Palo Alto Prisma Access - SASE Platform
Analysis of Palo Alto Prisma Access SASE platform for secure remote access and zero trust networking.
Table of contents
- Overview
- Core Capabilities
- Architecture for Cursor Environment
- Why Prisma Access (But Not Cortex XDR)?
- Pricing Model
- Resources & Links
Overview
Prisma Access (formerly GlobalProtect Cloud Service) is Palo Alto Networks’ Secure Access Service Edge (SASE) platform that delivers network security and connectivity for remote users, branch offices, and cloud resources.
Vendor Information
Company | Palo Alto Networks, Inc. |
Founded | 2005 |
Headquarters | Santa Clara, CA |
Product Launch | 2019 (as Prisma Access) |
Website | https://www.paloaltonetworks.com/prisma/access |
Status | Public (NASDAQ: PANW) |
Notable | Leader in Gartner Magic Quadrant for SASE |
Core Capabilities
1. Secure Remote Access
Zero Trust Network Access (ZTNA):
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Remote Developer Connectivity:
├── User authenticates (Okta SAML)
├── Device posture check (CrowdStrike integration)
├── Prisma Access validates:
│ ├── User identity (Okta)
│ ├── Device health (CrowdStrike)
│ ├── Location (geofencing)
│ └── Time of day
├── Grants access to specific resources:
│ ├── Azure OpenAI (private endpoint)
│ ├── Key Vault (private endpoint)
│ ├── Internal git repositories
│ └── Development environments
└── Continuous monitoring during session
Traditional VPN:
❌ All-or-nothing access
❌ No device posture checking
❌ Lateral movement once connected
Prisma Access ZTNA:
✅ Granular resource access
✅ Continuous trust evaluation
✅ Segmentation enforced
2. Cloud-Delivered Firewall
Next-Generation Firewall as a Service:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
prisma_firewall_capabilities:
threat_prevention:
- ips_ids: true
- anti_malware: true
- anti_spyware: true
- dns_security: true
url_filtering:
- category_based: 85+ categories
- custom_urls: company blocklist
- safe_search_enforcement: true
ssl_decryption:
- inspect_encrypted_traffic: true
- exclude_medical_financial: true # Privacy
- trust_corporate_cert: true
application_control:
- 6000_plus_applications: identified
- block_high_risk_apps: true
- allow_business_apps: true
3. Cloud Access Security Broker (CASB)
SaaS Security:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Prisma Access CASB monitors:
├── Sanctioned Apps (approved)
│ ├── Microsoft 365
│ ├── GitHub
│ ├── Slack (company instance)
│ └── Approved SaaS tools
│
├── Unsanctioned Apps (shadow IT)
│ ├── Personal Dropbox
│ ├── Personal Gmail
│ ├── Unauthorized cloud storage
│ └── High-risk apps
│
└── Enforces policies:
├── Block high-risk apps
├── Allow read-only for medium-risk
├── DLP for approved apps
└── Alert on policy violations
Example:
Developer tries to upload code to personal Dropbox
↓
Prisma Access CASB intercepts
↓
Checks: Is Dropbox approved? No
↓
Checks: Does upload contain sensitive data? Yes (API keys detected)
↓
Action: Block upload + Alert security team
↓
User sees: "Upload blocked by security policy"
4. Data Loss Prevention (DLP)
In-Line DLP:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
# Prisma Access DLP for developer traffic
dlp_policy:
name: "Block API Key Uploads"
match_criteria:
- data_pattern: "Azure API Key"
- data_pattern: "AWS Secret Key"
- data_pattern: "GitHub Token"
- direction: "upload"
- destination: "cloud_storage_apps"
actions:
- block_transaction
- capture_pcap: true # For forensics
- alert_severity: "high"
- notify_user: true
- log_to_siem: true
Architecture for Cursor Environment
graph TB
subgraph "Remote Developers"
A[Developer Laptop]
B[Cursor IDE]
C[Prisma Client]
end
subgraph "Prisma Access Cloud"
D[Authentication]
E[Firewall/IPS]
F[CASB]
G[DLP Engine]
H[SSL Decryption]
end
subgraph "Azure Resources"
I[Azure OpenAI<br/>Private Endpoint]
J[Key Vault<br/>Private Endpoint]
K[VNet Resources]
end
subgraph "Monitoring"
L[Prisma Logs]
M[Azure EventHub]
N[Cribl]
O[Chronicle]
end
A --> C
B --> C
C --> D
D --> E
E --> F
F --> G
G --> H
H --> I
H --> J
H --> K
E --> L
L --> M
M --> N
N --> O
style D fill:#7c3aed,stroke:#5b21b6,color:#fff
style E fill:#dc2626,stroke:#991b1b,color:#fff
style I fill:#0066cc,stroke:#003d7a,color:#fff
Why Prisma Access (But Not Cortex XDR)?
Customer’s Decision
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Palo Alto Products Used:
✅ Prisma Access (SASE/Network Security)
❌ Cortex XDR (Endpoint/Cloud Security)
Rationale:
Prisma Access:
├── Unique value: Secure remote access for developers
├── No overlap: Azure Firewall is for Azure-to-Azure only
├── ZTNA: Required for zero-trust architecture
├── CASB: Needed for SaaS security
└── Decision: Deploy
Cortex XDR:
├── Endpoint protection: Duplicates CrowdStrike
├── Cloud security: Duplicates Wiz
├── SIEM features: Have Chronicle + Splunk
├── Cost: Not justified given overlap
└── Decision: Don't deploy
Result: Use Palo Alto where they're best (networking)
Use CrowdStrike/Wiz where they're best (endpoint/cloud)
Pricing Model
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Prisma Access Pricing:
├── Per unique user per month
├── Bandwidth included (typically 2-5 GB/user/month)
├── Overage: $X per GB
Tiers:
├── Business: $8-12/user/month
├── Enterprise: $15-25/user/month
└── Elite: $25-35/user/month
Customer (50 remote developers):
50 users × $20/month = $1,000/month = $12K/year
Add-ons:
├── DLP: +$3-5/user/month
├── CASB: +$2-4/user/month
├── SaaS Security: +$2-3/user/month
└── Total with add-ons: ~$30/user = $18K/year
Compare to:
- Traditional VPN: $5K/year (less secure)
- Zscaler: Similar pricing ($25-35/user)
- Cisco Umbrella/SASE: $20-30/user
Resources & Links
- Website: https://www.paloaltonetworks.com/prisma/access
- Documentation: Prisma Access Docs
- Live Community: Palo Alto Networks Community
Last Updated: October 10, 2025
Review Status: Production Validated