Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. Our innovative security platform with game-changing technology natively brings network, cloud and endpoint security into a common architecture. By doing this we safely enable applications, users and content and deliver visibility, automation and control, as well as the ability to detect and prevent breaches at every stage of the attack lifecycle, so businesses and government agencies can securely and efficiently move their organizations forward. Find out more at www.paloaltonetworks.com.


  • AutoFocus

    Palo Alto Networks® AutoFocus™ threat intelligence service reimagines how security teams protect their organizations from unique, targeted attacks. The hosted security service provides the intelligence, analytics and context required to understand which attacks require immediate response, as well as the ability to make indicators actionable and prevent future attacks. AutoFocus further provides the ability to:

    • Prioritize alerts for advanced attacks that require immediate attention.
    • Understand context around attacks, adversaries and campaigns, including targeted industries.
    • Respond proactively to threats and prevent future attacks.

    AutoFocus Quick Demo
    At A Glance: AutoFocus

  • WildFire

    The WildFire™ cloud-based malware-analysis subscription actively analyzes unknown files and links, including malware, websites, and command and control traffic, and delivers automatically created protections and intelligence back to subscribed customers all over the world for proactive, global prevention.

    WildFire protections are created to account for innovative tactics, such as polymorphism, commonly used in advanced attacks. WildFire is also natively integrated with our newest technologies, Traps™, AutoFocus™, and Aperture, keeping security across your organization both coordinated and up to date.

    Wildfire: Automatically Prevent Highly Evasive Zero-Day Exploits and Malware
    At A Glance: Wildfire

  • GlobalProtect

    GlobalProtect™ mobile security extends the protection of your firewall to endpoints both inside and outside your corporate network, delivering consistent security to users in all locations.

    Mobile devices can use GlobalProtect apps for iOS and Android to connect to the corporate firewall, and you can apply the state of the endpoint device as part of the context for security policy, using the Host Information Profile (HIP). GlobalProtect subscriptions can also be deployed internally to protect local and wireless network users.

    Lightborad Series: Mobile Workforce Security Using GlobalProtect
    GlobalProtect: Prevent Breaches and Secure the Mobile Workforce

  • Aperture

    Aperture extends the visibility and granular control of our security platform into SaaS applications themselves – an area traditionally invisible to IT. Aperture solves this problem by looking into SaaS applications directly, providing full visibility into the day-to-day activities of users and data. Granular controls ensure policy is maintained to eliminate data exposure and threat risks.

    Aperture Demo Video
    At A Glance: Aperture

  • Traps

    Palo Alto Networks Traps replaces traditional antivirus with multi-method prevention, a proprietary combination of purpose-built malware and exploit prevention methods that protect users and endpoints from known and unknown threats. Traps prevents security breaches, in contrast to breach detection and incident response after critical assets have already been compromised.

    Traps Advanced Endpoint Protection:

    • Prevents cyber breaches by preemptively blocking known and unknown malware, exploits and zero-day threats.
    • Protects and enables users to conduct their daily activities and use web-based technologies without concerns for known or unknown cyberthreats.
    • Automates prevention by autonomously reprogramming itself using threat intelligence gained from WildFire.

    Traps: Advanced Endpoint Protection
    Case Study: CAME Group




GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

SEWP Contracts


Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021


Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Maryland Master Contract (COTS)

Project No.: 060B249002, Term: September 30, 2027

NASPO ValuePoint

Term: through September 15, 2026

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2018 (with 2 option renewal years)

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Pennsylvania COSTARS-3 IT Hardware Contract

Contract: COSTARS-003-451 Contract Period: Through July 18, 2018

State of Indiana Contract

Contract Number: 0000000000000000000021430 Contract Period: August 1, 2017 – July 31, 2019

State of New Mexico Contract

Contract Number: 80-000-18-00002 Contract Period: August 1, 2017 – August 1, 2021


Contract Number: UVA1482501 Contract Term: May 2, 2014– December 19, 2021

VITA Contract

Term: through March 31, 2018


Public Sector Events

Upcoming Events

March 27, 2018 at 8:00 AM PT
April 05, 2018 at 2:00 PM ET
May 03, 2018 at 2:00 PM ET
May 31, 2018 at 2:00 PM ET
June 28, 2018 at 2:00 PM ET

Archived Events


Latest News

Carahsoft Technology Corp., the trusted government IT solutions provider, today announced that it has been recognized by Palo Alto Networks® as a federal sector distributor.



VMware® and Palo Alto Networks® have partnered on a solution that leverages NSX® to enable the VM-Series to be transparently inserted into SDDC environments, allowing you to protect your applications and data with the Next-Generation Firewall and advanced threat prevention.

The AutoFocus threat intelligence service enables security teams to prioritize their response to unique, targeted attacks. Gain the intelligence, analytics and context needed to protect your organization. View the At-a-Glance for a high-level view into the AutoFocus service and key use cases.

Solutions Brief

Higher education institutions must balance academic openness with protecting the personal information and intellectual property of staff and students. It's another balancing act to maintain continuous, high-bandwidth access to resources while blocking threats and intrusions that could damage the ins...

The advent of the mobile workforce has dissolved traditional enterprise network boundaries. Users today expect to access their corporate networks from personally- and enterprise-owned mobile devices used at locations both inside and outside the corporate walls. While the corporate workforce is incre...


View Aperture's security abilities such as connecting cloud apps to Aperture and creating granular policies.


Great thinkers like Aristotle, Descartes and Elon Musk have said that, in order to solve really hard problems, you have to get back to first principles. First principles in a designated problem space are so fundamental as to be self-evident; so true that no expert in the field can argue against them...

Commercial boards and senior government officials may be the only groups capable of kick-starting this new and absolutely necessary direction in the evolution of cybersecurity. The network defenders that you have hired to defend your electronic assets are locked into a set of best practices develope...

Next-Generation Security for the Public Cloud - An insatiable appetite for compute and storage resources, combined with cloud-first development initiatives to support your business, is driving a data center transformation that seamlessly integrates the public cloud with your existing data center as ...

This white paper gives an overview of the Palo Alto Networks® Next-Generation Security Platform, and describes in detail how the platform, in combination with select technology and delivery partners, supports all three CDM phases and enables agencies to achieve the security objectives of the progra...

To serve their citizens, federal/national, state and local governments must gather, create or process sensitive information. As various high-profile breaches have demonstrated, this data is not sufficiently protected, particularly from the insiders whose actions are responsible for the majority of p...