Palo Alto Networks Prisma® Access creates complete security for all application traffic from on-prem to SaaS. The system consolidates all network and security functions in a single console and, if desired, with its own logging service hosted in Germany for full GDPR compliance.
At the same time, Prisma® Access enables an exceptionally good user experience thanks to tunnel-free access and the close-knit Google data centre infrastructure as a backbone for low latency.
In addition, Palo Alto's cloud-native solution does not run on a shared cloud infrastructure as is the case with other providers: a separate tenant is set up for each customer to make performance losses due to resource overbooking impossible.
This makes Prisma® Access the ideal single-vendor SASE for:
- Companies with many branches or national subsidiaries.
- Companies with many users working from home or at the client's premises.
- Companies in times of M&As.
Palo Alto Prisma® Access starts from 200 users. For full flexibility, new licences can be added at any time and for any duration.
Advantages at a glance.
- Prevent successful cyberattacks with proven security philosophies and threat intelligence from Palo Alto Networks and hundreds of third-party feeds for deep visibility and precise control.
- cincluding SSL/TLS-encrypted data traffic - on all ports, regardless of whether the communication is with the Internet, the cloud or between branch offices.
- instead of shared vendor infrastructure and GDPR compliance through logging service hosted in Germany.
- instead of shared vendor infrastructure and GDPR compliance through logging service hosted in Germany.
Palo Alto Thread Intelligence:
Application traffic is checked bidirectionally and completely -
Platform solution (Security Hub) with one console and config -
Best performance thanks to own tenant per customer
Two service layers in a SASE solution from Palo Alto.
Cyber attacks can only be prevented if data traffic can be recorded and checked without gaps. Any unknown traffic represents a significant security gap.
Palo Alto Prisma® Access therefore consists of two service layers - one for the network and one for security.

Network-Layer.
Connect mobile users to the GlobalProtect™ app, which supports user-based always-on, pre-logon always-on and on-demand connections. Prisma Access supports split tunnelling based on the access route and type of application, including the associated risk and bandwidth usage.
Connect branch offices to Prisma Access over a standard IPsec VPN tunnel using common IPsec-compliant devices, such as your existing branch office router or a software-defined wide area network (SD-WAN) appliance. You can use Border Gateway Protocol (BGP) or static routing from the branch and you can use Equal Cost Multipath (ECMP) routing for faster performance and better redundancy across multiple links.
The ADEM add-on for Prisma Access provides native end-to-end visibility for SASE. With ADEM, you get segment-by-segment insights across the entire service delivery path, with real and synthetic traffic analysis that enables autonomous remediation of digital experience issues as they arise. With the complementary Prisma Access Insights, you can monitor the health of your Prisma Access deployment and gain insights when needed.
Security-Layer.
Prisma Access offers Firewall-as-a-Service (FWaaS) features with the full functionality of Palo Alto Networks Next-Generation Firewalls (NGFWs). This includes inbound and outbound protection, native user authentication and access control, and Layer 3-7 single-pass inspection to protect branch offices from threats.
Prisma Access provides Cloud Secure Web Gateway (SWG) functionality for remote users across all web traffic protocols and applications in hybrid environments. It also provides URL and content filtering for users based on dynamic group monitoring, allowing you to implement granular behaviour-based policies. Integrated proxying gives users maximum flexibility in how they connect to the Prisma Access Service. Advanced DNS security prevents command-and-control (C2) callback and DNS tunnelling attacks.
ZTNA authenticates and connects users to applications based on granular role-based access control (RBAC) and provides a single interface to create and enforce policies. Prisma Access supports both agent-based and agentless connection methods, regardless of a user's location. Unlike standalone VPN or proxy solutions, Prisma Access performs single-pass traffic inspection for malware, data loss and malicious behaviour after users connect.
Prisma Access natively provides inline visibility and control of Software-as-a-Service (SaaS) applications. With the addition of Prisma SaaS, API-based security and contextual controls can be introduced for sanctioned SaaS applications. These controls are implemented together in an integrated manner and applied across all cloud application policies.
Warum Prisma® Access und Palo Alo mit Nomios Deutschland?
Prisma® Access Cloud from Palo Alto Networks offers a powerful security solution for modern network infrastructures, and Nomios Germany is your perfect implementation and operations partner.
As an official partner of Palo Alto Networks with in-depth expertise, Nomios helps you to optimally adapt Prisma Access to the individual needs of your company. The comprehensive service includes not only implementation, but also ongoing support and managed services to keep your solution up to date at all times. Get in touch with us!

Ready to talk?
Are you looking for pricing details, technical information, support or a custom quote? Our team of experts in Dortmund is ready to assist you.
