Back to Journey to the Prismaverse Back to Journey to the Prismaverse
Play again
Your results
Play again
  • Journey to the Prismaverse custom checklist

    Thanks for playing Journey to the Prismaverse!

    Great job defending Cloud City — here's your customized Prismaverse report. Use this tool to help identify the critical capabilities you need to make your cloud security even stronger.

    Critical

    These capabilities help protect against the most prevalent and dangerous security vulnerabilities currently facing cloud apps. Explore each card and see if your current cloud app security capabilities are up to the challenge.

    High

    After your most critical needs are met, what are your next steps for strengthening your cloud security? Check out these additional capabilities and see which cards are missing from your real-life battle deck.

    The Prismaverse guide to defending your cloud applications

    Thanks for playing Journey to the Prismaverse!

    This guide will help you understand more about the capabilities needed to protect your applications from code to cloud.

    Prismaboost - Infinity Graph and Code-to-Cloud Intelligence

    Attack Card 2
    Defense Card 2

    Use these Prisma® Cloud capabilities to uncover blind spots with end-to-end visibility, map the interconnected links among cloud assets, prioritize and track vulnerabilities, and manage remediation across your applications.

    Learn more about Infinity Graph.
    Learn more about code-to-cloud intelligence.

    Critical – Data Security

    Attack Card 2
    Defense Card 2

    Discover and protect all your data with data classification and malware scanning across your public cloud storage.

    Learn more about secret scanning.

    Critical – Cloud Security Posture Management

    Attack Card 2
    Defense Card 2

    Use CSPM to detect and prevent misconfigurations and threats that lead to data breaches and compliance violations.

    Learn more about data securtiy.
    DOWNLOAD
  • High - Agentless Secret Scanning

    Agentless Secret Scanning
    Agentless Secret Scanning

    Enable secret scanning in source code management systems to find and secure exposed and vulnerable secrets across your repositories and CI/CD pipelines.

    Learn more about secret scanning.

    High – CIEM

    CIEM
    CIEM

    Use cloud infrastructure entitlement management to enforce least-privileged access protocols and multifactor authentication to protect your cloud against breaches.

    Learn more about CIEM.

    High –User and Entity Behavior Analytics

    User and Entity Behavior Analytics
    Cloud Security Posture Management

    Deploy ML-powered user and entity behavior analytics to identify what’s normal and automatically flag behaviors that deviate from the baseline.

    Learn more about UEBA.

    High –High - Vulnerability Scanning: Cloud Workload Protection

    Vulnerability Scanning: Cloud Workload Protection
    Vulnerability Scanning: Cloud Workload Protection

    Deliver flexible cloud workload protection that enables DevOps and cloud infrastructure teams to adopt the architecture they need without security worries.

    Learn more about cloud workload protection.

    High - Code Security

    Code
                  Security
    Code
                   Security

    Automatically examine open-source dependencies and address vulnerabilities and license compliance issues with context-aware prioritization.

    Learn more about code security.

    High - Web Application and API Security  

    Application and API Security
    Application and API Security

    WAAS deploys agent-based (or agentless) integrated protection to APIs and web applications across any cloud-native architecture for both public and private cloud.

    Learn more about WAAS.