Slide 1

Slide 1 text

© 2024 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. Zsolt Vilhelm | Solutions Consultant
 Real-Time Cloud Security The industry’s first AI & automation driven platform spanning code to cloud to SOC

Slide 2

Slide 2 text

© 2024 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. Hard to effectively
 connect code to cloud Hard to effectively
 connect code to cloud Hard to effectively
 connect code to cloud IaC SAST Secrets SCA CI/CD ASPM KSPM DSPM AI-SPM CSPM Cloud Vuln CIEM API Security CWPP Web App Security Container Security Anti-malware Anti-exploit Application Security Cloud Posture 
 Security Cloud 
 Runtime Security AppSec DevOps Cloud Security Vuln Mgmt Cloud Security SecOps Lack of prevention leads to too many risks in production Poor prioritization and remediation at scale Inability to detect and block threats in real time The Industry Is Building Cloud Security in Silos Creating massive complexity and gaps in protection

Slide 3

Slide 3 text

© 2024 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. What’s Needed for Effective Cloud Security © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. Code-to-Cloud Context Prioritize and remediate posture issues at scale Shift left and prevent risk at the source Stop cloud attacks in real-time to enable resolution

Slide 4

Slide 4 text

© 2024 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. Introducing Cortex Cloud The industry’s leading CNAPP merged with best-in-class CDR for real-time cloud security Application Security Cloud Posture 
 Security Cloud 
 Runtime Security CloudSec / SecOps Cortex Extended Data Lake CloudSec / Vuln Mgmt AppSec / DevSecOps SUPPLY CHAIN AI MODELS CONFIGS IDENTITY CLOUD LOGS WORKLOADS CVES SENSITIVE DATA CODE NETWORK AI Automation © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.

Slide 5

Slide 5 text

© 2024 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. Malware Sensitive Data ML / GenAI Models Anomalous
 Data Events Network Anomaly Identity
 Anomaly Code Misconfigs Software
 Vulnerability Secrets at risk Cloud Misconfig Overly
 Permissive roles Accidental
 Exposure 14K 2K 305 13 High severity risk signals Exposure validation Critical attack paths Posture Cases One fix One fix Complete Code to Cloud Context Prioritize & Remediate Posture Issues Centralize all risk findings across multi- cloud Industry-leading analytics groups issues into a small number of highly prioritized cases Best-in-class automation to resolve multiple issues with a single fix Cloud Runtime Security CDR Application Security Cloud Posture Security

Slide 6

Slide 6 text

© 2024 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. Take one action to: Resolve 28 issues and secure 29 assets Cases deliver 
 cloud remediation at scale Always take the right 
 action with best fix guidance AI-Powered Security Posture Assessment and Prioritization Cloud Runtime Security CDR Application Security Cloud Posture Security

Slide 7

Slide 7 text

© 2024 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. Prevent insecure code and fix it before production Centralize visibility integrate native AppSec tools and third-party scanners Quickly identify
 critical application risk Easily learn how to 
 prevent future risk 
 from being introduced Comprehensive risk 
 prioritization based 
 on code, runtime and application context Cloud Runtime Security CDR Application Security Cloud Posture Security

Slide 8

Slide 8 text

© 2024 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. Stop Cloud Attacks in real time 
 with Cloud Runtime Security 100% Detection Score Prevent sophisticated attacks on workloads and APIs Shut down behavioral threats, vulnerability exploits, malicious processes, and, zero-day attacks Accelerate detection and response See the full attack timeline with Security Cases 
 and pinpoint the root cause Easy to deploy and operate Deploys in minutes to gain real-time visibility and protection across your multi-cloud environment in eBPF or Kernel mode. Serverless Containers Kubernetes APIs Hosts / VMs CDR Cloud Posture Security Application Security Cloud Runtime Security 10k Detectors
 2.6k+ ML models Best-in-class Protection

Slide 9

Slide 9 text

© 2024 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. Extending the Industry’s Leading CNAPP to the SOC For real-time Cloud Detection & Response Application Security Cloud Posture 
 Security Cloud Runtime Security CloudSec / SecOps Cortex Extended Data Lake Vuln Mgmt. / CloudSec AppSec / DevSecOps AI Automation © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. STOP ATTACKS REDUCE RISK PREVENT ISSUES SOC / IR Analyst Cloud Detection & Response INVESTIGATE & RESPOND

Slide 10

Slide 10 text

© 2024 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. AppSec DevSecOps CloudSec Vuln Mgmt SOC Analyst IR Analyst Purpose Built User Experiences for Each Team Optimized dashboards and workflows with granular role-based access control (RBAC) Security Operations Cloud Security Application Security

Slide 11

Slide 11 text

© 2024 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. Deploy as a standalone cloud security solution or as a SOC extension on top of XSIAM Application Security PREVENT ISSUES Cloud Posture 
 Security REDUCE RISK Cloud Runtime
 Security STOP ATTACKS Cloud Detection and Response INVESTIGATE & RESPOND © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. Start Anywhere, Expand to Anything Adopt best-in-class capabilities independently or as part of a single platform

Slide 12

Slide 12 text

© 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. Cortex Cloud 2.0 Preview Video

Slide 13

Slide 13 text

© 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. Thank You paloaltonetworks.com © 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.

Slide 14

Slide 14 text

© 2025 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. © 2024 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. ALT SLIDES