Quantcast
Channel: Data Security Posture Management Archives - Palo Alto Networks Blog
Browsing all 27 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

DSPM-Driven Data Context to Improve Attack Path Analysis and Prioritization

Prioritization might be the biggest challenge in modern cloud security. Cloud environments are complex, often comprising hundreds of services and thousands of cloud resources. This disparate and...

View Article


Image may be NSFW.
Clik here to view.

Is Your Snowflake Data at Risk? Find and Protect Sensitive Data with DSPM

In recent months, there’s been increased scrutiny of data managed in third-party applications. A spate of reported security incidents has highlighted the need for effective monitoring of sensitive data...

View Article


Image may be NSFW.
Clik here to view.

Prisma Cloud Innovations: September's Highlights

Prisma Cloud's September 2024 release packs a punch with seven impactful updates to enhance your cloud security and user experience. Discover the Latest Features and Important Insights to Keep Your...

View Article

Understanding the Costs and Benefits of DSPM Tools

The following article is an abridged version of our new Prisma Cloud datasheet Understanding the True Costs of a DSPM Solution. Today’s organizations face an uphill battle when it comes to protecting...

View Article

Image may be NSFW.
Clik here to view.

Data Security, Meet Remediation: Introducing the New Integration Between...

Remediation has long been a sore spot in data security posture management (DSPM). Many of the currently available solutions are great at surfacing alerts but offer no real way for Security teams to...

View Article


Image may be NSFW.
Clik here to view.

Monitor and Classify Your Databricks Data with Prisma Cloud DSPM

Databricks is a highly popular platform for companies working with large datasets in cloud environments. With offerings spanning the many ways organizations can extract value from data — from data...

View Article

Image may be NSFW.
Clik here to view.

Redshift Security: Data Backups and Encryption Best Practices

In this blog post, second in a series, we focus on risks that come from a misconfigured Redshift, like encryption, backups and logs. We’ll explore security features and best practices that can prevent...

View Article
Browsing all 27 articles
Browse latest View live