* [Blog](https://www.paloaltonetworks.com.au/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com.au/blog/corporate) * User-ID # Palo Alto Networks ## User-ID [![All Layers Are Not Created Equal](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2018/08/thought-bubble-blog-feature-img-650x300.png)](https://www.paloaltonetworks.com.au/blog/2019/05/network-layers-not-created-equal/) [All Layers Are Not Created Equal \--------------------------------](https://www.paloaltonetworks.com.au/blog/2019/05/network-layers-not-created-equal/) In order to build a real Zero Trust architecture, you need to understand why it cannot be done with Layer 3 technologies. [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) May 01, 2019 By [John Kindervag](https://www.paloaltonetworks.com/blog/author/john-kindervag/?ts=markdown "Posts by John Kindervag") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** ![Palo Alto Networks News of the Week – January 21, 2017](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/11/blog-generic-banner-1.jpg) [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- January 21, 2017](https://www.paloaltonetworks.com.au/blog/2017/01/palo-alto-networks-news-week-january-21-2017/) Did you miss any of this week's Palo Alto Networks action? Don't worry, we've rounded up our top news and views right here: Jan 21, 2017 By [Justin Hall](https://www.paloaltonetworks.com/blog/author/justin-hall/?ts=markdown "Posts by Justin Hall") ![5 Key Considerations When Implementing User-Based Access Controls](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/11/blog-generic-banner-1.jpg) [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) ## [5 Key Considerations When Implementing User-Based Access Controls](https://www.paloaltonetworks.com.au/blog/2017/01/5-key-considerations-implementing-user-based-access-controls/) End users, the very community of individuals chartered to preserve the integrity of your business, embody a profound vulnerability point within your network's security infrastructu... Jan 18, 2017 By [Stephanie Johnson](https://www.paloaltonetworks.com/blog/author/stephanie-johnson/?ts=markdown "Posts by Stephanie Johnson") ![Palo Alto Networks News of the Week – January 14, 2017](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/11/blog-generic-banner-1.jpg) [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- January 14, 2017](https://www.paloaltonetworks.com.au/blog/2017/01/palo-alto-networks-news-week-january-14-2017/) Did you miss any of this week's Palo Alto Networks action? Don't worry, we've rounded up our top news and views right here: Jan 14, 2017 By [Justin Hall](https://www.paloaltonetworks.com/blog/author/justin-hall/?ts=markdown "Posts by Justin Hall") ![There’s No “I” in Secure Network: User-Based Access Policy is a Team Effort](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/11/blog-generic-banner-1.jpg) [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) ## [There's No "I" in Secure Network: User-Based Access Policy is a Team Effort](https://www.paloaltonetworks.com.au/blog/2017/01/theres-no-secure-network-user-based-access-policy-team-effort/) Today's cyber attackers have proven themselves far more capable and committed, stopping at nothing to access the pools of valuable data that uphold the integrity and reliability of... Jan 11, 2017 By [Stephanie Johnson](https://www.paloaltonetworks.com/blog/author/stephanie-johnson/?ts=markdown "Posts by Stephanie Johnson") ![Don’t Let Your Users Unknowingly Be the Weak Link in Your Security Infrastructure](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/11/blog-generic-banner-1.jpg) [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) ## [Don't Let Your Users Unknowingly Be the Weak Link in Your Security Infrastr...](https://www.paloaltonetworks.com.au/blog/2017/01/dont-let-users-unknowingly-weak-link-security-infrastructure/) Hackers are becoming increasingly stealthy and creative, relentlessly trying to gain access to sensitive data, while organizations work tirelessly to prevent security breaches and... Jan 04, 2017 By [Stephanie Johnson](https://www.paloaltonetworks.com/blog/author/stephanie-johnson/?ts=markdown "Posts by Stephanie Johnson") [](https://www.paloaltonetworks.com.au/blog/2016/07/palo-alto-networks-news-of-the-week-july-16-2016/) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- July 16, 2016](https://www.paloaltonetworks.com.au/blog/2016/07/palo-alto-networks-news-of-the-week-july-16-2016/) In case you missed it, catch up on all of our top news from this past week right here.Palo Alto Networks researchers discovered two critical Internet Explorer vulnerabilities. Jul 16, 2016 By [Anna Lough](https://www.paloaltonetworks.com/blog/author/anna-lough/?ts=markdown "Posts by Anna Lough") [](https://www.paloaltonetworks.com.au/blog/2016/07/why-user-based-controls-are-critical-to-your-breach-prevention-strategy/) [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown) ## [Why User-Based Controls Are Critical to Your Breach Prevention Strategy](https://www.paloaltonetworks.com.au/blog/2016/07/why-user-based-controls-are-critical-to-your-breach-prevention-strategy/) Employees, customers and partners connect to different repositories of information within your network, as well as to the internet, to perform various aspects of their jobs. These... Jul 13, 2016 By [Navneet Singh](https://www.paloaltonetworks.com/blog/author/navneet-singh/?ts=markdown "Posts by Navneet Singh") [](https://www.paloaltonetworks.com.au/blog/2016/05/tech-docs-how-secure-is-your-internet-gateway/) [Technical Documentation](https://www.paloaltonetworks.com/blog/category/technical-documentation/?ts=markdown) ## [Tech Docs: How Secure is Your Internet Gateway?](https://www.paloaltonetworks.com.au/blog/2016/05/tech-docs-how-secure-is-your-internet-gateway/) One of the cheapest and easiest ways for an attacker to get into to your network is through users accessing the Internet. By successfully exploiting an endpoint, an attacker can take hold in your network and be... May 25, 2016 By [Charissa Fleischer](https://www.paloaltonetworks.com/blog/author/charissa-fleischer/?ts=markdown "Posts by Charissa Fleischer") [](https://www.paloaltonetworks.com.au/blog/2016/03/the-power-of-palo-alto-networks-threat-prevention-across-the-cyberattack-lifecycle/) [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) ## [The Power of Palo Alto Networks Threat Prevention Across the Cyberattack Li...](https://www.paloaltonetworks.com.au/blog/2016/03/the-power-of-palo-alto-networks-threat-prevention-across-the-cyberattack-lifecycle/) I recently shared examples of how App-ID and User-ID can dramatically reduce the attack surface and provide granular controls to allow exactly what tr... Mar 15, 2016 By [Stephen Perciballi](https://www.paloaltonetworks.com/blog/author/stephen-perciballi/?ts=markdown "Posts by Stephen Perciballi") [](https://www.paloaltonetworks.com.au/blog/2016/01/the-power-of-user-id/) [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) ## [The Power of User-ID](https://www.paloaltonetworks.com.au/blog/2016/01/the-power-of-user-id/) Following up on our recent discussion of App-ID as critical for safely enabling applications, here we will cover a related feature: User-ID. Jan 21, 2016 By [Stephen Perciballi](https://www.paloaltonetworks.com/blog/author/stephen-perciballi/?ts=markdown "Posts by Stephen Perciballi") [](https://www.paloaltonetworks.com.au/blog/2015/11/best-practices-for-your-swiss-army-knife/) [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Fuel User Group](https://www.paloaltonetworks.com/blog/category/fuel-user-group/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) ## [Best Practices for Your Swiss Army Knife](https://www.paloaltonetworks.com.au/blog/2015/11/best-practices-for-your-swiss-army-knife/) If you've been to any recent Palo Alto Networks Ignite conferences, you've likely attended sessions led by our Product Management team on best practices for various Palo Alto Netwo... Nov 30, 2015 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www.paloaltonetworks.com.au/blog/2015/07/working-with-panorama-templates/) [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Technical Documentation](https://www.paloaltonetworks.com/blog/category/technical-documentation/?ts=markdown) ## [Working with Panorama Templates](https://www.paloaltonetworks.com.au/blog/2015/07/working-with-panorama-templates/) To use Panorama for managing Palo Alto Networks firewalls, you must add the firewalls as managed devices and then assign them to device groups and templates. Panorama Templates allow you manage the configuration options on the Device and Ne... Jul 03, 2015 By [Charissa Fleischer](https://www.paloaltonetworks.com/blog/author/charissa-fleischer/?ts=markdown "Posts by Charissa Fleischer") [](https://www.paloaltonetworks.com.au/blog/2015/06/byod-makes-you-productive-and-its-also-why-your-nac-deployments-fail/) [Mobility](https://www.paloaltonetworks.com/blog/category/mobility/?ts=markdown) ## [BYOD Makes You Productive, and It's Also Why Your NAC Deployments Fail](https://www.paloaltonetworks.com.au/blog/2015/06/byod-makes-you-productive-and-its-also-why-your-nac-deployments-fail/) Network Access Control (NAC): everyone wants to do it, and the goals for most programs are noble.It goes like this: By ensuring only authorized users and devices connect to the net... Jun 18, 2015 By [Stephen Perciballi](https://www.paloaltonetworks.com/blog/author/stephen-perciballi/?ts=markdown "Posts by Stephen Perciballi") [](https://www.paloaltonetworks.com.au/blog/2015/03/introducing-the-palo-alto-networks-migration-tool-3-0/) [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown) ## [Introducing Palo Alto Networks Migration Tool 3.0](https://www.paloaltonetworks.com.au/blog/2015/03/introducing-the-palo-alto-networks-migration-tool-3-0/) With the increasing frequency of high profile security breaches, it's clear that legacy security solutions are no longer capable of sufficiently protecting your business from aggressive cyber attacks. So if you... Mar 20, 2015 By [Scott Ciccone](https://www.paloaltonetworks.com/blog/author/scott-ciccone/?ts=markdown "Posts by Scott Ciccone") [](https://www.paloaltonetworks.com.au/blog/2014/07/rtfm-like-boss-new-look-technical-documentation/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Technical Documentation](https://www.paloaltonetworks.com/blog/category/technical-documentation/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) ## [RTFM\* Like a Boss---A New Look for Technical Documentation](https://www.paloaltonetworks.com.au/blog/2014/07/rtfm-like-boss-new-look-technical-documentation/) At Palo Alto Networks, we have a passion for innovation! It must show because thousands of customers have chosen our security platforms to protect their enterprise, government, and service provider networks fro... Jul 29, 2014 By [Charissa Fleischer](https://www.paloaltonetworks.com/blog/author/charissa-fleischer/?ts=markdown "Posts by Charissa Fleischer") [](https://www.paloaltonetworks.com.au/blog/2014/04/iec-62443-new-gold-standard-network-segmentation-ics-and-scada-networks/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [SCADA \& ICS](https://www.paloaltonetworks.com/blog/category/scada-ics/?ts=markdown), [Vertical](https://www.paloaltonetworks.com/blog/category/vertical/?ts=markdown) ## [IEC 62443: The New Gold Standard for Network Segmentation in ICS and SCADA ...](https://www.paloaltonetworks.com.au/blog/2014/04/iec-62443-new-gold-standard-network-segmentation-ics-and-scada-networks/) In the past two months, I've attended various conferences, including the Smart Grid and SCADA Cybersecurity event in London, where experts discussed t... Apr 16, 2014 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") Load more blogs ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com.au/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language