Private App Security
Focus
Focus
What's New in the NetSec Platform

Private App Security

Table of Contents

Private App Security

Private App Security in Prisma Access.
Enterprise private applications used by internal employees and contractors are often kept private because of their critical business data (such as intellectual property) or the difficulty in migrating them to a SaaS model. Because of the sensitive data they host, private apps are often prime targets for malicious actors. However, their internal accessibility often gives administrators a false sense of security.
While Secure Access Service Edge (SASE) and Zero Trust Network Access (ZTNA) principles such as least privilege access and data security contribute to protecting such private applications, they are still at risk of app-centric attacks (such as account takeovers [ATOs] and application logic exploits). These attacks increase the risk to applications, especially considering the prevalence of bring your own devices (BYODs) and "work from anywhere" environments, where compromised internal hosts should be a concern.
Prisma Access Private App Security not only offers foundational web application firewall (WAF) capabilities, such as protection against OWASP Top 10 attacks, rate limiters for DDoS protections, and bot controls, but it delivers next-generation functionalities that enable admins to overcome traditional WAF challenges above and protect the modern app-verse. This includes:
  • Private App Security Intelligent Policy Recommendations, accompanied by rich impact evaluation reports, enable admins to maintain a strong app security posture while minimizing the risk of unintended effects when adopting new policies.
  • Automatic App Fingerprinting allows Private App Security to accurately detect anomalies in the app by app usage behaviors, providing a high efficacy against new day-0 sophisticated attacks.
Private App Security is a Prisma SASE native component, providing complete visibility into all app traffic, regardless of user, device, or destination. This unique architectural advantage over legacy WAF solutions provides:
  • Automatic discovery of private app inventory
  • Critical contextual insights for the sources of the detected attacks such as user-ID, device-ID, branch, location: these are critical details in the mitigation process of a compromised host.