A Zero Trust Leader

See why Forrester says we’re still a Zero Trust leader
Read the report

We are the world’s cybersecurity leader

Our technologies give 65,000 enterprise customers the power
to protect billions of people worldwide.

Built for simplicity

Prevent attacks with the industry-defining network security platform. Tightly integrated innovations, easy to operate, for consistent protection across network, cloud and mobile users. Secure the Enterprise

Security for today’s cloud

Prisma provides the industry’s most complete cloud security offering. Accelerate your cloud journey with a product suite designed to secure today’s complex IT environments. Secure the Cloud

AI-based security: radically simple, always learning

Cortex is the industry’s only open and integrated AI-based continuous security platform that constantly evolves to stop the most sophisticated threats. Secure the Future


Zingbox IoT Guardian, the Palo Alto Networks product for securing IoT, has achieved the designation of In Process for FedRAMP.
April 03, 2020 at 12:00 AM


Melbourne ,VIC ,Australia
May 13, 2020 @ 9:00 AEST
While threat hunting is an essential part of your security operations daily routine, let’s face it, it's not easy. Your teams are dealing with too many alerts, complicated workflows, and a lack of coherent data correlation to prioritise and respond quickly.   Palo Alto Networks is changing the equation by radically simplifying and automating security operations. Cortex XDR™ is an evolution in detection and response where the “X” stands for any data source, be it network, endpoint, or cloud, all feeding into powerful automation and behaviour analytics-powered security technology.    Join our Hands-on Workshop focusing on Investigation and Threat Hunting to boost your skills and speed in preventing, detecting and eliminating sophisticated attacks in your environment.   In this half-day workshop, you’ll get hands-on experience using Cortex XDR to:   ●      Accelerate and simplify threat hunting with enriched, contextualised data ●      Automate threat discovery across endpoint, network, cloud and third party sources ●      Quickly investigate the root cause and attack chain to prioritise a rapid response ●      Strengthen prevention by applying the knowledge gained from each investigation   This session is ideal for security analysts of all experience levels, including security operations staff, incident responders and threat hunters.   Seating is intentionally limited so secure your spot today.   We’ll ask you to bring your own laptop with the latest version of Google Chrome® installed. Lunch will also be provided.   We look forward to seeing you there!