Summary | Prisma Access - SaaS Security
| Overall network takeaways from different
apps: (Prisma Access) The percentage of SaaS apps
that are not sanctioned. (Prisma Access) The percentage of users using one
or more unsanctioned apps. (Prisma Access) The number of threats discovered
on your network. This includes malicious URLs, malicious domains,
and files that WildFire has identified as malware. (SaaS Security) The number of files exposed to people outside your organization (SaaS
Security) (SaaS Security) The number of files that are external or public and might contain
sensitive data.
|
Industry Comparison | Prisma Access SaaS Security
| Your SaaS security posture, as compared
to other companies in your industry: (Prisma Access)
The number of SaaS apps in use. (SaaS Security) Publicly shared files. (SaaS Security) Externally shared files.
|
SaaS |
App Overview | Prisma Access | The total number of apps in use on your
network, including your sanctioned SaaS apps, your unsanctioned
apps, and your non-SaaS apps. |
Apps with Poor Characteristics | Prisma Access | Click
a characteristic to see the top three applications with that characteristic. Toggle
between Count (to see the apps with the most users) and Usage (to
see the apps with the most traffic). |
SaaS Exposure Summary | SaaS Security | The number of asset violations and their
level of exposure (public, external, company, or internal). |
Exposure by Content Type | SaaS Security | The types of sensitive content that are
most exposed or at risk in your network. |
Network |
Threats | Prisma Access | An overview of the threats in your network
shows the total numbers of malicious files, URLs, and domains your users
accessed. |
Apps Using Non-Standard Ports | Prisma Access | The riskiest applications (most likely to
be used as part of a cyberattack) that are running on non-standard
ports. Applications running on unusual ports can indicate
that an attacker is attempting to circumvent traditional port-based
protections. |
Cloud |
Summary (cloud section) | Prisma Cloud | The number of GCP, AWS, and Azure accounts,
as well as the number of workloads (Resources) you’re monitoring, by
provider. |
Alerts | Prisma Cloud | Prisma Cloud alerts from the last 30 days,
based on severity. Prisma Cloud continually monitors your
cloud environments to detect misconfigurations, advanced network threats,
stolen access keys or account compromise, and vulnerable hosts.
Alert severities are based on the policy violation that occurred,
the impact to business, and the anomalous behavior that took place. |
Compliance | Prisma Cloud | Your compliance posture at a glance. For
the compliance standards listed (for example, HIPPA), you can see
the number of resources that either adhere to or do not pass compliance.
Ideally, the number of resources passing compliance will increase
over time, and the number of failed resources will decrease. |