Palo Alto Networks

Terms of Service




___DarkGate: Dancing the Samba With Alluring Excel Files Read More Dissecting GootLoader With Node.js Read More Threat Brief: CVE-2024-6387 OpenSSH RegreSSHion Vulnerability Read More <ul> <li> Sign In <ul> <li> Customer </li> <li> Partner </li> <li> Employee </li> <li> Research </li> </ul> </li> <li> Create Account </li> <li> EN <ul> <li>USA (ENGLISH)</li> <li>AUSTRALIA (ENGLISH)</li> <li>BRAZIL (PORTUGUÉS)</li> <li>CANADA (ENGLISH)</li> <li>CHINA (简体中文)</li> <li>FRANCE (FRANÇAIS)</li> <li>GERMANY (DEUTSCH)</li> <li>INDIA (ENGLISH)</li> <li>ITALY (ITALIANO)</li> <li>JAPAN (日本語)</li> <li>KOREA (한국어)</li> <li>LATIN AMERICA (ESPAÑOL)</li> <li>MEXICO (ESPAÑOL)</li> <li>SINGAPORE (ENGLISH)</li> <li>SPAIN (ESPAÑOL)</li> <li>TAIWAN (繁體中文)</li> <li>UK (ENGLISH)</li> </ul> </li> <li> </li> </ul> <ul> <li> Get Started </li> <li> Contact Us </li> <li> Resources </li> <li> Get Support </li> <li> Under Attack? </li> </ul> <ul> <li> </li> <li> Products Products Network Security Platform <ul> <li> CLOUD DELIVERED SECURITY SERVICES </li> <li> AI Access Security </li> <li> Advanced Threat Prevention </li> <li> Advanced URL Filtering </li> <li> Advanced WildFire </li> <li> Advanced DNS Security </li> <li> Enterprise Data Loss Prevention </li> <li> Enterprise IoT Security </li> <li> Medical IoT Security </li> <li> Industrial OT Security </li> <li> SaaS Security </li> </ul> <ul> <li> Next-Generation Firewalls </li> <li> AI Runtime Security </li> <li> Hardware Firewalls </li> <li> Software Firewalls </li> <li> Strata Cloud Manager </li> <li> SD-WAN for NGFW </li> <li> PAN-OS </li> <li> Panorama </li> </ul> <ul> <li> SECURE ACCESS SERVICE EDGE </li> <li> Prisma SASE </li> <li> Prisma Access </li> <li> Prisma Access Browser </li> <li> Prisma SD-WAN </li> <li> Autonomous Digital Experience Management </li> </ul> Code to Cloud Platform <ul> <li> Prisma Cloud </li> <li> AI Security Posture Management </li> <li> Code Security </li> <li> Cloud Security Posture Management </li> <li> Data Security Posture Management </li> <li> Cloud Workload Protection </li> <li> Web Application &amp. API Security </li> <li> Cloud Network Security </li> <li> Cloud Infrastructure Entitlement Management </li> <li> Cloud Discovery &amp. Exposure Management </li> </ul> AI-Driven Security Operations Platform <ul> <li> Cortex XDR </li> <li> Cortex XSOAR </li> <li> Cortex Xpanse </li> <li> Cortex XSIAM </li> </ul> </li> <li> Solutions Solutions Network Security <ul> <li> Zero Trust Network Access </li> <li> Cloud Secure Web Gateway </li> <li> Remote Browser Isolation </li> <li> Cloud Access Security Broker </li> <li> Branch &amp. SD-WAN </li> <li> Data Center Security </li> <li> 5G Security </li> <li> Zero Trust OT Security </li> </ul> <ul> <li> Intrusion Detection and Prevention </li> <li> Malware Analysis and Sandboxing </li> <li> Web &amp. Phishing Security </li> <li> DNS Security </li> <li> IoT Security </li> <li> Data Loss Prevention </li> </ul> Cloud-Native Application Protection <ul> <li> Infrastructure as Code (IaC) Security </li> <li> Visibility, Compliance, &amp. Governance </li> <li> Cloud Threat Detection </li> <li> Data Security </li> <li> Host Security </li> <li> Container Security </li> <li> Serverless Security </li> <li> Web Application &amp. API Security </li> </ul> Security Operations <ul> <li> Cloud Security Automation </li> <li> Cloud Detection &amp. Response </li> <li> Network Security Automation </li> <li> Incident Case Management </li> <li> SOC Automation </li> <li> Threat Intel Management </li> <li> Managed Detection &amp. Response </li> <li> Attack Surface Management </li> <li> Compliance Management </li> <li> Internet Operations Management </li> </ul> Endpoint Security <ul> <li> Endpoint Protection </li> <li> Extended Detection &amp. Response </li> <li> Ransomware Protection </li> <li> Digital Forensics </li> </ul> Industries <ul> <li> Public Sector </li> <li> Financial Services </li> <li> Manufacturing </li> <li> Healthcare </li> <li> Small &amp. Medium Business Solutions </li> </ul> </li> <li> Services Services Threat Intel and Incident Response Services <ul> <li> ASSESS </li> <li> AI Security Assessment </li> <li> Attack Surface Assessment </li> <li> Breach Readiness Review </li> <li> BEC Readiness Assessment </li> <li> Compromise Assessment </li> <li> Cyber Risk Assessment </li> <li> M&amp;A Cyber Due Diligence </li> <li> Penetration Testing </li> <li> Purple Team Exercises </li> <li> Ransomware Readiness Assessment </li> <li> SOC Assessment </li> <li> Supply Chain Risk Assessment </li> <li> Tabletop Exercises </li> <li> Unit 42 Retainer </li> </ul> <ul> <li> RESPOND </li> <li> Cloud Incident Response </li> <li> Digital Forensics </li> <li> Incident Response </li> <li> Managed Detection and Response </li> <li> Managed Threat Hunting </li> <li> Unit 42 Retainer </li> <li> TRANSFORM </li> <li> IR Plan Development and Review </li> <li> Security Program Design </li> <li> Virtual CISO </li> </ul> Global Customer Services <ul> <li> Education &amp. Training </li> <li> Professional Services </li> <li> Success Tools </li> <li> Support Services </li> <li> Customer Success </li> </ul> UNIT 42 RETAINER <p>Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial.</p> Learn more<i> </i> </li> <li> Partners Partners NextWave Partners <ul> <li> NextWave Partner Community </li> <li> Cloud Service Providers </li> <li> Global Systems Integrators </li> <li> Technology Partners </li> <li> Service Providers </li> <li> Solution Providers </li> <li> Managed Security Service Providers </li> </ul> Take Action <ul> <li> Portal Login </li> <li> Managed Services Program </li> <li> Become a Partner </li> <li> Request Access </li> <li> Find a Partner </li> </ul> CYBERFORCE <p>CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise.</p> Learn more<i> </i> </li> <li> Company Company Palo Alto Networks <ul> <li> About Us </li> <li> Management Team </li> <li> Investor Relations </li> <li> Locations </li> <li> Inclusion &amp. Diversity </li> <li> Ethics &amp. Compliance </li> <li> Corporate Responsibility </li> <li> Veterans </li> </ul> Why Palo Alto Networks? <ul> <li> Precision AI Security </li> <li> Our Platform Approach </li> <li> Awards and Recognition </li> <li> Customer Stories </li> <li> Technical Certifications </li> <li> Trust 360 Program </li> </ul> Careers <ul> <li> Overview </li> <li> Culture </li> <li> Benefits </li> </ul> A Newsweek Most Loved Workplace <p>"Businesses that do right by their employees"</p> Read more<i> </i> </li> <li> More More Resources <ul> <li> Blog </li> <li> Unit 42 Threat Research </li> <li> Communities </li> <li> Content Library </li> <li> Cyberpedia </li> <li> Tech Insider </li> <li> Knowledge Base </li> <li> Perspectives of Leaders </li> <li> Cyber Perspectives Magazine </li> <li> Regional Cloud Locations </li> <li> Tech Docs </li> <li> Security Posture Assessment </li> </ul> Connect <ul> <li> LIVE community </li> <li> Events </li> <li> Executive Briefing Center </li> <li> Demos </li> <li> Contact us </li> </ul> Blog <p>Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity</p> Learn more<i> </i> </li> </ul> <ul> <li> Sign In Sign In <ul> <li> Customer </li> <li> Partner </li> <li> Employee </li> <li> Research </li> </ul> </li> <li> Create Account </li> <li> EN Language <ul> <li>USA (ENGLISH)</li> <li>AUSTRALIA (ENGLISH)</li> <li>BRAZIL (PORTUGUÉS)</li> <li>CANADA (ENGLISH)</li> <li>CHINA (简体中文)</li> <li>FRANCE (FRANÇAIS)</li> <li>GERMANY (DEUTSCH)</li> <li>INDIA (ENGLISH)</li> <li>ITALY (ITALIANO)</li> <li>JAPAN (日本語)</li> <li>KOREA (한국어)</li> <li>LATIN AMERICA (ESPAÑOL)</li> <li>MEXICO (ESPAÑOL)</li> <li>SINGAPORE (ENGLISH)</li> <li>SPAIN (ESPAÑOL)</li> <li>TAIWAN (繁體中文)</li> <li>UK (ENGLISH)</li> </ul> </li> </ul> <ul> <li> Get Started </li> <li> Contact Us </li> <li> Resources </li> <li> Get support </li> <li> Under Attack? </li> </ul> <ul> <li> Unit 42 Threat Research </li> </ul> Search All <ul> <li>Tech Docs</li> </ul> Close search modal Palo Alto Networks Terms&nbsp;of&nbsp;Use<p>These Website Terms of Use (“Terms”) constitute an agreement between you and Palo Alto Networks, Inc. and its affiliates (“Palo Alto Networks”) and apply to all visitors and users of this website (“Site”). By accessing, visiting or using this Site, you agree to be bound by these Terms. YOU MUST BE AT LEAST 18 YEARS OLD TO USE THIS WEBSITE.</p>User Accounts and Profiles<p>In order to access certain services or features on our Site, you may be required to create an account or profile. In those situations, and when using or accessing Palo Alto Networks products as part of the Site, additional terms or requirements may apply and those additional terms will become part of your agreement with us. In the event of any conflict between such additional terms and these Terms, the additional terms will control. Any notices or communications sent by Palo Alto Networks will be sent to the contact information you provided during the account registration process unless you have notified us of any change.</p> <p>User accounts, profiles, usernames, and passwords must be associated with only one person unless otherwise agreed to by Palo Alto Networks. If you create an account or profile, the information you provide must be truthful and accurate. You may not allow by another person or entity to use your profile nor use the account of another person or entity. You agree to take all reasonable precautions to protect your account information. Palo Alto Networks will not be liable to you or any third party for your failure to prevent unauthorized access to your account. You must notify us immediately of any unauthorized use of your account or associated breach in security that you are aware of.</p> <p>We may, in our sole discretion (i) restrict, suspend, or terminate your access to any or all of the Site or (ii) cease to provide and maintain the Site, in whole or in part, at any time, for any or no reason, with or without prior notice, and without liability. Upon doing so, we may retain or delete any information or content that you provided, subject to applicable law.</p>Our Site Content<p>Our Site contains content owned, operated, licensed, and/or controlled by Palo Alto Networks, which we own copyright, trademark, trade secret, or other proprietary rights in and we retain all such rights to ("Site Content").&nbsp. Site Content includes, but is not limited to, icons, photographs, white papers, product documentation, as well as, technology overviews, software in both source and binary forms, sample code, scripts, APIs, SDKs, which may be available for download on certain parts of the Site.&nbsp;</p> <p>Palo Alto Networks grants you a limited, revocable, non-transferable license under its and other applicable copyrights to (1) download or use one copy of Site Content to a single computer, if applicable, solely for your personal and non-commercial internal use, except as otherwise may be indicated on this Site or (2) if you have an existing business relationship with Palo Alto Networks, you may download Site Content for use in furtherance of, and subject to the terms and conditions of, the provisions of your separate written agreement with Palo Alto Networks. If software, executable files or programs are not accompanied by their own terms and conditions, our End User Agreement shall govern their use.</p> <p>This is a license, not a transfer of title, and your use of Site Content is subject to the following restrictions: You may not: (a) modify the Site Content or use them for any commercial purpose, or any public display, performance comparison, sale or rental. (b) decompile, reverse engineer, or disassemble Site Content except and only to the extent permitted by applicable law. (c) remove any copyright or other proprietary notices from the Site Content. (d) transfer the Site Content to another person. Further, you agree to prevent any unauthorized copying of Site Content and you agree that any copy which you make shall retain all copyright and other proprietary notices in the same form and manner as on the original.</p> <p>ALL SITE CONTENT, AND THE COMPILATION AND ARRANGEMENT OF THE SITE CONTENT, ARE PROTECTED BY COPYRIGHT AND, WHERE APPLICABLE, OTHER INTELLECTUAL PROPERTY RIGHTS. EXCEPT AS EXPRESSLY SPECIFIED, NO PORTION OF THE INFORMATION ON THIS SITE MAY BE REPRODUCED, MODIFIED, PUBLISHED, UPLOADED, POSTED, TRANSMITTED, OR DISTRIBUTED IN ANY FORM, OR BY ANY MEANS, WITHOUT THE PRIOR WRITTEN PERMISSION OF PALO ALTO NETWORKS, AND NOTHING CONTAINED HEREIN SHALL BE CONSTRUED AS CONFERRING BY IMPLICATION, ESTOPPEL OR OTHERWISE ANY LICENSE OR RIGHT UNDER ANY PATENT, TRADEMARK OR COPYRIGHT OF PALO ALTO NETWORKS OR ANY THIRD PARTY.</p> <p>All trademarks, logos, and service marks displayed on our Site are the property of Palo Alto Networks or other third parties.&nbsp;</p> <p> <b>User Content</b> </p> <p>This Site provides opportunities for you to become a member of different communities (“Community”) and actively participate by creating, providing, sharing and uploading information to the Community such as comments, ideas or suggestions for new or improved software products, technologies, marketing/advertising campaigns or product names, data, articles, documents, discussion forum threads, blog entries, computer code, such as software sample code, source code, scripts, patches, bug fixes, binaries or executables, or other information (collectively "Contributions").&nbsp. Palo Alto Networks assumes no responsibility or liability over the sharing of user Contributions. Contributions are considered non-confidential and non-proprietary unless expressly agreed otherwise, in writing, by Palo Alto Networks.</p> <p>Palo Alto Networks shall have no obligations to you with regard to its use or disclosure of Contributions, and shall have a worldwide, perpetual, irrevocable and fully-paid right to use, reproduce, prepare derivative works of, perform, display, and distribute the Contributions, including any ideas, concepts, know-how or techniques contained in such Contributions, for any and all purposes without limitation, and to authorize others to do so as well, without attribution. Palo Alto Networks may, in its sole discretion, remove or delete any Contribution, for any reason, without prior notice.</p> <p>No right or license in connection with any Contribution is granted to any other user unless the contributing user explicitly agrees in writing to grant such right, license or permission to a user or users. You represent and warrant that you either own or have all the necessary intellectual property rights in the Contributions you upload or share to the Community and that your Contributions do not infringe on the patent, copyright or other intellectual property rights of others.&nbsp;</p> <p> <b>Rules of Conduct&nbsp;</b> </p> <p>In addition to these Terms and our Privacy Statement, which also apply to the Community, you must abide by the following rules of conduct:</p> <ol> <li> <p>Do not advertise, promote, endorse, or market, directly or indirectly, any third-party commercial products, services, solutions, or other technologies. While you may use the Community to provide supplemental information about your own business that might be of interest to other users (without spamming them), you may do so only after you receive the appropriate consents from other relevant users. If it doesn’t naturally arise from a conversation and need, you cannot mention your own business. Any use of the Community for commercial purposes is solely at your own risk and we assume no liability for such use.</p> </li> <li> <p>Do not engage in any unlawful conduct. In particular, do not post, publish, or distribute any defamatory, inappropriate, obscene, infringing or other unlawful material or information.</p> </li> <li> <p>Do not engage in personal attacks or any type of "flaming" of other users, i.e. say mean things online to deliberately hurt someone else. Do not "troll," i.e. post topics or opinions that are designed to provoke a negative response from one or more specific users and do not threaten, harass, stalk, defame, or defraud any person or entity.&nbsp;&nbsp;</p> </li> <li> <p>Do not use offensive language.</p> </li> <li> <p>Do not engage in disruptive, such as persistent off-topic contributions or comments, or statements that might incite other users to violate these Terms or participate in illegal activities.</p> </li> <li> <p>Do not contribute content that contains photos, software or other material protected by intellectual property laws, rights of privacy or publicity, or any other applicable law unless you own or have rights to these materials.</p> </li> <li> <p>If you don’t have to, do not post any instructions, software or other materials that would allow participants or third parties to harm other users' computers or to inappropriately access software or websites.</p> </li> <li> <p>Do not attack, abuse, interfere with, intercept, disrupt, or exploit any users, systems, or services, regardless of how accomplished and notwithstanding anything to the contrary in these Terms, including but not limited to Denial of Service (DoS), monitoring, crawling, spamming, using bots or scripts, or distributing malware (such as viruses, Trojan horses, worms, spyware, or adware).</p> </li> <li> <p>Do not falsely impersonate any other person in the forum, including Palo Alto Networks employees or agents.</p> </li> <li> <p>Do not distribute unwanted, unsolicited, or harassing mass email or other messages, promotions, advertising, or solicitations (“spam”) or send deceptive or false source-identifying information, including “spoofing” or “phishing.”</p> </li> <li> <p>Do not misrepresent the source of anything you contribute.</p> </li> <li> <p>Do not, under any circumstances, attempt to collect, store, or publish personally identifiable information (a) without the owner’s knowledge and consent, or (b) of a minor under the age of thirteen.</p> </li> <li> <p>Do not disable, disrupt, circumvent, interfere with, or otherwise violate the security of the Site or access any application, system, service, tool, data, account, network, or content without authorization or for unintended purposes.</p> </li> <li> <p>Do not engage in or promote any illegal or criminal activity such as child pornography, gambling, or piracy.</p> </li> <li> <p>Some participants may post Internet website links as part of their Contribution. Palo Alto Networks is not responsible for the content on the websites associated with these links and reminds you that some content and links on the Internet contain malware or inappropriate material that is not suitable for children or may be offensive to some users.</p> </li> <li> <p>You are responsible for all actions you take based on information or advice you receive while online. Use your good judgment when evaluating information provided through the Community or any other communication service. The decision to share information or conduct transactions with anyone is your own. therefore, conduct your own research prior to making any decisions.</p> </li> <li> <p>You acknowledge that you may compete with other users in various lines of business. It is therefore imperative that you act in a manner which does not violate any applicable state, federal or international antitrust laws, regulations or applicable orders. Accordingly, you are responsible for obtaining appropriate legal counsel while acting under these Terms. The Community shall not be used for the purpose of bringing about or attempting to bring about any understanding or agreement, written or oral, formal or informal, express or implied, between and among competitors with regard to their prices, terms or conditions of sale, distribution, volume of production, territories, customers, credit terms or marketing practices. Therefore, there shall be no contribution, discussion, communication, agreement or disclosure among users that are actual or potential competitors regarding their prices, discounts or terms or conditions of sale or licensing of products or services, pricing methods, profits, profit margins or cost data, production plans, market shares, sales territories or markets, allocation of territories or customers, or any limitation on the timing, cost or volume of their research, production or sales.</p> </li> </ol> <p>If you violate these Terms, your access will be terminated immediately and without notice, so be considerate and use the Site for its intended purpose.&nbsp;&nbsp;</p> <p> <b>Indemnification</b> </p> <p>You agree to defend, indemnify and hold Palo Alto Networks and anyone on its behalf, including but not limited to, all of its owners, managers, officers and employees, harmless against any losses, expenses, costs, claims, damages (including reasonable attorneys’ fees, expert fees and other reasonable costs of litigation) arising from, incurred as a result of, or in any manner related to your breach of these Terms.</p> <p> <b>DMCA Notice and Trademark Infringement</b> </p> <p>If you believe something on this Site has infringed your intellectual property rights, please provide us with the following information in writing:</p> <ol> <li> <p>An electronic or physical signature of the intellectual property owner or of a person authorized to act on behalf of the owner;</p> </li> <li> <p>Identification of the work that you claim has been infringed;</p> </li> <li> <p>Identification of the material that is claimed to be infringing and provide a link (where available) to where it is located;</p> </li> <li> <p>Information reasonably sufficient to allow us to contact you, such as your address, telephone number, and email address;</p> </li> <li> <p>A statement that you have a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or law. and</p> </li> <li> <p>A statement made under penalty of perjury, that the above information is accurate, and that you are the owner or are authorized to act on behalf of the owner.</p> </li> </ol> <p>The above information must be submitted to our DMCA agent at the following:</p> <p>Office of the General Counsel</p> <p>Palo Alto Networks, Inc.</p> <p>3000 Tannery Way</p> <p>Santa Clara, CA95054</p> <p>Attn: Copyright Agent<br> Email: DMCA@paloaltonetworks.com</p> <p> <b>Disclaimers and Limitation of Liability</b> </p> <p>Although Palo Alto Networks has attempted to provide accurate information on the Site, we assume no responsibility for the accuracy of any such information, nor do we endorse or assume responsibility for any user conduct or content submitted on our Site. Nothing in these Terms requires us to monitor the Site or to modify or remove any materials or information.&nbsp;&nbsp;</p> <p>This Site may contain links to third-party sites. Palo Alto Networks provides these links merely as a convenience to you. the inclusion of such links in no way implies an endorsement of the linked site or the products and services referenced on that site. The linked sites are not under the control of Palo Alto Networks, and we are not responsible for the accuracy or reliability of any information, opinions, advice or statements made on these linked sites. Access to any of these linked sites is at the user's own risk.</p> <p>You are solely responsible for maintaining the confidentiality of your account, registration, and password information. Palo Alto Networks will not be liable for any harm caused by, or related to, the theft or misappropriation of your user name or password, disclosure of your user name or password, or your authorization of anyone else to use your user name or password.</p> <p>We may change the programs or products mentioned at any time without notice. Any mention of third-party products or services is for informational purposes only and does not constitute an endorsement or recommendation.&nbsp;</p> <p>The Site and Site Content are subject to applicable federal, state, and local laws, and U.S. export control laws, and may also be subject to the laws of the country where you reside. We reserve the right to investigate and take appropriate action against anyone who, in our sole discretion, is suspected of violating any applicable law, including, without limitation, reporting you to law enforcement authorities.</p> <p>UNLESS OTHERWISE SPECIFIED, ALL PRODUCTS, SERVICES, FEATURES AND OTHER SITE CONTENT ON THIS SITE ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, INCLUDING WITHOUT LIMITATION ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT OR FITNESS FOR ANY PARTICULAR PURPOSE.&nbsp;</p> <p>IN NO EVENT SHALL PALO ALTO NETWORKS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING WITHOUT LIMITATION ANY LOST PROFITS, LOST DATA, LOSS OF USE OR COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES) INCLUDING WITHOUT LIMITATION ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING IN ANY WAY OUT OF THE USE OF OR INABILITY TO USE OR ACCESS THE SITE OR SITE CONTENT, UNDER ANY CAUSE OF ACTION OR THEORY OF LIABILITY, AND IRRESPECTIVE OF WHETHER SUCH PALO ALTO NETWORKS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OF THE POSSIBILITY OF SUCH DAMAGES.</p> <p> <b>Government Use</b> </p> <p>All Palo Alto Networks products and publications are commercial in nature. Use, duplication or disclosure by the United States Government is subject to the restrictions set forth in DFARS 252.227 7015 and FAR 52.227 19 or successor provisions regarding government use of commercial software.</p> <p> <b>Applicable Law</b> </p> <p>This Site is controlled by Palo Alto Networks from its offices within the State of California, United States of America. Palo Alto Networks makes no representation that Site Content, products, or services available via the Site are appropriate or available for use in other locations, and access to them from territories where their content is illegal is prohibited. Those who choose to access this Site from other locations do so on their own initiative and are responsible for compliance with applicable local laws. You may not use or export Site Content in violation of U.S. export laws and regulations. Not all products or programs mentioned may be available in your country. Please contact your local sales representative for information as to products and services available in your country.</p> <p> <b>General</b> </p> <p>We reserve the right to change these Terms at any time, without notice, at our sole discretion. Please check this page periodically for any updates. These Terms are governed by the laws of the State of California, U.S.A., excluding any conflict of laws rules or principles. If there is any dispute relating to the Site or these Terms, you and Palo Alto Networks agree to the exclusive personal jurisdiction and venue in the state and federal courts of Santa Clara County, State of California, U.S.A. If any provision of these Terms is found to be invalid or unenforceable, that provision will be struck and the remaining provisions will remain in full effect. If you or others violate these Terms and we take no immediate action, this in no way limits or waives our rights, such as our right to take action in the future or in similar situations.</p> <p>&nbsp;</p>Get the latest news, invites to events, and threat alertsEnter your email now to subscribe!Sign up <i> </i> <p> By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. </p>Sign up <i> </i>Products and Services<ul> <li> Network Security Platform </li> <li> CLOUD DELIVERED SECURITY SERVICES </li> <li> Advanced Threat Prevention </li> <li> DNS Security </li> <li> Data Loss Prevention </li> <li> IoT Security </li> <li> Next-Generation Firewalls </li> <li> Hardware Firewalls </li> <li> Strata Cloud Manager </li> <li> SECURE ACCESS SERVICE EDGE </li> <li> Prisma Access </li> <li> Prisma SD-WAN </li> <li> Autonomous Digital Experience Management </li> <li> Cloud Access Security Broker </li> <li> Zero Trust Network Access </li> </ul> <ul> <li> Code to Cloud Platform </li> <li> Prisma Cloud </li> <li> Cloud-Native Application Protection Platform </li> </ul> <ul> <li> AI-Driven Security Operations Platform </li> <li> Cortex XDR </li> <li> Cortex XSOAR </li> <li> Cortex Xpanse </li> <li> Cortex XSIAM </li> <li> External Attack Surface Protection </li> <li> Security Automation </li> <li> Threat Prevention, Detection &amp. Response </li> </ul> <ul> <li> Threat Intel and Incident Response Services </li> <li> Proactive Assessments </li> <li> Incident Response </li> <li> Transform Your Security Strategy </li> <li> Discover Threat Intelligence </li> </ul>Company<ul> <li> About Us </li> <li> Careers </li> <li> Contact Us </li> <li> Corporate Responsiblity </li> <li> Customers </li> <li> Investor Relations </li> <li> Location </li> <li> Newsroom </li> </ul>Popular Links<ul> <li> Blog </li> <li> Communities </li> <li> Content Library </li> <li> Cyberpedia </li> <li> Event Center </li> <li> Manage Email Preferences </li> <li> Products A-Z </li> <li> Product Certifications </li> <li> Report a Vulnerability </li> <li> Sitemap </li> <li> Tech Docs </li> <li> Unit 42 </li> <li> Do Not Sell or Share My Personal Information </li> </ul> <ul> <li> Privacy </li> <li> Trust Center </li> <li> Terms of Use </li> <li> Documents </li> </ul> <p>Copyright © 2024 Palo Alto Networks. All Rights Reserved</p> <ul> <li> </li> <li> </li> <li> </li> <li> </li> <li>EN<i> </i>Select your language<ul> </ul> </li> </ul> This site uses cookies essential to its operation, for analytics, and for personalized content and ads. By continuing to browse this site, you acknowledge the use of cookies. Privacy statementManage My Cookie Settings Your Opt Out Preference Signal is HonoredPrivacy Preference CenterWhen you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. <br>More information on cookie consentAllow All Manage Your Consent PreferencesStrictly Necessary CookiesAlways Active<p>These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. &nbsp. &nbsp;You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.</p>Performance Cookies Performance Cookies <p>These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. &nbsp. &nbsp;All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.</p>Functional Cookies Functional Cookies <p>These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. &nbsp. &nbsp;If you do not allow these cookies then some or all of these services may not function properly.</p>Targeting Cookies Targeting Cookies <p>These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. &nbsp. &nbsp;They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.</p>Back ButtonCookie List<p> </p> Search IconFilter IconClear checkbox label labelApply CancelConsent Leg.Interest checkbox label label checkbox label label checkbox label labelReject All Confirm My Choices Request a demoExplore Latest EventsGet today’s cybersecurity intelContact Us<br>408-753-4000





Comments:
On 2024-07-17 07:30:01 UTC, pederdm000 (2130) Staff wrote:

Attempted to Crawl Document
Error Message:
Crawler: us-east-2
Stacktrace: