www.paloaltonetworks.com Open in urlscan Pro
2600:141b:1c00:208c::c3a  Public Scan

Submitted URL: https://url.us.m.mimecastprotect.com/s/rROeCrkvVrF844vAotjtQI4soEg?domain=paloaltonetworks.com
Effective URL: https://www.paloaltonetworks.com/
Submission: On December 10 via api from US — Scanned from US

Form analysis 2 forms found in the DOM

Name: footer_form_manage_subscriptionsPOST /apps/pan/public/formsubmithandler.submitform.json

<form id="footer_form_manage_subscriptions" name="footer_form_manage_subscriptions" class="form d-flex flex-wrap" action="/apps/pan/public/formsubmithandler.submitform.json" method="POST" novalidate="" data-lang="en_US"><input type="hidden"
    name="mktoOptIn" value="true"><input type="hidden" name="Qualifying_Campaign__c" value="7010g000001J5shAAC"><input type="hidden" name="emailFormMask" value=""><input type="hidden" name="Company" id="Company" value=""><input type="hidden"
    name="FormName" value="subscription-all-corp-site-us"><input type="hidden" name="formid" value="1086"><input type="hidden" name="formVid" value="1086"><input type="hidden" name="munchkinId" value="531-OCS-018"><input type="hidden"
    name="programId" value="5373">
  <div class="footer-form-input-container d-flex flex-column">
    <div class="d-flex"><label class="form-field" aria-label="Enter your email now to subscribe!" for="PAN_FOOTER_EMAIL_FIELD"><span class="sr-only" style="display: none;">Enter your email now to subscribe!</span><input type="text" name="Email"
          required="" class="mb-md-3 body-serif-1 text-white" placeholder="Enter your email now to subscribe!" id="PAN_FOOTER_EMAIL_FIELD" pattern="[a-zA-Z0-9._%+\-]+@[a-zA-Z0-9.\-]+\.[a-zA-Z]{2,}$">
        <div class="form-validation validation body-serif-4"></div>
        <div class="validation-icon"></div>
      </label>
      <div class="actions d-none d-md-block"><button type="submit" class="btn btn-primary flex-grow-0 flex-shrink-0 ml-md-4" disabled="" data-page-track="true" data-page-track-value="en_US:footer:Sign up">Sign up <i></i></button></div>
    </div>
    <div id="PAN_FOOTER_CAPTCHA_HOLDER" class="mb-2 mt-sm-2 mt-xl-0">
      <div class="g-recaptcha" data-expired-callback="recaptchaExpired" data-callback="captchaComplete" data-sitekey="6Lc5EhgTAAAAAJa-DzE7EeWABasWg4LKv-R3ao6o"></div>
    </div>
    <div class="legal">
      <p class="label-3 text-400 text-white form-legal"> By submitting this form, you agree to our <a class="text-white" href="/legal-notices/terms-of-use" data-page-track="true" data-page-track-value="en_us:footer:terms-of-use">Terms of Use</a> and
        acknowledge our <a class="text-white" href="/legal-notices/privacy" data-page-track="true" data-page-track-value="en_us:footer:privacy">Privacy Statement</a>. </p>
    </div>
    <div class="mobile-actions d-block d-md-none"><button type="submit" class="btn btn-primary flex-grow-0 flex-shrink-0 ml-0" disabled="" data-page-track="true" data-page-track-value="en_US:footer:mobile:Sign up">Sign up <i></i></button></div>
  </div><input type="hidden" name="webform_req_id" id="webform_req_id" value="a0628ebf3a24f1e14fc2fe974e9d0c10">
</form>

<form action="" onsubmit="LO.submit_chat(); return false;">
  <div id="lo_chat_input" style="position:relative; width: 100%; ">
    <div class="lo-fx-hr" style="height:0px; margin-bottom:0px; margin-top:0px; width:100%; border-top:1px solid #000000;border-bottom:1px solid #4f4f4f"></div>
    <div style="padding:10px;"><label for="lo_chat_textarea" style="display:none">Chat Input Box</label><textarea id="lo_chat_textarea" disabled="disabled" rows="2"
        style="color: black; background-color: rgb(255, 255, 255); border-radius: 5px; padding: 7px; height: auto; width: 100%; font-family: sans-serif; text-transform: none; resize: none;" dir="null" data-last-scroll-height="0"></textarea></div>
    <div id="lo_chat_sound_holder" style="position:absolute; right:0px; top:-25px; width:100%;">
      <div style="cursor: pointer; float:right; opacity:0.6; padding-right:10px; height:16px;" id="lo_chat_sound"><img alt="Click to mute chat sounds" src="https://d10lpsik1i8c69.cloudfront.net/graphics/sound-on-white.png"></div>
      <div id="lo_chat_status" style="padding-left:10px; font-size:11px; color:#6d6d6d"></div>
      <div style="clear:both;"></div>
    </div>
  </div>
</form>

Text Content

___

Network Abuses Leveraging High-Profile Events: Suspicious Domain Registrations
and Other Scams
Threat Assessment: Howling Scorpius (Akira Ransomware)
Lateral Movement on macOS: Unique and Popular Techniques and In-the-Wild
Examples
See all Unit 42 Threat Research

 * Sign In
    * Customer
    * Partner
    * Employee
    * Login to download
    * Join us to become a member

 * EN
    * USA (ENGLISH)
    * AUSTRALIA (ENGLISH)
    * BRAZIL (PORTUGUÉS)
    * CANADA (ENGLISH)
    * CHINA (简体中文)
    * FRANCE (FRANÇAIS)
    * GERMANY (DEUTSCH)
    * INDIA (ENGLISH)
    * ITALY (ITALIANO)
    * JAPAN (日本語)
    * KOREA (한국어)
    * LATIN AMERICA (ESPAÑOL)
    * MEXICO (ESPAÑOL)
    * SINGAPORE (ENGLISH)
    * SPAIN (ESPAÑOL)
    * TAIWAN (繁體中文)
    * UK (ENGLISH)

 * 

 * Contact Us
 * What's New
 * Get Support
 * Under Attack?

 * 
 * Products
   Products
   Network Security Platform
    * CLOUD DELIVERED SECURITY SERVICES
    * AI Access Security
    * Advanced Threat Prevention
    * Advanced URL Filtering
    * Advanced WildFire
    * Advanced DNS Security
    * Enterprise Data Loss Prevention
    * Enterprise IoT Security
    * Medical IoT Security
    * Industrial OT Security
    * SaaS Security
   
    * Next-Generation Firewalls
    * AI Runtime Security
    * Hardware Firewalls
    * Software Firewalls
    * Strata Cloud Manager
    * SD-WAN for NGFW
    * PAN-OS
    * Panorama
   
    * SECURE ACCESS SERVICE EDGE
    * Prisma SASE
    * Prisma Access
    * Prisma Access Browser
    * Prisma SD-WAN
    * Autonomous Digital Experience Management
   
   Code to Cloud Platform
    * Prisma Cloud
    * AI Security Posture Management
    * Code Security
    * Cloud Security Posture Management
    * Data Security Posture Management
    * Cloud Workload Protection
    * Web Application & API Security
    * Cloud Network Security
    * Cloud Infrastructure Entitlement Management
    * Cloud Discovery & Exposure Management
   
   AI-Driven Security Operations Platform
    * Cortex XDR
    * Cortex XSOAR
    * Cortex Xpanse
    * Cortex XSIAM
    * Managed Detection & Response

 * Solutions
   Solutions
   Network Security
    * Zero Trust Network Access
    * Cloud Secure Web Gateway
    * Remote Browser Isolation
    * Cloud Access Security Broker
    * Branch & SD-WAN
    * Data Center Security
    * 5G Security
    * OT Security
   
    * Intrusion Detection and Prevention
    * Malware Analysis and Sandboxing
    * Web & Phishing Security
    * DNS Security
    * IoT Security
    * Data Loss Prevention
   
   Cloud-Native Application Protection
    * Infrastructure as Code (IaC) Security
    * Visibility, Compliance, & Governance
    * Cloud Threat Detection
    * Data Security
    * Host Security
    * Container Security
    * Serverless Security
    * Web Application & API Security
   
   Security Operations
    * Cloud Security Automation
    * Cloud Detection & Response
    * Network Security Automation
    * Incident Case Management
    * SOC Automation
    * Threat Intel Management
    * Managed Detection & Response
    * Attack Surface Management
    * Compliance Management
    * Internet Operations Management
   
   Endpoint Security
    * Endpoint Protection
    * Extended Detection & Response
    * Ransomware Protection
    * Digital Forensics
   
   Industries
    * Public Sector
    * Financial Services
    * Manufacturing
    * Healthcare
    * Small & Medium Business Solutions

 * Services
   Services
   Threat Intel and Incident Response Services
    * ASSESS
    * AI Security Assessment
    * Attack Surface Assessment
    * Breach Readiness Review
    * BEC Readiness Assessment
    * Cloud Security Assessment
    * Compromise Assessment
    * Cyber Risk Assessment
    * M&A Cyber Due Diligence
    * Penetration Testing
    * Purple Team Exercises
    * Ransomware Readiness Assessment
    * SOC Assessment
    * Supply Chain Risk Assessment
    * Tabletop Exercises
    * Unit 42 Retainer
   
    * RESPOND
    * Cloud Incident Response
    * Digital Forensics
    * Incident Response
    * Managed Detection and Response
    * Managed Threat Hunting
    * Unit 42 Retainer
    * TRANSFORM
    * IR Plan Development and Review
    * Security Program Design
    * Virtual CISO
    * Zero Trust Advisory
   
   Global Customer Services
    * Education & Training
    * Professional Services
    * Success Tools
    * Support Services
    * Customer Success
   
   UNIT 42 RETAINER
   
   Custom-built to fit your organization's needs, you can choose to allocate
   your retainer hours to any of our offerings, including proactive cyber risk
   management services. Learn how you can put the world-class Unit 42 Incident
   Response team on speed dial.
   
   Learn more
 * Partners
   Partners
   NextWave Partners
    * NextWave Partner Community
    * Cloud Service Providers
    * Global Systems Integrators
    * Technology Partners
    * Service Providers
    * Solution Providers
    * Managed Security Service Providers
   
   Take Action
    * Portal Login
    * Managed Services Program
    * Become a Partner
    * Request Access
    * Find a Partner
   
   CYBERFORCE
   
   CYBERFORCE represents the top 1% of partner engineers trusted for their
   security expertise.
   
   Learn more
 * Company
   Company
   Palo Alto Networks
    * About Us
    * Management Team
    * Investor Relations
    * Locations
    * Inclusion & Diversity
    * Ethics & Compliance
    * Corporate Responsibility
    * Military & Veterans
   
   Why Palo Alto Networks?
    * Precision AI Security
    * Our Platform Approach
    * Accelerate Your Cybersecurity Transformation
    * Awards & Recognition
    * Customer Stories
    * Global Certifications
    * Trust 360 Program
   
   Careers
    * Overview
    * Culture & Benefits
   
   A Newsweek Most Loved Workplace
   
   "Businesses that do right by their employees"
   
   Read more
 * More
   More
   Resources
    * Blog
    * Unit 42 Threat Research
    * Communities
    * Content Library
    * Cyberpedia
    * Tech Insider
    * Knowledge Base
    * Palo Alto Networks TV
    * Perspectives of Leaders
    * Cyber Perspectives Magazine
    * Regional Cloud Locations
    * Tech Docs
    * Security Posture Assessment
    * Threat Vector Podcast
   
   Connect
    * LIVE community
    * Events
    * Executive Briefing Center
    * Demos
    * Contact us
   
   Blog
   
   Stay up-to-date on industry trends and the latest innovations from the
   world's largest cybersecurity
   
   Learn more

 * Sign In
   Sign In
    * Customer
    * Partner
    * Employee
    * Login to download
    * Join us to become a member

 * EN
   Language
    * USA (ENGLISH)
    * AUSTRALIA (ENGLISH)
    * BRAZIL (PORTUGUÉS)
    * CANADA (ENGLISH)
    * CHINA (简体中文)
    * FRANCE (FRANÇAIS)
    * GERMANY (DEUTSCH)
    * INDIA (ENGLISH)
    * ITALY (ITALIANO)
    * JAPAN (日本語)
    * KOREA (한국어)
    * LATIN AMERICA (ESPAÑOL)
    * MEXICO (ESPAÑOL)
    * SINGAPORE (ENGLISH)
    * SPAIN (ESPAÑOL)
    * TAIWAN (繁體中文)
    * UK (ENGLISH)

 * Contact Us
 * What's New
 * Get support
 * Under Attack?

 * Demos and Trials



Search
All
 * Tech Docs


Close search modal


DEFEND. SECURE. SIMPLIFY.
WITH PRECISION AI™

The rollout of our new Secure AI by Design portfolio has begun!

 * Get ready for Precision AI

 * Secure AI by Design available now

Your browser does not support HTML5 video.



IT'S TIME TO
FIGHT AI WITH AI.

Stop AI-generated threats in real time.

This isn't Sci-Fi. This is Precision AI™

And stay tuned. This is just the beginning…




RECOMMENDED


THE ULTIMATE SOC TRANSFORMATION EVENT

Register now


BINGE WATCH CYBERSECURITY CONTENT ALL IN ONE PLACE.

Start Streaming


CLOUD SECURITY LEADER IN FIRST-EVER CNAPP REPORT

Read the report


UNIT 42 THREAT FRONTIER REPORT

Unlock insights


WHERE THE FUTURE OF SASE COMES TOGETHER.

Watch now


5X LEADER IN GARTNER® MAGIC QUADRANT™ FOR SD-WAN

Read the report


A LEADER IN ENTERPRISE FIREWALLS

Get the report


A LEADER IN THE GARTNER® MAGIC QUADRANT™ FOR EPP

Get the report



Why Palo Alto Networks?PlatformsIndustry ValidationSolutionsEngage with Us
Why Palo Alto Networks?
Platforms
Industry Validation
Solutions
Engage with Us


SECURITY SOLUTIONS, POWERED BY
PRECISION AI, ARE YOUR ULTIMATE DEFENSE
IN AN AI-FIRST WORLD.


MODERNIZE AND SIMPLIFY SECURITY
TO ACHIEVE BETTER SECURITY OUTCOMES
WITH PLATFORMIZATION.

 * Network Security Platform
 * Code to Cloud Platform
 * AI-Driven Security Operations Platform


BEST-IN-BREED SECURITY SOLUTIONS
FOR ALL APPS, USERS AND DEVICES—
ON PREMISES AND IN THE CLOUD.


POWERED BY PRECISION AI
TO ACCELERATE DETECTION AND REMEDIATION
OF SECURITY THREATS.

Intelligence-driven expertise to guide you
before, during and after an incident.
Palo Alto Networks
The cybersecurity partner of choice.
Engage with us
Your browser does not support the video tag.
 1. AI-Powered
 2. Platformize
 3. Secure
 4. Accelerate
 5. Predict

 1. 
 2. 
 3. 
 4. 
 5. 




SO YOU CAN DEFEND AT SPEED AND SCALE.

Daily data as of 12.10.24 at 7AM PST


1 T

Cloud Events Processed


20.74 K

Exploit Attempts Detected


250.0 K

Malware Executions Blocked


1.67 B

New Unique Objects Analyzed


13.21 M

New Unique Attack Objects Identified


11.3 B

Attacks Prevented Inline

Network Security Code to Cloud™ AI-Driven Security Operations Threat Intel &
Incident Response

Secure everyone and everything from the latest threats in every location. Built
for Zero Trust and powered by AI, the Strata™ Network Security Platform
proactively monitors, analyzes and prevents sophisticated threats in real time
with less complexity, enabling secure growth and innovation for your
organization.

95%

of the Fortune 100

70,000

customers

Explore Network Security


The cloud is where businesses speed innovation and digitally transform with AI.
Secure it with Prisma® Cloud, the industry’s leading Code to Cloud platform.
Prevent application risk, stop the broadest set of attacks and protect your
crown jewels with the richest threat data and advanced ML.

7B+

cloud assets monitored

276%

return on investment

Explore Cloud Security


Transform the SOC and enable better, faster security with an integrated suite of
battle-tested, AI-driven products.

700+

partner integrations

480B

endpoints scanned daily

Explore SecOps


Intelligence-driven. Response-ready. Unit 42’s world-renowned threat
researchers, elite incident responders and expert security consultants will
guide you with a threat-informed approach before, during and after an incident.

1K+

matters per year

24/7/365

incident response

Explore Unit 42



HEAR HOW WE’RE HELPING CUSTOMERS SECURE THEIR DIGITAL TRANSFORMATION.

See testimonials

--------------------------------------------------------------------------------

Video Player is loading.
Play Video
Play
Unmute

Current Time 0:00
/
Duration 1:16
Loaded: 12.82%


0:00
Stream Type LIVE
Seek to live, currently behind liveLIVE
Remaining Time -1:16
 
1x
Playback Rate

Chapters
 * Chapters

Descriptions
 * descriptions off, selected

Captions
 * captions settings, opens captions settings dialog
 * captions off
 * en, selected
 * English
 * German
 * Spanish (Latin America)
 * Spanish (Spain)
 * French (France)
 * Italian
 * Japanese
 * Korean
 * Portuguese (Brazil)
 * Chinese (Simplified)
 * Chinese (Traditional)

Audio Track
 * en (Main), selected

Picture-in-PictureFullscreen

This is a modal window.



Beginning of dialog window. Escape will cancel and close the window.

TextColorWhiteBlackRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentBackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentTransparentWindowColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyTransparentSemi-TransparentOpaque
Font Size50%75%100%125%150%175%200%300%400%Text Edge
StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional
Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall
Caps
Reset restore all settings to the default valuesDone
Close Modal Dialog

End of dialog window.

Close Modal Dialog

This is a modal window. This modal can be closed by pressing the Escape key or
activating the close button.


View video
Volume Play


--------------------------------------------------------------------------------


TRUSTED BY THE BEST




INDUSTRY RECOGNIZED.
CONSTANTLY INNOVATING.


11X NETWORK SECURITY LEADEROPEN

THE FORRESTER WAVE™: ENTERPRISE FIREWALL SOLUTIONS

GARTNER® MAGIC QUADRANT™ FOR SINGLE-VENDOR SASE

FORRESTER WAVE™: OPERATIONAL TECHNOLOGY SECURITY SOLUTIONS

GARTNER® MAGIC QUADRANT™ FOR NETWORK FIREWALLS

GARTNER® MAGIC QUADRANT™ FOR SD-WAN

FROST RADAR™ FOR ZERO TRUST BROWSER SECURITY

FORRESTER NEW WAVE™: ZTNA

GARTNER® MAGIC QUADRANT™ FOR SECURITY SERVICE EDGE

FORRESTER NEW WAVE: ZERO TRUST PLATFORM PROVIDERS

FROST & SULLIVAN HEALTHCARE IOMT RADAR

ABI RESEARCH INDUSTRIAL FW COMPETITIVE ASSESSMENT


9X CLOUD SECURITY LEADEROPEN

GIGAOM RADAR FOR CNAPPS

FORRESTER WAVE: CLOUD WORKLOAD SECURITY

FROST & SULLIVAN CNAPP RADAR

GIGAOM RADAR FOR POLICY AS CODE

GIGAOM RADAR FOR CLOUD INFRASTRUCTURE ENTITLEMENT MANAGEMENT

GIGAOM RADAR FOR CSPM

GIGAOM RADAR FOR CONTAINER SECURITY

GIGAOM RADAR FOR DATA SECURITY POSTURE MANAGEMENT

GIGAOM RADAR FOR DEVELOPER SECURITY TOOLS


9X SECOPS LEADEROPEN

2024 GARTNER® MAGIC QUADRANT™ FOR ENDPOINT PROTECTION PLATFORMS

FORRESTER WAVE™: ATTACK SURFACE MANAGEMENT SOLUTIONS, Q3 2024

FORRESTER WAVE™: EXTENDED DETECTION AND RESPONSE PLATFORMS, Q2 2024

2023 GARTNER® MAGIC QUADRANT™ FOR ENDPOINT PROTECTION PLATFORMS

GIGAOM RADAR FOR SOAR

KUPPINGERCOLE LEADERSHIP COMPASS REPORT FOR ATTACK SURFACE MANAGEMENT

FORRESTER CYBERSECURITY IR SERVICES WAVE

FROST & SULLIVAN MDR RADAR

GIGAOM AUTONOMOUS SOC RADAR


SEE WHAT OUR SOLUTIONS CAN DO FOR YOU.


Secure your network Secure your cloud Transform your SOC Threat intel and
incident response services Solutions by industry


SECURE WHATEVER, WHENEVER, WHEREVER — WITH LESS COMPLEXITY.

 * Secure the whole enterprise consistently
 * Apply AI inline to prevent evasive threats
 * Simplify network security operations
 * Adopt Zero Trust across the network
 * Reduce complexity with AI-powered SASE




REDUCE RISK AND PREVENT BREACHES ACROSS MULTI- AND HYBRID-CLOUD ENVIRONMENTS.

 * Protect applications from code to cloud
 * Shift-left and secure applications by design
 * Understand and prioritize risk across your cloud environments
 * Protect cloud workloads, web applications and APIs




STOP BREACHES AND SPEED UP RESPONSE TIMES WITH A CONSOLIDATED SECURITY PLATFORM.

 * Reign in security operations with one platform
 * Accelerate threat detection and response
 * Deliver security at speed and scale with automation
 * Secure and shrink your attack surface




PARTNER WITH OUR EXPERTS TO STAY AHEAD OF ADVANCED THREATS SO YOU CAN FOCUS ON
YOUR BUSINESS.

 * Let our experts be an extension of your team
 * Every second counts when responding to an attack
 * Move from reactive to proactive
 * Make our experience your experience
 * Get world-class threat intelligence




WE'LL HELP YOU ADVANCE SECURELY WITH NEXT-GENERATION SOLUTIONS TAILORED TO YOUR
UNIQUE REQUIREMENTS.

 * Public sector
 * Financial services
 * Manufacturing
 * Healthcare
 * Small & medium business solutions




HERE FOR YOU.
HERE FOR WHAT’S NEXT.

Executives
Specialists
Partners
Customers


IGNITE ON TOUR

Meet decision-makers, experts and practitioners for a day of hands-on learning,
strategy building and networking.

Attend our global roadshow


EXECUTIVE BRIEFING CENTER

Get a customized plan to see how our platforms, threat intelligence and expert
services help you secure the way forward.

Plan a collaborative discussion


UNDER ATTACK? WE’RE HERE.

Unit 42® Incident Response explains the breach, works with you to contain and
remedy it, and gets you back to business.

Our experts are standing by


AI-POWERED SECURITY PLATFORMS

Expert advice and insights for using AI-powered solutions to streamline your
security posture and mitigate risk.

Get expert insights


PRODUCT DEMO CENTER

Visit the demo center to see solution experts walk you through our comprehensive
cybersecurity portfolio in action.

Take our products for a spin


FUTURE-PROOF YOUR SECURITY

Meet the trusted, proven and awarded products that make a positive difference in
your security and business outcomes.

Get to know our products


EVENTS AROUND THE WORLD

Browse all scheduled global events by cybersecurity technology interest,
industry, region, use case and more.

Join us in person or online


PARTNER PORTAL

Don’t try to tackle security challenges alone. Tap into the world’s most
interoperable cloud and AI security platform.

Log into our partner interface


BECOME A PARTNER

Be part of a global community of world-class innovators committed to making
security breaches a thing of the past.

Apply to our partner community


MANAGED SERVICES PROGRAM

Provide managed security services that reduce cost, increase average revenue per
customer and maximize market reach.

Experience specialized tech


CUSTOMER LOGIN

Security, performance and ease of use: Three qualities our customers like most
about our cybersecurity products.

Sign in


EDUCATION AND TRAINING

Expand your wisdom and skills with world-class training, certification and
accreditation, including digital learning.

Learn from security experts


CUSTOMER SUCCESS TOOLS

Guidance, oversight and 24/7 support from cybersecurity experts to help expedite
your setup and initial configuration.

Make the most of our resources


STAYING AHEAD DEMANDS
PERSPECTIVES YOU CAN TRUST.

View all
ARTICLE


SECURING YOUR AI-POWERED NETWORK TRANSFORMATION: A GUIDE FOR C-SUITE LEADERS


ARTICLE


A NEW ERA OF CYBERSECURITY WITH AI


ARTICLE


WHEN IT COMES TO CYBER RESILIENCE AND AI, BE SURE TO STRETCH THE LIMITS OF YOUR
IMAGINATION


MAGAZINE


QUARTERLY THOUGHT LEADERSHIP ON THE ISSUES THAT MATTER MOST TO CYBERSECURITY
EXECUTIVES


PrevNext


GET THE LATEST NEWS, INVITES TO EVENTS, AND THREAT ALERTS

Enter your email now to subscribe!


Sign up


By submitting this form, you agree to our Terms of Use and acknowledge our
Privacy Statement.

Sign up


PRODUCTS AND SERVICES

 * Network Security Platform
 * CLOUD DELIVERED SECURITY SERVICES
 * Advanced Threat Prevention
 * Advanced WildFire
 * DNS Security
 * Data Loss Prevention
 * IoT Security
 * Next-Generation Firewalls
 * Hardware Firewalls
 * Strata Cloud Manager
 * SECURE ACCESS SERVICE EDGE
 * Prisma Access
 * Prisma SD-WAN
 * Autonomous Digital Experience Management
 * Cloud Access Security Broker
 * Zero Trust Network Access

 * Code to Cloud Platform
 * Prisma Cloud

 * AI-Driven Security Operations Platform
 * Cortex XDR
 * Cortex XSOAR
 * Cortex Xpanse
 * Cortex XSIAM
 * External Attack Surface Protection
 * Security Automation
 * Threat Prevention, Detection & Response

 * Threat Intel and Incident Response Services
 * Proactive Assessments
 * Incident Response
 * Transform Your Security Strategy
 * Discover Threat Intelligence


COMPANY

 * About Us
 * Careers
 * Contact Us
 * Corporate Responsiblity
 * Customers
 * Investor Relations
 * Location
 * Newsroom


POPULAR LINKS

 * Blog
 * Communities
 * Content Library
 * Cyberpedia
 * Event Center
 * Manage Email Preferences
 * Products A-Z
 * Product Certifications
 * Report a Vulnerability
 * Sitemap
 * Tech Docs
 * Unit 42
 * Do Not Sell or Share My Personal Information

 * Privacy
 * Trust Center
 * Terms of Use
 * Documents

Copyright © 2024 Palo Alto Networks. All Rights Reserved

 * 
 * 
 * 
 * 
 * 
 * EN
   Select your language



This site uses cookies essential to its operation, for analytics, and for
personalized content and ads. By continuing to browse this site, you acknowledge
the use of cookies. Privacy statement
Manage My Cookie Settings


Your Opt Out Preference Signal is Honored


PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information on cookie consent
Allow All


MANAGE YOUR CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices

Request a demo
Explore Latest Events
Get today’s cybersecurity intel
Contact Us
408-753-4000

×
–

undefined



Chat Input Box

Chat
Powered by