www.paloaltonetworks.com Open in urlscan Pro
23.215.18.118  Public Scan

Submitted URL: https://www.dig.security/privacy-policy
Effective URL: https://www.paloaltonetworks.com/prisma/cloud/cloud-data-security
Submission: On October 01 via api from IL — Scanned from IL

Form analysis 1 forms found in the DOM

Name: footer_form_manage_subscriptionsPOST /apps/pan/public/formsubmithandler.submitform.json

<form id="footer_form_manage_subscriptions" name="footer_form_manage_subscriptions" class="form d-flex flex-wrap" action="/apps/pan/public/formsubmithandler.submitform.json" method="POST" novalidate="" data-lang="en_US"><input type="hidden"
    name="mktoOptIn" value="true"><input type="hidden" name="Qualifying_Campaign__c" value="7010g000001J5shAAC"><input type="hidden" name="emailFormMask" value=""><input type="hidden" name="Company" id="Company" value=""><input type="hidden"
    name="FormName" value="subscription-all-corp-site-us"><input type="hidden" name="formid" value="1086"><input type="hidden" name="formVid" value="1086"><input type="hidden" name="munchkinId" value="531-OCS-018"><input type="hidden"
    name="programId" value="5373">
  <div class="footer-form-input-container d-flex flex-column">
    <div class="d-flex"><label class="form-field" aria-label="Enter your email now to subscribe!" for="PAN_FOOTER_EMAIL_FIELD"><span class="sr-only" style="display: none;">Enter your email now to subscribe!</span><input type="text" name="Email"
          required="" class="mb-md-3 body-serif-1 text-white" placeholder="Enter your email now to subscribe!" id="PAN_FOOTER_EMAIL_FIELD" pattern="[a-zA-Z0-9._%+\-]+@[a-zA-Z0-9.\-]+\.[a-zA-Z]{2,}$">
        <div class="form-validation validation body-serif-4"></div>
        <div class="validation-icon"></div>
      </label>
      <div class="actions d-none d-md-block"><button type="submit" class="btn btn-primary flex-grow-0 flex-shrink-0 ml-md-4" disabled="" data-page-track="true" data-page-track-value="cloud-data-security:footer:Sign up">Sign up <i></i></button></div>
    </div>
    <div id="PAN_FOOTER_CAPTCHA_HOLDER" class="mb-2 mt-sm-2 mt-xl-0">
      <div class="g-recaptcha" data-expired-callback="recaptchaExpired" data-callback="captchaComplete" data-sitekey="6Lc5EhgTAAAAAJa-DzE7EeWABasWg4LKv-R3ao6o"></div>
    </div>
    <div class="legal">
      <p class="label-3 text-400 text-white form-legal"> By submitting this form, you agree to our
        <a class="text-white" href="/legal-notices/terms-of-use" data-page-track="true" data-page-track-value="cloud-data-security:footer:terms-of-use">Terms of Use</a> and acknowledge our
        <a class="text-white" href="/legal-notices/privacy" data-page-track="true" data-page-track-value="cloud-data-security:footer:privacy">Privacy Statement</a>. </p>
    </div>
    <div class="mobile-actions d-block d-md-none"><button type="submit" class="btn btn-primary flex-grow-0 flex-shrink-0 ml-0" disabled="" data-page-track="true" data-page-track-value="cloud-data-security:footer:mobile:Sign up">Sign up
        <i></i></button></div>
  </div>
</form>

Text Content

AI-SPM is generally available to all Prisma® Cloud users as we continue the
rollout of Secure AI by Design product portfolio.     Let's go!
 * 
 * Why Prisma Cloud
 * Products
   Products
   Platform
    * Prisma Cloud
      Protect applications from code to cloud
    * What's New
      See the latest innovations from Prisma Cloud
   
   Categories
    * Cloud Security Posture Management
      Gain visibility, compliance and governance across multicloud environments
    * Cloud Workload Protection
      Secure host, containers, Kubernetes (K8s) and serverless functions
    * Code Security
      Shift left and secure applications by design
   
    * Cloud Infrastructure Entitlement Management Enforce least privilege access
      to cloud infrastructure
    * Web Application & API Security Protect applications and APIs against web
      based attacks
    * Cloud Network Security Secure the network that connects applications
    * Cloud Discovery & Exposure Management Combat rogue cloud deployments
    * Data Security Posture Management Classify and secure sensitive data
    * AI Security Posture Management Secure AI powered applications

 * Solutions
   Solutions
   Use Cases
    * Risk Prevention
    * Fix misconfigurations in IaC
    * Manage OSS vulnerabilities (SCA)
    * Avoid secrets exposure
    * Protect CI/CD pipelines
   
    * Visibility & Control
    * Detect misconfigurations
    * Generate compliance reports
    * Reduce excessive permissions
    * Prevent cloud data breaches
    * Manage shadow clouds
    * Vulnerability management
   
    * Runtime Protection
    * Detect threats
    * Container and Kubernetes security
    * Protect Hosts / VMs
    * Defend serverless functions
    * Protect web applications
    * API security
   
   Industries
    * Federal

 * Environments
   Environments
   Environments We Secure
    * Cloud Service Providers
    * Alibaba Cloud
    * Amazon Web Services
    * Google Cloud
    * Microsoft Azure
    * Oracle Cloud Infrastructure
   
    * Application Platforms
    * Docker
    * Kubernetes
    * Red Hat OpenShift
    * ServiceNow
    * VMWare Tanzu
   
    * Cloud Automation
    * HashiCorp

 * Product Tour
 * Resources
   Resources
   Product Information
    * Datasheets
    * Explore Demos
    * Technical Documentation
    * Knowledge Base
    * Support
    * Professional Services
    * Technology Partners
    * Open Source
   
   Learn & Connect
    * Blog
    * Research
    * DevSecTalks
    * Cloud Security Cyberpedia
    * Customer Success Stories
    * Analyst & Research Reports
    * Whitepapers
    * eBooks
    * Bootcamps
    * Videos
    * Developer Resources
   
   CXO Research
   The State of Cloud-Native Security 2024 Report
   Get your copy
   ON-DEMAND VIRTUAL EVENT
   The Complete Cloud Security Platform.
   End-to-End of Story.
   Watch now

 * 
 * Request a Trial




Search
All
 * Tech Docs


Close search modal

--------------------------------------------------------------------------------


DATA SECURITY POSTURE MANAGEMENT (DSPM)

DISCOVER, CLASSIFY AND PROTECT DATA IN CLOUD ENVIRONMENTS. PREVENT EXFILTRATION
AND COMPLIANCE VIOLATIONS.

 * Request guided trial

prismaprisma

ON-DEMAND WEBINAR


SECURING THE DATA
AND AI LANDSCAPE WITH
DSPM AND DDR

REGAIN VISIBILITY AND CONTROL OVER YOUR DATA
ACROSS MULTICLOUD ENVIRONMENTS.

 * Watch now

prismaprisma
prismaprisma
PrevNext

WHY IT MATTERSOUR APPROACHMODULESRESOURCES
 * WHY IT MATTERS
 * OUR APPROACH
 * MODULES
 * RESOURCES




DATA IS AN ORGANIZATION’S MOST IMPORTANT DIGITAL ASSET AND THE FOCAL POINT OF
SECURITY AND COMPLIANCE. BUT GROWING DATA VOLUMES, INCREASED REGULATION AND THE
SHIFT TOWARD AI MAKE IT DIFFICULT TO EFFECTIVELY MONITOR AND PROTECT DATA IN THE
CLOUD.


READ ABOUT OUR APPROACH TO CLOUD DATA SECURITY.

Read the blog



VISIBILITY INTO SENSITIVE DATA IS LIMITED

Cloud data is spread between multiple cloud providers and dozens of datastores –
including managed, unmanaged, structured and unstructured storage. Organizations
struggle to understand which sensitive data they hold, who can access it, and
where it’s exposed.


PRIORITIZATION IS PARAMOUNT

Security teams can get overwhelmed due to the volume of misconfigurations and
alerts that need their attention. Prioritizing threat vectors based on the risk
they pose to sensitive data is key to efficiently allocating limited security
resources.


DATA PROTECTION AND COMPLIANCE REQUIRES CONTEXT

To mitigate data risk, organizations need to look beyond misconfigurations. Data
lineage, exposure risk analysis, usage patterns and data flow monitoring are
needed to contextualize and effectively respond to incidents.




REPORT: THE STATE OF CLOUD DATA SECURITY IN 2023

Download the report


DISCOVER, CLASSIFY, PROTECT AND GOVERN DATA IN CLOUD ENVIRONMENTS

Prisma® Cloud Data Security Posture Management (DSPM) allows organizations to
securely scale their data and AI infrastructure. Building on unique data
discovery, classification and monitoring capabilities, Prisma Cloud puts data at
the center of Code to Cloud™ security.
 * Support for AWS, Azure, GCP and Snowflake
 * Find shadow data and misconfigured datastores
 * Continuously monitor data at rest and in transit

 * 
   Data discovery and classification
 * 
   Data risk analysis
 * 
   Data privacy and compliance
 * 
   Data access governance
 * 
   Data detection and response
 * 
   Malware prevention



--------------------------------------------------------------------------------

THE PRISMA CLOUD SOLUTION


OUR APPROACH TO CLOUD DATA SECURITY




DATA DISCOVERY AND CLASSIFICATION

Prisma Cloud automatically finds and contextualizes sensitive data. Eliminate
data blind spots, find shadow data and bolster your security and compliance
posture with automated data classification. Prisma Cloud DSPM protects your
datastores (including database and object storage) across the four major public
cloud providers.

 * COMPREHENSIVE COVERAGE
   
   Find all sensitive or regulated data, regardless of where data resides –
   infrastructure as a service (IaaS), platform as a service (PaaS), and
   database as a service (DBaaS) assets.

 * AUTOMATED DATA CLASSIFICATION
   
   Use 100+ pre-built classifiers to identify PII, financial information, health
   records, developer secrets and compliance-related data. Customize any
   classifier or build your own from scratch.

 * FAST, AGENTLESS SCANNING AND CLASSIFICATION
   
   Prisma Cloud DSPM provides a full mapping of your sensitive data and risk in
   24 hours, no connectors required.

 * SENSITIVE DATA STAYS IN YOUR ACCOUNT
   
   Data is scanned and classified in your cloud account, ensuring data residency
   compliance. Prisma Cloud DSPM relies on metadata and cloud logs to minimize
   impact on performance.

Learn more





DATA RISK ANALYSIS

Misconfigured cloud resources can lead to data breach and compliance violations.
Publicly exposed assets, over-permissive access control and violations of data
residency or privacy regulations can have costly consequences. Prisma Cloud
continuously monitors, identifies and prioritizes vulnerabilities in cloud data
resources.

 * VISIBILITY INTO DATA AT RISK
   
   Get visibility into your data in complex, multicloud environments. Understand
   where sensitive information is exposed across structured and unstructured
   data in storage, analytics and database services.

 * PREBUILT AND CUSTOM POLICIES
   
   Use templates or define your policies to find data flows and
   misconfigurations that put your organization at risk: publicly-exposed
   storage, violations of residency requirements, excessive access permissions
   and more.

 * UNIFIED POLICY ENGINE
   
   Apply the same security policies wherever your data lives, based on a
   continuously updated threat model and the unique characteristics of data
   environments – data movement, lineage and regulatory considerations.

Learn more





DATA PRIVACY AND COMPLIANCE

Prisma Cloud DSPM helps you strengthen your privacy and compliance posture by
understanding how sensitive data is replicated or consumed across your cloud
environments. See how regulated data travels through different cloud services
and environments to detect issues, such as violations of data residency
requirements or non-compliant replication between environments.

 * IDENTIFY SENSITIVE DATA AT REST, IN USE AND IN MOTION
   
   Prisma Cloud DSPM monitors data flows between storage locations and
   environments (e.g., between production and development), allowing you to see
   the full path leading to a compliance issue.

 * GET NOTIFIED WHEN DATA FALLS OUT OF COMPLIANCE
   
   See when specific data flows put you at risk of compliance violation, such as
   PII moved into non-compliant regions, or healthcare records moved into
   unencrypted storage.

 * PREVENT DATA BREACH AND INSIDER THREATS
   
   Find out if data is moving into an unauthorized location by seeing who has
   access at source and target. Ensure that data stays in monitored storage and
   doesn’t leave your cloud account.

Learn more





DATA ACCESS GOVERNANCE

Preventing unauthorized access to data is a core aspect of cybersecurity – but
many organizations struggle with complex IAM policies, cross-account permissions
and cloud service sprawl. Prisma Cloud DSPM gives you the tools to see who has
access to your critical data assets, assign data owners and create
accountability for security and compliance.

 * VISUAL MAP OF ACCESS HOLDERS
   
   Get a clear visual representation of your sensitive data and a mapping of
   identities and accounts with access permissions. Make sense of myriad managed
   permissions granted to consultants, vendors and employees.

 * NOTIFICATIONS FOR HIGH-PRIORITY DATA ACCESS RISKS
   
   Prisma Cloud DSPM alerts you to significant incidents such as cross-account
   access to sensitive data, over-privileged permissions and application, and
   unused or out-of-date permissions.

 * CONTINUOUS DATA ACCESS MONITORING
   
   Prisma Cloud DSPM tracks all data interactions including changes to
   permissions across the data lifecycle, so you can rightsize permissions
   according to actual access and activity patterns.

Learn more





DATA DETECTION AND RESPONSE (DDR)

Cloud data remains in flux. Responding to changes days or weeks after they
happen might not prevent critical incidents. Prisma Cloud DSPM allows you to
detect and respond to high-priority incidents in minutes by monitoring your
environment and alerting you on important changes with full context and
prioritization.

 * AGENTLESS, DYNAMIC MONITORING FOR CLOUD ENVIRONMENTS
   
   Prisma Cloud DSPM analyzes cloud logs to detect potentially damaging
   scenarios, such as large-scale data downloads or regulated data copied into
   an insecure environment.

 * ALERTS IN NEAR REAL TIME
   
   Get notifications on matters that need your attention at this moment,
   including high-risk data movement, exfiltration or severe compliance
   violations. Enable effective incident response and remediation.

 * MULTIPLE INTEGRATIONS WITH YOUR SECURITY STACK
   
   Get alerts in the ticketing and messaging tools you’re using today, such as
   Jira and Slack. Integrate with SOAR and SIEM tools to activate automated and
   manual response workflows.

Learn more





MALWARE PREVENTION

Some IT applications allow users to upload data, which are then stored as files
in your object storage account (e.g. Amazon S3, Azure Blob). These files can
contain malware that could later “detonate” and put your organization at risk.
Prisma Cloud DSPM helps you detect malware with automated discovery and scanning
for files in cloud storage.

 * WILDFIRE® INTEGRATION
   
   Use the WildFire malware analysis engine, seamlessly integrated into Prisma
   Cloud DSPM, to quickly and easily identify malware hidden in your stored
   data. No separate, siloed security product required.

 * COMPLIANCE WITH MALWARE SCANNING REQUIREMENTS
   
   Compliance frameworks (e.g., PCI, NIST, GDPR), due diligence processes and
   RFI responses may require the scanning of certain data for malware. Prisma
   Cloud DSPM simplifies your path to compliance.

 * INTEGRATED DASHBOARD FOR MALWARE AND OTHER DATA RISK
   
   Use a single UI for comprehensive cloud data security. The Prisma Cloud DSPM
   dashboard displays all malware detected and analyzed to facilitate an audit
   or forensic investigation.

Learn more



Prisma Cloud
Prisma® Cloud is the industry’s most complete Cloud Native Application
Protection Platform (CNAPP), with the industry’s broadest security and
compliance coverage—for infrastructure, workloads, and applications, across the
entire cloud native technology stack—throughout the development lifecycle and
across hybrid and multicloud environments.
Learn more


CLOUD SECURITY POSTURE MANAGEMENT MODULES


VISIBILITY, COMPLIANCE, AND GOVERNANCE

Continuously monitor all cloud resources for misconfigurations, vulnerabilities
and other security threats. Simplify compliance reporting.

Learn more


THREAT DETECTION

Pinpoint the highest risk security issues using ML-powered and threat
intelligence-based detection with contextual insights.

Learn more


DATA SECURITY POSTURE MANAGEMENT

Discover, classify and protect data in cloud environments. Prevent exfiltration
and compliance violations.

Learn more

Featured Resources


GET MORE INSIGHT INTO WHAT PRISMA CLOUD CAN DO FOR YOUR BUSINESS

See all resources

GUIDE

YOUR GUIDE TO DATA-CENTRIC CLOUD SECURITY TOOLS

Download
Guide

SECURING THE DATA LANDSCAPE WITH DSPM AND DDR

Download
Datasheet

WHY DSPM MATTERS

Download
Blog post


CNAPP, DSPM AND DDR: A NEW AGE IN CLOUD SECURITY

Learn more
DATASHEET


PRISMA CLOUD: CLOUD SECURITY POSTURE MANAGEMENT

Download
Blog post

PRISMA CLOUD PROVIDES NEW EXTENSIVE USE CASES FOR AZURE CUSTOMERS

Learn more
PreviousNext



CUSTOMER STORIES

Hear how Pokemon, Sabre and ElevenPaths take advantage of Prisma Cloud's full
lifecycle security and full stack protection.


CLOUD SECURITY BASICS

Learn about DevSecOp trends and get practical tips from developers, industry
leaders and security professionals.


THE LATEST FROM OUR BLOG

Start with a piece that focuses on container security with Kubernetes cluster
awareness, then dive into the rest.


GET THE LATEST NEWS, INVITES TO EVENTS, AND THREAT ALERTS

Enter your email now to subscribe!


Sign up


By submitting this form, you agree to our Terms of Use and acknowledge our
Privacy Statement.

Sign up


PRODUCTS AND SERVICES

 * Network Security Platform
 * CLOUD DELIVERED SECURITY SERVICES
 * Advanced Threat Prevention
 * DNS Security
 * Data Loss Prevention
 * IoT Security
 * Next-Generation Firewalls
 * Hardware Firewalls
 * Strata Cloud Manager
 * SECURE ACCESS SERVICE EDGE
 * Prisma Access
 * Prisma SD-WAN
 * Autonomous Digital Experience Management
 * Cloud Access Security Broker
 * Zero Trust Network Access

 * Code to Cloud Platform
 * Prisma Cloud

 * AI-Driven Security Operations Platform
 * Cortex XDR
 * Cortex XSOAR
 * Cortex Xpanse
 * Cortex XSIAM
 * External Attack Surface Protection
 * Security Automation
 * Threat Prevention, Detection & Response

 * Threat Intel and Incident Response Services
 * Proactive Assessments
 * Incident Response
 * Transform Your Security Strategy
 * Discover Threat Intelligence


COMPANY

 * About Us
 * Careers
 * Contact Us
 * Corporate Responsiblity
 * Customers
 * Investor Relations
 * Location
 * Newsroom


POPULAR LINKS

 * Blog
 * Communities
 * Content Library
 * Cyberpedia
 * Event Center
 * Manage Email Preferences
 * Products A-Z
 * Product Certifications
 * Report a Vulnerability
 * Sitemap
 * Tech Docs
 * Unit 42
 * Do Not Sell or Share My Personal Information

 * Privacy
 * Trust Center
 * Terms of Use
 * Documents

Copyright © 2024 Palo Alto Networks. All Rights Reserved

 * 
 * 
 * 
 * 
 * 
 * EN
   Select your language



Close
This site uses cookies essential to its operation, for analytics, and for
personalized content and ads. By continuing to browse this site, you acknowledge
the use of cookies. Privacy statement
Manage My Cookie Settings


Your Opt Out Preference Signal is Honored


PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information on cookie consent
Allow All


MANAGE YOUR CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices

Request a demo
Explore Latest Events
Get today’s cybersecurity intel
Contact Us
408-753-4000