Resources

OMS Coverage Map
Where Palo Fits in Optiv's Framework

A complete mapping of Palo Alto Networks solutions to the Optiv Market System (OMS) — 10 security domains (including AI Security), every sub-domain, with coverage levels and PA ownership.

What Is the Optiv Market System (OMS)?

The Optiv Market System (OMS) is Optiv's reference architecture and security taxonomy. It organizes the entire cybersecurity landscape into 9 core security domains (plus AI Security as an emerging 10th) — from Infrastructure and Operations to Identity, Risk, and Physical Security.

Optiv uses the OMS during SPL (Strategic Partner Landscape) assessments to map vendor coverage across these domains, identify gaps, and guide technology investments. Understanding where Palo Alto Networks maps — and where gaps exist — is essential for positioning deals through Optiv's framework.

Coverage Legend: Strong = Primary solution, market-leading fit. Moderate = Partial or emerging coverage. Gap = Recognized gap with workaround. None = No PAN solution.

At a Glance

Coverage Across Key Domains

A quick view of Palo Alto Networks' presence in each OMS domain.

Detailed Mapping

Domain-by-Domain Breakdown

Every sub-domain mapped to PAN solutions, coverage level, and PA ownership.

Infrastructure

Strong

Network, cloud, endpoint, and OT/IoT security — the foundational layer of any security architecture.

Sub-Domain PAN Solution Coverage PA Owner
Network Security Strata NGFWsNext-Generation Firewalls — hardware and virtual firewalls with ML-powered threat prevention, App-ID, and security subscriptions., Strata Cloud ManagerThe single management console for all Palo Alto network security — NGFWs, SASE, and subscriptions in one pane., Security SubscriptionsAdd-on licenses for NGFWs: Advanced Threat Prevention, DNS Security, WildFire, IoT Security, URL Filtering, and more. Strong Ford, Chad, Charles
Secure Access / SASE Prisma AccessCloud-delivered secure access — ZTNA, SWG, CASB, and FWaaS in one service, managed through SCM., SD-WANSoftware-defined WAN with intelligent path selection, app-aware routing, and integrated security., Prisma Browser 2.0Secure enterprise browser with DLP, isolation, and SaaS visibility — replaces VDI for many use cases., App AccelerationOptimizes SaaS app performance (Teams, Zoom, Salesforce) by steering traffic through the fastest path., ADEMAutonomous Digital Experience Management — end-to-end visibility into user-to-app performance. Strong Ford
Cloud Security Cortex Cloud 2.0Unified CNAPP + CDR — cloud posture, workload protection, code scanning, and runtime defense. (CNAPP + CDR) Strong Chad
Endpoint Security Cortex XDRExtended Detection and Response — endpoint agent for cross-data-source detection, investigation, and response., XSIAM agentUnified endpoint agent combining XDR detection, prevention, and forensics capabilities. Strong Charles
OT/ICS K2-SeriesRuggedized firewalls for OT/ICS environments — manufacturing, energy, and critical infrastructure., IoT Security subscriptionAuto-discovers and classifies IoT devices, then enforces least-privilege security policies. Moderate Ford
IoT IoT SecurityAuto-discovers and classifies IoT devices on the network and enforces least-privilege policies. subscription, K2-Series Moderate Ford

Operations

Strong

Security operations center capabilities — detection, response, automation, threat intelligence, and incident management.

Sub-Domain PAN Solution Coverage PA Owner
TDR XSIAMAI-driven SOC platform unifying SIEM, SOAR, XDR, ASM, and ITDR with ML-powered alert grouping., Cortex XDRExtended Detection and Response — endpoint agent for cross-data-source detection, investigation, and response., Advanced Email SecurityAI-powered email security detecting phishing, BEC, and malware — included in XSIAM. Strong Charles
Orchestration & Automation AgentiXAgentic AI SOAR — autonomous agents that investigate, triage, and remediate incidents without human intervention., 1,300+ playbooks, MCPModel Context Protocol — enables AgentiX agents to securely communicate with on-premise systems. Strong Charles
Analytics XSIAM analytics, XQL, Cortex Data LakeCloud-based data lake centralizing logs and telemetry from firewalls, endpoints, and cloud., Federated SearchQuery data across Splunk, S3, etc. without requiring data migration. Strong Charles
Threat Intelligence Unit 42Palo's elite threat intelligence and incident response team., TIM add-onThreat Intelligence Management — aggregates and operationalizes threat intel feeds., WildFireCloud-based malware sandbox detonating suspicious files to identify zero-day threats. Strong Charles
Incident Response Unit 42 IR, XSIAM case mgmt, Forensics Strong Charles
Insider Threat & Fraud XSIAM ITDRIdentity Threat Detection and Response — detects compromised credentials and lateral movement., UEBAUser and Entity Behavior Analytics — ML-powered detection of anomalous user behavior. Strong Charles
Digital Brand Protection XSIAM ASMAttack Surface Management — discovers internet-facing assets to find exposures. + Digital Risk Protection Moderate Charles
AML No PAN solution None N/A
Observability ChronosphereAcquired for $3.35B. Gartner MQ Leader in observability — metrics, logs, and traces. — Telemetry PipelineChronosphere data routing — filters and routes observability data, 30%+ noise reduction., metrics, logs, traces, 30%+ noise reduction Strong Ford, Chad, Charles

Identity

Strong New

Identity security across access management, governance, PAM, and lifecycle — powered by the $25B CyberArk acquisition.

Sub-Domain PAN Solution Coverage PA Owner
Digital Access Management CyberArk Identity (SSO, MFA) Strong TBD
Identity Governance CyberArk IGAIdentity Governance — automates access reviews and role-based provisioning. Strong TBD
User/Entity Lifecycle CyberArk LifecycleFull identity lifecycle — joiner/mover/leaver with automated provisioning., XSIAM ITDRIdentity Threat Detection and Response — detects compromised credentials and lateral movement. Strong TBD
Identity Orchestration CyberArk Identity FlowsLow-code identity orchestration across apps and infrastructure., AgentiXAgentic AI SOAR — autonomous agents that investigate, triage, and remediate incidents without human intervention. Moderate TBD
PAM CyberArk PAMPrivileged Access Management — vaults, rotates, and monitors credentials. (human+machine+agentic) Strong TBD
CIAM CyberArk Customer IdentityCIAM for external/customer-facing identity with adaptive authentication. Moderate TBD
OCM No PAN solution (services play) None N/A

Data Protection

Moderate

Data security and governance — protecting sensitive information across the enterprise.

Sub-Domain PAN Solution Coverage PA Owner
Data Security SASE AI DLPAI-powered DLP delivered through Prisma Access for network-level data protection., Cortex DLP (3.4)DLP in XSIAM 3.4 — prevents sensitive data exposure across endpoints and cloud., NGFW DLPDLP at the firewall — inspects traffic for sensitive data and blocks exfiltration. Strong Ford / Charles
Data Governance No direct solution Gap N/A

Application Security

Moderate

Securing the software development lifecycle and application runtime environments.

Sub-Domain PAN Solution Coverage PA Owner
Secure SDLC Cortex Cloud ASPMApplication Security Posture Management — finds risks across code, dependencies, and pipelines., code-to-cloud Moderate Chad
App Operations & Security AIRS runtimeReal-time LLM protection — guards against prompt injection, data leakage, and hallucination., Cortex CloudUnified CNAPP + CDR platform for cloud security, workload protection, and runtime defense., WildFireCloud-based malware sandbox detonating suspicious files to identify zero-day threats. Moderate Chad

AI Security

Strong New

Securing AI models, agents, LLM applications, and the entire AI lifecycle — a new frontier in the security landscape.

Sub-DomainPAN SolutionCoveragePA Owner
AI Model SecurityPrisma AIRS 2.0 — Model scanning (35+ file types, 25+ threat categories), Protect AI GuardianStrongFord, Chad, Charles
AI Red TeamingPrisma AIRS — Automated adversarial testing, prompt injection detection, Protect AI ReconStrongFord, Chad, Charles
AI Posture ManagementPrisma AIRS — Discover shadow AI, map data flows, model/pipeline inventoryStrongFord, Chad, Charles
AI Runtime ProtectionPrisma AIRS — Real-time LLM guardrails, data leakage prevention, hallucination detectionStrongFord, Chad, Charles
AI Agent SecurityPrisma AIRS + Koi Security (pending) — Identity, tool misuse, and memory manipulation for AI agentsModerateFord, Chad, Charles

Risk

Light

Risk management, compliance operations, and cyber insurance — organizational risk governance.

Sub-Domain PAN Solution Coverage PA Owner
Compliance Cortex Cloud complianceContinuous compliance against CIS, SOC2, HIPAA, PCI and other frameworks., SCM Compliance CentreSCM dashboard tracking posture compliance across managed firewalls and SASE. Moderate Chad
Risk Governance No PAN solution None N/A
Risk Operations XSIAMAI-driven SOC platform unifying SIEM, SOAR, XDR, ASM, and ITDR with ML-powered alert grouping. Exposure Mgmt, ASMAttack Surface Management — discovers internet-facing assets to find exposures. Moderate Charles
Cyber Insurance No PAN solution None N/A

Offensive Security

Light

Proactive security testing — red teaming, attacker simulation, and readiness assessments.

Sub-Domain PAN Solution Coverage PA Owner
Attacker Simulation AIRS AI Red TeamingAutomated adversarial testing for AI — finds prompt injection and jailbreak vulns., Unit 42Palo's elite threat intelligence and incident response team. Moderate Charles
Readiness Unit 42 readiness, XSIAMAI-driven SOC platform unifying SIEM, SOAR, XDR, ASM, and ITDR with ML-powered alert grouping. detection validation Moderate Charles
OEM Security No PAN solution None N/A

Privacy

Light

Privacy operations, governance, and regulatory compliance for data privacy mandates.

Sub-Domain PAN Solution Coverage PA Owner
Privacy Operations DLPData Loss Prevention — detects and prevents sensitive data exfiltration., Prisma AccessCloud-delivered secure access — ZTNA, SWG, CASB, and FWaaS in one service, managed through SCM. Browser (mask/block/prevent) Moderate Ford
Privacy Governance No PAN solution None N/A
Privacy Regulations No PAN solution None N/A

Physical Security

None

Physical security controls — access control systems, surveillance, and facility protection. No PAN coverage.

Sub-Domain PAN Solution Coverage PA Owner
All sub-domains No PAN solution None N/A