Read our new e-book to take a deep dive into various cloud-native architectures and CI/CD workflows, how they affect your security posture, and how the latest cloud security tools – including containers – can dramatically boost your protection.
No matter the cloud role you fill within your organization, security and compliance are at the heart of your daily activities. As a defender of the cloud, you must arm yourself with the right set of tools to minimize risk and ensure the growth and longevity of your business. Choose your adventure, based on your role - SecOps, NetOps, Compliance or DevOps - to learn how the Prisma Cloud Security Suite enables you to effectively predict, prevent, detect and automatically respond to security and compliance risks.
Prisma Public Cloud for AWS dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk
This report highlights key learnings from these incidents along with research by Unit 42’s cloud research team to shed light on current and emerging trends. Moreover, it offers tips and best practices to help organizations ensure business-critical data across their public cloud environments – Google Cloud, AWS, and Azure – is secure.
Describes how you can use automation along with the elements of the Palo Alto Networks Security Operating Platform to increase the speed, consistency, quality, and reliability of the tasks they perform
This reference document links the technical design aspects of the Google Cloud Platform with Palo Alto Networks solutions and then explores several technical design models. The design models include a model with all instances in a single project to enterprise-level operational environments that span across multiple projects using Shared VPC.
Prisma Cloud for Google Cloud dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.
Read this report for an understanding of how RedLock can reduce financial risks due to security breaches, third-party tools and labor requirements to resolve issues faster; provide security governance and increase cross-team visibility such as asset management; and easily generate compliance reports that map and provide audit trails for your cloud resources.
Prisma Cloud for Microsoft Azure dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.
In this 20 minute on demand webinar, John Morello, formerly CTO at Twistlock and now Prisma VP of Product, provides a look at challenges with traditional security strategies--especially for organizations leveraging microservices. He then shares why and how your organization can adopt a proactive security stance by leveraging containers and other cloud native technologies.
Learn how to use the Palo Alto Networks next-generation firewalls to secure connectivity between public and private clouds. Understand the different connectivity models between public and private cloud and how to secure them.
The way your business leverages cloud and SaaS technologies evolves each and every day -- including where they access systems and data from. As a result, many security and technology executives find it a challenge to strike the right balance between speed and risk. If you’re looking for ideas and best practices to ensure consistent, comprehensive security without adding additional complexity, check out our Prisma resource center for tips and best practices to inform how your next step in your cloud security journey.
A prominent Fortune 1000 company with more than 10,000 workloads across 100 AWS® accounts achieved several important goals by implementing Prisma™ Cloud (formerly RedLock). This use case provides an overview of the immediate benefits Prisma Cloud provided, including the ability to enable forensics, achieve visibility into risk posture, and automate DevSecOps.
Displaying 1 to 30 of 44
Be the first to know.
Access guides and white papers to help evaluate the people, processes and technology you need to successfully select and purchase the right EDR for your organization.