Secure Internet Traffic Using Prisma Access
Table of Contents
5.1 Preferred and Innovation
Expand all | Collapse all
-
- Remote Networks: IPSec Termination Nodes and Service IP Addresses
- Remote Networks: IP Address Changes Related To Bandwidth Allocation
- Remote Networks: Service IP Address and Egress IP Address Allocation
- API Examples for Retrieving Prisma Access IP Addresses
- Get Notifications When Prisma Access IP Addresses Change
- Prisma Access Zones
- High Availability for Prisma Access
-
- Enable Dynamic Privilege Access for Prisma Access Through Common Services
- Authorize User Group Mapping in Cloud Identity Engine for Dynamic Privilege Access
- Enable the Access Agent
- Set Up the Agent Infrastructure for Dynamic Privilege Access
- Create a Snippet
- Create a Project
- Traffic Steering for Dynamic Privilege Access
- Push the Prisma Access Agent Configuration
- Download the Dynamic Privilege Access Enabled Prisma Access Agent Package
-
- Log in to the Dynamic Privilege Access Enabled Prisma Access Agent
- Change Preferences for the Dynamic Privilege Access Enabled Prisma Access Agent
- Connect the Dynamic Privilege Access Enabled Prisma Access Agent to a Different Location
- Switch to a Different Project
- Connect the Dynamic Privilege Access Enabled Prisma Access Agent to a Different Server
- Disable the Dynamic Privilege Access Enabled Prisma Access Agent
- View and Monitor Dynamic Privilege Access Users
- View and Monitor Dynamic Privilege Access Projects
- Automatic Tunnel Restoration in Dynamic Privilege Access Prisma Access Agents
- Manage Prisma SASE 5G
-
-
- Explicit Proxy Configuration Guidelines
- How Explicit Proxy Identifies Users
- Explicit Proxy Forwarding Profiles
- Explicit Proxy Best Practices
- Block Settings for Explicit Proxy
- Use Special Objects to Restrict Explicit Proxy Internet Traffic to Specific IP Addresses
- Configure Proxy Chaining with Blue Coat Proxy
- IP Address Optimization for Explicit Proxy Users- Proxy Deployments
- View User to IP Address or User Groups Mappings
- Report Mobile User Site Access Issues
- Enable Mobile Users to Access Corporate Resources
-
- Planning Checklist for Remote Networks
- Connect a Remote Network Site to Prisma Access
- Enable Routing for Your Remote Network
- Onboard Multiple Remote Networks
- Configure Remote Network and Service Connection Connected with a WAN Link
- Integrate a Shared Desktop VDI with Prisma Access Using Terminal Server
-
- Multitenancy Configuration Overview
- Plan Your Multitenant Deployment
- Create an All-New Multitenant Deployment
- Enable Multitenancy and Migrate the First Tenant
- Add Tenants to Prisma Access
- Delete a Tenant
- Create a Tenant-Level Administrative User
- Sort Logs by Device Group ID in a Multitenant Deployment
-
- Add a New Compute Location for a Deployed Prisma Access Location
- How BGP Advertises Mobile User IP Address Pools for Service Connections and Remote Network Connections
- Proxy Support for Prisma Access and Strata Logging Service
- Block Incoming Connections from Specific Countries
- Prisma Access for No Default Route Networks
-
-
- Default Routes With Prisma Access Traffic Steering
- Traffic Steering in Prisma Access
- Traffic Steering Requirements
- Default Routes with Traffic Steering Example
- Default Routes with Traffic Steering Direct to Internet Example
- Default Routes with Traffic Steering and Dedicated Service Connection Example
- Prisma Access Traffic Steering Rule Guidelines
- Configure Zone Mapping and Security Policies for Traffic Steering Dedicated Connections
- BGP Filtering and Route Metric Support on Service Connections in Prisma Access
-
- Configure Privileged Remote Access Settings
- Set Up the Privileged Remote Access Portal
- Configure Applications for Privileged Remote Access
- Set Up Privileged Remote Access Profiles
- Define Permissions for Accessing Privileged Remote Access Apps
- Manage Privileged Remote Access Connections
- Use Privileged Remote Access
Secure Internet Traffic Using Prisma Access
Learn about using Prisma Access to secure your internet traffic.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
The Importance of Internet Security
Securing internet access has never been more important and more challenging. Existing
legacy solutions struggle to detect evasive and targeted phishing and other
web-based attacks while at the same time neglecting new threats posed by unsecured
DNS traffic. Palo Alto Networks Prisma Access has internet security with
industry-first ML-powered Advanced URL Filtering and DNS Security services. Using
Prisma Access, you can prevent evasive and targeted phishing and fileless
attacks in real-time, and protect against the latest sophisticated DNS-based
attacks.
Prisma Access Cloud Secure Web Gateway (SWG)
A secure web gateway is a crucial element in today's digital landscape due to the
escalating complexity and frequency of cyberthreats. Cybercriminals continually
devise new tactics and techniques to breach security defenses, one of which is to
camouflage malicious code in seemingly legitimate websites. As users access these
compromised websites, they inadvertently leak credentials or expose organizations to
harmful code, which can wreak havoc if left unnoticed.
In such a risk-laden environment, the absence of a robust security gateway
significantly amplifies the risk to an organization's digital assets. Such risk
could lead to unauthorized access, data theft and disruption of business operations,
especially with the increasing prevalence of widespread phishing and ransomware
attacks. Without the security barrier provided by SWG, a ransomware attack could
effectively hold an organization hostage, leading to financial and reputational
harm.
The use of encrypted traffic is now commonplace, with HTTPS constituting the majority
of web traffic. An organization is at risk of security threats concealed within
encrypted channels if it lacks a SWG that can effectively decrypt and inspect this
traffic.
However, using multiple point products for SWG, private app access, and CASB only
complicates matters. Siloed products stitched together as one offering results in
feature parity gaps and poor security outcomes, leaving you vulnerable for attacks.
With these solutions, you get inconsistent security for internet and private
apps.
To address these challenges, Prisma Access offers a unified product, converging
management, policy, and data for all users and apps across all capabilities
including ZTNA, SWG, NG-CASB, FWaaS, DLP, and more.
Customers can easily migrate from legacy on-premises and cloud-based proxy solutions
toPrisma Access to gain inline visibility and control of internet and SaaS
app traffic with industry-leading AI-powered security protections.
Using Prisma Access to Secure Users and Endpoints
Prisma Access is designed to prevent successful cyberattacks, and that’s why it
does more than just secure the web. To stop cyberattacks, it’s necessary to inspect
all traffic. Anything short of a full inspection of all traffic introduces a
significant gap in security. Prisma Access consistently protects all traffic on
all ports and from all applications, enabling your organization to:
- Prevent successful cyberattacks with proven security philosophies and threat intelligence for deep visibility and precise control that extends across your organization.
- Fully inspect all application traffic bidirectionally—including SSL or TLS-encrypted traffic—on all ports, whether communicating with the internet, with the cloud, or between branches.
- Benefit from comprehensive threat intelligence powered by automated threat data from Palo Alto Networks and hundreds of third-party feeds.
Read more about Prisma Access and its
solutions.