Learn more about Zero Trust Security
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Network Security
  • Secure Access Service Edge
  • Cloud-Native Security
  • Security Operations
  • Threat Intel & Consulting
  • More
  • GB
    Language
  • Contact Us
  • Resources
  • Get support
  • Get Started

Prisma Cloud for GCP

  • Download
Jul 19, 2019 at 09:00 AM

Public cloud computing adoption is outpacing cybersecurity defenses. The absence of a physical network boundary to the internet, the risk of accidental exposure by users with limited security expertise, decentralized visibility, and the dynamic nature of the cloud increases the attack surface by orders of magnitude. While point security products may be able to address each discrete challenge, they lack context and create alert fatigue.

More information - and context - leads to better security decision making. Prisma Cloud for Google Cloud dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk. Through a new machine learning-driven approach, Prisma Public Cloud for Google Cloud enables organizations to fulfill their obligations in the shared responsibility model. 


Datasheet

At a Glance: Prisma Cloud Compute Edition

Read the at a glance document to find out how.

January 9, 2020
  • 660

Datasheet

Prisma Cloud at a Glance

With Prisma Cloud by Palo Alto Networks®, organizations can maintain compliance, govern security, and enable security operations across public cloud computing environments.

January 9, 2020
  • 1330

Datasheet

Prisma Cloud for Microsoft Azure

Prisma Cloud for Microsoft Azure dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.

July 19, 2019
  • 917

White Paper

AWS Lambda Security Best Practices

Read the e-book to learn serverless security best practices to secure AWS Lambda environments.

February 19, 2020
  • 123

White Paper

Security for Cloud-Native Architectures

Read our new e-book to take a deep dive into various cloud-native architectures and CI/CD workflows, how they affect your security posture, and how the latest cloud security tools – including containers – can dramatically boost your protection.

December 11, 2019
  • 100

Datasheet

Prisma Cloud for Amazon Web Services

More information and context lead to better security decision-making. Prisma™ Cloud (formerly RedLock) for AWS® dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources, including user activity, resource configurations, network traffic, threat intelligence and vulnerability feeds, to provide a complete view of public cloud risk. Through a new machine learning-driven approach, Prisma enables organizations to fulfill their obligations in the Shared Responsibility Model.

July 18, 2019
  • 453

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability

Copyright © 2022 Palo Alto Networks. All rights reserved