www.paloaltonetworks.com
Open in
urlscan Pro
23.215.18.118
Public Scan
Submitted URL: https://www.dig.security/privacy-policy
Effective URL: https://www.paloaltonetworks.com/prisma/cloud/cloud-data-security
Submission: On October 01 via api from IL — Scanned from IL
Effective URL: https://www.paloaltonetworks.com/prisma/cloud/cloud-data-security
Submission: On October 01 via api from IL — Scanned from IL
Form analysis
1 forms found in the DOMName: footer_form_manage_subscriptions — POST /apps/pan/public/formsubmithandler.submitform.json
<form id="footer_form_manage_subscriptions" name="footer_form_manage_subscriptions" class="form d-flex flex-wrap" action="/apps/pan/public/formsubmithandler.submitform.json" method="POST" novalidate="" data-lang="en_US"><input type="hidden"
name="mktoOptIn" value="true"><input type="hidden" name="Qualifying_Campaign__c" value="7010g000001J5shAAC"><input type="hidden" name="emailFormMask" value=""><input type="hidden" name="Company" id="Company" value=""><input type="hidden"
name="FormName" value="subscription-all-corp-site-us"><input type="hidden" name="formid" value="1086"><input type="hidden" name="formVid" value="1086"><input type="hidden" name="munchkinId" value="531-OCS-018"><input type="hidden"
name="programId" value="5373">
<div class="footer-form-input-container d-flex flex-column">
<div class="d-flex"><label class="form-field" aria-label="Enter your email now to subscribe!" for="PAN_FOOTER_EMAIL_FIELD"><span class="sr-only" style="display: none;">Enter your email now to subscribe!</span><input type="text" name="Email"
required="" class="mb-md-3 body-serif-1 text-white" placeholder="Enter your email now to subscribe!" id="PAN_FOOTER_EMAIL_FIELD" pattern="[a-zA-Z0-9._%+\-]+@[a-zA-Z0-9.\-]+\.[a-zA-Z]{2,}$">
<div class="form-validation validation body-serif-4"></div>
<div class="validation-icon"></div>
</label>
<div class="actions d-none d-md-block"><button type="submit" class="btn btn-primary flex-grow-0 flex-shrink-0 ml-md-4" disabled="" data-page-track="true" data-page-track-value="cloud-data-security:footer:Sign up">Sign up <i></i></button></div>
</div>
<div id="PAN_FOOTER_CAPTCHA_HOLDER" class="mb-2 mt-sm-2 mt-xl-0">
<div class="g-recaptcha" data-expired-callback="recaptchaExpired" data-callback="captchaComplete" data-sitekey="6Lc5EhgTAAAAAJa-DzE7EeWABasWg4LKv-R3ao6o"></div>
</div>
<div class="legal">
<p class="label-3 text-400 text-white form-legal"> By submitting this form, you agree to our
<a class="text-white" href="/legal-notices/terms-of-use" data-page-track="true" data-page-track-value="cloud-data-security:footer:terms-of-use">Terms of Use</a> and acknowledge our
<a class="text-white" href="/legal-notices/privacy" data-page-track="true" data-page-track-value="cloud-data-security:footer:privacy">Privacy Statement</a>. </p>
</div>
<div class="mobile-actions d-block d-md-none"><button type="submit" class="btn btn-primary flex-grow-0 flex-shrink-0 ml-0" disabled="" data-page-track="true" data-page-track-value="cloud-data-security:footer:mobile:Sign up">Sign up
<i></i></button></div>
</div>
</form>
Text Content
AI-SPM is generally available to all Prisma® Cloud users as we continue the rollout of Secure AI by Design product portfolio. Let's go! * * Why Prisma Cloud * Products Products Platform * Prisma Cloud Protect applications from code to cloud * What's New See the latest innovations from Prisma Cloud Categories * Cloud Security Posture Management Gain visibility, compliance and governance across multicloud environments * Cloud Workload Protection Secure host, containers, Kubernetes (K8s) and serverless functions * Code Security Shift left and secure applications by design * Cloud Infrastructure Entitlement Management Enforce least privilege access to cloud infrastructure * Web Application & API Security Protect applications and APIs against web based attacks * Cloud Network Security Secure the network that connects applications * Cloud Discovery & Exposure Management Combat rogue cloud deployments * Data Security Posture Management Classify and secure sensitive data * AI Security Posture Management Secure AI powered applications * Solutions Solutions Use Cases * Risk Prevention * Fix misconfigurations in IaC * Manage OSS vulnerabilities (SCA) * Avoid secrets exposure * Protect CI/CD pipelines * Visibility & Control * Detect misconfigurations * Generate compliance reports * Reduce excessive permissions * Prevent cloud data breaches * Manage shadow clouds * Vulnerability management * Runtime Protection * Detect threats * Container and Kubernetes security * Protect Hosts / VMs * Defend serverless functions * Protect web applications * API security Industries * Federal * Environments Environments Environments We Secure * Cloud Service Providers * Alibaba Cloud * Amazon Web Services * Google Cloud * Microsoft Azure * Oracle Cloud Infrastructure * Application Platforms * Docker * Kubernetes * Red Hat OpenShift * ServiceNow * VMWare Tanzu * Cloud Automation * HashiCorp * Product Tour * Resources Resources Product Information * Datasheets * Explore Demos * Technical Documentation * Knowledge Base * Support * Professional Services * Technology Partners * Open Source Learn & Connect * Blog * Research * DevSecTalks * Cloud Security Cyberpedia * Customer Success Stories * Analyst & Research Reports * Whitepapers * eBooks * Bootcamps * Videos * Developer Resources CXO Research The State of Cloud-Native Security 2024 Report Get your copy ON-DEMAND VIRTUAL EVENT The Complete Cloud Security Platform. End-to-End of Story. Watch now * * Request a Trial Search All * Tech Docs Close search modal -------------------------------------------------------------------------------- DATA SECURITY POSTURE MANAGEMENT (DSPM) DISCOVER, CLASSIFY AND PROTECT DATA IN CLOUD ENVIRONMENTS. PREVENT EXFILTRATION AND COMPLIANCE VIOLATIONS. * Request guided trial prismaprisma ON-DEMAND WEBINAR SECURING THE DATA AND AI LANDSCAPE WITH DSPM AND DDR REGAIN VISIBILITY AND CONTROL OVER YOUR DATA ACROSS MULTICLOUD ENVIRONMENTS. * Watch now prismaprisma prismaprisma PrevNext WHY IT MATTERSOUR APPROACHMODULESRESOURCES * WHY IT MATTERS * OUR APPROACH * MODULES * RESOURCES DATA IS AN ORGANIZATION’S MOST IMPORTANT DIGITAL ASSET AND THE FOCAL POINT OF SECURITY AND COMPLIANCE. BUT GROWING DATA VOLUMES, INCREASED REGULATION AND THE SHIFT TOWARD AI MAKE IT DIFFICULT TO EFFECTIVELY MONITOR AND PROTECT DATA IN THE CLOUD. READ ABOUT OUR APPROACH TO CLOUD DATA SECURITY. Read the blog VISIBILITY INTO SENSITIVE DATA IS LIMITED Cloud data is spread between multiple cloud providers and dozens of datastores – including managed, unmanaged, structured and unstructured storage. Organizations struggle to understand which sensitive data they hold, who can access it, and where it’s exposed. PRIORITIZATION IS PARAMOUNT Security teams can get overwhelmed due to the volume of misconfigurations and alerts that need their attention. Prioritizing threat vectors based on the risk they pose to sensitive data is key to efficiently allocating limited security resources. DATA PROTECTION AND COMPLIANCE REQUIRES CONTEXT To mitigate data risk, organizations need to look beyond misconfigurations. Data lineage, exposure risk analysis, usage patterns and data flow monitoring are needed to contextualize and effectively respond to incidents. REPORT: THE STATE OF CLOUD DATA SECURITY IN 2023 Download the report DISCOVER, CLASSIFY, PROTECT AND GOVERN DATA IN CLOUD ENVIRONMENTS Prisma® Cloud Data Security Posture Management (DSPM) allows organizations to securely scale their data and AI infrastructure. Building on unique data discovery, classification and monitoring capabilities, Prisma Cloud puts data at the center of Code to Cloud™ security. * Support for AWS, Azure, GCP and Snowflake * Find shadow data and misconfigured datastores * Continuously monitor data at rest and in transit * Data discovery and classification * Data risk analysis * Data privacy and compliance * Data access governance * Data detection and response * Malware prevention -------------------------------------------------------------------------------- THE PRISMA CLOUD SOLUTION OUR APPROACH TO CLOUD DATA SECURITY DATA DISCOVERY AND CLASSIFICATION Prisma Cloud automatically finds and contextualizes sensitive data. Eliminate data blind spots, find shadow data and bolster your security and compliance posture with automated data classification. Prisma Cloud DSPM protects your datastores (including database and object storage) across the four major public cloud providers. * COMPREHENSIVE COVERAGE Find all sensitive or regulated data, regardless of where data resides – infrastructure as a service (IaaS), platform as a service (PaaS), and database as a service (DBaaS) assets. * AUTOMATED DATA CLASSIFICATION Use 100+ pre-built classifiers to identify PII, financial information, health records, developer secrets and compliance-related data. Customize any classifier or build your own from scratch. * FAST, AGENTLESS SCANNING AND CLASSIFICATION Prisma Cloud DSPM provides a full mapping of your sensitive data and risk in 24 hours, no connectors required. * SENSITIVE DATA STAYS IN YOUR ACCOUNT Data is scanned and classified in your cloud account, ensuring data residency compliance. Prisma Cloud DSPM relies on metadata and cloud logs to minimize impact on performance. Learn more DATA RISK ANALYSIS Misconfigured cloud resources can lead to data breach and compliance violations. Publicly exposed assets, over-permissive access control and violations of data residency or privacy regulations can have costly consequences. Prisma Cloud continuously monitors, identifies and prioritizes vulnerabilities in cloud data resources. * VISIBILITY INTO DATA AT RISK Get visibility into your data in complex, multicloud environments. Understand where sensitive information is exposed across structured and unstructured data in storage, analytics and database services. * PREBUILT AND CUSTOM POLICIES Use templates or define your policies to find data flows and misconfigurations that put your organization at risk: publicly-exposed storage, violations of residency requirements, excessive access permissions and more. * UNIFIED POLICY ENGINE Apply the same security policies wherever your data lives, based on a continuously updated threat model and the unique characteristics of data environments – data movement, lineage and regulatory considerations. Learn more DATA PRIVACY AND COMPLIANCE Prisma Cloud DSPM helps you strengthen your privacy and compliance posture by understanding how sensitive data is replicated or consumed across your cloud environments. See how regulated data travels through different cloud services and environments to detect issues, such as violations of data residency requirements or non-compliant replication between environments. * IDENTIFY SENSITIVE DATA AT REST, IN USE AND IN MOTION Prisma Cloud DSPM monitors data flows between storage locations and environments (e.g., between production and development), allowing you to see the full path leading to a compliance issue. * GET NOTIFIED WHEN DATA FALLS OUT OF COMPLIANCE See when specific data flows put you at risk of compliance violation, such as PII moved into non-compliant regions, or healthcare records moved into unencrypted storage. * PREVENT DATA BREACH AND INSIDER THREATS Find out if data is moving into an unauthorized location by seeing who has access at source and target. Ensure that data stays in monitored storage and doesn’t leave your cloud account. Learn more DATA ACCESS GOVERNANCE Preventing unauthorized access to data is a core aspect of cybersecurity – but many organizations struggle with complex IAM policies, cross-account permissions and cloud service sprawl. Prisma Cloud DSPM gives you the tools to see who has access to your critical data assets, assign data owners and create accountability for security and compliance. * VISUAL MAP OF ACCESS HOLDERS Get a clear visual representation of your sensitive data and a mapping of identities and accounts with access permissions. Make sense of myriad managed permissions granted to consultants, vendors and employees. * NOTIFICATIONS FOR HIGH-PRIORITY DATA ACCESS RISKS Prisma Cloud DSPM alerts you to significant incidents such as cross-account access to sensitive data, over-privileged permissions and application, and unused or out-of-date permissions. * CONTINUOUS DATA ACCESS MONITORING Prisma Cloud DSPM tracks all data interactions including changes to permissions across the data lifecycle, so you can rightsize permissions according to actual access and activity patterns. Learn more DATA DETECTION AND RESPONSE (DDR) Cloud data remains in flux. Responding to changes days or weeks after they happen might not prevent critical incidents. Prisma Cloud DSPM allows you to detect and respond to high-priority incidents in minutes by monitoring your environment and alerting you on important changes with full context and prioritization. * AGENTLESS, DYNAMIC MONITORING FOR CLOUD ENVIRONMENTS Prisma Cloud DSPM analyzes cloud logs to detect potentially damaging scenarios, such as large-scale data downloads or regulated data copied into an insecure environment. * ALERTS IN NEAR REAL TIME Get notifications on matters that need your attention at this moment, including high-risk data movement, exfiltration or severe compliance violations. Enable effective incident response and remediation. * MULTIPLE INTEGRATIONS WITH YOUR SECURITY STACK Get alerts in the ticketing and messaging tools you’re using today, such as Jira and Slack. Integrate with SOAR and SIEM tools to activate automated and manual response workflows. Learn more MALWARE PREVENTION Some IT applications allow users to upload data, which are then stored as files in your object storage account (e.g. Amazon S3, Azure Blob). These files can contain malware that could later “detonate” and put your organization at risk. Prisma Cloud DSPM helps you detect malware with automated discovery and scanning for files in cloud storage. * WILDFIRE® INTEGRATION Use the WildFire malware analysis engine, seamlessly integrated into Prisma Cloud DSPM, to quickly and easily identify malware hidden in your stored data. No separate, siloed security product required. * COMPLIANCE WITH MALWARE SCANNING REQUIREMENTS Compliance frameworks (e.g., PCI, NIST, GDPR), due diligence processes and RFI responses may require the scanning of certain data for malware. Prisma Cloud DSPM simplifies your path to compliance. * INTEGRATED DASHBOARD FOR MALWARE AND OTHER DATA RISK Use a single UI for comprehensive cloud data security. The Prisma Cloud DSPM dashboard displays all malware detected and analyzed to facilitate an audit or forensic investigation. Learn more Prisma Cloud Prisma® Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage—for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments. Learn more CLOUD SECURITY POSTURE MANAGEMENT MODULES VISIBILITY, COMPLIANCE, AND GOVERNANCE Continuously monitor all cloud resources for misconfigurations, vulnerabilities and other security threats. Simplify compliance reporting. Learn more THREAT DETECTION Pinpoint the highest risk security issues using ML-powered and threat intelligence-based detection with contextual insights. Learn more DATA SECURITY POSTURE MANAGEMENT Discover, classify and protect data in cloud environments. Prevent exfiltration and compliance violations. Learn more Featured Resources GET MORE INSIGHT INTO WHAT PRISMA CLOUD CAN DO FOR YOUR BUSINESS See all resources GUIDE YOUR GUIDE TO DATA-CENTRIC CLOUD SECURITY TOOLS Download Guide SECURING THE DATA LANDSCAPE WITH DSPM AND DDR Download Datasheet WHY DSPM MATTERS Download Blog post CNAPP, DSPM AND DDR: A NEW AGE IN CLOUD SECURITY Learn more DATASHEET PRISMA CLOUD: CLOUD SECURITY POSTURE MANAGEMENT Download Blog post PRISMA CLOUD PROVIDES NEW EXTENSIVE USE CASES FOR AZURE CUSTOMERS Learn more PreviousNext CUSTOMER STORIES Hear how Pokemon, Sabre and ElevenPaths take advantage of Prisma Cloud's full lifecycle security and full stack protection. CLOUD SECURITY BASICS Learn about DevSecOp trends and get practical tips from developers, industry leaders and security professionals. THE LATEST FROM OUR BLOG Start with a piece that focuses on container security with Kubernetes cluster awareness, then dive into the rest. GET THE LATEST NEWS, INVITES TO EVENTS, AND THREAT ALERTS Enter your email now to subscribe! Sign up By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Sign up PRODUCTS AND SERVICES * Network Security Platform * CLOUD DELIVERED SECURITY SERVICES * Advanced Threat Prevention * DNS Security * Data Loss Prevention * IoT Security * Next-Generation Firewalls * Hardware Firewalls * Strata Cloud Manager * SECURE ACCESS SERVICE EDGE * Prisma Access * Prisma SD-WAN * Autonomous Digital Experience Management * Cloud Access Security Broker * Zero Trust Network Access * Code to Cloud Platform * Prisma Cloud * AI-Driven Security Operations Platform * Cortex XDR * Cortex XSOAR * Cortex Xpanse * Cortex XSIAM * External Attack Surface Protection * Security Automation * Threat Prevention, Detection & Response * Threat Intel and Incident Response Services * Proactive Assessments * Incident Response * Transform Your Security Strategy * Discover Threat Intelligence COMPANY * About Us * Careers * Contact Us * Corporate Responsiblity * Customers * Investor Relations * Location * Newsroom POPULAR LINKS * Blog * Communities * Content Library * Cyberpedia * Event Center * Manage Email Preferences * Products A-Z * Product Certifications * Report a Vulnerability * Sitemap * Tech Docs * Unit 42 * Do Not Sell or Share My Personal Information * Privacy * Trust Center * Terms of Use * Documents Copyright © 2024 Palo Alto Networks. All Rights Reserved * * * * * * EN Select your language Close This site uses cookies essential to its operation, for analytics, and for personalized content and ads. By continuing to browse this site, you acknowledge the use of cookies. Privacy statement Manage My Cookie Settings Your Opt Out Preference Signal is Honored PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information on cookie consent Allow All MANAGE YOUR CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices Request a demo Explore Latest Events Get today’s cybersecurity intel Contact Us 408-753-4000