Enterprise Edition
Operationalize
Prisma® Cloud secures applications from code to cloud, enabling security and DevOps teams to effectively collaborate to accelerate secure cloud-native application development and deployment.
Secure the Source
Prevent risks by securing infrastructure and applications by design. Prisma Cloud enables you to integrate security into developer tools and workflows so that you can keep pace with the agility and rapid release cycles.
Secure the Infrastructure
Visibility is about knowing what to protect and what to protect it against so that you can identify threats and prevent bad outcomes. Identifying threats, understanding the impact to your business and implementing security guardrails is essential to having a secure network.
Secure the Runtime
Prevent breaches across your workloads, web applications and APIs. Runtime protections cover against threats across your public cloud infrastructure, APIs, and data at runtime — while also protecting your applications across VMs, containers and Kubernetes, and serverless architectures.
Secure the Source
Prevent risks by securing infrastructure and applications by design. Prisma Cloud enables you to integrate security into developer tools and workflows so that you can keep pace with the agility and rapid release cycles.
Zero blind spots
Gain a better understanding of what tools and frameworks are in use, and which ones are linked to production environments
- Connect Prisma Cloud to your VCS and CI/CD Systems
- Assess your Code Repositories
- Get to Know SDLC Technologies, Shadow IT, Unmanaged Assets
- Assess third- party Technologies Used in the Engineering Ecosystem
- Explore the Organization SBOM (Software Bill of Materials)
Risk prevention
Reduce new vulnerabilities and lower the time to remediate existing vulnerabilities by fixing and preventing issues in code
- Subscribe to the Add-On Features
- Onboard your Version Control System
- Explore High-Priority IaC Risks
- Explore High-Priority SCA Risks
- Explore High-Priority Secrets Risks
- Proactively Help Developers Secure Code
- Customize your Policies
- Detect and Remediate Drift
Secure pipeline
Find and fix misconfigurations in your VCS and CI/CD pipelines so that bad actors cannot inject code or steal credentials
- Subscribe to CI/CD Security
- Connect Prisma Cloud to your VCS and CI/CD Systems
- Explore High-Priority CI/CD Security Risks
- Investigate and Reduce the Attack Surface of the Engineering Ecosystem
Secure the Infrastructure
Visibility is about knowing what to protect and what to protect it against so that you can identify threats and prevent bad outcomes. Identifying threats, understanding the impact to your business and implementing security guardrails is essential to having a secure network.
Zero blind spots
- Gain visibility into your cloud estate
- Gain visibility into your shadow cloud assets
- What are your top risks
- Identify identity risks
- Discover public exposure and sensitive data
- Detect vulnerabilities
- Discover your API endpoints and risks
- Discover — Onboard your Cloud Accounts
- Assess — Use Policies and Alerts
- Investigate — Analyze for Deeper Insight
- Adopt —Increase Security Coverage
- Subscribe to Cloud Discovery and Asset Management
- View your Unmanaged Asset Inventory and Discovery and Exposure Management Dashboard.
- Review unmanaged assets
- Monitor the CDEM Dashboard daily
- Prioritize risks to safeguard your most valuable assets in the public cloud
- Subscribe to CIEM
- Onboard your cloud accounts
- Connect your IdP for enhanced visibility
- Explore high-priority identity risks
- Investigate top identity concerns
- Customize your policies
- Mitigate identity risks
- Subscribe to Data Security
- Provide additional permissions for scanning data stores
- Set up integrations
- Take action
- Onboard your cloud accounts, repositories, and container image registries
- Analyze your vulnerability landscape
- Understand the code to cloud impact of the vulnerabilities
- Take action
- Investigate to learn more
- Increase API visibility
- Assess the level of risk in your discovered APIs
- Investigate incidents and suspicious activity
Achieve regulatory compliance
- View compliance standards and set your baseline
- Generate compliance reports
- Review policies and adjust compliance mappings
- Customize compliance standards to enforce your business goals
Personalize security to close gaps
- Choose your focus
- Tune policies and alert thresholds for automated efficiency
- Configure compliance standards to align with organizational requirements
- Query and write custom policy
- Tailor your dashboards and reports
Secure the Runtime
Prevent breaches across your workloads, web applications and APIs. Runtime protections cover against threats across your public cloud infrastructure, APIs, and data at runtime — while also protecting your applications across VMs, containers and Kubernetes, and serverless architectures.
Prevent API and web application attacks
Prioritize preventative measures to reduce exposure
- Create WAAS rules
- Enable WAAS protection for malicious activity
- Review examples
- Protect container-based web application against OWASP Top-10 Risks
- Ensure traffic received by your container-based APIs adheres to the API specification