{"id":22491,"date":"2022-12-10T16:38:16","date_gmt":"2022-12-10T16:38:16","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/"},"modified":"2022-12-10T16:38:16","modified_gmt":"2022-12-10T16:38:16","slug":"how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/","title":{"rendered":"How Palo Alto Networks became the gold standard of cybersecurity &#8211; and what it has to do to stay on top"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div>\n<p>Palo Alto Networks Inc. has earned a reputation as the leader in security. You can measure this in revenue, market cap, execution and, most importantly, conversations with chief information security officers.<\/p>\n<p>The company is on track to double its revenue to nearly $7 billion in fiscal year 2023 from 2020. That\u2019s despite macro headwinds that will likely continue through next year. Palo Alto owes its position to a clarity of vision and strong execution of a total available market expansion strategy bolstered by key acquisitions and integrations into its cloud and software-as-a-service offerings.<\/p>\n<p>In this Breaking Analysis, and ahead of Palo Alto Ignite, we bring you the next chapter on top of\u00a0<a href=\"https:\/\/wikibon.com\/breaking-analysis-cyber-firms-revert-to-the-mean\/\">last week\u2019s cybersecurity update<\/a>. We\u2019ll dig into the Enterprise Technology Research spending data on Palo Alto Networks, provide a glimpse of what to look for at Ignite, and posit what Palo Alto needs to do to stay on top of the hill.<\/p>\n<h3>The problem is clear<\/h3>\n<p>The challenges for cybersecurity professionals are dead simple to understand. Solving them is not so easy.<\/p>\n<p><a href=\"https:\/\/www.optiv.com\/sites\/default\/files\/images\/Cybersecurity-Technology-Map-Web-min.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-303296 aligncenter\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top.jpg\" data-sizes=\"auto, (max-width: 1706px) 100vw, 1706px\" data-srcset=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top.jpg 1706w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-300x169.jpg 300w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-768x432.jpg 768w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-1024x576.jpg 1024w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-610x343.jpg 610w\" alt=\"\" width=\"1706\" height=\"959\"\/><\/a><\/p>\n<p>The taxonomic eye test above from Optiv is one of our favorite artifacts to make the point. The cybersecurity landscape is a mosaic of stovepipes. Security professionals have to work with dozens of tools, many legacy, combined with shiny new toys to try to keep up with the relentless pace of innovation, catalyzed by incredibly capable, well-funded and motivated adversaries.<\/p>\n<p>Cybersecurity is an anomalous market in that the leaders have low single-digit market shares. Think about that.\u00a0Cisco Systems Inc. at one point held 60% market share in networking and it\u2019s still deep into the 40s. Oracle Corp. captures around 30% of database market revenue. EMC Corp. at its peak had more than 30% of the storage market. Dell Technologies Inc.\u2019s personal computer unit market share is in the high 20s. From a market share standpoint, cybersecurity is even more fragmented than the software market.<\/p>\n<p>The point is, despite its position as the #No. 1 player, Palo Alto has maybe 3% to 4% of the total security market, depending on your denominator. Regardless, the leader has only a tiny slice.<\/p>\n<h3>Why is Palo Alto considered the leader?<\/h3>\n<p>This CISO\u2019s comments from a recent ETR roundtable discussion with our friend Erik Bradley sums up Palo Alto\u2019s allure pretty well in our opinion.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-303297 aligncenter\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-1.jpg\" data-sizes=\"auto, (max-width: 1706px) 100vw, 1706px\" data-srcset=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-1.jpg 1706w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-1-300x169.jpg 300w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-1-768x432.jpg 768w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-1-1024x576.jpg 1024w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-1-610x343.jpg 610w\" alt=\"\" width=\"1706\" height=\"959\"\/><\/p>\n<h4>Why Palo Alto Networks?<\/h4>\n<blockquote>\n<p>Because of its completeness as a platform. Its ability to integrate with its own products\u2026 or they acquire, integrate, then rebrand them as their own. We\u2019d looked at other vendors. We just didn\u2019t think they were as mature. We had already implemented some of the Palo Alto tools, the firewalls and stuff. We thought, Why not go holistically with a vendor, a single throat to choke if you will if stuff goes wrong? And I think that that was probably the primary driver and familiarity with the tools and the resources that they provided.\u00a0\u2013 <em>CISO in a recent ETR roundtable<\/em><\/p>\n<\/blockquote>\n<h4>The push to consolidate redundant vendors<\/h4>\n<p>Here\u2019s another stat from ETR\u2019s Erik Bradley. He gave us a glimpse of the January survey. The percentage of information technology buyers stating they plan to consolidate redundant vendors went from 34% in the October survey and now stands at 44%. So we feel this bodes well for consolidators such as Palo Alto Networks. Same for Microsoft Corp.\u2019s \u201cgood enough\u201d approach. It should also be true for CrowdStrike Holdings Inc., although last quarter we saw softness in their small and medium-sized business market, whereas MongoDB Inc. actually saw consistent strength from SMB, so that\u2019s something we\u2019re watching closely.<\/p>\n<h3>Palo Alto\u2019s stock has fared better than its peers<\/h3>\n<p>Although all growth stocks have been hit hard over the past year, Palo Alto Networks has held up better than most security players.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-303298 aligncenter\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-2.jpg\" data-sizes=\"auto, (max-width: 1706px) 100vw, 1706px\" data-srcset=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-2.jpg 1706w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-2-300x169.jpg 300w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-2-768x432.jpg 768w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-2-1024x576.jpg 1024w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-2-610x343.jpg 610w\" alt=\"\" width=\"1706\" height=\"959\"\/><\/p>\n<p>The chart above gives you a sense of how well. It\u2019s a one-year comparison of Palo Alto with the BUG ETF, CrowdStrike, Zscaler Inc. and Okta Inc. Now remember that Palo Alto didn\u2019t run up as much as CRWD, ZS and OKTA during the pandemic, but you can see it\u2019s now down \u201conly\u201d 9% for the year. The cyber basket ETF is off 27%, roughly in line with the Nasdaq (not shown). CrowdStrike is down 44%, Zscaler is down 61% and Okta is off 72% in the last year.<\/p>\n<p>As we\u2019ve indicated, Palo Alto is making a strong case for consolidating point tools. We think it will have a much harder time getting customers\u00a0to switch off platforms such as Cisco, another leader in network security. But based on the fragmentation in the market, there\u2019s plenty of room to grow in our view.<\/p>\n<h4>How the traders see it<\/h4>\n<p>We asked Breaking Analysis contributor Chip Symington for his take on the technicals of the stock and he said the following:<\/p>\n<blockquote>\n<p>Despite Palo Alto\u2019s leadership position, fundamentals\u00a0don\u2019t seem to make much difference these days. It\u2019s all about interest rates.\u00a0Even though this name has performed better than its peers, it looks like this stock wants to keep testing its 52-week lows.<\/p>\n<\/blockquote>\n<p>But he thinks the Palo Alto got oversold during the last big selloff, and the fact that the company\u2019s free cash flow is so strong probably keeps it at the 150 level or above. If it breaks that to the downside, its next test is around the 140 level, according to Symington.<\/p>\n<h3>Palo Alto\u2019s opinionated point of view<\/h3>\n<p>As we said earlier, Palo Alto has strong convictions. Its founder and Chief Technology Officer Nir Zuk is extremely clear on his view of the market and sets the tone for the company\u2019s strategy.\u00a0Below we take a look at how Palo Alto got to where it is today and how we should think about its future.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-303300 aligncenter\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-3.jpg\" data-sizes=\"auto, (max-width: 1706px) 100vw, 1706px\" data-srcset=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-3.jpg 1706w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-3-300x169.jpg 300w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-3-768x432.jpg 768w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-3-1024x576.jpg 1024w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-3-610x343.jpg 610w\" alt=\"\" width=\"1706\" height=\"959\"\/><\/p>\n<p>The company was founded about 18 years ago as a network security company focused on firewalls. What Palo Alto did was different.\u00a0It didn\u2019t try to stuff too much functionality inside of a box. Rather, it layered network security functions on top of its firewalls and delivered value as a service through software \u2013 running at the time in its own cloud and now heavily leaning into public clouds. A pretty obvious move today but forward-thinking for the time.<\/p>\n<p>Palo Alto has invested in building a true cloud native platform. In February 2020, right before the pandemic, we reported on the\u00a0<a href=\"https:\/\/wikibon.com\/breaking-analysis-cyber-security-update-rsa-2020\/\">divergence in market values between Palo Alto and Fortinet Inc.<\/a>\u00a0and cited some challenges Palo Alto had transitioning to a cloud-native model. At the time we said we were confident that Palo Alto would make it through the knot hole and you can see from the previous stock chart it has done so.<\/p>\n<p>The company\u2019s architectural approach was to do the heavy lifting in the cloud. This eliminates the need for customers to deploy sensors or proxies on-premises. Same with sandboxes on-prem, which can be vulnerable to overwhelming attacks.\u00a0Think about it: If your sandbox is on-prem, it\u2019s not getting updated every day \u2014 no way. Or even every week. Perhaps even longer. And if the capacity of your sandbox is 20,000 files per hour, a hacker will just overwhelm you by sending 100,000 email attachments so your sandbox will choke and they\u2019ll have the run of the house while you\u2019re figuring out what happened.<\/p>\n<p>The cloud won\u2019t completely prevent this problem, but it definitely increases the hackers\u2019 cost so they\u2019ll probably hit easier targets. Return on investment is the simple algorithm for hackers. ROI = benefit\/cost.\u00a0Increase the denominator and ROI decreases, making you a less attractive target.<\/p>\n<h4>TAM expansion via acquisitions<\/h4>\n<p>The next thing that Palo Alto did is start acquiring aggressively. We counted 17 or 18 acquisitions to increase the company\u2019s total available market beyond network security. Endpoint, cloud access security broker, platform as a service and infrastructure as a service, containers, serverless, incident response, software-defined wide-area network security, continuous integration and delivery or CI\/CD pipeline security, attack surface management and, with the recent <a href=\"https:\/\/siliconangle.com\/2022\/11\/17\/palo-alto-networks-acquires-cybersecurity-startup-cider-security\/\">acquisition of Cider Security<\/a>, supply chain security.<\/p>\n<p>Palo Alto by all accounts takes the time to integrate these acquisitions into its cloud\/SaaS platform called Prisma. That\u2019s unlike many acquisitive companies \u2013 EMC was a good example \u2014 where you ended up with a \u201cFranken-portfolio.\u201d<\/p>\n<h4>Palo Alto: building the security supercloud<\/h4>\n<p>Consolidation of redundant vendors is the No. 1 customer cost optimization strategy today. Forty-four percent of ETR survey respondents are actively pursuing this strategy.\u00a0This leads us to believe that Palo Alto wants to be\u00a0<em>the<\/em>\u00a0consolidator and is in a good position to do so.<\/p>\n<p>But beyond that, as multi1cloud becomes more prevalent, customers tell us they want a consistent experience across clouds. This will be the same with the \u201cinternet of things.\u201d Customers don\u2019t want another stovepipe for edge security. So we think Palo Alto is in a position to build what we call the security\u00a0<a href=\"https:\/\/wikibon.com\/supercloud-definition-3-0\/#:~:text=Supercloud%20is%20an%20emerging%20computing,spanning%20more%20than%20one%20cloud.\">supercloud<\/a>, a layer above the clouds that brings a common experience for developers and operational teams.<\/p>\n<h4>Can Palo Alto remain best of breed?<\/h4>\n<p>The obvious question for a company rapidly expanding through acquisition is can it continue to effectively integrate new capabilities and still maintain best of breed status? Does it even have to? As Constellation Research analyst\u00a0<a href=\"https:\/\/video.cube365.net\/c\/939761\">Holger Mueller talks about all the time on theCUBE<\/a>, integrated suites will always beat BoB in the long run if the suite vendor can incorporate important features quickly. Maintaining best-of-breed inside of a suite would be a \u201cgame over\u201d strategy.<\/p>\n<h3>Palo Alto\u2019s portfolio is impressive<\/h3>\n<p>This next graphic underscores the point.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-303302 aligncenter\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-4.jpg\" data-sizes=\"auto, (max-width: 1706px) 100vw, 1706px\" data-srcset=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-4.jpg 1706w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-4-300x169.jpg 300w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-4-768x432.jpg 768w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-4-1024x576.jpg 1024w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-4-610x343.jpg 610w\" alt=\"\" width=\"1706\" height=\"959\"\/><\/p>\n<p>Above is a picture we don\u2019t expect you to digest fully, but it\u2019s a screen grab of Palo Alto\u2019s product and solutions portfolio. Security in areas including network, cloud, secure access service edge, cloud-native application protection platform, endpoint, Unit 42 (its threat intelligence platform) and every imaginable security service for customers. Well, not every. We\u2019re sure there\u2019s more to come, such as supply chain with the recent Cider acquisition, and maybe more IoT beyond Zingbox. But we\u2019re sure there will be more in the future both organic and inorganic.<\/p>\n<h3>Palo Alto\u2019s customer spending profile: very little churn<\/h3>\n<p>Let\u2019s come back to the ETR spending data.<\/p>\n<p>For those that don\u2019t know ETR, it\u2019s the No. 1 enterprise data platform, surveying thousands of end customers every quarter with additional drill-down surveys and customer roundtables. It\u2019s just an awesome SaaS-enabled platform and an amazing contributor to theCUBE.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-303303 aligncenter\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-5.jpg\" data-sizes=\"auto, (max-width: 1706px) 100vw, 1706px\" data-srcset=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-5.jpg 1706w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-5-300x169.jpg 300w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-5-768x432.jpg 768w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-5-1024x576.jpg 1024w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-5-610x343.jpg 610w\" alt=\"\" width=\"1706\" height=\"959\"\/><\/p>\n<p>Above is a view that shows Net Score or spending momentum on the vertical axis and pervasion or presence within the data on the horizontal axis. The red line at 40% indicates a highly elevated Net Score and you can see Palo Alto is right on that line. We\u2019ll give another glimpse of the future survey. It looks like despite the macro, Palo Alto may edge back up in the next survey based on the preview Erik Bradley gave us.<\/p>\n<p>The colored bars in the bottom right corner show the breakdown of Palo Alto\u2019s Net Score. It shows the percentge of customers spending in each category. The lime green is new customer adoptions at 7%; the forest green at 38% is the percentage of customers spending spending 6% or more; the gray at 48% is spending flat; the pinkish at 5% is spending is down on Palo Alto products by 6% or worse; and the bright red at only 2% is churn or defections.<\/p>\n<p>Subtract the red from green and you get a Net Score of 38%, which is very good for a company of Palo Alto\u2019s size.\u00a0And we\u2019ll note this is based on nearly 400 respondents that are Palo Alto customers out of around 1,300 in the total survey.<\/p>\n<p>You can see the other leading companies such as CrowdStrike, Okta, Zscaler, Fortinet and Cisco loom large. Many of those firms have aspirations similar to Palo Alto Networks vis-a-vis consolidating multiple tools \u2014 including the ever-ubiquitous Microsoft.<\/p>\n<h3>Palo Alto continues to increase its market penetration<\/h3>\n<p>Drilling deeper into the ETR data, let\u2019s look at how Palo Alto has progressed over the last three surveys in terms of presence in the ETR survey.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-303305 aligncenter\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-6.jpg\" data-sizes=\"auto, (max-width: 1706px) 100vw, 1706px\" data-srcset=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-6.jpg 1706w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-6-300x169.jpg 300w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-6-768x432.jpg 768w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-6-1024x576.jpg 1024w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-6-610x343.jpg 610w\" alt=\"\" width=\"1706\" height=\"959\"\/><\/p>\n<p>This view of the data above shows pervasion or presence in the data going back to the October 2021 survey \u2013 that\u2019s the gray bars. The blue is July 22 and the yellow is the latest survey form October 2022. Remember January is currently in the field.<\/p>\n<p>The leftmost set show size of company the middle set shows industry and the rightmost shows geographic region. Notice anything? Yes \u2013 Palo Alto gaining across the board relative to both this past summer and last fall. So that is pretty impressive.<\/p>\n<p>Palo Alto Networks Chief Executive Nikesh Arora stressed on the last earnings call, like other firms, that the company is seeing somewhat elongated deal approvals and sometimes splitting up the size of deals. He stressed that certain industries such as energy, government and financial services continue to spend. But we would expect even a pullback in those sectors as companies get more conservative.<\/p>\n<p>But the point is that Arora stressed the company is aggressively hiring sales pros and taking action to work the pipeline harder, because it understands it must pull deals forward, get more approvals and increase volume to account for certain companies splitting up deal sizes.<\/p>\n<h3>Ignite Preview and the key to Palo Alto staying on top<\/h3>\n<p>We\u2019re going to wrap by sharing what we expect and what we\u2019re going to probe for at Palo Alto Ignite next week.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-303306 aligncenter\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-7.jpg\" data-sizes=\"auto, (max-width: 1706px) 100vw, 1706px\" data-srcset=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-7.jpg 1706w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-7-300x169.jpg 300w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-7-768x432.jpg 768w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-7-1024x576.jpg 1024w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-How-Palo-Alto-Networks-Became-the-Gold-Standard-of-Cybersecurity...and-what-it-has-to-do-to-stay-on-top-7-610x343.jpg 610w\" alt=\"\" width=\"1706\" height=\"959\"\/><\/p>\n<p>First, it\u2019s a four-day event at the MGM Grand in Las Vegas, with the meat of the program on days two and three when we\u2019ll be broadcasting. Our understanding is it\u2019s a pretty technically oriented crowd that will be eager to hear what CTO and founder Nir Zuk has to say. As well, we\u2019ll be speaking to Arora, longtime friend of theCUBE, and current President BJ Jenkins, Wendy Whitmore, who runs Unit 42, and several other high-profile Palo Alto execs.<\/p>\n<p>Thomas Kurian, CEO of Google Cloud, will also be speaking at the event.<\/p>\n<p>Lee Klarich, who is Palo Alto\u2019s chief product officer, we think will be giving the audience a heavy dose of Prisma Cloud and Cortex enhancements. Cortex came from an acquisition and does threat detection, attack surface management and security automation.\u00a0So we\u2019ll be listening for how that\u2019s being integrated and what kind of uptake it\u2019s getting.<\/p>\n<p>One of the other things we\u2019ll be watching is pricing. We\u2019ll be talking to customers about their spend optimization patterns and vendor consolidation strategies. Palo Alto is a premium offering. It charges for value. It\u2019s considered expensive. So what kind of switching costs are customers willing to absorb and how onerous are they? What\u2019s the business case for paying that premium?<\/p>\n<p>And as we discussed earlier, how will Palo Alto maintain best-of-breed feature status as it acquires and integrates? And does it even need to do so?<\/p>\n<h4>The tension between regulation and security<\/h4>\n<p>There\u2019s also an interesting dynamic going on in security. A CUBE alum named\u00a0<a href=\"https:\/\/www.thecube.net\/guest\/590af53018ba2c116ca00c8b\">Edward Haletky<\/a>\u00a0is a security pro who has educated us on many aspects of cybersecurity. One area of particular interest he\u2019s talked about are the challenges of securing data and applications while at the same time protecting data privacy. This is especially difficult as public policy evolves, how regulations vary by region and how complicated it is to show a chain of custody that proves unequivocally that data has been deleted. Or that scrubbed data or metadata doesn\u2019t include any residual private data that violates local laws.<\/p>\n<p>The tension is this: You need good data to have good security. The more data the better, really. But government policy is often a major blocker to sharing data and it\u2019s getting more restrictive. So we want to understand this tension and how companies such as Palo Alto are dealing with it. Are customers testing public policy in courts? Are governments making exceptions in policies such as the EU\u2019s GDPR that favor security over data privacy? What are the tradeoffs there and how are they being managed?<\/p>\n<h4>What keeps Palo Alto on top?<\/h4>\n<p>Finally, one theme of this Breaking Analysis is: What does Palo Alto have to do to stay on top? And we would sum it up with three words \u2013\u00a0<strong>ecosystem, ecosystem, ecosystem.<\/strong>\u00a0We said at CrowdStrike Fal.con that the one concern we had was the pace of ecosystem development. How inclusive is Palo Alto\u2019s ecosystem? Will Palo Alto collaborate with possible competitors? Is Palo Alto\u2019s portfolio being adopted aggressively by global system integrators and developers? Where do the cloud players fit in the ecosystem? Are they aggressively leaning in to partner or cautiously dancing?<\/p>\n<p>The hallmark of a cloud company, which Palo Alto is, as a cloud security company, is a thriving ecosystem that has entries into and exits from its platform. So we\u2019ll be looking at what that ecosystem looks like, how vibrant and inclusive it is, where the public clouds fit and whether Palo Alto Networks can really become the security supercloud.<\/p>\n<p>If you\u2019re at Ignite next week, please stop by theCUBE and say hello. If not, as always we always appreciate your candid feedback.<\/p>\n<h3>Keep in touch<\/h3>\n<p>Thanks to Chip Symington and Erik Bradley for their contributions this week. Alex Myerson and Ken Shiffman are on production, podcasts and media workflows for Breaking Analysis. Special thanks to Kristen Martin and Cheryl Knight who help us keep our community informed and get the word out, and to Rob Hof, our editor in chief at SiliconANGLE.<\/p>\n<p>Remember we publish each week on\u00a0<a href=\"https:\/\/wikibon.com\/\">Wikibon<\/a>\u00a0and\u00a0<a href=\"http:\/\/siliconangle.com\/\">SiliconANGLE<\/a>. These episodes are all available as\u00a0<a href=\"https:\/\/open.spotify.com\/show\/7u9nQywKYm1s8hoqIjCcoM\" target=\"_blank\" rel=\"noopener\">podcasts wherever you listen<\/a>.<\/p>\n<p>Email\u00a0<a href=\"https:\/\/siliconangle.com\/2022\/12\/10\/palo-alto-networks-became-gold-standard-cybersecurity-stay-top\/mailto:david.vellante@siliconangle.com\">david.vellante@siliconangle.com<\/a>, DM\u00a0<a href=\"https:\/\/twitter.com\/dvellante?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor\">@dvellante on Twitter<\/a>\u00a0and comment on\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/dvellante\/detail\/recent-activity\/shares\/\">our LinkedIn posts<\/a>.<\/p>\n<p>Also, check out this\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=apdwumDkDCI\">ETR Tutorial we created<\/a>, which explains the spending methodology in more detail.\u00a0Note:\u00a0<a href=\"http:\/\/etr.ai\/\">ETR<\/a>\u00a0is a separate company from Wikibon and SiliconANGLE<i>.<\/i>\u00a0If you would like to cite or republish any of the company\u2019s data, or inquire about its services, please contact ETR at legal@etr.ai.<\/p>\n<p>Here\u2019s the full video analysis:<\/p>\n<p><iframe loading=\"lazy\" title=\"Breaking Analysis | How Palo Alto Networks Became the Gold Standard of Cybersecurity\" width=\"720\" height=\"405\" data-lazy=\"true\" data-src=\"https:\/\/www.youtube.com\/embed\/lYtd4xu1BUQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p><em>All statements made regarding companies or securities are strictly beliefs, points of view and opinions held by SiliconANGLE Media, Enterprise Technology Research, other guests on theCUBE and guest writers. Such statements are not recommendations by these individuals to buy, sell or hold any security. The content presented does not constitute investment advice and should not be used as the basis for any investment decision. You and only you are responsible for your investment decisions.<\/em><\/p>\n<p><em>Disclosure: Many of the companies cited in Breaking Analysis are sponsors of theCUBE and\/or clients of Wikibon. None of these firms or other companies have any editorial control over or advanced viewing of what\u2019s published in Breaking Analysis.<\/em><\/p>\n<h5>Image:\u00a0<a class=\"blue science-text js-contributor-link\" href=\"https:\/\/stock.adobe.com\/contributor\/202264837\/gearstd?load_type=author&amp;prev_url=detail\" data-ingest-clicktype=\"details-contributor-link\">gearstd\/Adobe Stock<\/a><\/h5>\n<div class=\"silic-after-content\" id=\"silic-539588215\">\n<hr style=\"border: 1px solid; color: #d8d8d8; height: 0px; margin-top: 20px;\"\/>\n<h3><span style=\"font-size: 16px;\">Show your support for our mission by joining our Cube Club and Cube Event Community of experts. Join the community that includes Amazon Web Services and Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger and many more luminaries and experts.<\/span><\/h3>\n<\/div><\/div>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/><iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/siliconangle.com\/2022\/12\/10\/palo-alto-networks-became-gold-standard-cybersecurity-stay-top\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks Inc. has earned a reputation as the leader in security. You can measure this in revenue, market cap, execution and, most importantly,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":22492,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-22491","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Palo Alto Networks became the gold standard of cybersecurity - and what it has to do to stay on top - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Palo Alto Networks became the gold standard of cybersecurity - and what it has to do to stay on top - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-10T16:38:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/Gold-standard-1024x575.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"575\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/10\\\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/10\\\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"How Palo Alto Networks became the gold standard of cybersecurity &#8211; and what it has to do to stay on top\",\"datePublished\":\"2022-12-10T16:38:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/10\\\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\\\/\"},\"wordCount\":3229,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/10\\\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Gold-standard-1024x575.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/10\\\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/10\\\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/10\\\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\\\/\",\"name\":\"How Palo Alto Networks became the gold standard of cybersecurity - and what it has to do to stay on top - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/10\\\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/10\\\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Gold-standard-1024x575.jpg\",\"datePublished\":\"2022-12-10T16:38:16+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/10\\\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/10\\\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/10\\\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Gold-standard-1024x575.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Gold-standard-1024x575.jpg\",\"width\":1024,\"height\":575},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/10\\\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Palo Alto Networks became the gold standard of cybersecurity &#8211; and what it has to do to stay on top\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Palo Alto Networks became the gold standard of cybersecurity - and what it has to do to stay on top - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/","og_locale":"en_US","og_type":"article","og_title":"How Palo Alto Networks became the gold standard of cybersecurity - and what it has to do to stay on top - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2022-12-10T16:38:16+00:00","og_image":[{"width":1024,"height":575,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/Gold-standard-1024x575.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"How Palo Alto Networks became the gold standard of cybersecurity &#8211; and what it has to do to stay on top","datePublished":"2022-12-10T16:38:16+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/"},"wordCount":3229,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/Gold-standard-1024x575.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/","url":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/","name":"How Palo Alto Networks became the gold standard of cybersecurity - and what it has to do to stay on top - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/Gold-standard-1024x575.jpg","datePublished":"2022-12-10T16:38:16+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/Gold-standard-1024x575.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/Gold-standard-1024x575.jpg","width":1024,"height":575},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/10\/how-palo-alto-networks-became-the-gold-standard-of-cybersecurity-and-what-it-has-to-do-to-stay-on-top\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"How Palo Alto Networks became the gold standard of cybersecurity &#8211; and what it has to do to stay on top"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/22491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=22491"}],"version-history":[{"count":0,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/22491\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/22492"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=22491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=22491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=22491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}