Palo Alto Prisma Access - SASE Platform

Analysis of Palo Alto Prisma Access SASE platform for secure remote access and zero trust networking.

Table of contents

  1. Overview
    1. Vendor Information
  2. Core Capabilities
    1. 1. Secure Remote Access
    2. 2. Cloud-Delivered Firewall
    3. 3. Cloud Access Security Broker (CASB)
    4. 4. Data Loss Prevention (DLP)
  3. Architecture for Cursor Environment
  4. Why Prisma Access (But Not Cortex XDR)?
    1. Customer’s Decision
  5. Pricing Model
  6. Resources & Links

Overview

Prisma Access (formerly GlobalProtect Cloud Service) is Palo Alto Networks’ Secure Access Service Edge (SASE) platform that delivers network security and connectivity for remote users, branch offices, and cloud resources.

Vendor Information

   
Company Palo Alto Networks, Inc.
Founded 2005
Headquarters Santa Clara, CA
Product Launch 2019 (as Prisma Access)
Website https://www.paloaltonetworks.com/prisma/access
Status Public (NASDAQ: PANW)
Notable Leader in Gartner Magic Quadrant for SASE

Core Capabilities

1. Secure Remote Access

Zero Trust Network Access (ZTNA):

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Remote Developer Connectivity:
├── User authenticates (Okta SAML)
├── Device posture check (CrowdStrike integration)
├── Prisma Access validates:
│   ├── User identity (Okta)
│   ├── Device health (CrowdStrike)
│   ├── Location (geofencing)
│   └── Time of day
├── Grants access to specific resources:
│   ├── Azure OpenAI (private endpoint)
│   ├── Key Vault (private endpoint)
│   ├── Internal git repositories
│   └── Development environments
└── Continuous monitoring during session

Traditional VPN:
❌ All-or-nothing access
❌ No device posture checking
❌ Lateral movement once connected

Prisma Access ZTNA:
✅ Granular resource access
✅ Continuous trust evaluation
✅ Segmentation enforced

2. Cloud-Delivered Firewall

Next-Generation Firewall as a Service:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
prisma_firewall_capabilities:
  threat_prevention:
    - ips_ids: true
    - anti_malware: true
    - anti_spyware: true
    - dns_security: true
    
  url_filtering:
    - category_based: 85+ categories
    - custom_urls: company blocklist
    - safe_search_enforcement: true
    
  ssl_decryption:
    - inspect_encrypted_traffic: true
    - exclude_medical_financial: true  # Privacy
    - trust_corporate_cert: true
    
  application_control:
    - 6000_plus_applications: identified
    - block_high_risk_apps: true
    - allow_business_apps: true

3. Cloud Access Security Broker (CASB)

SaaS Security:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Prisma Access CASB monitors:
├── Sanctioned Apps (approved)
│   ├── Microsoft 365
│   ├── GitHub
│   ├── Slack (company instance)
│   └── Approved SaaS tools
│
├── Unsanctioned Apps (shadow IT)
│   ├── Personal Dropbox
│   ├── Personal Gmail
│   ├── Unauthorized cloud storage
│   └── High-risk apps
│
└── Enforces policies:
    ├── Block high-risk apps
    ├── Allow read-only for medium-risk
    ├── DLP for approved apps
    └── Alert on policy violations

Example:
Developer tries to upload code to personal Dropbox
  ↓
Prisma Access CASB intercepts
  ↓
Checks: Is Dropbox approved? No
  ↓
Checks: Does upload contain sensitive data? Yes (API keys detected)
  ↓
Action: Block upload + Alert security team
  ↓
User sees: "Upload blocked by security policy"

4. Data Loss Prevention (DLP)

In-Line DLP:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
# Prisma Access DLP for developer traffic
dlp_policy:
  name: "Block API Key Uploads"
  
  match_criteria:
    - data_pattern: "Azure API Key"
    - data_pattern: "AWS Secret Key"
    - data_pattern: "GitHub Token"
    - direction: "upload"
    - destination: "cloud_storage_apps"
  
  actions:
    - block_transaction
    - capture_pcap: true  # For forensics
    - alert_severity: "high"
    - notify_user: true
    - log_to_siem: true

Architecture for Cursor Environment

graph TB
    subgraph "Remote Developers"
        A[Developer Laptop]
        B[Cursor IDE]
        C[Prisma Client]
    end
    
    subgraph "Prisma Access Cloud"
        D[Authentication]
        E[Firewall/IPS]
        F[CASB]
        G[DLP Engine]
        H[SSL Decryption]
    end
    
    subgraph "Azure Resources"
        I[Azure OpenAI<br/>Private Endpoint]
        J[Key Vault<br/>Private Endpoint]
        K[VNet Resources]
    end
    
    subgraph "Monitoring"
        L[Prisma Logs]
        M[Azure EventHub]
        N[Cribl]
        O[Chronicle]
    end
    
    A --> C
    B --> C
    C --> D
    D --> E
    E --> F
    F --> G
    G --> H
    H --> I
    H --> J
    H --> K
    
    E --> L
    L --> M
    M --> N
    N --> O
    
    style D fill:#7c3aed,stroke:#5b21b6,color:#fff
    style E fill:#dc2626,stroke:#991b1b,color:#fff
    style I fill:#0066cc,stroke:#003d7a,color:#fff

Why Prisma Access (But Not Cortex XDR)?

Customer’s Decision

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Palo Alto Products Used:
✅ Prisma Access (SASE/Network Security)
❌ Cortex XDR (Endpoint/Cloud Security)

Rationale:
Prisma Access:
├── Unique value: Secure remote access for developers
├── No overlap: Azure Firewall is for Azure-to-Azure only
├── ZTNA: Required for zero-trust architecture
├── CASB: Needed for SaaS security
└── Decision: Deploy

Cortex XDR:
├── Endpoint protection: Duplicates CrowdStrike
├── Cloud security: Duplicates Wiz
├── SIEM features: Have Chronicle + Splunk
├── Cost: Not justified given overlap
└── Decision: Don't deploy

Result: Use Palo Alto where they're best (networking)
        Use CrowdStrike/Wiz where they're best (endpoint/cloud)

Pricing Model

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Prisma Access Pricing:
├── Per unique user per month
├── Bandwidth included (typically 2-5 GB/user/month)
├── Overage: $X per GB

Tiers:
├── Business: $8-12/user/month
├── Enterprise: $15-25/user/month
└── Elite: $25-35/user/month

Customer (50 remote developers):
50 users × $20/month = $1,000/month = $12K/year

Add-ons:
├── DLP: +$3-5/user/month
├── CASB: +$2-4/user/month
├── SaaS Security: +$2-3/user/month
└── Total with add-ons: ~$30/user = $18K/year

Compare to:
- Traditional VPN: $5K/year (less secure)
- Zscaler: Similar pricing ($25-35/user)
- Cisco Umbrella/SASE: $20-30/user


Last Updated: October 10, 2025
Review Status: Production Validated