Prisma Access Features
Network Management (4)
Network Segmentation
Based on 24 Prisma Access reviews.
Allows administrative control over network components, mapping, and segmentation.
Network Mapping
24 reviewers of Prisma Access have provided feedback on this feature.
Allows visual display of networks segmented components and their connected resources.
Security Analytics
Based on 25 Prisma Access reviews.
Utilizes behavioral analysis to improve security procedures and documentation.
API/Integrations
23 reviewers of Prisma Access have provided feedback on this feature.
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security (8)
Security Automation
24 reviewers of Prisma Access have provided feedback on this feature.
Allows administrative control over automated security tasks.
Application Security
Based on 25 Prisma Access reviews.
Protects application access and data. Prompts additional authentication for suspicious users.
Workload Protection
24 reviewers of Prisma Access have provided feedback on this feature.
Protects computing resources across a network. Prompts additional authentication for suspicious users.
Data Protection
Based on 24 Prisma Access reviews.
Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.
Governance
This feature was mentioned in 19 Prisma Access reviews.
Allows users to create, edit, and relinquish user access privileges.
Data loss Prevention
As reported in 20 Prisma Access reviews.
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Data Encryption/Security
This feature was mentioned in 20 Prisma Access reviews.
Manages policies for user data access and data encryption.
Access Control
As reported in 20 Prisma Access reviews.
Supports LDAP Protocol to enable access control and governance.
Identity Management (3)
Adaptive Access Control
As reported in 23 Prisma Access reviews.
Provides a risk-based approcach to determining trust within the network.
Identity Scoring
23 reviewers of Prisma Access have provided feedback on this feature.
Calculates risk based on user behavior, permissions, and requests.
User Monitoring
Based on 24 Prisma Access reviews.
Monitors users attempting unauthorized access to databases, applicaitons, and othe network components.
Analysis (3)
User Analytics
20 reviewers of Prisma Access have provided feedback on this feature.
Allows for reporting and documentation of individual user behavior and privileges.
Cloud Gap Analytics
Based on 21 Prisma Access reviews.
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Anomoly Detection
Based on 21 Prisma Access reviews.
Monitors acivity related to user behavior and compares activity to benchmarked patterns.
Functionality (3)
SSO
Based on 20 Prisma Access reviews.
Provides a single access point for users to access multiple cloud products without multiple logins.
Cloud Registry
As reported in 20 Prisma Access reviews.
Details SaaS products the cloud security product can integrate with and provide security for.
Mobile Device Mangement
18 reviewers of Prisma Access have provided feedback on this feature.
Offers the ability to set standards for types of mobile devices and networks capable of accessing data.
Protection (8)
Policy Enforcement
Based on 12 Prisma Access reviews.
Allows administrators to set policies for security and governance.
Security Audit
As reported in 12 Prisma Access reviews.
Allows for deep examination into network-connected devices, policies, and protocols.
Access Control
This feature was mentioned in 12 Prisma Access reviews.
Supports LDAP Protocol to enable access control and governance.
User Authentication
Based on 12 Prisma Access reviews.
Authenticates users prior to granting access to networks, applciations, and systems.
Firewall-as-a-Service
This feature was mentioned in 39 Prisma Access reviews.
Managed, cloud-delivered firewall that protects devices, assets, networks, and other cloud services from web-based threats.
Cloud Application Brokerage
Based on 41 Prisma Access reviews.
Provides a single access point for users to access multiple cloud applications, services, and products through a central gateway
Web Gateway
This feature was mentioned in 40 Prisma Access reviews.
Provides a private web gateway for secure internet browsing.
Adaptive Access Control
This feature was mentioned in 40 Prisma Access reviews.
Provides a risk-based approach to determining trust within the network.
Monitoring (7)
Compliance Monitoring
This feature was mentioned in 12 Prisma Access reviews.
Monitors data and compliance requirements. Sends alerts based on violations or misuse.
Vulnerability Monitoring
This feature was mentioned in 12 Prisma Access reviews.
Monitors networks, applications, and systems to identify misconfigurations and access points that can be easily compromised.
Configuration Monitoring
As reported in 12 Prisma Access reviews.
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Observability
This feature was mentioned in 12 Prisma Access reviews.
Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
Data Center Networking
This feature was mentioned in 38 Prisma Access reviews.
Provides advanced data center network services to deliver multiple high-speed IP.
Multicloud Visibility
As reported in 38 Prisma Access reviews.
Allows users to track and control activity across cloud services and providers.
Anomaly Detection
This feature was mentioned in 40 Prisma Access reviews.
Constantly monitors system to detect anomalies in real time.
Administration (3)
Network Segmentation
11 reviewers of Prisma Access have provided feedback on this feature.
Allows administrative control over network components, mapping, and segmentation.
Scalability
Based on 11 Prisma Access reviews.
Provides features to allow scaling for large organizations and user bases.
Global Access
12 reviewers of Prisma Access have provided feedback on this feature.
Extends SDP network access to users regardless of their physical location.
Management (4)
Multicloud Management
39 reviewers of Prisma Access have provided feedback on this feature.
Allows users to track and control cloud spend across cloud services and providers.
DLP Configuration
This feature was mentioned in 37 Prisma Access reviews.
Offers data loss prevention tools to protect data from leaving the environments it is allowed to.
Dynamic Scaling
Based on 37 Prisma Access reviews.
Scale resources automatically, adjusting for usage demands.
Policy Enforcement
38 reviewers of Prisma Access have provided feedback on this feature.
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes
Generative AI (2)
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Generation
Allows users to generate text based on a text prompt.
Web Content and Traffic Filtering - Secure Web Gateways (5)
SSL/TLS Inspection
As reported in 29 Prisma Access reviews.
Decrypts and inspects encrypted web traffic to detect and block threats hidden within encrypted connections.
Content Filtering
Based on 29 Prisma Access reviews.
Analyzes web content to filter out malicious code, malware, and inappropriate material.
URL Filtering
As reported in 29 Prisma Access reviews.
Blocks access to known malicious or unauthorized websites based on predefined policies.
Real-Time Traffic Inspection
29 reviewers of Prisma Access have provided feedback on this feature.
Inspects and analyzes inbound and outbound web traffic in real-time for threats and compliance.
Ad and Tracker Blocking
This feature was mentioned in 28 Prisma Access reviews.
Blocks ads and trackers to enhance user privacy and reduce exposure to potential threats.
Data Protection and Loss Prevention - Secure Web Gateways (4)
Data Loss Prevention (DLP)
26 reviewers of Prisma Access have provided feedback on this feature.
Monitors outgoing web traffic to prevent sensitive data from being leaked or exfiltrated.
Phishing Protection
27 reviewers of Prisma Access have provided feedback on this feature.
Detects and blocks phishing attempts to protect users from fraudulent websites and email links.
Malware Protection
Based on 27 Prisma Access reviews.
Uses signature-based scanning, heuristic analysis, and sandboxing to detect and block malware threats.
Cloud Access Security
26 reviewers of Prisma Access have provided feedback on this feature.
Monitors and controls access to cloud applications and services to prevent unauthorized use and data leakage.
Access Control and Authentication - Secure Web Gateways (3)
Application Control
25 reviewers of Prisma Access have provided feedback on this feature.
Regulates access to web-based applications and services as per organizational policies.
Authentication and Access Control
Based on 25 Prisma Access reviews.
Verifies users' identities and enforces access control policies to ensure only authorized users can access permitted web resources.
User and Group Policies
Based on 25 Prisma Access reviews.
Supports the creation of policies based on user roles, groups, or other attributes for more granular control.
Performance and Management - Secure Web Gateways (5)
Customizable Policy Enforcement
As reported in 25 Prisma Access reviews.
Allows organizations to create and enforce custom web usage policies tailored to their specific needs.
Bandwidth Management
This feature was mentioned in 25 Prisma Access reviews.
Prioritizes and allocates network resources based on predefined policies to optimize performance.
Integration Capabilities
25 reviewers of Prisma Access have provided feedback on this feature.
Integrates with other security tools and systems, such as firewalls, SIEMs, and endpoint security solutions.
Reporting and Logging
25 reviewers of Prisma Access have provided feedback on this feature.
Provides comprehensive reports and logs of web activity, including sites visited, user activity, security events, and policy violations.
Threat Intelligence Integration
As reported in 25 Prisma Access reviews.
Leverages threat intelligence feeds to stay updated on the latest threats and enhance protection.
Components - Secure Access Service Edge (SASE) (5)
Zero Trust Network Access (ZTNA)
Enforces zero trust access rules.
Wide Area Network (WAN)
Integrates wide area network (WAN) capabilities, such as SD-WAN.
Cloud Access Security Broker (CASB)
Enforces security requirements and secures connections with cloud resources.
Secure Web Gateway (SWG)
Prevents unauthorized web domains from entering a network and protects against web-based threats.
Firewall as a Service
Provides cloud-based firewall protection.
Artificial Intelligence - Secure Access Service Edge (SASE) (3)
Predictive Capabilities
Uses predictive analytics to anticipate emerging threats.
Real-Time Threat Detection
Utilizes AI algorithms to identify anomolies and block access to malicious sites.
Automation
Automates common workflows and remediation tasks.
Identity and Access Management - Zero Trust Platforms (4)
Single sign-on (SSO)
Simplifies user authentication across multiple services while maintaining security.
Multi-factor authentication (MFA)
Ensures that users are verified through multiple credentials before access is granted, reducing the risk of compromised accounts.
Role-based access control (RBAC)
Grants access based on the user’s role within the organization, adhering to the principle of least privilege.
Identity federation
Integrates with external identity providers to manage user identities across different platforms and services.
Security - Zero Trust Platforms (5)
Encryption
Mandatory encryption of data both at rest and in transit protects against unauthorized access.
Endpoint detection and response (EDR)
Continuous monitoring and real-time response capabilities with EDR help detect and mitigate threats on endpoint devices.
Device posture assessment
Verifies the security status of a device before granting access to network resources, ensuring that only compliant devices can connect.
Micro-segmentation
Divides the network into isolated segments to prevent lateral movement by attackers, ensuring that if one segment is compromised, others remain secure.
Zero trust network access (ZTNA)
Replaces traditional VPNs by enforcing granular, context-aware access to applications based on user identity, device, and other factors.
Data Security - Zero Trust Platforms (2)
Data loss prevention (DLP)
Detect and prevent unauthorized access or transfer of sensitive data.
Data classification
Data classification automatically categorizes data based on its sensitivity, allowing for appropriate security measures to be applied
Application Visibility - Zero Trust Platforms (5)
API support
API support ensures that the zero trust platform can integrate seamlessly with other security tools and existing infrastructure
Application-level controls
Provides the ability to enforce security policies at the application layer, ensuring that access to specific applications is tightly controlled.
Secure application access
ensures that only authorized users can access critical applications, protecting against unauthorized entry points
User and entity behavior analytics (UEBA)
UEBA identifies unusual behavior that may indicate a security threat, enabling proactive threat managemen
Continuous monitoring
Provides real-time visibility into all network traffic, user activities, and data flows to detect anomalies
Reporting and Policies - Zero Trust Platforms (5)
Policy automation
allows for automatic application of security policies based on predefined criteria, reducing the risk of human error and ensuring consistent enforcement
Regulatory compliance
Regulatory compliance assists organizations in adhering to industry-specific regulations, such as the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), or the California Consumer Privacy Act (CCPA)
Cross-platform compatibility
This works across different environments, including on-premises, cloud, and hybrid setups, ensuring comprehensive security coverage
Policy enforcement
This ensures that security policies are consistently applied across all users, devices, and application
Comprehensive reporting
Detailed reports that provide insights into security events help organizations maintain compliance and optimize their security posture
Agentic AI - Secure Access Service Edge (SASE) Platforms (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Zero Trust Platforms (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Components - Secure Service Edge (SSE) (4)
Secure Web Gateway (SWG)
Prevents unauthorized web domains from entering a network and protects against web-based threats.
Firewall as a Service
Provides cloud-based firewall protection.
Zero Trust Network Access (ZTNA)
Enforces zero trust access rules.
Cloud Access Security Broker (CASB)
Enforces security requirements and secures connections with cloud resources.
Artificial Intelligence -Secure Service Edge (SSE) (3)
Automation
Automates common workflows and remediation tasks.
Predictive Capabilities
Uses predictive analytics to anticipate emerging threats.
Real-Time Threat Detection
Utilizes AI algorithms to identify anomolies and block access to malicious sites.
Agentic AI - Secure Service Edge (SSE) (4)
Decision Making
Makes informed choices based on available data and objectives.
Autonomous Task Execution
Capability to perform complex tasks without constant human input.
Cross-system Integration
Works across multiple software systems or databases.
Proactive Assistance
Anticipates needs and offers suggestions without prompting.




