Search
  • Get support

  • Secure the Enterprise

  • Secure the Cloud

  • Secure the Future
  • More
  • Get support

Prisma Public Cloud at a Glance

  • Download

Jan 09, 2020 at 09:00 AM

Threat defense in the cloud requires a new machine learning-driven approach that correlates disparate security data sets to provide comprehensive visibility, detect threats, and enable rapid response across fragmented cloud environments. With Prisma™ Public Cloud (formerly RedLock) by Palo Alto Networks®, organizations can maintain compliance, govern security, and enable security operations across public cloud computing environments.


Datasheet

At a Glance: Prisma Cloud Compute Edition

Read the at a glance document to find out how.

January 9, 2020
  • 277

Datasheet

Prisma Public Cloud for Microsoft Azure

Prisma Public Cloud for Microsoft Azure dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.

July 19, 2019
  • 218

Datasheet

Prisma Public Cloud for Amazon Web Services

More information and context lead to better security decision-making. Prisma™ Public Cloud (formerly RedLock) for AWS® dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources, including user activity, resource configurations, network traffic, threat intelligence and vulnerability feeds, to provide a complete view of public cloud risk. Through a new machine learning-driven approach, Prisma enables organizations to fulfill their obligations in the Shared Responsibility Model.

July 18, 2019
  • 131

White Paper

The Business Case for Cloud Threat Defense

Read this report for an understanding of how RedLock can reduce financial risks due to security breaches, third-party tools and labor requirements to resolve issues faster; provide security governance and increase cross-team visibility such as asset management; and easily generate compliance reports that map and provide audit trails for your cloud resources.

December 17, 2019
  • 90

White Paper

Security for Cloud-Native Architectures

Read our new e-book to take a deep dive into various cloud-native architectures and CI/CD workflows, how they affect your security posture, and how the latest cloud security tools – including containers – can dramatically boost your protection.

December 11, 2019
  • 162

White Paper

The Continuum of Cloud Native Topologies

In this white paper, John Morello, Chief Technology Officer at Twistlock, shares a helpful model of viewing the different cloud native technologies as a continuum, to address different scenarios and efficiently choose which combination of technologies work best for running different workloads.

March 3, 2020
  • 17

Want to be first to know?

Subscribe to Palo Alto Networks

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Company

  • Company
  • Tech Docs
  • Careers
  • Report a Vulnerability

Legal Notices

  • Privacy
  • Terms of Use
  • Documents
  • GDPR Readiness

Account

  • Manage a Subscription
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube

© 2020 Palo Alto Networks, Inc. All rights reserved.