Strata Cloud Manager now allows custom application signatures based on SNORT and
        Suricata, enabling integration of open-source threat intelligence to detect and prevent
        attacks.
    Snort and Suricata are third party open-source intrusion prevention system (IPS)
                tools that utilize specialized rule formats to identify potential threats. Because
                organizations that share threat intelligence often distribute security advisories
                using these rule formats, the additional coverage can reveal threats that might not
                be apparent on any single IPS system. The IPS Signature Converter functionality
                allows you to leverage these open-source rules for immediate threat protection on
                Palo Alto Networks Strata Cloud Manager by translating the IPS signatures from Snort
                and Suricata into custom threat signatures.
After the Snort or Suricata rules are converted, you can use these signatures to
                enforce security policies by incorporating the converted signatures into your
                Vulnerability Protection and Anti-Spyware Security Profiles.
By leveraging this conversion process, you can quickly adapt and implement a wide
                range of threat detection rules from the open-source community, enhancing your
                network's security posture with up-to-date and comprehensive threat
                intelligence.