With an OverDrive account, you can save your favorite libraries
for at-a-glance information about availability. Find out more
about OverDrive accounts.
Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced featuresKey Features
Find out how to activate, deploy, and configure Prisma Access
Configure mobile user and remote network security processing nodes
Understand user identification and the Cloud Identity Engine
Purchase of the print or Kindle book includes a free PDF eBook
Book DescriptionDiscover how Palo Alto Networks' Prisma Access, a firewall as a service (FWaaS) platform, securely connects mobile users and branch offices to resources. This guide, written by renowned Palo Alto Networks expert Tom Piens, introduces cloud-delivered security and Prisma Access components. You'll learn how Prisma Access fits into the security landscape and benefits organizations with remote networks and mobile workforces, and gain essential knowledge and practical skills in setting up secure connections, implementing firewall policies, utilizing threat prevention, and securing cloud applications and data. By the end, you'll be able to successfully implement and manage a secure cloud network using Prisma Access.What you will learn
Configure and deploy the service infrastructure and understand its importance
Investigate the use cases of secure web gateway and how to deploy them
Gain an understanding of how BGP works inside and outside Prisma Access
Design and implement data center connections via service connections
Get to grips with BGP configuration, secure web gateway (explicit proxy), and APIs
Explore multi tenancy and advanced configuration and how to monitor Prisma Access
Leverage user identification and integration with Active Directory and AAD via the Cloud Identity Engine
Who this book is for
This book is for network engineers, security engineers, security administrators, security operations specialists, security analysts, and anyone looking to integrate Prisma Access into their security landscape. Whether you're a newcomer to the field or a seasoned expert, this guide offers valuable insights for implementing and managing a secure cloud network effectively. Basic knowledge of Palo Alto will be helpful, but it's not a prerequisite.