We are using Prisma Access by Palo Alto Networks as our ZTNA solution and I recommend it.
The fact that it secures not just web-based apps, but non-web apps as well, is valuable since there are so many. Nowadays, attacks are being generated through non-standard protocols, like DNS tunneling and newly-registered domain control names. There are also a lot of critical applications being accessed on a point-to-point basis, and they can be exposed to malicious behavior if those ports and protocols are not being inspected. You need to have the right security in place for your data to be protected all the time.
The security that Prisma Access provides us with is really top-notch. It is a very comprehensive combination of some excellent components, such as the HIP (Host Information Profile) as well as components like Forcepoint, which provides end-user content inspection, and antivirus. There are also DLP features which make sure that all of the essential prerequisites are in place before a user can log in or can be tunneled into. Other features include: Traffic analysis, threat prevention, URL filtering, and segmentation.
Once users are onboarded, they are subject to Palo Alto's firewall inspection. All their traffic is inspected well. Prisma Access gives us the flexibility to apply various policies and inspections on different users. This gives us a lot of peace of mind knowing that we are getting the best security features and tools.
We are using Palo Alto Panorama, which is a VM that sits in our Data Center, to monitor and manage our entire infrastructure. Palo Alto Panorama allows us to:
Manage our office and Data Center’s firewalls.
Manage our VPNs.
Perform traffic forwarding.
Apply deep packet inspection.
Allow or deny traffic.
Apply additional security features like threat prevention, DNS security, malware and anti-virus protection etc.
Since everything is connected to Prisma, we are very proactive, and can detect end-user or site connectivity issues much faster.
I would say that Prisma Access has three major components:
Connections to the remote offices.
Connections to mobile devices.
Links to Data Centers.
Everything is connected by establishing VPN tunnels using the Prisma Access Infrastructure. All edge devices send all traffic to Prisma and Prisma knows to route the traffic to the necessary destinations.
Since this is a cloud platform, you can seamlessly scale up by adding more mobile users or new remote offices. Prisma will just create additional instances in the cloud to support your load.
Another advantage of Prisma being a cloud platform is that we don’t have to deal with patches and upgrades. We automatically get all the new features as they come in. This really reduces our administrative overhead, and allows us to focus on other things.
We haven't encountered any connectivity issues. The Prisma Access infrastructure is high performing and stable. During upgrades we have zero downtime. It's very easy to use and set up and it takes very little time to train users on how to use it.
One thing that could improve is the support. Sometimes their response times are slow.
Overall, I would rate Prisma Access a nine out of ten. It just works really well and we find it to be a very comprehensive ZTNA solution that does exactly what we need.
Find out what your peers are saying about Zscaler, Palo Alto Networks, Check Point Software Technologies and others in ZTNA as a Service. Updated: November 2024.
ZTNA as a Service is a cloud-based security solution that provides secure access to applications and data from anywhere, helping organizations protect themselves from data breaches and other security threats.
We are using Prisma Access by Palo Alto Networks as our ZTNA solution and I recommend it.
The fact that it secures not just web-based apps, but non-web apps as well, is valuable since there are so many. Nowadays, attacks are being generated through non-standard protocols, like DNS tunneling and newly-registered domain control names. There are also a lot of critical applications being accessed on a point-to-point basis, and they can be exposed to malicious behavior if those ports and protocols are not being inspected. You need to have the right security in place for your data to be protected all the time.
The security that Prisma Access provides us with is really top-notch. It is a very comprehensive combination of some excellent components, such as the HIP (Host Information Profile) as well as components like Forcepoint, which provides end-user content inspection, and antivirus. There are also DLP features which make sure that all of the essential prerequisites are in place before a user can log in or can be tunneled into. Other features include: Traffic analysis, threat prevention, URL filtering, and segmentation.
Once users are onboarded, they are subject to Palo Alto's firewall inspection. All their traffic is inspected well. Prisma Access gives us the flexibility to apply various policies and inspections on different users. This gives us a lot of peace of mind knowing that we are getting the best security features and tools.
We are using Palo Alto Panorama, which is a VM that sits in our Data Center, to monitor and manage our entire infrastructure. Palo Alto Panorama allows us to:
Since everything is connected to Prisma, we are very proactive, and can detect end-user or site connectivity issues much faster.
I would say that Prisma Access has three major components:
Everything is connected by establishing VPN tunnels using the Prisma Access Infrastructure. All edge devices send all traffic to Prisma and Prisma knows to route the traffic to the necessary destinations.
Since this is a cloud platform, you can seamlessly scale up by adding more mobile users or new remote offices. Prisma will just create additional instances in the cloud to support your load.
Another advantage of Prisma being a cloud platform is that we don’t have to deal with patches and upgrades. We automatically get all the new features as they come in. This really reduces our administrative overhead, and allows us to focus on other things.
We haven't encountered any connectivity issues. The Prisma Access infrastructure is high performing and stable. During upgrades we have zero downtime. It's very easy to use and set up and it takes very little time to train users on how to use it.
One thing that could improve is the support. Sometimes their response times are slow.
Overall, I would rate Prisma Access a nine out of ten. It just works really well and we find it to be a very comprehensive ZTNA solution that does exactly what we need.