* [Blog](https://www.paloaltonetworks.com/blog) * [Cloud Security](https://www.paloaltonetworks.com/blog/cloud-security/) * [AI Governance](https://www.paloaltonetworks.com/blog/category/ai-governance/) * Securing Enterprise AI Ad... # Securing Enterprise AI Adoption: Palo Alto Networks Integrates with the Claude Compliance API to Enable Safe Use of Claude [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fclaude-security-integration-ai-governance%2F) [](https://twitter.com/share?text=Securing+Enterprise+AI+Adoption%3A+Palo+Alto+Networks+Integrates+with+the+Claude+Compliance+API+to+Enable+Safe+Use+of+Claude&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fclaude-security-integration-ai-governance%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fclaude-security-integration-ai-governance%2F&title=Securing+Enterprise+AI+Adoption%3A+Palo+Alto+Networks+Integrates+with+the+Claude+Compliance+API+to+Enable+Safe+Use+of+Claude&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/cloud-security/claude-security-integration-ai-governance/&ts=markdown) \[\](mailto:?subject=Securing Enterprise AI Adoption: Palo Alto Networks Integrates with the Claude Compliance API to Enable Safe Use of Claude) Link copied By [Arpit Bhatt](https://www.paloaltonetworks.com/blog/author/arpit-bhatt/?ts=markdown "Posts by Arpit Bhatt") May 21, 2026 7 minutes [AI Governance](https://www.paloaltonetworks.com/blog/category/ai-governance/?ts=markdown) [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown) [AI-SPM](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-spm/?ts=markdown) [Announcement](https://www.paloaltonetworks.com/blog/cloud-security/category/announcement/?ts=markdown) [Data Security](https://www.paloaltonetworks.com/blog/cloud-security/category/data-security/?ts=markdown) [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown) Organizations are rapidly bringing AI into everyday work, and sensitive data is moving with it through prompts, uploaded files, generated outputs and autonomous workflows. Until recently, though, what happened inside those AI interactions remained largely invisible to enterprise security and data governance programs. As AI adoption scales, that visibility gap has become one of the most urgent problems in securing enterprise use. Palo Alto Networks is changing that with an integration to Anthropic's Compliance API. Through the Claude Compliance API and Cortex Cloud Data Security Posture Management (DSPM), organizations will be able to gain deep visibility into how sensitive data is being used inside Claude Enterprise, enabling a fundamentally new approach to securing enterprise AI usage. ## The Risk Hiding Inside Everyday AI Workflows Traditional data security tools monitor data at rest and in motion across storage, SaaS and networks. They weren't built to understand what happens inside AI conversations. Enterprise use of AI, however, has moved faster than the control model. Employees now interact with AI systems as working partners. They paste sensitive data into prompts, upload internal files and generate new content at scale. Each interaction can create a new layer of enterprise data exposure, yet most organizations have limited visibility into what's being shared or produced. A developer pastes proprietary source code into Claude to debug a function. A finance analyst uploads a confidential forecast for a summary. An HR partner shares employee data to draft internal communications. None of these users are acting maliciously, but each interaction can expose data in ways the organization may not see. The risks that follow are concrete: * Intellectual property leaving the organization through AI prompts * Regulated data such as PII and PHI being shared in ways that create compliance exposure * Prompt injection attacks designed to manipulate AI behavior or extract data * Unauthorized or anomalous usage patterns that signal account compromise Without visibility into Claude interactions, organizations are trying to secure an AI environment already operating inside the business. ## What Claude Compliance API Makes Possible The Claude Compliance API gives enterprises something they haven't had before --- programmatic visibility into AI interactions. With this access, organizations can inspect conversation content, uploaded files, generated outputs and behavioral activity inside Claude at enterprise scale. AI interactions become governable security and compliance events rather than activity hidden outside existing controls. Built on Palo Alto Networks market-leading DSPM foundation and heritage in data security innovation, Cortex Cloud DSPM transforms this entirely new telemetry layer into actionable data protection, governance, and threat detection. Integration with the Claude Compliance API will enable organizations to understand what data is being shared with Claude, in addition to detecting sensitive content and policy violations, identifying threats and anomalous behavior and guiding users toward safer AI use. ## A Phased Path to Securing AI Conversations Enterprise security programs don't achieve full maturity at once. Our integrated solution is designed around a phased model that will deliver immediate value while building advanced capability over time. ### Phase 1: Gain Immediate Visibility into Sensitive Data Usage The first stage is understanding what's already happening. The platform will automatically scan Claude Enterprise conversations, files and projects to identify sensitive data, including PII, PHI and intellectual property. Data security and governance teams will see what data is being shared, where risk is concentrated, and which conversations need attention first. For many organizations, this stage alone will reshape how they understand AI risk. ![Discovery of sensitive data within Claude Workspace Assets](https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/05/word-image-359022-1.png) Figure 1: Discovery of sensitive data within Claude Workspace Assets ### Phase 2: Detect and Respond to Risk With baseline visibility in place, the platform moves into active detection, analyzing Claude Enterprise activity on an ongoing cadence and generating actionable alerts before risks escalate. Key detection capabilities include: * Exposure of API keys, credentials or internal secrets inadvertently shared in prompts * Malicious or compromised files uploaded to or downloaded from Claude * Policy violations in prompt content or shared documents ### Phase 3: Prevent Risk Through User Awareness and Attack Detection Detection alone leaves security teams responding after risk appears. Phase 3 moves the model toward risk reduction. When a user shares sensitive data in violation of policy, the platform delivers an end-user coaching notification that helps guide safer AI use. At the same time, retrieved Claude Enterprise conversations are analyzed for AI-specific risks, including prompt injection attempts, sensitive data exposure and anomalous behavior. Cortex Cloud enables organizations to detect and respond to these risks in real time, helping prevent data leakage and policy violations before they escalate. ### Phase 4: Detect Anomalous Behavior and Account Compromise At full maturity, the integration applies behavioral intelligence to audit log data surfaced by the Compliance API, detecting account-level signals that point to risks beyond a single policy violation. * **Impossible travel scenarios**: Login events that are geographically inconsistent with a user's normal pattern. * **Unusual data sharing spikes**: Sudden increases in file uploads or data volume that may indicate exfiltration by a compromised or malicious account. * **Suspicious access patterns**: Behavioral anomalies across AI workflows that don't match a user's established baseline. The integration gives enterprises a stronger foundation for adopting Claude securely, one where they can support broad AI use with the visibility, detection and response capabilities to govern it. Employees gain access to a tool that makes them meaningfully more productive. Security teams get the control and audit trail they need to operate confidently. Compliance teams have the governance documentation that regulated industries require. Palo Alto Networks is building that foundation with the Claude Compliance API, giving enterprises the visibility and control to unlock the full potential of Claude without putting their data, customers or compliance posture at risk. To learn more about securing Claude in your enterprise environment, download the [Cortex Cloud DSPM datasheet](https://www.paloaltonetworks.com/resources/datasheets/data-security-posture-management?ts=markdown) or [schedule a Cortex Cloud demo](https://www.paloaltonetworks.com/cortex/cloud/demo?ts=markdown) to see Cortex Cloud in action. ***Forward-Looking Statements*** *This blog contains forward-looking statements that involve risks, uncertainties and assumptions, including, without limitation, statements regarding the benefits, impact or performance or potential benefits, impact or performance of our products and technologies or future products and technologies. These forward-looking statements are not guarantees of future performance, and there are a significant number of factors that could cause actual results to differ materially from statements made in this blog including, without limitation: developments and changes in general market, political, economic, and business conditions; risks associated with managing our growth; risks associated with new products and subscription and support offerings; shifts in priorities or delays in the development or release of new offerings, or the failure to timely develop, release and achieve market acceptance of new products and subscriptions as well as existing products and subscription and support offerings; failure of our business strategies; rapidly evolving technological developments in the market for security products and subscription and support offerings; our customers' purchasing decisions and the length of sales cycles; our competition; our ability to attract and retain new customers; and our ability to acquire and integrate other companies, products, or technologies. We identify certain important risks and uncertainties that could affect our results and performance in our most recent Annual Report on Form 10-K, our most recent Quarterly Report on Form 10-Q and our other filings with the U.S. Securities and Exchange Commission from time-to-time, each of which are available on our website at investors.paloaltonetworks.com and on the SEC's website at www.sec.gov. All forward-looking statements in this blog are based on information available to us as of the date hereof, and we do not assume any obligation to update the forward-looking statements provided to reflect events that occur or circumstances that exist after the date on which they were made.* *** ** * ** *** ## Related Blogs ### [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [AI-SPM](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-spm/?ts=markdown), [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Data Security](https://www.paloaltonetworks.com/blog/cloud-security/category/data-security/?ts=markdown), [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown) [#### Dissecting Shadow AI to Illuminate Hidden Footprints in Your Workloads](https://www.paloaltonetworks.com/blog/cloud-security/shadow-ai-workloads/) ### [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [AI-SPM](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-spm/?ts=markdown), [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown), [Identity Security](https://www.paloaltonetworks.com/blog/cloud-security/category/identity-security/?ts=markdown) [#### Is AI a New Challenge for Cloud Security? Yes and No.](https://www.paloaltonetworks.com/blog/cloud-security/ai-security-gap-cloud-models-agents/) ### [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [AI-SPM](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-spm/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) [#### Explore the OWASP Top 10 for LLMs: A New Interactive Guide](https://www.paloaltonetworks.com/blog/cloud-security/owasp-top-10-llms-ai-security-guide/) ### [Data Detection and Response](https://www.paloaltonetworks.com/blog/cloud-security/category/data-detection-and-response/?ts=markdown), [Data Loss Prevention](https://www.paloaltonetworks.com/blog/category/data-loss-prevention/?ts=markdown), [Data Security](https://www.paloaltonetworks.com/blog/cloud-security/category/data-security/?ts=markdown), [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown) [#### Rethinking Data Security in the AI Era](https://www.paloaltonetworks.com/blog/cloud-security/data-security-ai-agentic-foundation/) ### [AI Governance](https://www.paloaltonetworks.com/blog/category/ai-governance/?ts=markdown), [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Idira --- Our Journey to Democratize Privilege Controls](https://www.paloaltonetworks.com/blog/2026/05/idira-journey-democratize-privilege-controls/) ### [AI Security](https://www.paloaltonetworks.com/blog/cloud-security/category/ai-security/?ts=markdown), [Application Security](https://www.paloaltonetworks.com/blog/cloud-security/category/application-security/?ts=markdown), [AppSec](https://www.paloaltonetworks.com/blog/cloud-security/category/appsec/?ts=markdown), [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Identity Security](https://www.paloaltonetworks.com/blog/cloud-security/category/identity-security/?ts=markdown), [Supply Chain Security](https://www.paloaltonetworks.com/blog/cloud-security/category/supply-chain-security/?ts=markdown) [#### Introducing Cortex Cloud 2.1](https://www.paloaltonetworks.com/blog/cloud-security/visibility-governance-automation/) ### Subscribe to Cloud Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/ai-security?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Next-Generation Identity Security](https://www.paloaltonetworks.com/idira?ts=markdown) * [Privileged Access Management](https://www.paloaltonetworks.com/idira/human/privileged-access-management?ts=markdown) * [Identity and Access Management](https://www.paloaltonetworks.com/idira/human/identity-and-access-management?ts=markdown) * [Endpoint Privilege Manager](https://www.paloaltonetworks.com/idira/human/endpoint-privilege-manager?ts=markdown) * [Identity Governance](https://www.paloaltonetworks.com/idira/human/identity-governance?ts=markdown) * [Workforce Password Management](https://www.paloaltonetworks.com/idira/human/workforce-password-management?ts=markdown) * [Agentic Identities](https://www.paloaltonetworks.com/idira/agentic?ts=markdown) * [Secrets Management](https://www.paloaltonetworks.com/idira/machine/secrets-management?ts=markdown) * [Unified Secrets Governance](https://www.paloaltonetworks.com/idira/machine/unified-secrets-governance?ts=markdown) * [Application Credentials Delivery](https://www.paloaltonetworks.com/idira/machine/application-credentials-delivery?ts=markdown) * [Vendor Privileged Access](https://www.paloaltonetworks.com/idira/human/vendor-privileged-access?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language