Starting in 2011, Gartner began listing Palo Alto Networks as a leader in the Magic Quadrant for Network Firewalls.[14][better source needed]
The company debuted on the NYSE on July 20, 2012, raising $260 million with its initial public offering, which was the 4th-largest tech IPO of 2012.[15][16][17] It remained on the NYSE until October 2021 when the company transferred its listing to Nasdaq.[18][19]
In 2014, Palo Alto Networks founded the Cyber Threat Alliance with Fortinet, McAfee, and NortonLifeLock, a not-for-profit organization with the goal of improving cybersecurity "for the greater good" by encouraging cybersecurity organizations to collaborate by sharing cyber threat intelligence among members.[20][21] By 2018, the organization had 20 members including Cisco, Check Point, Juniper Networks, and Sophos.[22]
In 2018, the company began opening cybersecurity training facilities around the world as part of the Global Cyber Range Initiative.[25]
In May 2018, the company announced Application Framework, an open cloud-delivered ecosystem where developers can publish security services as SaaS applications that can be instantly delivered to customers.[2]
In 2019, the company announced the K2-Series, a 5G-ready next-generation firewall developed for service providers with 5G and IoT requirements.[26][better source needed] In February 2019, the company announced Cortex, an AI-based continuous security platform.[27] In 2022, the company was also listed in the Gartner Magic Quadrant for Network Firewalls, also marking the 11th consecutive year of the company being listed.[28]
Palo Alto Networks offers an enterprise cybersecurity platform that provides network security, cloud security, endpoint protection, and various cloud-delivered security. Components of the security platform listed on the Palo Alto Networks website include:[53]
Next-generation firewalls, running PAN-OS,[54] offered in multiple forms including:[55]
As a physical appliance through the PA series, which includes small form-factor firewalls such as the PA-220 for small businesses and offices, to the PA-7000 series built for large enterprises and service providers.
As a streamlined cloud service provided by Palo Alto Networks through GlobalProtect Cloud Service.
Panorama, a network security control center that allows customers to manage a fleet of firewalls at an enterprise scale from a single console.[56]
Traps, advanced endpoint protection. Unlike traditional antivirus, Traps does not rely on signatures to detect malware. Instead, it focuses on analyzing the behavior of programs to detect zero-day exploits. Threat intelligence is shared with and obtained from Wildfire.[57]
In 2019, Palo Alto Networks reorganized its SaaS offerings under the Cortex branding.[59]
Cortex Data Lake – Cortex data lake is a cloud-delivered log aggregation service for Palo Alto Networks devices located in on-premise networks, directly from endpoints, or cloud-based products such as Prisma Access. This data lake information is then fed into the Hub apps that provide analysis, response, and other added services.[60]
Hub – Hub is an open cloud-delivered ecosystem where customers can subscribe to security applications developed by 3rd-party developers or Palo Alto Networks. Some applications from Palo Alto Networks such as XDR (analytics) and Auto Focus (threat intelligence) are Cortex-branded apps on Hub.[61]
Cortex XDR – XDR is the primary tool for data analysis from Palo Alto Networks that leverages modern threat detection and response capabilities on the centralized data collected in the Cortex Data Lake.[62]
AutoFocus – This service provides threat intelligence to enhance the analytic capabilities of the hub applications as an external source of relevant security information.
Cortex XSOAR – Integrating its acquisition of Demisto into the Cortex cloud suite, XSOAR is the Security Orchestration And Response component responsible for automation and integration with other security and network systems for the automation of incident response and intelligence gathering processes.
Prisma Access – Prisma Access is the Palo Alto Networks offering for moving the enterprise network monitoring and analysis functions into the cloud. It is the most comprehensive SASE solution of its kind, secures access, protects users and applications, and controls data for remote users and locations.
Prisma Cloud – Prisma Cloud secures any cloud environment and all compute form factors used to build and run cloud-native applications, including multi- and hybrid-clouds environments. It addresses the majority of cloud security use cases a customer might have, such as cloud and data security posture, containers, serverless function, and code scanning. It is Palo Alto Networks' cloud-native security solution that integrates with DevOpscontinuous integration and continuous development (CI/CD) processes for a more holistic control of the security life-cycle of cloud assets.[63][64]
Threat researchedit
Unit 42 is the Palo Alto Networks threat intelligence and security consulting team. They are a group of cybersecurity researchers and industry experts who use data collected by the company's security platform to discover new cyber threats, such as new forms of malware and malicious actors operating across the world.[65] The group runs a popular blog where they post technical reports analyzing active threats and adversaries.[66] Multiple Unit 42 researchers have been named in the MSRC Top 100, Microsoft's annual ranking of top 100 security researchers.[67] In April 2020, the business unit consisting of Crypsis Group which provided digital forensics, incident response, risk assessment, and other consulting services merged with the Unit 42 threat intelligence team.[68]
According to the FBI, Palo Alto Networks Unit 42 has helped solve multiple cybercrime cases, such as the Mirai Botnet and Clickfraud Botnet cases,[69] the LuminosityLink RAT case,[70][71] and assisted with "Operation Wire-Wire".[72]
In 2018, Unit 42 discovered Gorgon, a hacking group believed to be operating out of Pakistan and targeting government organizations in the United Kingdom, Spain, Russia, and the United States. The group was detected sending spear-phishing emails attached to infected Microsoft Word documents using an exploit commonly used by cybercriminals and cyber-espionage campaigns.[73]
In September 2018, Unit 42 discovered Xbash, a ransomware that also performs cryptomining, believed to be tied to the Chinese threat actor "Iron". Xbash is able to propagate like a worm and deletes databases stored on victim hosts.[74] In October, Unit 42 warned of a new crypto mining malware, XMRig, that comes bundled with infected Adobe Flash updates. The malware uses the victim's computer's resources to mine Monero cryptocurrency.[75]
^"Palo Alto Networks". World Economic Forum. Archived from the original on 2022-03-21. Retrieved 2023-05-26.
^"Forbes Releases Digital 100". forbes.com. 2018-06-02. Retrieved 2018-11-27.
^"What to Expect of Google and Softbank Star Nikesh Arora, Palo Alto Network's New CEO". fortune.com. 2018-06-02. Retrieved 2018-09-15.
^Blacharski, Dan (2010-04-05). "How I Got Here: Nir Zuk, CTO, Palo Alto Networks". ITworld. Retrieved 2018-03-11.
^Leyden, John (22 October 2010). "US and UK gov cyber defences = big boys' trough-slurp". The Register. Retrieved 8 September 2014.
^"Palo Alto Networks Recognized as a Leader in Gartner Magic Quadrant for Enterprise Network Firewalls Seven Times in a Row". PR Newswire. 8 October 2018. Retrieved 27 November 2018.
^Savitz, Eric (20 July 2012). "Kayak, Palo Alto Networks IPOs Off To Strong Debuts". Forbes. Retrieved 8 September 2014.
^Owens, Jeremy (20 July 2012). "Palo Alto Networks stunning IPO a good sign for some tech niches". Mercury News. Retrieved October 3, 2018.
^"The 10 largest tech IPOs of 2012". VentureBeat. 31 December 2012. Retrieved 26 October 2018.
^"EDGAR Filing Documents for 0001193125-21-296438". www.sec.gov. Retrieved 2024-03-10.
^"Palo Alto Networks to Transfer Stock Exchange Listing to Nasdaq" (Press release). PR Newswire. October 12, 2021.
^Albanesius, Chloe (February 13, 2015). "Obama Wants Tech Firms to Alert Feds to Cyber Threats". PC Magazine. Retrieved March 13, 2015.
^"Who We Are - Cyber Threat Alliance". Retrieved October 3, 2018.
^"Membership - Cyber Threat Alliance". Retrieved October 3, 2018.
^"Palo Alto Networks". 2019. Retrieved March 9, 2019.
^"Palo Alto Networks Announces Availability of New Cloud-Based Logging Service". markets.businessinsider. 2017-09-27. Retrieved 2018-03-11.
^Aasha Bodhani, ITP Net. "Palo Alto Networks introduces global Cyber Range initiative." Jan 16, 2018. Retrieved Feb 6, 2018.
^"Palo Alto Networks Introduces Fastest-Ever Next-Generation Firewall and Integrated Cloud-Based DNS Security Service to Stop Attacks". PR Newswire. 2019-02-12. Retrieved 2019-03-09.
^"Edited Transcript of PANW earnings conference call or presentation 26-Feb-19 9:30pm GMT". 26 February 2019. Archived from the original on 12 June 2019. Retrieved March 9, 2019.
^Rao, Leena (6 January 2014). "Palo Alto Networks Buys Cyber Security Startup Founded By Former NSA Engineers, Morta". TechCrunch. Retrieved 8 September 2014.
^"Palo Alto Networks® Acquires Morta Security". Palo Alto Networks. 6 January 2014. Retrieved 8 September 2014.
^Rao, Leena (24 March 2014). "Palo Alto Networks Buys Cyber Security Company Cyvera For $200M". TechCrunch. Retrieved 8 September 2014.
^"Palo Alto Networks® Completes Acquisition of Cyvera". Palo Alto Networks. 10 April 2014. Retrieved 8 September 2014.
^King, Rachel (27 May 2015). "Palo Alto Networks acquires cybersecurity company CirroSecure". Zdnet. Retrieved 27 May 2015.
^"Prisma Cloud Shifts Left With Proposed Acquisition of Bridgecrew". 2021-02-16. Retrieved 2021-02-16.
^Lunden, Ingrid (2022-11-17). "Sources: Palo Alto Networks is buying Cider Security for up to $300M". TechCrunch.
^Ingrid Lunden (October 31, 2023). "Confirmed: Palo Alto Networks buys Dig Security, sources say for $400M". Tech Crunch. Retrieved November 2, 2023.
^Maria Deutscher (October 31, 2023). "Palo Alto Networks acquires Dig Security for reported $400M". Silicon Angle. Retrieved November 2, 2023.
^Gately, Edward (6 November 2023). "Palo Alto Networks Acquiring Talon Cyber Security in Reported $625 Million Deal". Channel Futures. Retrieved 22 November 2023.
^"Palo Alto Networks completes acquisition of Dig Security". Security Info Watch. 2023-12-05. Retrieved 2023-12-14.
^"Security Operating Platform - Palo Alto Networks". 2018. Archived from the original on June 16, 2019. Retrieved September 13, 2018.
^"Panorama - Palo Alto Networks". 2018. Retrieved September 13, 2018.
^"Traps - Advanced Endpoint Protection - Palo Alto Networks". 2018. Archived from the original on September 14, 2018. Retrieved September 13, 2018.
^"Wildfire Malware Analysis - Palo Alto Networks". 2018. Archived from the original on September 15, 2018. Retrieved September 14, 2018.
^"Palo Alto Networks Introduces Cortex, the Industry's Only Open and Integrated, AI-Based Continuous Security Platform". www.prnewswire.com (Press release). Retrieved 2020-10-10.
^"About Cortex Data Lake". docs.paloaltonetworks.com. Retrieved 2020-10-10.
^"What is a Cloud-Native Security Platform (CNSP)?". Palo Alto Networks. Retrieved 2020-10-10.
^"Unit 42 FAQs". 2018. Retrieved November 28, 2018.
^"Unit 42 Archives". 2018. Retrieved November 28, 2018.
^"Four Unit 42 Vulnerability Researchers Make MSRC Top 100 for 2018". Unit 42. 16 August 2018. Retrieved November 28, 2018.
^Whitmore, Wendi (2021-04-20). "Unit 42 and Crypsis Combine to Offer Threat Intel, Incident Response". Palo Alto Networks Blog. Retrieved 2021-07-19.
^"Hackers' Cooperation with FBI Leads to Substantial Assistance in Other Complex Cybercrime Investigations". U.S. Attorney's Office, District of Alaska. U.S. Department of Justice. 18 September 2018. Retrieved 28 November 2018.
^Osborne, Charlie (17 October 2018). "Creator of remote access tool LuminosityLink sent behind bars". ZDNET. Retrieved 28 November 2018.
^"Stanford Man Sentenced to 30 Months for Computer Intrusion Crimes". U.S. Attorney's Office, Eastern District of Kentucky. U.S. Department of Justice. 15 October 2018. Retrieved 28 November 2018.
^"Business E-Mail Compromise (BEC) Task Force in Los Angeles Announces Local Arrests as the Department of Justice Announces the Results of "Operation Wire-Wire" Including 74 Charged in Bec Schemes Internationally". 11 June 2018. Retrieved 28 November 2018.
^"Hacking group combines spear-phishing with mass malware campaign". 2 August 2018. Retrieved 28 November 2018.
^"Chinese-speaking cybercrime group launches destructive malware family". 18 September 2018. Retrieved 28 November 2018.
^"Hack Brief: Fake Adobe Flash Installers Come With A Little Malware Bonus". 12 October 2018. Retrieved 28 November 2018.
^"Russian hacking tool gets extra stealthy to target US, European computers". 20 October 2018. Retrieved 28 November 2018.
^"Russia's Elite Hackers May Have New Phishing Tricks". 20 October 2018. Retrieved 28 November 2018.
^"Sofacy Continues Global Attacks and Wheels Out New 'Cannon' Trojan". 20 October 2018. Retrieved 28 November 2018.