www.paloaltonetworks.com
Open in
urlscan Pro
2a02:26f0:480:9b9::c3a
Public Scan
URL:
https://www.paloaltonetworks.com/company
Submission: On May 22 via api from US — Scanned from DE
Submission: On May 22 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMName: footer_form_manage_subscriptions — POST /apps/pan/public/formsubmithandler.submitform.json
<form id="footer_form_manage_subscriptions" name="footer_form_manage_subscriptions" class="form" action="/apps/pan/public/formsubmithandler.submitform.json" method="POST" novalidate="">
<!-- hidden fields -->
<input type="hidden" name="mktoOptIn" value="true">
<input type="hidden" name="Qualifying_Campaign__c" value="7010g000001J5shAAC">
<input type="hidden" name="emailFormMask" value="">
<input type="hidden" name="Company" id="Company" value="">
<input type="hidden" name="FormName" value="subscription-all-corp-site-en_US">
<input type="hidden" name="formid" value="1086">
<input type="hidden" name="formVid" value="1086">
<input type="hidden" name="munchkinId" value="531-OCS-018">
<input type="hidden" name="programId" value="5373">
<label class="form-field" aria-label="Your email" for="PAN_FOOTER_EMAIL_FIELD">
<span class="sr-only" style="display: none;">Your email</span>
<input type="text" name="Email" id="PAN_FOOTER_EMAIL_FIELD" placeholder="Your email" pattern="[a-zA-Z0-9._%+\-]+@[a-zA-Z0-9.\-]+\.[a-zA-Z]{2,}$" required="">
<div class="validation display-3"></div>
<div class="validation-icon"></div>
</label>
<div id="PAN_FOOTER_CAPTCHA_HOLDER">
<label for="g-recaptcha-response" class="captcha">recaptcha</label>
<div class="g-recaptcha" data-expired-callback="recaptchaExpired" data-callback="captchaComplete" data-sitekey="6Lc5EhgTAAAAAJa-DzE7EeWABasWg4LKv-R3ao6o"></div>
</div>
<div class="actions">
<button type="submit" class="btn btn-primary" disabled="" data-page-track="true" data-page-track-value="company:cleanFooter:Sign up">Sign up<i></i></button>
<div class="form-validation display-3"></div>
</div>
<p class="display-2 form-legal">By submitting this form, you agree to our
<a href="/legal-notices/terms-of-use" data-page-track="true" data-page-track-value="company:: parbase:get the latest news invites to events and threat alerts:terms of use">Terms of Use</a> and acknowledge our
<a href="/legal-notices/privacy" data-page-track="true" data-page-track-value="company:: parbase:get the latest news invites to events and threat alerts:privacy statement">Privacy Statement</a>.</p>
</form>
Text Content
Payload Trends in Malicious OneNote Samples Read More Leveraging DNS Tunneling for Tracking and Scanning Read More Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400 (Updated May 3) Read More * Sign In * Customer * Partner * Employee * Research * Create Account * EN * USA (ENGLISH) * AUSTRALIA (ENGLISH) * BRAZIL (PORTUGUÉS) * CANADA (ENGLISH) * CHINA (简体中文) * FRANCE (FRANÇAIS) * GERMANY (DEUTSCH) * INDIA (ENGLISH) * ITALY (ITALIANO) * JAPAN (日本語) * KOREA (한국어) * LATIN AMERICA (ESPAÑOL) * MEXICO (ESPAÑOL) * SINGAPORE (ENGLISH) * SPAIN (ESPAÑOL) * TAIWAN (繁體中文) * UK (ENGLISH) * * Get Started * Contact Us * Resources * Get Support * Under Attack? * * Products Products Network Security Platform * CLOUD DELIVERED SECURITY SERVICES * AI Access Security * Advanced Threat Prevention * Advanced URL Filtering * Advanced WildFire * Advanced DNS Security * Enterprise Data Loss Prevention * Enterprise IoT Security * Medical IoT Security * Industrial OT Security * SaaS Security * Next-Generation Firewalls * AI Runtime Security * Hardware Firewalls * Software Firewalls * Strata Cloud Manager * SD-WAN for NGFW * PAN-OS * Panorama * SECURE ACCESS SERVICE EDGE * Prisma SASE * Prisma Access * Prisma Access Browser * Prisma SD-WAN * Autonomous Digital Experience Management Code to Cloud Platform * Prisma Cloud * AI Security Posture Management * Code Security * Cloud Security Posture Management * Data Security Posture Management * Cloud Workload Protection * Web Application & API Security * Cloud Network Security * Cloud Infrastructure Entitlement Management * Cloud Discovery & Exposure Management AI-Driven Security Operations Platform * Cortex XDR * Cortex XSOAR * Cortex Xpanse * Cortex XSIAM * Solutions Solutions Network Security * Zero Trust Network Access * Cloud Secure Web Gateway * Remote Browser Isolation * Cloud Access Security Broker * Branch & SD-WAN * Data Center Security * 5G Security * Zero Trust OT Security * Intrusion Detection and Prevention * Malware Analysis and Sandboxing * Web & Phishing Security * DNS Security * IoT Security * Data Loss Prevention Cloud-Native Application Protection * Infrastructure as Code (IaC) Security * Visibility, Compliance, & Governance * Cloud Threat Detection * Data Security * Host Security * Container Security * Serverless Security * Web Application & API Security Security Operations * Cloud Security Automation * Cloud Detection & Response * Network Security Automation * Incident Case Management * SOC Automation * Threat Intel Management * Managed Detection & Response * Attack Surface Management * Compliance Management * Internet Operations Management Endpoint Security * Endpoint Protection * Extended Detection & Response * Ransomware Protection * Digital Forensics Industries * Public Sector * Financial Services * Manufacturing * Healthcare * Small & Medium Business Solutions * Services Services Threat Intel and Incident Response Services * ASSESS * AI Security Assessment * Attack Surface Assessment * Breach Readiness Review * BEC Readiness Assessment * Compromise Assessment * Cyber Risk Assessment * M&A Cyber Due Diligence * Penetration Testing * Purple Team Exercises * Ransomware Readiness Assessment * SOC Assessment * Supply Chain Risk Assessment * Tabletop Exercises * Unit 42 Retainer * RESPOND * Cloud Incident Response * Digital Forensics * Incident Response * Managed Detection and Response * Managed Threat Hunting * Unit 42 Retainer * TRANSFORM * IR Plan Development and Review * Security Program Design * Virtual CISO Global Customer Services * Education & Training * Professional Services * Success Tools * Support Services * Customer Success UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more * Partners Partners NextWave Partners * NextWave Partner Community * Cloud Service Providers * Global Systems Integrators * Technology Partners * Service Providers * Solution Providers * Managed Security Service Providers Take Action * Portal Login * Managed Services Program * Become a Partner * Request Access * Find a Partner CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more * Company Company Palo Alto Networks * About Us * Management Team * Investor Relations * Locations * Inclusion & Diversity * Ethics & Compliance * Corporate Responsibility * Veterans Why Palo Alto Networks? * Precision AI Security * Our Platform Approach * Awards and Recognition * Customer Stories * Technical Certifications * Trust 360 Program Careers * Overview * Culture * Benefits A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more * More More Resources * Blog * Unit 42 Threat Research * Communities * Content Library * Cyberpedia * Tech Insider * Knowledge Base * Perspectives of Leaders * Cyber Perspectives Magazine * Regional Cloud Locations * Tech Docs * Security Posture Assessment Connect * LIVE community * Events * Executive Briefing Center * Demos * Contact us Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more * Sign In Sign In * Customer * Partner * Employee * Research * Create Account * EN Language * USA (ENGLISH) * AUSTRALIA (ENGLISH) * BRAZIL (PORTUGUÉS) * CANADA (ENGLISH) * CHINA (简体中文) * FRANCE (FRANÇAIS) * GERMANY (DEUTSCH) * INDIA (ENGLISH) * ITALY (ITALIANO) * JAPAN (日本語) * KOREA (한국어) * LATIN AMERICA (ESPAÑOL) * MEXICO (ESPAÑOL) * SINGAPORE (ENGLISH) * SPAIN (ESPAÑOL) * TAIWAN (繁體中文) * UK (ENGLISH) * Get Started * Contact Us * Resources * Get support * Under Attack? * Unit 42 Threat Research Search All * Tech Docs Close search modal COMPANY The world’s leading cybersecurity company Our technologies give over 80,000 enterprise customers the power to protect billions of people worldwide. About us Company overview Management team Executive Briefing Program Investor relations Venture fund Contact us Locations Careers Overview Search openings Benefits Culture Interns & University Inclusion & Diversity Veterans Newsroom Press releases In the news Awards Customer case studies Press kit Brand guide Resources Resource Center Blog Communities Events Virtual ultimate test drive YouTube channel Tech docs Cyberpedia Best practices and tools Best Practice Assessment Security Lifecycle Review risk assessment Prevention Posture Assessment Applipedia Threat Vault Unit 42 Threat Research Latest research Threat briefs Tools Playbooks About the team GET THE LATEST NEWS, INVITES TO EVENTS, AND THREAT ALERTS Your email recaptcha Sign up By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. EN * USA (ENGLISH) * AUSTRALIA (ENGLISH) * BRAZIL (PORTUGUÉS) * CANADA (ENGLISH) * CHINA (简体中文) * FRANCE (FRANÇAIS) * GERMANY (DEUTSCH) * INDIA (ENGLISH) * ITALY (ITALIANO) * JAPAN (日本語) * KOREA (한국어) * LATIN AMERICA (ESPAÑOL) * MEXICO (ESPAÑOL) * SINGAPORE (ENGLISH) * SPAIN (ESPAÑOL) * TAIWAN (繁體中文) * UK (ENGLISH) POPULAR RESOURCES * Blog * Communities * Content Library * Cyberpedia * Event Center * Investors * Products A-Z * Tech Docs * Unit 42 * Sitemap LEGAL NOTICES * Privacy Statement * Trust Center * Terms of Use * Documents * Do Not Sell or Share My Personal Information POPULAR LINKS * About Us * Customers * Careers * Contact Us * Manage Email Preferences * Newsroom * Product Certifications Report a Vulnerability Create an account or login Copyright © 2024 Palo Alto Networks. All rights reserved This site uses cookies essential to its operation, for analytics, and for personalized content and ads. Please read our privacy statement for more information.Privacy statement Cookies Settings Reject All Accept All Your Opt Out Preference Signal is Honored PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information on cookie consent Allow All MANAGE YOUR CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices