{"id":306524,"date":"2023-10-18T03:00:36","date_gmt":"2023-10-18T10:00:36","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=306524"},"modified":"2023-10-31T11:09:59","modified_gmt":"2023-10-31T18:09:59","slug":"announcing-innovations-cnapp-prisma-cloud","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2023\/10\/announcing-innovations-cnapp-prisma-cloud\/","title":{"rendered":"Prisma Cloud: Darwin Release Introduces Code to Cloud Intelligence"},"content":{"rendered":"<p><a id=\"post-306524-_gjdgxs\"><\/a> Cloud applications power the modern enterprise. Still, today\u2019s app economy \u2014 propelled by AI-led development \u2014 will seem inaugural in retrospect. By 2030, <a href=\"http:\/\/www.mckinsey.com\/industries\/public-sector\/our-insights\/the-potential-value-of-ai-and-how-governments-could-look-to-capture-it\" rel=\"nofollow,noopener\" >AI could add $13 trillion to global economic output<\/a>, a significant portion derived from the application economy, according to the McKinsey Global Institute.<sup>1<\/sup><\/p>\n<p><a id=\"post-306524-_o09vzfvskwdd\"><\/a> But applications aren\u2019t without risks \u2014 not surprising when you consider that they\u2019re built from a complex combination of software packages assembled across multiple delivery pipelines, which also present sources of risk. Code misconfigurations, insecure APIs, unpatched vulnerabilities, exposed secrets \u2026 the list goes on. And each risk in code exponentially increases in the cloud, driving security teams to continuously react with runtime patching. This approach won\u2019t scale \u2014 not when you consider that <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/research\/2023-unit-42-attack-surface-threat-report\">hackers can exploit new vulnerabilities within 15 minutes<\/a> after they\u2019re announced.<sup>2<\/sup><\/p>\n<p><a id=\"post-306524-_b1r144odowg\"><\/a> In the digital era dominated by cloud-native applications, organizations need an intelligent code to cloud approach to act as a single source of truth on application risk for developers, operations and security teams. Gartner drives home the challenge, saying, \u201cHowever, it is <a href=\"https:\/\/www.gartner.com\/doc\/reprints?id=1-2CKBS610&amp;ct=230213&amp;st=sb\" rel=\"nofollow,noopener\" >incredibly complex to secure software supply chains<\/a> because they typically extend beyond the confines of any single organization. They span a network of vendors, partners and open-source ecosystems.\u201d<sup>3<\/sup><\/p>\n<p>Addressing this complexity head-on, <a href=\"http:\/\/www.paloaltonetworks.com\/prisma\/cloud\">Prisma\u00ae Cloud delivers the next major advancement in CNAPP<\/a> with the latest Darwin release, making it uniquely comprehensive at securing the application lifecycle from code to cloud.<\/p>\n<h2><strong>Taking an Intelligent Approach to CNAPP<\/strong><\/h2>\n<p>While many vendors offer piecemeal solutions, addressing only fragments of the application lifecycle, Prisma Cloud stands apart with its platform approach. It secures applications from their inception in code to their deployment in the cloud to their active running environments where it identifies, connects and fixes risks at every step.<\/p>\n<p>But the game-changer lies in Prisma Cloud's Code to Cloud\u2122 intelligence. Introduced in the Darwin release, Code to Cloud intelligence dives deep into patterns, behaviors and anomalies across code, cloud infrastructure and cloud runtime. Security issues aren\u2019t just identified. They\u2019re traced to their source in code and back, allowing for effective remediation at the origin of risk. To prevent problems from multiplying as applications are built and deployed, developers have deep context on exactly what needs fixing.<\/p>\n<p>Moreover, this isn't merely an add-on \u2014 it's woven into the fabric of Prisma Cloud.<\/p>\n<h2><a id=\"post-306524-_sq388nspdgdw\"><\/a><strong>Harnessing the Power of Code to Cloud\u2122 Intelligence<\/strong><\/h2>\n<p>Since launching Prisma Cloud, Palo Alto Networks has consistently led the way in innovation. Today, with the <a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/cloud\/latest\">Darwin release<\/a>, we\u2019ve raised the bar once more, delivering four industry-first innovations that work together to vastly simplify how organizations prevent risks and stop breaches.<\/p>\n<p>From understanding your applications in context with AppDNA and uncovering complex risks with the Infinity Graph to easily fixing and preventing risks from occurring again via Code to Cloud remediation, teams tap into unmatched intelligence. Connected insights from the developer environment to applications in production streamline effective security unlike ever before.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"2378\"><span class=\"ar-custom\" style=\"padding-bottom:53.32%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-307422 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-25-at-6.56.18-PM.png\" alt=\"Code-to-Cloud intelligence application, showing AppDNA, Infinity Graphy, Remediation, Vulnerability Mgmt, and the dashboard. \" width=\"2378\" height=\"1268\" \/><\/span><\/div><\/p>\n<h3><span style=\"font-weight: 400;\">Intelligence Delivered with an Intuitive User Experience<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Most security teams know the futility of trying to collaborate to reduce cloud risk while switching between various UIs to piece together tools. The Darwin release of Prisma Cloud solves this breakdown, enabling quick and effective collaboration among cross-functional teams. By radically simplifying the user experience, users can now access role-specific dashboards \u2014 whether they're DevOps, AppSec or CloudSec \u2014 through a simple drop-down menu. What\u2019s more, the platform seamlessly transitions between interfaces, promoting optimal communication across roles.<\/span><\/p>\n<figure id=\"attachment_306826\" aria-describedby=\"caption-attachment-306826\" style=\"width: 1920px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"1920\"><span class=\"ar-custom\" style=\"padding-bottom:56.3%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-306826 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2023\/10\/app_switcher2.png\" alt=\"Easily surface the platform capabilities most relevant to your role.\" width=\"1920\" height=\"1081\" \/><\/span><\/div><figcaption id=\"caption-attachment-306826\" class=\"wp-caption-text\">Easily surface the platform capabilities most relevant to your role.<\/figcaption><\/figure>\n<h3><a id=\"post-306524-_9dwk5jo5ygmm\"><\/a>AppDNA: Act Decisively with Rich Application Insights<\/h3>\n<p>Cloud security tools have historically focused on workloads, leaving users with fragmented context into what they really care about \u2014 the applications. AppDNA modernizes visibility by structuring the inventory into an intuitive application-centric view that displays your cloud apps and their DNA \u2014 the cloud services, infrastructure assets, compute workloads, API endpoints, data and code that make up those applications \u2014 all in one place. Additional cloud and business context completes the picture.<\/p>\n<figure id=\"attachment_306732\" aria-describedby=\"caption-attachment-306732\" style=\"width: 1920px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"1920\"><span class=\"ar-custom\" style=\"padding-bottom:56.3%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-306732 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2023\/10\/Inventory.png\" alt=\"AppDNA visualizes every resource component that makes up the application.\" width=\"1920\" height=\"1081\" \/><\/span><\/div><figcaption id=\"caption-attachment-306732\" class=\"wp-caption-text\">AppDNA visualizes every resource component that makes up the application.<\/figcaption><\/figure>\n<h3><a id=\"post-306524-_p7rtyje5vqbt\"><\/a>Infinity Graph: Explore All Angles from Code to Cloud<\/h3>\n<p>Which risks are actually critical? The Infinity Graph makes it easy to understand risks with deep context. By correlating the security stack across misconfigurations, vulnerabilities, pipeline risks, exposure, identity and secrets, sensitive data, and more, you see the potential attack paths leading to a breach. Beyond showing what could go wrong, the graph overlays active attack attempts to show you what\u2019s actually occurring and whether you have protection in place. Highly interactive, the Infinity Graph enables you to search and investigate issues by asking any question, from code to cloud. Easily perform forensics and create guardrails from the supply chain to runtime.<\/p>\n<figure id=\"attachment_306745\" aria-describedby=\"caption-attachment-306745\" style=\"width: 1920px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"1920\"><span class=\"ar-custom\" style=\"padding-bottom:56.3%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-306745 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2023\/10\/Graph_NLP2.png\" alt=\"Easily ask any question about code or cloud in a natural language and model the attack surface with the Infinity Graph.\" width=\"1920\" height=\"1081\" \/><\/span><\/div><figcaption id=\"caption-attachment-306745\" class=\"wp-caption-text\">Easily ask any question about code or cloud in a natural language and model the attack path with the Infinity Graph.<\/figcaption><\/figure>\n<h3><a id=\"post-306524-_h4map029qiir\"><\/a><a id=\"post-306524-_79deqfko59tz\"><\/a>Code to Cloud Remediation: Zero in Quickly to Fix Now in Cloud and Forever in Code<\/h3>\n<p>Opening tickets for remediation is extremely inefficient, yet still the most common way to resolve issues. With Prisma Cloud, you can immediately fix risks in the cloud and open a pull request for developers to address the issue at the source \u2014 preventing it from happening again. With Code to Cloud intelligence, risks are traced back to their origin, giving you a clear roadmap to ensure all teams achieve timely and effective risk management.<\/p>\n<figure id=\"attachment_306758\" aria-describedby=\"caption-attachment-306758\" style=\"width: 1920px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"1920\"><span class=\"ar-custom\" style=\"padding-bottom:56.3%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-306758 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2023\/10\/fix_in_code.png\" alt=\"Code-to-Cloud Remediation enables you to easily fix issues in the cloud or open a pull request to fix the issue permanently in the code.\" width=\"1920\" height=\"1081\" \/><\/span><\/div><figcaption id=\"caption-attachment-306758\" class=\"wp-caption-text\">Code to Cloud remediation enables you to easily fix issues in the cloud or open a pull request to fix the issue permanently in the code.<\/figcaption><\/figure>\n<h3>Code to Cloud Vulnerability Management: Fix in Minutes, Not Months<\/h3>\n<p>While no one is completely immune to vulnerabilities, timely resolution is something we can control. But today\u2019s approach still <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\" rel=\"nofollow,noopener\" >requires months on average to patch a vulnerability<\/a>,<sup>4<\/sup> primarily due to lack of context and legacy workflows. Code to Cloud intelligence enables panoramic visibility, allowing you to trace vulnerabilities to the source and easily fix the base image or code repo, ensuring secure-by-design in future pipeline pushes.<\/p>\n<figure id=\"attachment_306771\" aria-describedby=\"caption-attachment-306771\" style=\"width: 1920px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"1920\"><span class=\"ar-custom\" style=\"padding-bottom:56.3%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-306771 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2023\/10\/c2cvulnmgmt.png\" alt=\"Code-to-Cloud Vulnerability Management traces issues back to their source for end-to-end visibility.\" width=\"1920\" height=\"1081\" \/><\/span><\/div><figcaption id=\"caption-attachment-306771\" class=\"wp-caption-text\">Code to Cloud vulnerability management traces issues back to their source for end-to-end visibility.<\/figcaption><\/figure>\n<h3><a id=\"post-306524-_p6uz8iy7fkup\"><\/a>Code to Cloud Dashboard<\/h3>\n<p>Simplify reporting to leadership and boards. The Code to Cloud dashboard offers visibility and control across the entire application lifecycle, down to the supply chain. More than a monitoring function, the main dashboard is an analytics titan, providing deep insights across each stage of the software development lifecycle to aid in efficient decision-making and reporting.<\/p>\n<figure id=\"attachment_306784\" aria-describedby=\"caption-attachment-306784\" style=\"width: 1920px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"1920\"><span class=\"ar-custom\" style=\"padding-bottom:56.3%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-306784 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2023\/10\/c2c_dash.png\" alt=\"Code-to-Cloud Dashboard provides panoramic visibility across the entire application lifecycle.\" width=\"1920\" height=\"1081\" \/><\/span><\/div><figcaption id=\"caption-attachment-306784\" class=\"wp-caption-text\">Code to Cloud dashboard provides panoramic visibility across the entire application lifecycle.<\/figcaption><\/figure>\n<h3><a id=\"post-306524-_p62bmmsr590z\"><\/a>Cloud Discovery and Exposure Management<\/h3>\n<p>Leveraging an \u201coutside-looking-in\u201d view into cloud environments, Cloud Discovery and Exposure Management (CDEM) empowers security teams to discover, evaluate and mitigate unknown and unmanaged internet exposure risks in their cloud environments. With <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/research\/2023-unit-42-attack-surface-threat-report\">80% of security exposures<\/a> found on assets hosted in the cloud<sup>5<\/sup> \u2014 visibility across all resources is essential. By highlighting rogue assets, providing comprehensive risk assessment, and allowing users to easily onboard unmanaged assets to Prisma Cloud, organizations can help secure cloud infrastructure against previously unmanaged risks.<\/p>\n<h2><strong>The Only Comprehensive Solution<\/strong><\/h2>\n<p>CNAPP by definition is a platform. Remember that. While many vendors claim to offer CNAPP solutions, most only secure isolated parts of the application lifecycle. Prisma Cloud, on the other hand, offers a comprehensive solution, securing the full lifecycle from code to cloud. This all-encompassing approach provides tremendous operational advantages to developers, operations and security teams. Most importantly, it helps ensure that organizations are shielded from threats, no matter where they originate.<\/p>\n<p>Prisma Cloud has consistently showcased its drive toward innovation and excellence. Its simple and intuitive approach, combined with groundbreaking features, positions it as the go-to solution. In a market filled with partial solutions, Prisma Cloud emerges as the only vendor capable of delivering Code to Cloud intelligence.<\/p>\n<p style=\"text-align: center;\"><div class=\"styleIt\" style=\"width:1111px;height:625px;\"><lite-youtube videoid=\"-YTNRQrNoCI\" ><\/lite-youtube><\/div><span style=\"font-size: 10pt;\">See how <a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/cloud\/latest\">Prisma Cloud\u2019s Darwin release<\/a> makes it easier than ever to secure your cloud infrastructure.<\/span><\/p>\n<h2><strong>It Only Gets Better<\/strong><\/h2>\n<p>At Palo Alto Networks, we strive to offer our users a world-class experience that delights application developers and security professionals alike. Our track record speaks for itself. But accolades and industry recognition aside, it's the feedback from our users \u2014 the stories of breaches prevented, of the peace of mind experienced by so many \u2014 that underscore our commitment to excellence.<\/p>\n<h2><a id=\"post-306524-_7wqbtqflcijl\"><\/a><strong>Learn More<\/strong><\/h2>\n<p>Tune in to our on-demand webinar,\u00a0<a class=\"c-link\" href=\"https:\/\/start.paloaltonetworks.com\/prisma-cloud-new-innovations-for-the-future-of-cloud-security-webinar-on-demand.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/start.paloaltonetworks.com\/prisma-cloud-new-innovations-for-the-future-of-cloud-security-webinar-on-demand.html\" data-sk=\"tooltip_parent\">CNAPP Supercharged: A Radically New Approach to Cloud Security<\/a>, to learn about Prisma Cloud's latest innovations and how to streamline app lifecycle protection. And, don\u2019t miss an opportunity to test drive best-in-class, code to cloud security with a <a class=\"c-link\" href=\"https:\/\/www.paloaltonetworks.com\/prisma\/request-a-prisma-cloud-trial\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.paloaltonetworks.com\/prisma\/request-a-prisma-cloud-trial\" data-sk=\"tooltip_parent\">30-day Prisma Cloud trial<\/a>.<\/p>\n<p><span style=\"font-size: 10pt;\"><strong>References<\/strong><\/span><\/p>\n<ol>\n<li><span style=\"font-size: 10pt;\">\u201cAI in Government: Capturing the Potential Value | McKinsey.\u201d <em>www.mckinsey.com<\/em>, <a href=\"http:\/\/www.mckinsey.com\/industries\/public-sector\/our-insights\/the-potential-value-of-ai-and-how-governments-could-look-to-capture-it\" rel=\"nofollow,noopener\" >www.mckinsey.com\/industries\/public-sector\/our-insights\/the-potential-value-of-ai-and-how-governments-could-look-to-capture-it<\/a>.<\/span><\/li>\n<li><span style=\"font-size: 10pt;\">\u201c2023 Unit 42 Attack Surface Threat Report.\u201d n.d. Palo Alto Networks. Accessed September 24, 2023. <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/research\/2023-unit-42-attack-surface-threat-report\">https:\/\/www.paloaltonetworks.com\/resources\/research\/2023-unit-42-attack-surface-threat-report<\/a>.<\/span><\/li>\n<li><span style=\"font-size: 10pt;\">2023. Gartner.com. 2023. <a href=\"https:\/\/www.gartner.com\/doc\/reprints?id=1-2CKBS610&amp;ct=230213&amp;st=sb\" rel=\"nofollow,noopener\" >https:\/\/www.gartner.com\/doc\/reprints?id=1-2CKBS610&amp;ct=230213&amp;st=sb<\/a>.<\/span><\/li>\n<li><span style=\"font-size: 10pt;\">\u201c2023 Data Breach Investigations Report.\u201d n.d. Verizon Business. <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\" rel=\"nofollow,noopener\" >https:\/\/www.verizon.com\/business\/resources\/reports\/dbir<\/a>.<\/span><\/li>\n<li><span style=\"font-size: 10pt;\">\u201c2023 Unit 42 Attack Surface Threat Report.\u201d n.d. Palo Alto Networks. Accessed September 24, 2023. <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/research\/2023-unit-42-attack-surface-threat-report\">https:\/\/www.paloaltonetworks.com\/resources\/research\/2023-unit-42-attack-surface-threat-report<\/a>.<\/span><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Prisma Cloud's latest release delivers full cloud security through the application lifecycle and prevents breaches with Code to Cloud\u2122 intelligence. <\/p>\n","protected":false},"author":656,"featured_media":306812,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,6717],"tags":[9591,368,6890],"coauthors":[8149],"class_list":["post-306524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","category-products-and-services","tag-darwin","tag-innovation","tag-prisma-cloud","cloud_sec_category-announcement","cloud_sec_category-cloud-security","cloud_sec_category-cnapp"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2023\/10\/Prisma-Cloud-Darwin-Promo-Launch-Blog-Banners-400x300-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/306524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/656"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=306524"}],"version-history":[{"count":17,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/306524\/revisions"}],"predecessor-version":[{"id":309463,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/306524\/revisions\/309463"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/306812"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=306524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=306524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=306524"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=306524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}