AI Access Security Dashboard for Prisma Access Browser
AI Access Security's dashboard provides visibility into AI application
access, threats, and data transfers for standalone Prisma Access Browser users.
Where Can I Use This? | What Do I Need? |
- Prisma Access Browser standalone
|
- Prisma Access Browser Standalone license
|
AI Access Security is
integrated with the
Prisma Access Browser to
provide comprehensive GenAI app visibility, access control, data, and threat protection
to
Prisma Access Browser standalone customers. This integration delivers the most
comprehensive catalog of GenAI apps with deep last mile controls such as data
classification and real-time threat defense. As a
Prisma Access Browser standalone security
administrator, you can access
AI Access Security under the Insights menu to
monitor third party AI application usage through
Prisma Access Browser with detailed
analytics including application metrics, user activity, threats detected, and data
transfers.
The GenAI Apps monitoring feature provides detailed application metrics including total,
allowed, and blocked GenAI applications, enabling administrators to maintain
comprehensive oversight of AI tool usage within their organization. Additionally, the
Unique GenAI Users tracking capability offers visibility into user access patterns,
allowing administrators to drill down into individual user activities and review
specific GenAI applications that have been allowed or blocked for particular users
through the enhanced Events page filtering system.
Security enhancements include advanced threat detection capabilities that monitor and
block malicious URLs and files specifically within GenAI applications. The system now
provides detailed threat analytics through the Threats Detected widget, categorizing
security incidents by malware type including malicious websites and file-based threats.
Data protection has been significantly strengthened through the new Data Transfers
monitoring system, which leverages Enterprise Data Loss Prevention (E-DLP) profiles to
detect sensitive data incidents across various activities including file uploads and
downloads, clipboard operations, content sanitization, screen sharing, and printing
activities.