Palo Alto Networks has introduced the industry’s first integrated Code to Cloud intelligence as part of the Prisma Cloud Darwin release.
In the last decade, organizations have started to deploy cloud applications at an unprecedented rate with no sign of slowing down. According to Gartner, 65 percent of application workloads will be optimized or ready for cloud delivery by 2027 – up from 45 percent in 2022.
With its new Code to Cloud intelligence, Prisma Cloud offers a single trusted place that connects insights from the developer environment through application runtime for security teams to contextualize alerts and pinpoint remediations. This intelligence prevents risk and stops breaches while enhancing the end-user experience and improving developer and security team collaboration.
Explore related questions
Ankur Shah, senior vice president, Prisma Cloud, Palo Alto Networks, said: “The only way to secure applications from code to cloud is by fending off risk from entering the development pipeline and preventing breaches of applications in production.
“This can only be achieved through an intelligent CNAPP platform like Prisma Cloud that gathers intelligence throughout the application lifecycle so security teams can precisely trace vulnerabilities and misconfigurations back to their origin in the source code. Prisma Cloud’s Darwin release simplifies cloud security and improves productivity and collaboration across code, infrastructure and runtime security.”
Melinda Marks, practice director, Enterprise Strategy Group, said: “Today’s reality is we face a cybersecurity skills shortage, especially in cloud security, while organizations are increasingly leveraging cloud services for faster application development to best serve customers and drive business results.
“At the same time, we have a rapidly evolving threat landscape increasingly targeting cloud workloads. So, it’s crucial to invest in an effective security solution that supports increased development productivity from code to cloud to enable security teams to optimize security risk mitigation and protect their applications to enable business growth.”