Prisma Cloud (formerly Twistlock)

Prisma cloud

Document request

If you would like the following materials, please proceed to the application form.

Document content
Feature article
Introduction to Container Security4.24MB /8P PDF
Despite the obvious benefits in terms of developer productivity, too many cybersecurity professionals are somewhat reluctant to deploy containers in production given all the challenges involved in securing containerized applications. You can also convince me. However, as daunting as it may seem, containers have one very beneficial cybersecurity advantage that cybersecurity teams don't fully appreciate at first.
An introduction to container security
white paper
Secure application development with Posture Management543KB /18P PDF NEW
With the digitization of lifestyles and the spread of portable devices, we have more opportunities to use applications in our daily lives, and as a result we have more opportunities to experience changes in our lifestyles. Behind the scenes of such an application-driven lifestyle, the application development model has undergone a major transformation as the competition for development to deliver successful experiences to users has intensified to keep up with the diversification and changes in requirements. Dealing with the accompanying security risks has become a major business issue. This book explains the security risks associated with the transformation of application development models and the ideal security operation concept for dealing with risks.
Secure application development with Posture Management
Image scanning for vulnerabilities is not enough Points to remember when implementing runtime protection that are blind spots in container security1.21MB /6P PDF
Container technology is being used by many companies. As a technology indispensable for promoting digital transformation (DX), further expansion of its use is expected in the future. Under these circumstances, ensuring security has emerged as an urgent issue. However, security measures for containers require different requirements from conventional physical/virtual servers, and it is true that many difficult problems stand in the way. This document describes possible threats, points to keep in mind, and functions required for solutions when implementing container security.
Vulnerability Image Scanning Is Not Enough Blind Spots in Container Security and Points in Implementing Runtime Protection
NIST SP800-190 Compliant with Prisma Cloud2.02MB/21P PDF
Prisma Cloud can comprehensively cover almost all of the measures recommended in the container security guidelines "NIST SP800-190" issued by NIST in the United States. This document introduces the details.
The Complete Guide to Kubernetes Security
From NodeUp: The Complete Guide to Kubernetes Security 1.19MB/14P PDF
Much of the discussion about Kubernetes® security centers around the difficulty of securing clusters. Kubernetes has few native security features, making it extremely difficult to secure all layers of a Kubernetes environment. This ebook will show you how to design a security strategy that strengthens rather than hinders other Kubernetes-based processes. Identify Kubernetes security challenges from node up and specific solutions to address each challenge.
The Complete Guide to Kubernetes Security
report
Cloud Native Security State Report15.4MB/37P PDF
The first State of Cloud Native Security Report from Palo Alto Networks and Accenture outlined the techniques, tools and techniques that enterprises around the world are using to manage the security of their cloud native architectures. Based on a survey of 3,000 cloud architecture, information security, DevOps and application development professionals in 5 countries and 5 industries, this report helps you make cloud transformation and cloud usage decisions and understand the potential of the cloud. You can bring out your full potential.
Cloud-Native Security State Report
Lecture materials
[ZDNet Japan Security Trend 2020 Winter Presentation Material] Security that follows high-speed application development in the DX era3.45MB/36P PDF
Nowadays, digitalization is essential for companies to grow their businesses, and many development departments and DX departments are building modern development environments using container technology and working on quick application development. However, while rapid application development greatly contributes to early business value creation, the priority of security tends to be relatively low. We believe that cooperation is important. In this document, we will explain the elements of security for the efforts of development departments using container environments, the differences from conventional security, the concept of countermeasures, the aspects of tools, operations, and culture.
ZDNet Japan Security Trend 2020 Winter Presentation Material
[Developers Summit Summer 2020 Lecture Material] Let's implement "security" in a container-based development pipeline3.48MB /46P PDF
Application development using container technologies such as Docker and Kubernetes is rapidly spreading, but one of the major challenges is how to implement security without sacrificing speed or productivity. In this session, we will introduce the method of implementing security for container-based development pipelines by skillfully combining multiple global standard tools with demonstrations.
Developers Summit Summer 2020 Lecture Materials
User case
GVA TECH Co., Ltd.2.11MB /2P PDF
GVA TECH provides AI contract review support cloud “GVA assist”
Introducing “Prisma Cloud” for security in container/serverless environments
GVA TECH Co., Ltd.
Minna Bank, Ltd. Ltd.2.00MB/2P PDF
Minna no Bank, the first bank in the industry to build a full cloud banking system
Adopt Prisma Cloud for cloud security solution
Minna Bank, Ltd.
JCB Co. , Ltd.1.66MB/2P PDF
JCB builds a next-generation platform based on Microservices architecture
Deployed Prisma Cloud to monitor and protect container workloads
Chatwork Co., Ltd.
Chatwork Co., Ltd. Inc.759KB/2P PDF
When Kubernetes was introduced and it became possible to operate individual applications, the operation policy was changed in the direction of strengthening the authority of developers. For that reason, we introduced an open source container monitoring tool and checked it. Although it was possible to detect anomalous events, it was a major issue that they were not able to block them. Therefore, when looking for an all-in-one container security product, I noticed the function of Twistlock (currently Prisma Cloud).
Chatwork Co., Ltd.

application form

Inquiry

In charge of Macnica DevOps

Mon-Fri 8:45-17:30