* [Blog](https://www.paloaltonetworks.com.au/blog) * [Cloud Security](https://www.paloaltonetworks.com.au/blog/cloud-security/) * [Cloud Computing](https://www.paloaltonetworks.com.au/blog/category/cloud-computing-2/) * Designing Prisma Cloud to... # Designing Prisma Cloud to See Beyond [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2Fcloud-security%2Fuser-designed-interface%2F) [](https://twitter.com/share?text=Designing+Prisma+Cloud+to+See+Beyond&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2Fcloud-security%2Fuser-designed-interface%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2Fcloud-security%2Fuser-designed-interface%2F&title=Designing+Prisma+Cloud+to+See+Beyond&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com.au/blog/cloud-security/user-designed-interface/&ts=markdown) \[\](mailto:?subject=Designing Prisma Cloud to See Beyond) Link copied By [Larry St John](https://www.paloaltonetworks.com/blog/author/larry-st-john/?ts=markdown "Posts by Larry St John") Nov 21, 2023 6 minutes [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown) [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [Darwin](https://www.paloaltonetworks.com/blog/tag/darwin/?ts=markdown) Throughout the hundreds of hours I spent meeting with customers, sales teams, and internal users of Prisma Cloud, I was struck by the complexity of feedback I received. Soon into the process, a few key themes emerged. Each theme centered on the user experience of the product. Motivated by a desire to enhance usability, I embarked on a journey to better understand our users and their needs. To offer some insight into the approach, user experience teams and myself employed various UX methods to transform our application. ## The Process: From Users to Co-Creators ### Step 1: Deep-Dive User Interviews I started by reaching out to our users for one-on-one interviews. These weren't mere formalities. We had heartfelt conversations where I genuinely wanted to understand their struggles and aspirations with our product. The stories I heard were eye-opening. They spoke of the challenges they faced and the features they wished they had. I came away from the conversations with a clear picture of the emotional and functional needs of our users. ### Step 2: Broadening the Horizon with Surveys To complement the depth of the interviews, I rolled out surveys to a wider user base. The responses flooded in, providing a broader perspective on common issues and desired features. I was beginning to see patterns and areas where we could make the most impact. ### Step 3: Hands-On Usability Testing Armed with user input, I organized usability testing sessions. Watching real users navigate our application was a revelation. I could see where they hesitated, where they got stuck, and where our security protocols felt more like obstacles than safeguards. ### Step 4: Establishing Continuous Feedback I realized that to make lasting change, I needed ongoing input. I chose to champion the integration of feedback mechanisms within our application. This allows users to share their thoughts in real-time, ensuring we stay on the pulse of their needs. ### Step 5: Diving into Data Analytics Beyond the stories and feedback, I dove into the world of data analytics. Every click, every interaction offered a trove of information. Quantitative data, combined with the qualitative insights from earlier, painted a comprehensive picture of our user experience. > This helps to cut through noise and focus on important issues. ## Embracing Iterative Design With all this knowledge, I spearheaded an iterative design approach. Every change, every tweak was tested and validated with our users. We were no longer shooting in the dark. We were now co-creating with our users. A prime example of the outcomes of these methods is our new Persona Switcher. The Persona Switcher enables easy navigation to customizations that better address the needs of security professionals working in specific areas. By providing a personalized experience, it empowers them to efficiently manage the tasks most relevant to their roles and responsibilities, ultimately enhancing their overall workflow and productivity. ![Easy navigation to custom Cloud Security, Runtime Security and App Security workflows](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/11/word-image-308986-1.png) Figure 1: Easy navigation to custom Cloud Security, Runtime Security and App Security workflows With our process, we collected the common denominators of all the capabilities we've developed over the years. Examining these, we found that to create a platform that could truly meet the needs of diverse security teams, we needed to tightly couple and loosely align the capabilities of the platform. This was the key decision behind how we created our platform-level top navigation while still allowing autonomy to meet custom Cloud Security, Runtime Security and App Security workflows on the left navigation. ## Layering Transparent Elements The hundreds of hours invested in seeking out and listening to our users provided insights that factored into numerous aspects of Palo Alto Networks recent [Darwin release of Prisma Cloud](https://www.paloaltonetworks.com/blog/2023/10/announcing-innovations-cnapp-prisma-cloud/). One technique applied throughout --- layering transparent elements --- merits a brief mention. ### Streamlining Clarity in Complex Environments In the continuous enhancement of Prisma Cloud, we prioritize clarity amidst the complexity of cloud security. Our interface has been meticulously designed to guide security professionals through their infrastructure with ease. By strategically organizing information, we ensure that critical issues stand out, allowing for swift identification and action. This clarity of presentation means that potential security misconfigurations and vulnerabilities aren't lost in the noise. In fact, as one cloud security architect pointed out after a preview of our graphing elements, "This helps to cut through noise and focus on important issues." ![Using translucent overlays to reveal insights](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/11/word-image-308986-2.gif) Figure 2: Using translucent overlays to reveal insights Translucent overlays, as seen in figure 2, reveal insights. Network traffic flows and build pipelines can be shown with pulsing red pipes and links spanning the environment. As anomalies or threats are detected, the transparency allows users to view the underlying infrastructure impacted by suspicious data flows. Alert badges hovering over compromised components indicate problems without fully obstructing the view. Layering transparent elements effectively displays multiple data dimensions. By floating user behavior profiles, risk scores, and other analytics readouts transparently over relevant environments and assets, the underlying model remains clear. This visual hierarchy lets users focus on insights while maintaining perspective. ### Prioritizing Actionable Insights Our approach to data presentation is straightforward: prioritize actionable insights. We've structured our interface to present security metrics and alerts in a way that doesn't overwhelm but empowers. Security teams can now navigate through alerts and insights without losing sight of the broader security landscape. This streamlined presentation of data ensures that the most pertinent information is always at the forefront, enabling security professionals to make informed decisions quickly and confidently. ![Intuitive visibility when critical security metrics and warnings are shown in transparent overlays on top of summary charts and tables](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/11/codeandbuild.gif) Figure 3: Intuitive visibility when critical security metrics and warnings are shown in transparent overlays on top of summary charts and tables Our goal behind using transparent overlays centers on providing a visual experience that moves from the hidden to the seen, obscurity to clarity. As Prisma Cloud promises to shine a light into the shadows of the cloud attack surface, the UI purposely serves that intention. ## Designing for the Future Imagine a world where users aren't forced to sift through a labyrinth of data points to understand issues. With Prisma Cloud, the user interface (UI) plays a key role in representing visibility into the user's infrastructure, applications and data flows. As we continue to evolve and expand our capabilities with the aim of providing greater transparency and insight into cloud environments, we will utilize the methods detailed in this post --- and more --- to create feature-rich and tailored workflows that directly address the needs of our users. Our commitment to user-centric design ensures that we consistently strive for innovation and improvement, empowering our users with a solution that not only meets but exceeds their expectations in the ever-changing landscape of cloud security. ### Learn More To learn about [Prisma Cloud's latest innovations](https://www.paloaltonetworks.com/prisma/cloud/latest), tune in to our on-demand virtual event, [CNAPP Supercharged: A Radically New Approach to Cloud Security](https://start.paloaltonetworks.com/prisma-cloud-new-innovations-for-the-future-of-cloud-security-webinar-on-demand.html), where we'll show you how to streamline app lifecycle protection. And if you haven't tried Prisma Cloud, take it for a test drive with a free[30-day Prisma Cloud trial](https://www.paloaltonetworks.com/prisma/request-a-prisma-cloud-trial). *** ** * ** *** ## Related Blogs ### [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [Code to Cloud](https://www.paloaltonetworks.com/blog/cloud-security/category/code-to-cloud/?ts=markdown) [#### Elevate Cloud Security with the Flexibility and Simplicity of Custom Dashboards](https://www.paloaltonetworks.com.au/blog/cloud-security/custom-security-dashboards-data-assessment/) ### [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [#### Show Risk Burndown with the Code to Cloud Dashboard](https://www.paloaltonetworks.com.au/blog/cloud-security/security-kpis-metric-reporting-dashboard/) ### [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) [#### Streamline Risk Management with Context-Based Risk Prioritization](https://www.paloaltonetworks.com.au/blog/cloud-security/risk-prioritization-remediation/) ### [Cloud Workload Protection](https://www.paloaltonetworks.com/blog/category/cloud-workload-protection/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [#### Limitless Insights into Your Cloud Security Landscape with the Infinity Graph](https://www.paloaltonetworks.com.au/blog/cloud-security/infinity-graph-search-investigate/) ### [Cloud Native Application Protection Platform](https://www.paloaltonetworks.com/blog/category/cloud-native-application-protection-platforms/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [#### Code to Cloud Vulnerability Management](https://www.paloaltonetworks.com.au/blog/cloud-security/vulnerability-management-innovation/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/cloud-security/category/announcement/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Prisma Cloud: Darwin Release Introduces Code to Cloud Intelligence](https://www.paloaltonetworks.com.au/blog/2023/10/announcing-innovations-cnapp-prisma-cloud/) ### Subscribe to Cloud Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com.au/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language