbo...](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/custom-security-dashboards-data-assessment/) Optimize cloud security and team productivity with Prisma Cloud's custom dashboards, tailored for efficient data insights and timely, effective threat... Dec 05, 2023 By [Maddy Kim](https://www.paloaltonetworks.com/blog/author/maddy-kim/?ts=markdown "Posts by Maddy Kim") ![Designing Prisma Cloud to See Beyond](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2023/11/In-All-Seriousness-5.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) ## [Designing Prisma Cloud to See Beyond](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/user-designed-interface/) User-centric design at the forefront of Prisma Cloud's enhanced usability streamlines cloud security complexity and prioritizes actionable items via easy data access. Nov 21, 2023 By [Larry St John](https://www.paloaltonetworks.com/blog/author/larry-st-john/?ts=markdown "Posts by Larry St John") ![Abuse and Mitigation of Misconfigured SAS Tokens](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2023/11/cq5dam.web_.1280.1280-15.jpeg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cloud Infrastructure Entitlement Management](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-infrastructure-entitlement-management/?ts=markdown) ## [Abuse and Mitigation of Misconfigured SAS Tokens](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/sas-token-abuse-mitigation/) Learn about the abuse and mitigation of misconfigured SAS tokens in Azure Storage accounts and how to implement best security practices for data protection. Nov 20, 2023 By [Pradeep Biradar](https://www.paloaltonetworks.com/blog/author/pradeep-biradar/?ts=markdown "Posts by Pradeep Biradar") ![Demystifying API Security: A Review of the OWASP Top 10 Risks for 2023](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2023/10/GettyImages-1142780558-edit.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Web Application \& API Security](https://www.paloaltonetworks.com/blog/cloud-security/category/web-application-api-security/?ts=markdown) ## [Demystifying API Security: A Review of the OWASP Top 10 Risks for 2023](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/demystifying-api-security/) Discover OWASP's recently updated list of API security risks and learn how to protect your organization with Prisma Cloud's Web Application and API Se... Nov 01, 2023 By [Roman Chikunov](https://www.paloaltonetworks.com/blog/author/roman-chikunov/?ts=markdown "Posts by Roman Chikunov") ![Show Risk Burndown with the Code to Cloud Dashboard](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2023/09/NetSec-Adhoc-Updated-Blog-Image-Resize-1135341681-1.png) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) ## [Show Risk Burndown with the Code to Cloud Dashboard](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/security-kpis-metric-reporting-dashboard/) Elevate your cloud security strategy with events insights, analytics, and risk management for informed decision-making, proactive defense, and executive KPI reporting. Oct 31, 2023 By [Kathleen Qin](https://www.paloaltonetworks.com/blog/author/kathleen-qin/?ts=markdown "Posts by Kathleen Qin") ![Join Prisma Cloud at KubeCon North America in Chicago](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2023/10/image1.png) [Announcement](https://www.paloaltonetworks.com/blog/cloud-security/category/announcement/?ts=markdown), [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Event](https://www.paloaltonetworks.com/blog/category/event/?ts=markdown) ## [Join Prisma Cloud at KubeCon North America in Chicago](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/kubecon-na-2023/) Join Prisma Cloud by Palo Alto Networks, meet our cloud-native security experts, and demo our next-gen solutions at KubeCon Chicago 2023. Oct 20, 2023 By [Derek Rogerson](https://www.paloaltonetworks.com/blog/author/derek-rogerson/?ts=markdown "Posts by Derek Rogerson") ![High-Severity Vulnerabilities Discovered in WebM Project’s Libraries](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2023/09/Coding.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Code Security](https://www.paloaltonetworks.com/blog/cloud-security/category/code-security/?ts=markdown) ## [High-Severity Vulnerabilities Discovered in WebM Project's Libraries](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/high-severity-vulnerabilities-webm-project-libraries/) Learn about the high-severity vulnerabilities discovered in WebM Project's libwebp and libvpx libraries and get practical tips to protect your organization from attack. Oct 05, 2023 By [Sharon Ben Zeev](https://www.paloaltonetworks.com/blog/author/sharon-ben-zeev/?ts=markdown "Posts by Sharon Ben Zeev"), [Tohar Zand](https://www.paloaltonetworks.com/blog/author/tohar-zand/?ts=markdown "Posts by Tohar Zand") and [Artur Oleyarsh](https://www.paloaltonetworks.com/blog/author/artur-oleyarsh/?ts=markdown "Posts by Artur Oleyarsh") ![Securing Your Metadata from Cloud Heists with Prisma Cloud’s Attack Path Policies](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2023/09/I-See-4.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security/?ts=markdown) ## [Securing Your Metadata from Cloud Heists with Prisma Cloud's Attack Path Po...](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/secure-metadata-attack-path-policies/) Learn how bad actors exploit EC2 misconfigurations to access your metadata and discover four steps to mitigate the risk from this common attack path. ... Sep 26, 2023 By [Kabeer Saxena](https://www.paloaltonetworks.com/blog/author/kabeer-saxena/?ts=markdown "Posts by Kabeer Saxena") ![Using Your Pipelines To Harden Your Pipelines: The Importance of CI/CD Security for Your Software Supply Chain](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/11/Gazing.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown) ## [Using Your Pipelines To Harden Your Pipelines: The Importance of CI/CD Secu...](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/shift-left-ci-cd-security-for-your-software-supply-chain/) Learn how to shift your CI/CD security left to proactively harden your pipelines against software supply chain attacks. Dec 01, 2022 By [Idan Tendler](https://www.paloaltonetworks.com/blog/author/idan-tendler/?ts=markdown "Posts by Idan Tendler") ![AppSec and CloudSec 101: Blurring the Lines Between Cloud-Native App Layers](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/08/So-Tall.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown) ## [AppSec and CloudSec 101: Blurring the Lines Between Cloud-Native App Layers](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/application-infrastructure-security-101-blurring-cloud-native-app-layers/) Get tips for leveraging infrastructure as code to maintain cohesive application and infrastructure security for your cloud-native teams. Sep 28, 2022 By [Chris Tozzi](https://www.paloaltonetworks.com/blog/author/chris-tozzi/?ts=markdown "Posts by Chris Tozzi") ![A Primer on Secure DevOps: Learn the Benefits of These 3 DevSecOps Use Cases](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/02/iStock-523693904.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown) ## [A Primer on Secure DevOps: Learn the Benefits of These 3 DevSecOps Use Case...](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/a-primer-on-secure-devops-learn-the-benefits-of-these-3-devsecops-use-cases/) Learn best practices and benefits of taking a DevSecOps approach to AppSec, IaC security and software supply chain security. Sep 22, 2022 By [Julia Benson](https://www.paloaltonetworks.com/blog/author/julia-benson/?ts=markdown "Posts by Julia Benson") ![Four Steps To Get Started With a ‘Bottom-Up’ Cybersecurity Approach](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/07/Double-Checking-1.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown) ## [Four Steps To Get Started With a 'Bottom-Up' Cybersecurity Approach](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/four-steps-to-get-started-with-a-bottom-up-cybersecurity-approach/) Learn about bottom-up cybersecurity. We give you 4 tips to get started with creating a culture of developer-centered security in your organization. Sep 13, 2022 By [Idan Tendler](https://www.paloaltonetworks.com/blog/author/idan-tendler/?ts=markdown "Posts by Idan Tendler") ![How To Adopt Infrastructure as Code With a Secure-by-Default Strategy](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/01/Professional.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown) ## [How To Adopt Infrastructure as Code With a Secure-by-Default Strategy](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/how-to-adopt-infrastructure-as-code-with-a-secure-by-default-strategy/) Learn about challenges with building a secure IaC strategy. Here are seven tips to help you build a security-first IaC strategy. Sep 08, 2022 By [Julia Benson](https://www.paloaltonetworks.com/blog/author/julia-benson/?ts=markdown "Posts by Julia Benson") ![Addressing Security Throughout the Infrastructure DevOps Lifecycle](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2020/06/prisma-cloud-state-cloud-native-security-report-2020-blog-900x400-1.png) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown) ## [Addressing Security Throughout the Infrastructure DevOps Lifecycle](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/addressing-security-throughout-infra-devops-lifecycle/) Learn how to address cloud security at each step of the infrastructure development lifecycle, from infrastructure as code in your IDE to running cloud resources. Aug 30, 2022 By [Barak Schoster](https://www.paloaltonetworks.com/blog/author/barak-schoster/?ts=markdown "Posts by Barak Schoster") ![5 Tips for Securely Adopting Infrastructure as Code](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2021/10/GettyImages-1253211227.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown) ## [5 Tips for Securely Adopting Infrastructure as Code](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/5-tips-for-securely-adopting-infrastructure-as-code/) Get our top tips for leveraging infrastructure as code (IaC) for efficient cloud management and a secure cloud environment. Aug 23, 2022 By [Taylor Smith](https://www.paloaltonetworks.com/blog/author/taylor-smith/?ts=markdown "Posts by Taylor Smith") ![Scaling in the Cloud? IaC and DevSecOps Are Here to Help](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/01/Skyscraper2-3.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown) ## [Scaling in the Cloud? IaC and DevSecOps Are Here to Help](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/scaling-in-the-cloud/) Learn how IaC and DevSecOps best practices can make working at scale in the cloud more agile, efficient, simple and secure. Aug 09, 2022 By [Julia Benson](https://www.paloaltonetworks.com/blog/author/julia-benson/?ts=markdown "Posts by Julia Benson") ![Zero Trust for Applications: Securing Content within Transactions](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/02/LI-1200X627-1.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cloud Native Application Protection Platform](https://www.paloaltonetworks.com/blog/category/cloud-native-application-protection-platforms/?ts=markdown), [Cloud Workload Protection Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection-platform/?ts=markdown) ## [Zero Trust for Applications: Securing Content within Transactions](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/zero-trust-for-applications-securing-content-within-transactions/) Zero Trust removes all implicit trust and continuously verifies every data transaction across public cloud, private clou... Mar 15, 2022 By [Mohit Bhasin](https://www.paloaltonetworks.com/blog/author/mohit-bhasin/?ts=markdown "Posts by Mohit Bhasin") ![Build Security Expertise from Code to Cloud at our Upcoming Global Practitioner Summit](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/03/400x300.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown) ## [Build Security Expertise from Code to Cloud at our Upcoming Global Practiti...](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/code-to-cloud-summit-2022/) Join us at Code to Cloud Summit by Bridgecrew and Prisma Cloud to learn from the experts at the intersection of security, engineering, and DevOps. Mar 10, 2022 By [Payton O'Neal](https://www.paloaltonetworks.com/blog/author/payton-oneal/?ts=markdown "Posts by Payton O’Neal") ![Zero Trust for Applications: Verifying Access Between Workloads](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/01/Professional.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cloud Network Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-network-security/?ts=markdown) ## [Zero Trust for Applications: Verifying Access Between Workloads](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/zero-trust-for-applications-access/) Verifying and limiting network access between hosts, virtual machines, and containers is critical to every Zero Trust initiative for applications. Mar 01, 2022 By [Jason Williams](https://www.paloaltonetworks.com/blog/author/jason-williams/?ts=markdown "Posts by Jason Williams") ![How Does DevSecOps Fit Into Your Digital Transformation?](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2019/11/Picture-5.png) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [How Does DevSecOps Fit Into Your Digital Transformation?](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/digital-transformation/) Going digital and embarking on a digital transformation is hard enough without having to rethink your entire security strategy. By weaving security into the fabric of your company's digital identity, you can ca... Dec 08, 2021 By [Zachary Flower](https://www.paloaltonetworks.com/blog/author/zachary-flower/?ts=markdown "Posts by Zachary Flower") Load more blogs Load more blogs ### Subscribe to the Newsletter! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language