Discover what’s really driving the shift toward unified security
Discover how geopolitical tensions are fueling advanced cyber campaigns
Is the Quantum Threat Closer Than You Think?
  • Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
  • magnifying glass search icon to open search field
  • Contact Us
  • What's New
  • Get Support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
    Language
  • Contact Us
  • What's New
  • Get support
  • Under Attack?
  • Demos and Trials

“SASE for Securing Internet” Reference Architecture

Learn how to enable the best security outcomes by using Palo Alto Networks solutions. With our validated design and deployment guidance, you can reduce rollout time and avoid common integration challenges. These reference architectures are designed, tested, and documented to provide faster, predictable deployments.

Overviews

Provide high-level introductions to technologies and concepts.

SASE: Overview
Securing Generative AI: Overview

Design Guides

Provide an architectural overview for using Palo Alto Networks technologies to provide visibility, control, and protection to applications built in a specific environment.

SASE for Securing Internet: Design Guide

Deployment Guides

Provide decision criteria for deployment scenarios, as well as procedures for combining Palo Alto Networks technologies with third-party technologies in an integrated design.

SASE for Securing Internet: Deployment Guide

Solution Guides

Provide add-on solutions for post-deployment use cases.

AI-Powered ADEM: Solution Guide Enhancing Internet Security with SSL Forward-Proxy Decryption: Solution Guide Identity-Based and Posture-Based Security for SASE: Solution Guide Secure Internet Policy Design: Solution Guide Securing Access from Unmanaged Devices Using Prisma Access Browser: Solution Guider Securing Access to Generative AI Applications: Solution Guide Securing Internet and Private Application Access Using Prisma Access Browser Securing Internet Access by Using Explicit Proxy: Solution Guide Securing Internet Access by Using Explicit Proxy in a No-Default-Route Environment: Solution Guide Securing IoT Environments: Solution Guide Securing Microsoft 365: Solution Guide Securing SaaS with the Next-Generation CASB: Solution Guide

See all reference architecture guides

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Access Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language