Palo Alto Networks and FedRAMP Authorization
Build your agency’s cybersecurity foundation with FedRAMP Authorized cloud services
Build your agency’s cybersecurity foundation with FedRAMP Authorized cloud services
As your agency moves forward in its modernization efforts, it needs trusted cybersecurity solutions that will reduce the risk of data breaches while meeting compliance. Develop a comprehensive cloud cybersecurity strategy with solutions that protect workers, data and applications from cyber adversaries and advanced threats.
Simplifying and strengthening your agency’s cybersecurity foundation, Prisma Access allows you to respond to and stop sophisticated cyber attacks across endpoints, networks and cloud environments. Using Zero Trust architecture, Prisma Access protects remote workers and branch offices - while reducing TCO and improving compliance. Prisma Access is FedRAMP Moderate Authorized.
View the press release Read the Forrester study Read the blog Download the datasheet Browse the use case Transition to TIC 3.0Stop modern attacks with an extended detection and response platform that spans your key security data sources. Cortex XDR includes endpoint protection, AI-driven threat detection and a powerful yet intuitive console for investigations. Cortex XDR has received FedRAMP Moderate Authorization.
Monitor posture, detect and respond to vulnerabilities and threats, and maintain compliance. The Cloud Security Posture Management (CSPM) capabilities of Prisma Cloud reduce alert volume, configuration errors and cloud security tools. Prisma Cloud is FedRAMP Moderate Authorized.
Read the CSPM for government datasheetEnforce permissions and secure identities across workloads and cloud resources with Prisma Cloud Identity and Access Management (IAM) Security.
Learn more about IAM Security
![]() Cortex XDR Prevent |
![]() Cortex XDR Pro |
---|---|
Data sourcesGet extended visibility |
Data sourcesGet extended visibility |
Endpoint protectionStop malware, exploits and fileless attacks |
Endpoint protectionStop malware, exploits and fileless attacks |
Device controlPrevent data loss and USB-based malware infections |
Device controlPrevent data loss and USB-based malware infections |
Disk encryptionManage BitLocker or FileVault from the Cortex XDR console |
Disk encryptionManage BitLocker or FileVault from the Cortex XDR console |
Host firewallReduce the attack surface on Windows and macOS endpoints |
Host firewallReduce the attack surface on Windows and macOS endpoints |
Managed Threat HuntingUncover the most complex threats across endpoint and network with Unit 42 experts |
Managed Threat HuntingUncover the most complex threats across endpoint and network with
Unit 42 experts |
Host InsightsMonitor host inventory, find vulnerabilities and sweep across endpoints to eradicate threats |
Host InsightsMonitor host inventory, find vulnerabilities and sweep across
endpoints to eradicate threats |
Behavioral analyticsDetect emerging attacks with patented analytics and machine learning |
Behavioral analyticsDetect emerging attacks with patented analytics and machine learning |
Rule-based detectionFind threats with out-of-the-box and custom rules |
Rule-based detectionFind threats with out-of-the-box and custom rules |
Incident managementReduce alert fatigue 98% by intelligently grouping
alerts |
Incident managementReduce alert fatigue 98% by intelligently grouping
alerts |
Integrated responseContain threats with multiple, flexible response
options |
Integrated responseContain threats with multiple, flexible response
options |
Threat intelligence feedEnrich investigations with rich context from tens of thousands of
customers |
Threat intelligence feedEnrich investigations with rich context from tens of thousands of
customers |
Alert retention30 days |
Alert retention30 days |
XDR data retention |
XDR data retentionEndpoint and network, 30 days |
Extended data retentionOptional |
Extended data retentionOptional |
A Palo Alto Networks specialist will reach out to you shortly. We look forward to connecting with you!