Palo Alto Networks(PANW.US)Following AI Cybersecurity Trends: Launches Prisma Secure Browser, Targeting Critical Window for Enterprise AI Scaled Deployment

CyberTimes APP has learned that Palo Alto Networks (PANW.US) has developed the Prisma browser, which they claim is “the safest browser designed specifically for the era of proxy-based artificial intelligence.” The Prisma browser allows enterprises to use their preferred large language models across all models and platforms, while ensuring the security of AI interactions and preventing sensitive data leaks during automation tasks. It also prevents proxy hijacking or manipulation and supports global compliance.

Anand Oswal, the company’s EVP of AI and cybersecurity, said, “Organizations are unleashing a new workforce composed of proxies, but without security measures, they cannot be autonomous. By embedding AI-driven data protection features directly into the browser and safeguarding AI interactions, leaders can now confidently approve strategic AI initiatives that were previously stalled due to security concerns.”

The company also announced updates to the Prisma AIRS platform, which provides end-to-end security throughout the entire lifecycle of AI proxies.

The cybersecurity firm stated, “Enterprise adoption of AI has rapidly shifted from single pilots to large-scale deployments. However, as autonomous proxies can now independently access databases and perform workflows, new trust gaps and attack surfaces emerge without proper safeguards. Prisma AIRS fills this gap by securing the content generated by AI and the actions performed by proxies at every stage of the AI supply chain.”

Finally, Palo Alto Networks introduced next-generation trust security technology that automates encryption trust, transforming it from manual processes into automated network controls.

Oswal added, “Manual updates are time-consuming and require coordination across multiple teams. As scale and speed increase, manual methods are no longer feasible. With NGTS and our quantum security solutions, the network will become the ultimate control point for automated encryption resets.”

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin