Microsoft Exchange Server Exploit response
  • Network Security
  • Cloud Security
  • Security Operations
  • More
  • Get support
  • Sign In
  • Get Started

Host Security

Secure VMs on any public or private cloud

The need for host security
Linux and Windows® VMs are central parts of many organizations’ cloud native application portfolios. VMs offer isolation, compatibility and control suitable for running nearly any type of application, and they give users a wide range of use cases when running cloud workloads. At the same time, hosts require a combination of vulnerability management, compliance monitoring, runtime protection and network security to ensure they are secure.
Delivering full stack security for virtual machines (VMs)

Prisma™ Cloud delivers full stack security for Linux and Windows VMs. Security teams can continuously monitor hosts for vulnerabilities, ensure compliance, and protect their running workloads from anomalies and active threats.
Read the blog
2020 Gartner Market Guide for Cloud Workload Protection Platforms

Download now
Host Security. For any cloud.
  • Vulnerability Management
  • Compliance
  • Runtime Defense
  • Access Control
  • Network Visualization

Vulnerability Management

Prisma Cloud continuously monitors for vulnerabilities to provide accurate insights into running hosts. Vulnerability Top 10 lists provide risk prioritization across all known CVEs as well as remediation guidance.

Compliance

Prisma Cloud provides more than 400 compliance checks including the CIS benchmarks for Linux, Docker® and Kubernetes®, as well as compliance checks for Windows® configurations and Istio®. Pre-built, customizable frameworks support PCI DSS, HIPAA, GDPR and NIST SP 800-190.

Runtime Defense

Prisma Cloud secures hosts with file integrity monitoring (FIM); log inspection; application, capability, and activity rules; custom runtime rules; and more, to ensure running workloads are secure. Quickly view all audit or security events with automated, secure forensic data captures.

Access Control

Prisma Cloud offers control over Docker activities, visibility into Kubernetes AuditSink, Open Policy Agent integration, and powerful secrets management integrations to secure host activities.

Network Visualization

Prisma Cloud continuously monitors all hosts for network communications in a visualization tool: Radar. Quickly understand all host network connections alongside vulnerability, compliance and runtime status.

Prisma Cloud continuously monitors for vulnerabilities to provide accurate insights into running hosts. Vulnerability Top 10 lists provide risk prioritization across all known CVEs as well as remediation guidance.
Prisma Cloud provides more than 400 compliance checks including the CIS benchmarks for Linux, Docker® and Kubernetes®, as well as compliance checks for Windows® configurations and Istio®. Pre-built, customizable frameworks support PCI DSS, HIPAA, GDPR and NIST SP 800-190.
Prisma Cloud secures hosts with file integrity monitoring (FIM); log inspection; application, capability, and activity rules; custom runtime rules; and more, to ensure running workloads are secure. Quickly view all audit or security events with automated, secure forensic data captures.
Prisma Cloud offers control over Docker activities, visibility into Kubernetes AuditSink, Open Policy Agent integration, and powerful secrets management integrations to secure host activities.
Prisma Cloud continuously monitors all hosts for network communications in a visualization tool: Radar. Quickly understand all host network connections alongside vulnerability, compliance and runtime status.

Recommended resources

  • All
  • All
2020 Gartner Market Guide for CWPP
Download the guide
Full Lifecycle Approach to Secure Cloud Native Apps
View the blog
State of Cloud Native Security 2020
Read the report
Gartner Top Security and Management Trends
Get the latest
Quick links
View a demo
View a demo
Request a personalized demo
Request a personalized demo
Contact sales
Contact sales
Visit the Resource Center
Visit the Resource Center
Visit the Corporate blog
Visit the Corporate blog
Visit the Unit 42 blog
Visit the Unit 42 blog

Unlock the cloud
security kit now

Get everything you need from best practices and guides to secure your cloud environments today.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
Subscription Reward

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube
Create an account or login

© 2021 Palo Alto Networks, Inc. All rights reserved.