We are excited to announce the expansion of Prisma Access—our leading cloud-native security service edge (SSE) platform that delivers Zero Trust Network Access (ZTNA) 2.0 with the best user experience—to a new Google Cloud region in Tel Aviv. This new location broadens the Prisma Access footprint within Israel and will help accelerate business transformation as well as the organizational migration to hybrid work with:
Organizations need to provide hybrid workforces access to applications and sensitive company data from anywhere. This has dramatically exploded an already vast attack surface, and this situation hasn’t gone unnoticed by cyber adversaries.
Increasingly sophisticated and highly evasive threats, along with the rise in ransomware, are putting pressure on legacy virtual private network (VPN) and traditional ZTNA 1.0 approaches. Businesses and organizations today need a new approach to operate successfully and securely in a digital, cloud-first world. This approach is ZTNA 2.0.
Organizations conducting business in Israel can now gain the benefits of ZTNA 2.0, delivered from Prisma Access with:
Prisma Access uses Google Cloud Platform’s hyperscale architecture to provide organizations and businesses the superior security of ZTNA 2.0 across a high-performance, low latency, multi-cloud backbone to achieve the highest degree of service resiliency with interzone and intercloud failover support from one cloud provider to another.
This unique architecture delivers the industry’s only ZTNA 2.0 cybersecurity that ensures great digital experiences for organizations and hybrid workers across Israel, backed by the best service level agreements (SLAs).
With our expansion of Prisma Access to a new Google Cloud location in Tel Aviv, organizations doing business in Israel can now better fortify themselves against cyber attacks, whether their company’s operating model is office-only, fully remote, or hybrid.
As the global leader in cybersecurity, Palo Alto Networks is proud to bring zero trust with zero exceptions to meet the unique requirements of the Israeli cybersecurity landscape and business environment.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.