Simplify management, enable app-defined SD-WAN policies and deliver a secure, cloud-delivered branch today with the Industry’s first next-generation SD-WAN.
Get an overviewLayer 3 packet-based policies limit app visibility and app-based networking policies.
Ineffective scaling and manual intervention increase administrative overhead.
Requiring multiple point products to achieve both security and connectivity increases costs and complexity.
Palo Alto Networks Prisma SD-WAN (formerly CloudGenix SD-WAN) is the industry’s first next-generation SD-WAN solution that enables the cloud-delivered branch.
See a demoTake advantage of deep application visibility and intelligent Layer 7 network policies.
Automate operations and problem avoidance using machine learning and data science.
Reduce costs for cloud-delivered branch security and networking.
![]() Cortex XDR Prevent |
![]() Cortex XDR Pro |
---|---|
Data sourcesGet extended visibility |
Data sourcesGet extended visibility |
Endpoint protectionStop malware, exploits and fileless attacks |
Endpoint protectionStop malware, exploits and fileless attacks |
Device controlPrevent data loss and USB-based malware infections |
Device controlPrevent data loss and USB-based malware infections |
Disk encryptionManage BitLocker or FileVault from the Cortex XDR console |
Disk encryptionManage BitLocker or FileVault from the Cortex XDR console |
Host firewallReduce the attack surface on Windows and macOS endpoints |
Host firewallReduce the attack surface on Windows and macOS endpoints |
Managed Threat HuntingUncover the most complex threats across endpoint and network with Unit 42 experts |
Managed Threat HuntingUncover the most complex threats across endpoint and network with
Unit 42 experts |
Host InsightsMonitor host inventory, find vulnerabilities and sweep across endpoints to eradicate threats |
Host InsightsMonitor host inventory, find vulnerabilities and sweep across
endpoints to eradicate threats |
Behavioral analyticsDetect emerging attacks with patented analytics and machine learning |
Behavioral analyticsDetect emerging attacks with patented analytics and machine learning |
Rule-based detectionFind threats with out-of-the-box and custom rules |
Rule-based detectionFind threats with out-of-the-box and custom rules |
Incident managementReduce alert fatigue 98% by intelligently grouping
alerts |
Incident managementReduce alert fatigue 98% by intelligently grouping
alerts |
Integrated responseContain threats with multiple, flexible response
options |
Integrated responseContain threats with multiple, flexible response
options |
Threat intelligence feedEnrich investigations with rich context from tens of thousands of
customers |
Threat intelligence feedEnrich investigations with rich context from tens of thousands of
customers |
Alert retention30 days |
Alert retention30 days |
XDR data retention |
XDR data retentionEndpoint and network, 30 days |
Extended data retentionOptional |
Extended data retentionOptional |
Your seat is reserved in the Investigation and Threat Hunting Virtual Hands on wordkshop. Please check your email for your confirmation.