Federal and military IT environments are more complex than ever. Agencies are operating across bases, campuses, data centers, and multiple clouds—while adversaries move faster, automation accelerates attacks, and new mandates like Zero Trust and post‑quantum readiness raise the bar.
In this episode of The Bottom Line Upfront, we break down Palo Alto Networks’ latest announcements around Strata Cloud Manager, PAN‑OS 12.1 Orion, device security, AI‑assisted operations, and quantum readiness—and translate them into mission‑ready takeaways for Federal and DoD leaders.
The Challenge: Complexity Is the Enemy of Security
Modern Federal enterprises face a familiar problem:
- Too many security tools
- Disconnected visibility
- Manual change processes
- Policy drift over time
- Legacy IT, OT, and IoT systems that can’t be easily patched
All of this creates risk, slows response, and makes Zero Trust harder to operationalize at scale. Palo Alto Networks’ strategy is clear: unify management and operations, move from reactive to proactive security, and do it with AI‑assisted workflows that fit real‑world Federal constraints.
Unified Operations with Strata Cloud Manager
At the center of this strategy is Strata Cloud Manager (SCM). SCM centralizes management across:
- Next‑generation firewalls
- Cloud security
- Secure Service Edge (SSE)
All from a single operational interface, backed by shared telemetry and embedded best‑practice enforcement. SCM ingests billions of telemetry points each month, providing the foundation for:
- Zero Trust posture analytics
- Predictive health forecasting
- AI‑assisted troubleshooting
- Faster mean time to respond
For Federal agencies, this directly supports OMB and DoD Zero Trust goals—delivering consistent policy enforcement, automated guardrails, and continuous monitoring without multiplying consoles or playbooks.
Pre‑Commit Policy Enforcement: Shift Security Left
One of the most important operational takeaways is how SCM enforces security before changes go live. With inline, pre‑commit policy checks, SCM:
- Flags misconfigurations at write time
- Blocks risky or non‑compliant changes
- Enforces best practices automatically
This aligns cleanly with RMF Step 3 (Implement) and Step 6 (Monitor) by providing real‑time controls and evidence while reducing change‑induced outages. For ISSOs and security teams, it also simplifies:
- POA&M updates
- Audit preparation
- Leadership reporting
AI‑Assisted Operations: Copilot and AI Canvas
SCM integrates AI in practical ways operators can actually use.
- Strata Copilot allows admins to ask natural‑language questions, receive contextual guidance, and even open support cases with relevant telemetry attached.
- AI Canvas turns natural‑language queries into real‑time dashboards and reports you can share instantly.
This reduces time spent hunting through logs and dashboards and accelerates both troubleshooting and decision‑making.
Device Security: Closing the IT, OT, and IoT Gap
Device sprawl is one of the hardest problems agencies face. Palo Alto’s Device Security capability—managed through SCM—creates a holistic device inventory across:
- Managed IT
- Unmanaged endpoints
- BYOD
- IoT
- OT and industrial systems
Each device is enriched with approximately 1,600 identity and risk attributes sourced from machine learning, integrations, and vendor intelligence. From there, SCM can:
- Prioritize risk by criticality, exposure, and exploitability
- Apply precision‑based recommendations
- Enable virtual patching for devices that can’t be upgraded
- Enforce advanced Device‑ID–based policies
This is a strong fit for installations, depots, clinics, shipyards, and flight lines, where legacy OT systems must remain operational and downtime is not an option.
Multi‑Cloud and AI Security: Clara, Security Fabric, and Micro‑Perimeters
Palo Alto’s approach to multi‑cloud and AI security focuses on visibility first, automation second. Key components include:
Clara – provides multi‑cloud risk assessment by:
- Discovering workloads and traffic flows
- Benchmarking existing controls
- Identifying gaps
- Red‑teaming AI and large language model (LLM) applications
Multi‑Cloud Security Fabric – This fabric automates firewall deployment and networking across clouds, delivering:
- Consistent ingress, egress, and east‑west protection
- Policy consistency across environments
- Reduced deployment friction
Micro‑Perimeters – SCM enables identity‑aware, Layer 7 micro‑perimeters down to:
- Containers
- Kubernetes namespaces
Using native CNI chaining, this helps stop lateral movement and directly supports Zero Trust east‑west objectives and C2 resiliency. A recommended starting point: deploy a micro‑perimeter around a single containerized mission application to validate value quickly.
Advanced DNS Security Resolver: Closing a Major Blind Spot
DNS remains one of the most commonly abused—and overlooked—attack vectors. Palo Alto’s Advanced DNS Security Resolver (ADNSR) is a cloud‑delivered resolver that inspects both DNS queries and responses, closing blind spots traditional resolvers miss. Key capabilities include:
- Detection of phishing, C2, tunneling, hijacking, and misconfiguration
- Sinkholing and category controls
- Centralized logging and investigation through SCM
For Federal agencies, ADNSR enables enterprise‑grade DNS security across distributed users and enclaves without re‑architecting the network.
Quantum Readiness with PAN‑OS 12.1 Orion
Quantum readiness was a central theme of the release—and for good reason. PAN‑OS 12.1 Orion introduces a pragmatic, phased path to post‑quantum security:
- Cryptographic inventory – understand where vulnerable algorithms are in use
- Hybrid post‑quantum cryptography (PQC) – protect high‑value tunnels first
- Cipher translation – shield legacy systems by upgrading only one side of the connection
- QKD integrations – optional additional resiliency
This approach acknowledges a harsh reality: many Federal systems can’t be upgraded quickly. Cipher translation, in particular, provides a critical bridge—allowing agencies to raise their security posture without breaking mission systems.
Hardware That Supports the Mission
Palo Alto’s hardware refresh supports this strategy:
- PA‑5500 series for data centers with 400GbE, clustering, and high Layer 7 capacity
- Refreshed PA‑500 series for branches with higher density and PoE
Both are designed to decrypt and inspect PQC traffic at scale and without performance degradation, aligning with CNSA 2.0 trajectories and the “harvest now, decrypt later” threat model.
The Bottom Line…
There are three clear takeaways from Palo Alto Networks’ PAN‑OS 12.1 Orion release:
- Unify operations with centralized visibility and AI‑assisted workflows
- Harden security posture proactively with pre‑commit policy enforcement and device intelligence
- Prepare for quantum using a phased, mission‑aware approach
For Federal and DoD leaders, this isn’t about buying more tools—it’s about operationalizing Zero Trust and future‑proofing security without disrupting the mission.

- Designing 90‑day pilots aligned to RMF and Zero Trust objectives
- Integrating Palo Alto capabilities with ICAM, SIEM/SOAR, EDR, and existing environments
- Supporting ATO documentation and compliance evidence
- Bridging legacy systems safely while modernizing security
Now is the time to unify operations, reduce policy risk, protect devices you can’t patch—and begin your post‑quantum journey.
Synopsis
On this episode we summarize Palo Alto Networks’ updates on unified operations, AI-assisted security, and quantum readiness as part of PAN OS 12.1 “ORION.” We highlight Strata Cloud Manager as a centralized platform to manage next-gen firewalls, cloud, and SSE with shared telemetry, best-practice pre-commit checks, AI Copilot and AI Canvas for troubleshooting and reporting, and support for zero trust and RMF monitoring. It describes device security for IT/OT/IoT visibility, risk prioritization, adaptive segmentation, and virtual patching for hard-to-update assets, plus Clara for multi-cloud risk assessment, AI/LLM red teaming, and micro-perimeters down to containers and Kubernetes. We also recommend piloting Advanced DNS Security Resolver to inspect DNS queries and responses, and outlines quantum transition steps including crypto inventory, hybrid PQC, cipher translation for legacy systems, and new firewall hardware capabilities aligned to CNSA 2.0.
- 00:00 Episode Overview
- 01:13 Unified Ops with Strata Cloud Manager
- 02:06 AI Workflows and Pre Commit
- 02:57 Device Security for IT/OT/IoT
- 03:37 Multi Cloud and AI Security
- 04:12 Micro Perimeters for Zero Trust
- 04:38 Advanced DNS Security Resolver
- 05:22 Quantum Readiness and New Hardware
- 06:28 Pan OS 12.1 Key Takeaways
- 08:07 Upgrade your PAN OS Call to Action & Wrap Up
This episode is brought to you by ATP Gov. Visit us online at www.atpgov.com or follow us on LinkedIn.
Transcript
[00:00:00] Welcome to the Bottom Line Upfront, the podcast that cuts through the noise to deliver distilled insights from today’s most important technical webinars, presentations and demonstrations designed for federal and military IT leaders. Each episode breaks down complex technologies into mission ready takeaways, so you get the key points.
Fast. Whether it’s cybersecurity, cloud, architecture, or emerging defense technologies, we highlight what matters most and how trusted integrators like a TP gov can help implement and operationalize these solutions across your agency or command. No fluff. No filler, just the bottom line upfront. Today we’re breaking down Palo Alto Network’s, latest on unified operations, ai, assistant security, and quantum readiness.
You’ll hear how Strata Cloud manager unifies firewall Cloud and SSE Management and how device security finally closes the gap across it, OT, and iot. That and more as we bundle up [00:01:00] how P Os 12.1 Orion and the fifth Generation Next Gen firewalls set you on a pragmatic path to post quantum and what that means for federal agencies pushing zero trust under real world constraints.
Today’s enterprise, especially in government, runs across bases, campuses, data centers, and multiple clouds. Palo Alto’s answer is to unify management and operations and move from reactive to proactive with AI assisted workflows. Strata Cloud manager or SCM centralizes their next gen firewalls cloud, and SSE with shared telemetry and best practice enforcement.
This is aimed at consistent policy and faster remediation. Strata Cloud manager processes billions of telemetry points monthly across a large device estate. This is fuel for posture analytics, health forecasting, and AI assisted troubleshooting, and this directly supports OMB and do OD zero trust goals for consistent policy, automated guardrails, continuous monitoring, and faster meantime to respond [00:02:00] without multiplying consoles or playbooks.
So let’s talk about what’s new and why it matters. Strata Cloud Manager is designed as one place to see threats, user experience, data security, and device health. Plus best practice checks at configuration time to block risky changes before they deploy. SCM incorporates AI tools like copilot and answers natural language questions, suggests actions and can even open support cases with context and with the addition of AI canvas, this turns natural language queries in instantly shareable dashboards and reports.
The key here is to turn on SCM in a pre-commit stage so that it can check and fix failing policies before deployment. As well as map to RMF steps three and six, which is implement and monitor with real-time controls and evidence. This reduces change induced incidences and enforces policy of record before commit.
This is also important for rapid reporting for POAM updates and leadership briefs. We can also apply this to device [00:03:00] security by creating a holistic inventory across managed unmanaged iot, ot, and even BYOD with roughly 1600 identity and risk attributes for machine learning integrations and vendor intel.
SCM can prioritize risk by criticality exposure, and exploitability then migrate via precision recommendations Virtual patching and advanced device ID based policies. This is a great fit for installations, depots, clinics, shipyards, and flight lines. Word, legacy, OT can’t be routinely patched. And with SCM, we can enforce adaptive segmentation without rewriting topology and quarantine, non-compliant endpoints automatically.
Palo Alto has a plan for multi-cloud and AI security. This incorporates something known as Clara, which provides multi-cloud risk assessment. It discovers workloads and flows, benchmarks, protections, and can red team AI and LLM apps. It includes a multi-cloud security fabric, automating deployment and network across clouds.
It also has consistent egress ingress and [00:04:00] EastWest protection at scale, and the ability to create micro perimeters enforces identity aware. L seven controls down to the containers and Kubernetes name spaces using native CNI chaining to stop lateral movement. To get started with this particular part of the technology, we need to consider deploying a micro perimeter on one containerized mission app to block lateral movement.
This can be useful for testing cross-domain AI pilots, JW style multi-cloud patterns, and rapidly spun up mission apps. By doing this, we can also establish identity aware micro perimeters that align with zero trust, EastWest objectives, and C two resiliency as part of Panos 12.1 Orion. They’ve also incorporated advanced DNS security, resolver, known as A-D-N-S-R.
It’s a cloud delivered resolver that inspects both DNS queries and responses. Closing a big blind spot for phishing C two tunneling, hijacking, and misconfiguration. A-D-N-S-R includes sync holding options, category controls, rich logging, and [00:05:00] integration with Strata Cloud Manager. After reviewing the material, we recommend that you pilot the A-D-N-S-R because DNS is often overlooked in the security space.
But Palo Alto’s approach allows you to enforce enterprise grade DNS protections quickly across distributed users. And enclaves and enforce sync holes for C two phishing tunneling and review the logs in the Strata Cloud manager. All of this without re-architecting quantum readiness was the hot topic, including inventory of crypto usage support for NIST PQC algorithms.
As well as enabling hybrid PQC and the introduction of Cipher Translation to Shield legacy systems by upgrading only one side of the connection. And I’d be remiss if I didn’t mention that QKD integrations are also supported for additional resiliency and the new 5,500 series Palo Altos for data centers, which now include 400 gigabit options clustering and big L seven capacity, as well as the refreshed PA 500 series for branches.
Which now include POE and higher [00:06:00] density are designed to decrypt and inspect PQC traffic at scale without breaking performance. The overall goal here is to run a crypto inventory and start hybrid PQC on selected tunnels and supply cipher translation for legacy endpoints. These new devices and the upgrades to Pan Os align to CNSA 2.0 trajectories and the harvest now decrypt later reality giving agencies a bridge for legacy systems where upgrades are slow or constrained.
So what’s the bottom line upfront of the newly released Pan OS 12.1 Orion? Well, there’s three key takeaways from the product brief. Palo Alto’s messaging is all about unifying operations, hardening posture proactively, and preparing for quantum without breaking the mission. So how do we do that? Strata cloud managers inline pre-commit policy checks and zero trust posture.
Dashboards help you harden rule sets continually and prove it during your assessments. SCM Centralizes Ops enforces best practices before deployment [00:07:00] and adds AI co-pilot and AI canvas for rapid troubleshooting and reporting. Moreover, health forecasting capacity analyzer and incident guidance help prevent outages that disrupt mission timelines, especially in bandwidth constrained or edge locations.
Panos 12.1. Device security and virtual patching protects fixed function and safety critical gear during maintenance windows. Device security also unifies IAT, OT and IOT visibility with roughly 1600 attributes and advanced device ID policies, plus virtual patching for hard to update assets. Clara and its multi-cloud security fabric and micro perimeter capabilities give consistent protection across clouds all the way down to containers and Kubernetes.
The advanced DNS security, resolver inspects queries and responses to block phishing C two tunneling and misconfiguration hijacks a gap that many DNS resolvers miss. And finally one of the most salient points of the brief, it’s all about quantum transition. Start with the crypto inventory. Apply hybrid PQC [00:08:00] and use cipher translation where you can’t touch the endpoint.
All this while you plan hardware refreshes only where they’re needed. So if you’re a current Palo Alto Networks user. Don’t linger in the legacy. It’s time to upgrade to Pan OS 12.1 Orion and unify your operations. Reduce policy risk and protect devices you can’t patch as well as beginning your post quantum journey without derailing your mission.
Be sure to reach out to atp gov today@www.atpgov.com, or email info@atpgov.com, or check us out on social media on LinkedIn. Thanks for listening, and be sure to subscribe to the bottom line upfront wherever you get your podcasts. And stay tuned for more distilled insights from the front lines of tech and national security.
So until next time, stay secure. Stay mission ready.
About this Podcast
The Bottom Line Up Front, is ATP Gov’s podcast that cuts through the noise to deliver distilled insights from today’s most important technical webinars, presentations and demonstrations designed for federal and military IT leaders. Each episode breaks down complex technologies into mission ready takeaways, so you get the key points.
Fast.
Whether it’s cybersecurity, cloud, architecture, or emerging defense technologies, we highlight what matters most and how trusted integrators like ATP Gov can help implement and operationalize these solutions across your agency or command.
No fluff. No filler, just the bottom line up front.