* [Blog](https://www2.paloaltonetworks.com/blog) * [SASE](https://www2.paloaltonetworks.com/blog/sase/) * [Cloud-delivered Security](https://www2.paloaltonetworks.com/blog/sase/category/cloud-delivered-security/) * Securing Campus Networks ... # Securing Campus Networks with Prisma Access and Nile [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fsase%2Fsecuring-campus-networks-with-prisma-access-and-nile%2F) [](https://twitter.com/share?text=Securing+Campus+Networks+with+Prisma+Access+and+Nile&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fsase%2Fsecuring-campus-networks-with-prisma-access-and-nile%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fsase%2Fsecuring-campus-networks-with-prisma-access-and-nile%2F&title=Securing+Campus+Networks+with+Prisma+Access+and+Nile&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/sase/securing-campus-networks-with-prisma-access-and-nile/&ts=markdown) \[\](mailto:?subject=Securing Campus Networks with Prisma Access and Nile) Link copied By [Saurabh Dixit](https://www.paloaltonetworks.com/blog/author/saurabh-dixit/?ts=markdown "Posts by Saurabh Dixit") and [Savi Venkatachalapathy](https://www.paloaltonetworks.com/blog/author/savi-venkatachalapathy/?ts=markdown "Posts by Savi Venkatachalapathy") Nov 21, 2024 5 minutes [Cloud-delivered Security](https://www.paloaltonetworks.com/blog/sase/category/cloud-delivered-security/?ts=markdown) [Partner Integrations](https://www.paloaltonetworks.com/blog/sase/category/partner-integrations/?ts=markdown) [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown) [campus networks](https://www.paloaltonetworks.com/blog/tag/campus-networks/?ts=markdown) [IoT](https://www.paloaltonetworks.com/blog/tag/iot/?ts=markdown) [Prisma Access](https://www.paloaltonetworks.com/blog/tag/prisma-access/?ts=markdown) [Zero Trust](https://www.paloaltonetworks.com/blog/tag/zero-trust/?ts=markdown) The modern workplace has evolved significantly in recent years, with the rise of hybrid work becoming the new standard. This shift has blurred the traditional boundaries of office spaces as employees seamlessly transition among branches, campuses, their homes and other locations. This has led to a proliferation of devices everywhere, including large campuses where employees increasingly use their personal devices at work and IT administrators implement more IoT devices to simplify operations and improve monitoring. While providing flexibility, these unmanaged devices also bring a host of unknown vulnerabilities. The Palo Alto Networks Unit 42 [*2020 IoT Threat Report*](https://start.paloaltonetworks.com/unit-42-iot-threat-report) found that 57% of IoT devices are highly vulnerable, significantly increasing the risk of security breaches. Campus networks are at the heart of many IT operations. They need to ensure that the access networks, including wired and wireless local area networks (LAN), are protected and monitored with [Next-Generation Firewalls (NGFWs)](https://www.paloaltonetworks.com/network-security/next-generation-firewall) and [Security Services Edge (SSE)](https://www.paloaltonetworks.com/cyberpedia/what-is-security-service-edge-sse) for outbound access. Operators of such networks also rely on legacy switching technologies such as virtual local area networks (VLANs) for segmentation. However, campus networks that rely on VLANs for segmentation are vulnerable to MAC spoofing, where attackers can impersonate legitimate devices by replicating their MAC addresses. Moreover, VLANs create a broadcast domain, allowing threats emanating from a single device to propagate throughout the logical segment. Such technologies weaken the ability to monitor lateral movement within the network, allowing compromised devices to move freely and spread malicious activity, such as ransomware, putting the entire network at risk. As a result, IT administrators are often left with no choice but to deploy localized security solutions with overly permissive policies. This traditional approach, based on the allow-and-ignore method, significantly increases operational complexity and is no longer sufficient for the dynamic needs of a hybrid workforce and the vulnerabilities of IoT devices. Organizations must move from a traditional approach of using point products like network access control (NAC) to a more simplified and secure networking solution that effectively segments users and devices based on granular policy controls. They require a robust security solution to protect their hybrid workforce with Zero Trust and the ability to enforce security policies based on complete visibility, the isolation of devices, and a more granular segmentation approach across networks. # Palo Alto Networks Zero Trust Network Architecture Palo Alto Networks delivers [Zero Trust](https://www.paloaltonetworks.com/zero-trust) that leverages the principle of [least privilege access](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access) based on user, app identification and device posture with the best-in-breed security capabilities of [NGFWs](https://www.paloaltonetworks.com/network-security/next-generation-firewall) on-premises and [Prisma® Access](https://www.paloaltonetworks.com/sase/access) in the cloud. This provides [continuous trust verification](https://www.paloaltonetworks.com/blog/2022/05/allow-and-ignore-model-is-a-recipe-for-disaster/) even after access to the app has been granted, ensuring that device posture or any changes to it, along with user and app behaviors, are all continuously monitored and verified so we can respond to any changes or deviations in real-time. They also provide [continuous security inspection](https://www.paloaltonetworks.com/blog/2022/06/security-inspection-problem/) for all application traffic, including for allowed connections to help prevent threats, including zero-day threats, while protecting data across all applications with a data loss prevention policy. Furthermore, they also identify devices, including IoT, with unique Device-ID to deliver secure, seamless, and optimized access while enforcing robust security policies. # The Nile Access Service Nile is redefining branch and campus networks with a completely reimagined wired and wireless LAN that provides enhanced security, including granular access controls. The AI-powered [Nile Access Service](https://nilesecure.com/solutions/nile-access-service) eliminates VLANs and delivers robust Layer 3 segmentation. Nile isolates each device by default to prevent vulnerabilities and denies lateral movement for unauthorized communication between two devices. This streamlined approach forwards all traffic to a centralized policy enforcement point for precise inspection and routing. # Elevating Enterprise Security with Prisma Access and Nile The integrated architecture between Palo Alto Networks [NGFWs](https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/techbriefs/next-generation-firewall-and-nile-access-service) and [Nile Access Service](https://nilesecure.com/wp-content/uploads/2024/02/Nile-Higher-Ed-Solution-Brief.pdf) enables secure end-to-end networking for all organizations looking to deploy a resilient and comprehensive solution on their campus networks. This integration now extends to [Prisma Access](https://www.paloaltonetworks.com/resources/prisma/prisma-access-aag) to automatically connect and forward traffic to cloud-based [Prisma Access](https://www.paloaltonetworks.com/resources/datasheets/prisma-access) nodes based on policies defined on Nile, ensuring a comprehensive and robust security approach. Customers can now secure all local access with [NGFWs](https://www.paloaltonetworks.com/network-security/next-generation-firewall-hardware) and all outbound access, including [internet](https://www.paloaltonetworks.com/sase/secure-web-gateway) and [private application](https://www.paloaltonetworks.com/sase/ztna) access with Prisma Access, gaining the following benefits: * \*\*Network operation simplicity:\*\*Ability to apply more granular and uniform enforcement via device isolation that helps Identify and contain the blast radius of possible threats. * **Greater visibility:** In-depth network and security insights for optimizing access enforcement based on the best path per application or connectivity type. * **Scalability:** Easily scale to accommodate growing networks, devices and users and adapt to evolving enterprise needs without requiring complex reconfiguration or new integrations. > "At Nile, we're revolutionizing enterprise security with campus Zero Trust solutions, eliminating legacy VLANs and enhancing protection with Layer 3 segmentation. Our integration with Palo Alto Networks Prisma Access ensures comprehensive, streamlined security across campus and cloud environments, improving protection and management efficiency." > > **--- Suresh Katukam, cofounder and chief product officer at Nile** > "Partnering with Nile to integrate Palo Alto Networks Prisma Access further strengthens our best-in-class Zero Trust security that delivers continuous trust protection and verification to protect for all apps, and, and devices at the branch and on campus. This collaboration demonstrates our dedication to being the preferred cybersecurity partner for our customers, guiding them toward enhanced security with secure LAN and, and campus solutions." > > **--- Anupam Upadhyaya, vice president of product management at Palo Alto Networks** As enterprise networks evolve with hybrid work, personal devices and IoT, traditional security methods like VLANs and Access Control Lists (ACL) must be improved. The urgency of modernizing security with cloud-based SSE solutions and Zero Trust principles is paramount, given the increasing complexity and diversity of threats in today's digital landscape. Nile's innovative approach and Palo Alto Networks' best-of-breed security solutions address these challenges with unified security that bridges campus and cloud environments. This integration enhances protection, visibility and efficiency, setting a new standard for securing today's dynamic digital landscape. Learn more about [Prisma Access](https://www.paloaltonetworks.com/sase/access) and [Nile Access Service](https://nilesecure.com/solutions/network-security). *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Cloud-delivered Security](https://www.paloaltonetworks.com/blog/sase/category/cloud-delivered-security/?ts=markdown), [News \& Events](https://www.paloaltonetworks.com/blog/sase/category/news-events/?ts=markdown), [Partner Integrations](https://www.paloaltonetworks.com/blog/sase/category/partner-integrations/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Palo Alto Networks and Verizon Champion a New Cybersecurity Approach](https://www2.paloaltonetworks.com/blog/2022/11/a-new-cybersecurity-approach/) ### [Cloud-delivered Security](https://www.paloaltonetworks.com/blog/sase/category/cloud-delivered-security/?ts=markdown), [News \& Events](https://www.paloaltonetworks.com/blog/sase/category/news-events/?ts=markdown), [Partner Integrations](https://www.paloaltonetworks.com/blog/sase/category/partner-integrations/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Introducing Prisma Access Traffic Replication](https://www2.paloaltonetworks.com/blog/sase/introducing-prisma-access-traffic-replication/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Cloud-delivered Security](https://www.paloaltonetworks.com/blog/sase/category/cloud-delivered-security/?ts=markdown), [Partner Integrations](https://www.paloaltonetworks.com/blog/sase/category/partner-integrations/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Orange Cyberdefense and Palo Alto Networks Lead with Zero Trust](https://www2.paloaltonetworks.com/blog/2022/10/orange-cyber-defense-with-zero-trust/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [News \& Events](https://www.paloaltonetworks.com/blog/sase/category/news-events/?ts=markdown), [Partner Integrations](https://www.paloaltonetworks.com/blog/sase/category/partner-integrations/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown) [#### Palo Alto Networks and Deutsche Telekom Offer Secure Service Edge](https://www2.paloaltonetworks.com/blog/2022/09/dt-launch-managed-secure-service-edge/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [News \& Events](https://www.paloaltonetworks.com/blog/sase/category/news-events/?ts=markdown), [Partner Integrations](https://www.paloaltonetworks.com/blog/sase/category/partner-integrations/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Prisma Access Joins the Microsoft 365 Networking Partner Program](https://www2.paloaltonetworks.com/blog/2022/01/microsoft-365-networking-partner-program/) ### [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Bringing Zero Trust SASE to Your Doorstep with SASE Private Location](https://www2.paloaltonetworks.com/blog/sase/bringing-zero-trust-sase-to-your-doorstep-with-sase-private-location/) ### Subscribe to Sase Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language