To help customers address the diverse cloud and virtualization use cases and the growing need for greater performance, the VM-Series has been optimized and expanded to deliver industry-leading performance of up to 16Gbps of App-ID enabled firewall throughput across five models. Customers can protect their cloud and virtualization initiatives with a security feature set that mirrors those protecting their physical networks and delivers a consistent security posture from the network to the cloud.


White Paper

Executive Overview: The Next Evolution in Cloud Security

The current landscape of networking and security overlay products are creating administrative problems with cost and complexity, and falling short on the protections that organizations need. Learn about how Palo Alto Networks is changing the game with GlobalProtect Cloud Service and Aperture.

  • 267

Datasheet

Prisma Public Cloud for Microsoft Azure

Prisma Public Cloud for Microsoft Azure dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.

  • 112

Datasheet

Prisma Public Cloud at a Glance

With RedLock® by Palo Alto Networks, organizations can harness the power of machine learning to maintain compliance and govern security, even across the most fragmented multi-cloud environments.

  • 91

Datasheet

Prisma Public Cloud for GCP

Prisma Public Cloud for Google Cloud dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.

  • 91

Datasheet

VM-Series for VMware

Key features, performance capacities and specifications of VM-Series for VMware.

  • 3264

White Paper

Security for Cloud-Native Architectures

Read our new e-book to take a deep dive into various cloud-native architectures and CI/CD workflows, how they affect your security posture, and how the latest cloud security tools – including containers – can dramatically boost your protection.

  • 126