Tomorrow's SD-WAN, Powered by ML and Automation
Tomorrow's SD-WAN, Powered by ML and Automation

Simplify management, enable app-defined SD-WAN policies and deliver a secure, cloud-delivered branch today with the Industry’s first next-generation SD-WAN.

Get an overview

Read the report

Report

Palo Alto Networks: A Leader in the 2020 Magic Quadrant® for WAN Edge Infrastructure

See why Gartner named Palo Alto Networks a Leader in the 2020 Magic Quadrant® for WAN Edge Infrastructure


Moving from MPLS to SD-WAN?

Prisma SD-WAN delivers 243% ROI

The Forrester Total Economic Impact (TEI) Spotlight highlights our latest customer results.

Legacy SD-WAN limitations

Ineffective for today’s transforming networks
Legacy vs. Next-Gen SD-WAN

Limited app visibility

Layer 3 packet-based policies limit app visibility and app-based networking policies.

Manual operations

Ineffective scaling and manual intervention increase administrative overhead.

Bolt-on branch products

Requiring multiple point products to achieve both security and connectivity increases costs and complexity.


Industry’s first next-gen SD-WAN

Increase bandwidth, savings and eliminate network trouble tickets.

Next-gen SD-WAN webinar
Learn about AIOPs
  • Increase in bandwidth
    10x
  • Reduction in network trouble tickets
    99%
  • Return on investment
    243%
  • Increase in bandwidth
    10x
  • Reduction in network trouble tickets
    99%
  • Return on investment
    243%

Gartner peer insights customers choice badge


See why we were named a Customers’ Choice in the 2021 Gartner Peer Insights ‘Voice of the Customer': WAN Edge Infrastructure. We are proud to receive the highest overall rating of any vendor, with an overall score of 5.0/5.0.


Read the full report

Router modernization
USE CASES
  • Router modernization

    Upgrade legacy routers to intelligent, lightweight appliances at the branch and enable Zero-Touch Provisioning capabilities to reduce manual, labor-intensive branch provisioning.

  • Unlock cloud-scale savings to reduce WAN costs, and ensure high performance access and industry-leading security.

  • Automate operations using machine learning. Easily integrate security as well as get the visibility and control you need to ensure the best performance and consistent availability of your network.

Cortex XDR tiers


Cortex XDR Prevent

Cortex XDR Pro

Data sources

Get extended visibility

Endpoint


Data sources

Get extended visibility

Endpoint, network, cloud and third-party products


Endpoint protection

Stop malware, exploits and fileless attacks


Endpoint protection

Stop malware, exploits and fileless attacks


Device control

Prevent data loss and USB-based malware infections


Device control

Prevent data loss and USB-based malware infections


Disk encryption

Manage BitLocker or FileVault from the Cortex XDR console


Disk encryption

Manage BitLocker or FileVault from the Cortex XDR console


Host firewall

Reduce the attack surface on Windows and macOS endpoints


Host firewall

Reduce the attack surface on Windows and macOS endpoints


Managed Threat Hunting

Uncover the most complex threats across endpoint and network with Unit 42 experts


Managed Threat Hunting

Uncover the most complex threats across endpoint and network with Unit 42 experts

Optional


Host Insights

Monitor host inventory, find vulnerabilities and sweep across endpoints to eradicate threats


Host Insights

Monitor host inventory, find vulnerabilities and sweep across endpoints to eradicate threats

Optional


Behavioral analytics

Detect emerging attacks with patented analytics and machine learning


Behavioral analytics

Detect emerging attacks with patented analytics and machine learning


Rule-based detection

Find threats with out-of-the-box and custom rules


Rule-based detection

Find threats with out-of-the-box and custom rules


Incident management

Reduce alert fatigue 98% by intelligently grouping alerts

Endpoint alerts


Incident management

Reduce alert fatigue 98% by intelligently grouping alerts

All alert sources


Integrated response

Contain threats with multiple, flexible response options

Endpoint only


Integrated response

Contain threats with multiple, flexible response options

Endpoint, network & cloud


Threat intelligence feed

Enrich investigations with rich context from tens of thousands of customers

Optional


Threat intelligence feed

Enrich investigations with rich context from tens of thousands of customers

Optional


Alert retention

30 days


Alert retention

30 days


XDR data retention


XDR data retention

Endpoint and network, 30 days


Extended data retention

Optional

Extended data retention

Optional