One of the customers I have worked with is Paytm, which is a giant online business transaction service in India. We have implemented the Prisma Access Browser for them. The customer followed best practices for the Prisma Access Browser. They implemented it because they didn't have any security apart from EDR and firewall. That's why they chose browser isolation security and Prisma Access to connect between VAN and all. They implemented it with best practices, and our IT team would enhance the security. I'm not aware of how they implemented it later on. I have experience with the Prisma Access Browser for about 400 to 500 users.
The project is finishing now and I have delivered the documentation. The project has been signed off. It is tunnel-based, and it is used to access the customer's private workload and to access the internet.
Prisma Access Browser enhances enterprise security with its cloud-delivered architecture, offering secure web access and threat protection for organizational networks through a streamlined interface.By delivering consistent security through a single platform, Prisma Access Browser provides scalable and flexible protection, ensuring reliability and efficiency. The service prioritizes advanced threat prevention and zero-trust security models to safeguard business applications and user data....
One of the customers I have worked with is Paytm, which is a giant online business transaction service in India. We have implemented the Prisma Access Browser for them. The customer followed best practices for the Prisma Access Browser. They implemented it because they didn't have any security apart from EDR and firewall. That's why they chose browser isolation security and Prisma Access to connect between VAN and all. They implemented it with best practices, and our IT team would enhance the security. I'm not aware of how they implemented it later on. I have experience with the Prisma Access Browser for about 400 to 500 users.
The project is finishing now and I have delivered the documentation. The project has been signed off. It is tunnel-based, and it is used to access the customer's private workload and to access the internet.