• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

Palo Alto adds new SaaS compliance, threat prevention, URL filtering features to Prisma solution

flyytech by flyytech
August 31, 2022
Home Security
Share on FacebookShare on Twitter


Cybersecurity vendor Palo Alto Networks has announced new updates to its Prisma Secure Access Service Edge (SASE) platform that introduce new Software as a Service (SaaS) security and compliance support for customers, along with enhanced threat prevention and URL filtering capabilities. The firm has also released a new native artificial intelligence for IT operations (AIOps) solution for SASE to help simplify networking and security operations. The launches come as the hybrid working era persists with organizations increasingly implementing and relying on SaaS applications, introducing new and complex security challenges.

New Prisma features address SaaS security and compliance challenges, help prevent phishing, ransomware, C2 attacks

In a press release, Palo Alto estimated that the average business now uses more than 110 SaaS applications. With vast amounts of sensitive data typically stored in SaaS apps, security misconfigurations pose serious threats to organizations. Its latest features are therefore partly designed to help customers improve their SaaS security and risk management positions, along with enhancing other key elements of modern cyber resilience.

The first is SaaS security posture management (SSPM) capabilities that, as part of the vendor’s cloud access security broker (CASB) offerings, move beyond Center for Internet Security (CIS) and U.S. National Institute of Standards and Technology (NIST) compliance checks to allow customers to easily view and configure security settings for multiple SaaS apps to ensure they are both compliant and secure, Palo Alto stated. “What this means for the customer is they can now secure the posture of their SaaS applications without having to deploy additional tools and manage other products,” Matt De Vincentis, vice president SASE marketing at Palo Alto Networks, tells CSO.

The second new feature is advanced URL filtering that uses “deep learning” to prevent new phishing attacks, ransomware, and other web-based threats. De Vincentis says that traditional URL filtering has predominantly relied on web crawlers and databases to find and categorize URLs so that customer web security policies can be enforced. The problem with that is that modern web attacks can easily hide by making use of disposable domains/URLs and by identifying and evading security vendor web crawlers so that the URLs appear benign until the moment they are used to attack a user.

“With advanced URL filtering, we use inline machine-learning models and deep learning to identify whether a URL is malicious or not in real-time,” De Vincentis adds. “Our telemetry shows that advanced URL filtering can prevent over 200,000 attacks per-day that traditional databases could not. Customers do not need to deploy anything new to take advantage of this, as it is part of the Prisma SASE service and is configured just like our traditional URL filtering previously was.”

Next is advanced threat prevention that uses new machine learning enhancements to stop unknown command-and-control (C2) attacks in real time, Palo Alto stated. The new capabilities bring security analysis from “offline” to “inline” using cloud compute for AI and deep learning techniques, without sacrificing performance, according to the vendor.

“Traditional threat prevention capabilities like IPS [intrusion protection systems] require the use of signatures to detect and prevent threats,” De Vincentis says. In other words, a threat must have been seen and analyzed offline by a security vendor, with a signature produced and delivered to the customer over a period of time. “This time lag between a zero-day threat existing and a protection being delivered puts customers at risk,” he adds. With its new threat prevention feature, Palo Alto uses vast amounts of real-world network attack traffic to build and train deep learning models to detect and stop C2 attacks from advanced hack tools that are now commonly used to target enterprise networks with impunity, he says.

Last is the vendor’s integration of a native AIOps solution for SASE to help reduce manual operations and enable faster remediation. AIOps for SASE provides automated root-cause analysis, rapid problem remediation, and guided best practice adoption, Palo Alto wrote. It also provides more efficient capacity planning and anomaly detection via predictive analytics and a query-based interface that leverages NLP to support IT service desks with automated contextual troubleshooting and change analysis, it added.

Shadow IT, access management biggest SaaS security risks

Omdia Senior Principal Analyst Rik Turner tells CSO the sheer rate at which new SaaS apps have been adopted, particularly since hybrid working gained a new lease of life during the COVID-19 pandemic, has had significant security implications for organizations. One of the biggest is the ease of adoption of SaaS apps and the subsequent rise of shadow IT. “A user in an individual business unit can sign up for it without any need to involve his or her IT department, leading to the growth of a so-called “shadow IT” environment completely unbeknown to IT or security.”

This lack of visibility regarding which SaaS apps are in use within an organization, and what data is being shared via them, has led to the development of cloud access security broker (CASB) technology, Turner adds. “However, it is worth remembering that, in the shared responsibility model for cloud security, the data and access to it are always the customer’s responsibility. With SaaS, in fact, the cloud service provider takes responsibility for every other part of the stack, but data and access still fall to the customer.”

The explosion in hybrid working has driven the need for a more proactive approach here — i.e., trying to get ahead of the access issue by identifying excessive or misconfigured access rights and curtailing them before they can cause a problem, Turner says. “This is pretty much the only way to address the scale of the problem and avoid the continual “putting out fires” scenario.”

Copyright © 2022 IDG Communications, Inc.



Source_link

flyytech

flyytech

Next Post
Detroit: Become Human developer Quantic Dream bought by China’s NetEase

Detroit: Become Human developer Quantic Dream bought by China’s NetEase

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Start11 Adds Support for Moment 2

Start11 Adds Support for Moment 2

March 13, 2023
Kolide, endpoint security for teams that want to meet SOC 2 compliance goals without sacrificing privacy • Graham Cluley

Kolide, endpoint security for teams that want to meet SOC 2 compliance goals without sacrificing privacy • Graham Cluley

October 18, 2022

Trending.

Review: Zoom ZPC-1

Review: Zoom ZPC-1

January 28, 2023
Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

October 23, 2022
Elden Ring best spells 1.08: Tier lists, sorceries, incantations, and locations

Elden Ring best spells 1.08: Tier lists, sorceries, incantations, and locations

January 14, 2023
Allen Parr’s false teaching examined. Why you should unfollow him.

Allen Parr’s false teaching examined. Why you should unfollow him.

September 24, 2022
How to View Ring Doorbell on a Roku TV

How to View Ring Doorbell on a Roku TV

December 20, 2022

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

What are ChatGPT plugins? Here’s everything you need to know

What are ChatGPT plugins? Here’s everything you need to know

March 24, 2023
New DPA Pencil Mics — AudioTechnology

New DPA Pencil Mics — AudioTechnology

March 24, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT