![]() | |
![]() Headquarters in Santa Clara, California | |
Type | Public company |
---|---|
| |
Industry | Network security Cybersecurity[1] Cloud Computing[2] |
Founded | 2005 |
Founder | Nir Zuk |
Headquarters | , U.S. |
Area served | Worldwide |
Key people | Nikesh Arora (CEO) |
Products | PA 220, 4x0, 8x0, 32x0, 34x0, 54x0, 70x0, VM, CN firewall series[3] Prisma SASE[4] Prisma Cloud, Cortex XDR, Cortex Xpanse, Cortex XSOAR, Cortex XSIAM |
Revenue | ![]() |
![]() | |
![]() | |
Total assets | ![]() |
Total equity | ![]() |
Number of employees | 12,561 (July 2022)[5] |
Website | paloaltonetworks |
Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters in Santa Clara, California. The core product is a platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security. The company serves over 70,000 organizations in over 150 countries, including 85 of the Fortune 100.[6] It is home to the Unit 42 threat research team[7] and hosts the Ignite cybersecurity conference.[8] It is a partner organization of the World Economic Forum.[9]
In 2018, Palo Alto Networks was listed 8th in the Forbes Digital 100.[10] In June 2018, former Google and SoftBank executive Nikesh Arora joined the company as Chairman and CEO.[11]
Palo Alto Networks was founded in 2005 by Israeli-American Nir Zuk,[12] a former engineer from Check Point and NetScreen Technologies, and was the principal developer of the first stateful inspection firewall and the first intrusion prevention system.[13] Zuk created Palo Alto Networks with the intention of solving problems enterprises faced with existing network security solutions, namely: the inability to allow employees to use modern applications safely, which entailed developing a firewall capable of identifying and providing fine-grained control of applications.[14]
In 2007, the company produced and shipped its first product, an enterprise firewall.[15] In 2009, Gartner released a publication defining a next-generation firewall.[16] In contrast to traditional firewalls, which at the time relied on simple rules such as port numbers and protocol to block traffic, the authors stated that next-generation firewalls should operate on and inspect all layers of the network stack and be intelligent enough to block threats independently of port numbers or protocols used. In particular, the publication defined this next-generation firewall as containing (in addition to the full capabilities of both traditional firewalls and intrusion prevention systems): Support for in-line deployment without disrupting network operations, application awareness, and full stack visibility allowing for fine-grained detection and control of applications, extra-firewall intelligence, and upgrade paths.
Starting in 2011, Gartner began listing Palo Alto Networks as a leader on its enterprise firewall, Magic Quadrant.[17] In 2019, they were named a leader in the Gartner Magic Quadrant for Network Firewalls for the 8th year in a row.[18] The company debuted on the NYSE on July 20, 2012, raising $260 million with its initial public offering, which was the 4th-largest tech IPO of 2012.[19][20][21] It remained on the NYSE until October 2021 when the company transferred its listing to Nasdaq.[22]
In 2014, Palo Alto Networks founded the Cyber Threat Alliance with Fortinet, McAfee, and NortonLifeLock (formerly known as Symantec), a not-for-profit organization with the goal of improving cybersecurity "for the greater good" by encouraging collaboration between cybersecurity organizations by sharing cyber threat intelligence amongst members.[23][24] By 2018, the organization had 20 members including Cisco, Check Point, Juniper Networks, and Sophos.[25]
The company expanded over the years, offering a wide selection of enterprise cybersecurity services beyond its original next-generation firewall offering, such as Traps endpoint protection and Wildfire malware prevention.[26] In 2017, Palo Alto Networks announced Logging Service, a cloud-based service allowing customers to amass their own data for machine learning and data analytics.[27]
In 2018, the company began opening dedicated cybersecurity training facilities around the world as part of the Global Cyber Range Initiative.[28]
In May 2018, the company announced Application Framework, an open cloud-delivered ecosystem where developers can publish security services as SaaS applications that can be instantly delivered to the company's network of customers.[2]
In 2018, several high-profile tech executives joined Palo Alto Networks. In June 2018, former Google Chief Business Officer and SoftBank President Nikesh Arora joined the company as chairman and CEO.[11] His predecessor, Mark McLaughlin, became vice chairman of the board of directors. Arora received a pay package worth about $128 million, making him one of the highest-paid executives in the United States.[29] In September 2018 Liane Hornsey, formerly Chief People Officer at Uber, joined Palo Alto Networks as Chief People Officer.[30] In October 2018, Amit Singh, formerly President of Google Cloud, succeeded Mark Anderson as President of Palo Alto Networks.[31] In August 2021, William (BJ) Jenkins succeeded Singh as president, with Singh assuming the role of Chief Business Officer.[32]
In 2019, the company announced the K2-Series, a 5G-ready next-generation firewall developed for service providers with 5G and IoT requirements.[33] In February 2019, the company announced Cortex, an AI-based continuous security platform. CEO Nikesh Arora described Cortex as an "Application Framework 2.0".[34]
Palo Alto Networks offers an enterprise cybersecurity platform that provides network security, cloud security, endpoint protection, and various cloud-delivered security. Components of the security platform listed on the Palo Alto Networks website include:[56]
In 2019, Palo Alto Networks reorganized its SaaS offerings under the Cortex branding.[62]
Unit 42 is the Palo Alto Networks threat intelligence and security consulting team. They are a group of cybersecurity researchers and industry experts who use data collected by the company's security platform to discover new cyber threats, such as new forms of malware and malicious actors operating across the world.[68] The group runs a popular blog where they post technical reports analyzing active threats and adversaries.[69] Multiple Unit 42 researchers have been named in the MSRC Top 100, Microsoft's annual ranking of top 100 security researchers.[70] In April 2020, the business unit consisting of Crypsis Group which provided digital forensics, incident response, risk assessment, and other consulting services merged with the Unit 42 threat intelligence team.[71]
According to the FBI, Palo Alto Networks Unit 42 has helped solve multiple cybercrime cases, such as the Mirai Botnet and Clickfraud Botnet cases,[72] the LuminosityLink RAT case,[73][74] and assisted with "Operation Wire-Wire".[75]
In 2018, Unit 42 discovered Gorgon, a hacking group believed to be operating out of Pakistan and targeting government organizations in the United Kingdom, Spain, Russia, and the United States. The group was detected sending spear-phishing emails attached to infected Microsoft Word documents using an exploit commonly used by cybercriminals and cyber-espionage campaigns.[76]
In September 2018, Unit 42 discovered Xbash, a ransomware that also performs cryptomining, believed to be tied to the Chinese threat actor "Iron". Xbash is able to propagate like a worm and deletes databases stored on victim hosts.[77] In October, Unit 42 warned of a new crypto mining malware, XMRig, that comes bundled with infected Adobe Flash updates. The malware uses the victim's computer's resources to mine Monero cryptocurrency.[78]
In November 2018, Palo Alto Networks announced the discovery of "Cannon," a trojan being used to target United States and European government entities.[79][80] The hackers behind the malware are believed to be Fancy Bear, the Russian hacking group believed to be responsible for hacking the Democratic National Committee in 2016. The malware communicates with its command and control server with email and uses encryption to evade detection.[81]