• Network Security
  • Cloud Security
  • Security Operations
  • Threat Intel & Consulting
  • More
  • Get support
  • Sign In
  • Get Started

Identity-Based Microsegmentation

Microsegmentation for hosts and containers on public or private cloud

Learn more
Identity-Based Microsegmentation to Secure Multi-Cloud and Hybrid Infrastructure
With the accelerated growth of cloud computing, enterprises have broadly adopted virtual machines and containers across public- and private-cloud infrastructure, as well as on-premises. As organizations continue to adopt cloud native workloads, they need visibility, centralized security policy management and DevSecOps-ready policy support to enable secure networking.
A New Approach to Microsegmentation Is Here

Prisma™ Cloud Identity-Based Microsegmentation secures hosts and containers in any cloud, providing end-to-end visibility, comprehensive security policy and DevSecOps empowerment. Prisma Cloud enables SecOps and DevOps teams to safely accelerate cloud native application deployment.
Download the solution brief
E-Book: Identity-Powered Microsegmentation

Download the e-book
Microsegmentation for your cloud native applications
  • Cloud native identity
  • Application dependency mapping
  • Comprehensive security policy
  • Policy as code
  • Flow Logging

Cloud native identity

Prisma™ Cloud brings the concept of identity to applications. Workload identity incorporates metadata from AWS®, GCP®, Azure®, Kubernetes® and other application contexts.

Application dependency mapping

Prisma™ Cloud delivers real-time and historical visibility of network communications across hosts and containers – no matter where they run. Use a map to visualize the impact of policies before they are applied.

Comprehensive security policy

Prisma Cloud centralizes policy management for hosts and containers spanning public, private and hybrid infrastructures. Policy writing is coupled to application identity, instead of network-centric VLANs and security groups. Communications between protected workloads are authorized based on cryptographic identity – not IP address. Data in transit between workloads can also be encrypted.

Policy as code

Prisma Cloud helps accelerate application delivery by deploying security policies as code for continuous compliance.

Flow Logging

Prisma Cloud retains historical flow records, with workload context, for compliance reporting. Apply flexible filters and queries to collect specific data.

Prisma™ Cloud brings the concept of identity to applications. Workload identity incorporates metadata from AWS®, GCP®, Azure®, Kubernetes® and other application contexts.
Prisma™ Cloud delivers real-time and historical visibility of network communications across hosts and containers – no matter where they run. Use a map to visualize the impact of policies before they are applied.
Prisma Cloud centralizes policy management for hosts and containers spanning public, private and hybrid infrastructures. Policy writing is coupled to application identity, instead of network-centric VLANs and security groups. Communications between protected workloads are authorized based on cryptographic identity – not IP address. Data in transit between workloads can also be encrypted.
Prisma Cloud helps accelerate application delivery by deploying security policies as code for continuous compliance.
Prisma Cloud retains historical flow records, with workload context, for compliance reporting. Apply flexible filters and queries to collect specific data.

Recommended resources

  • All
  • All
Zero Trust Microsegmentation for Cloud Infrastructure
View the blog
Identity-Powered Microsegmentation
Read the e-book
Why Microsegmentation is Important
View the blog
Microsegmentation for Kubernetes Deployments
Get the brief
Quick links
View a demo
View a demo
Request a personalized demo
Request a personalized demo
Contact sales
Contact sales
Visit the Resource Center
Visit the Resource Center
Visit the Corporate blog
Visit the Corporate blog
Visit the Unit 42 blog
Visit the Unit 42 blog

Unlock the cloud
security kit now

Get everything you need from best practices and guides to secure your cloud environments today.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
Subscription Reward

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube
Create an account or login

© 2021 Palo Alto Networks, Inc. All rights reserved.