Palo Alto Networks and FedRAMP Authorization

Build your agency’s cybersecurity foundation with end-to-end FedRAMP High Authorized services.

FedRAMP Authorized across network, cloud and security operations

Palo Alto Networks delivers the most comprehensive suite of AI-powered cybersecurity solutions authorized for use in federal networks at the Moderate and High Impact level. With 20+ FedRAMP Authorized solutions across network, cloud and security operations, this achievement highlights our commitment to providing top-tier cybersecurity tailored to government agencies and organizations. Experience the highest standards of security. Discover how our FedRAMP Authorized solutions can strengthen your organization’s cybersecurity and ensure compliance.

Last Updated:11/Jun/2025

FedRAMP
Moderate
FedRAMP
High
Prisma Cloud

Other

FedRAMP
Moderate
FedRAMP
High
For general FedRAMP Compliance questions, please reach out to fedramp@paloaltonetworks.com. For product features and sales inquiries contact fedrampsales@paloaltonetworks.com. Please visit the FedRAMP Marketplace to learn more about our Palo Alto Networks authorized cloud offerings:

GCS-Moderate
GCS-High

Cortex XDR tiers


Cortex XDR Prevent

Cortex XDR Pro

Data sources

Get extended visibility

Endpoint


Data sources

Get extended visibility

Endpoint, network, cloud and third-party products


Endpoint protection

Stop malware, exploits and fileless attacks


Endpoint protection

Stop malware, exploits and fileless attacks


Device control

Prevent data loss and USB-based malware infections


Device control

Prevent data loss and USB-based malware infections


Disk encryption

Manage BitLocker or FileVault from the Cortex XDR console


Disk encryption

Manage BitLocker or FileVault from the Cortex XDR console


Host firewall

Reduce the attack surface on Windows and macOS endpoints


Host firewall

Reduce the attack surface on Windows and macOS endpoints


Managed Threat Hunting

Uncover the most complex threats across endpoint and network with Unit 42 experts


Managed Threat Hunting

Uncover the most complex threats across endpoint and network with Unit 42 experts

Optional


Host Insights

Monitor host inventory, find vulnerabilities and sweep across endpoints to eradicate threats


Host Insights

Monitor host inventory, find vulnerabilities and sweep across endpoints to eradicate threats

Optional


Behavioral analytics

Detect emerging attacks with patented analytics and machine learning


Behavioral analytics

Detect emerging attacks with patented analytics and machine learning


Rule-based detection

Find threats with out-of-the-box and custom rules


Rule-based detection

Find threats with out-of-the-box and custom rules


Incident management

Reduce alert fatigue 98% by intelligently grouping alerts

Endpoint alerts


Incident management

Reduce alert fatigue 98% by intelligently grouping alerts

All alert sources


Integrated response

Contain threats with multiple, flexible response options

Endpoint only


Integrated response

Contain threats with multiple, flexible response options

Endpoint, network & cloud


Threat intelligence feed

Enrich investigations with rich context from tens of thousands of customers

Optional


Threat intelligence feed

Enrich investigations with rich context from tens of thousands of customers

Optional


Alert retention

30 days


Alert retention

30 days


XDR data retention


XDR data retention

Endpoint and network, 30 days


Extended data retention

Optional

Extended data retention

Optional