Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:01):
And it's Evan Kerstel
here.
I'm at the big Palo AltoNetworks event in San Francisco
and I'm really excited to sitdown with one of the true
industry insiders and VP productmanagement leaders at Palo Alto
Networks, Arupam Upadhyaya.
How are you, sir?
Speaker 2 (00:19):
Evan, I am great.
Thank you for asking what anexciting week for us.
Speaker 1 (00:23):
Yeah, you have so
much news, so many announcements
, demos, hands-on.
Everything is going on here inSan Francisco.
Before that, maybe introduceyourself your role and mission
team within Palo Alto Networks.
What are you focused on?
Speaker 2 (00:36):
Yeah, so, evan, I've
been at Palo Alto Networks for
almost five years.
I am VP of products for PrismaSASE.
Five years I am VP of productsfor Prisma SASE.
Prisma SASE has Prisma Access,which is our secure services
edge, our secure access stack inthe cloud.
Second part is Prisma SD-WAN,which is our SD-WAN component.
(00:56):
Global Protect, our PrismaAccess agent, which is our agent
that connects us to the PrismaSSE or Prisma Access, and then,
last but not the least, prismaAccess Browser, which extends
our SASE to unmanaged devicesand provides that last mile of
data protection on all devices.
Speaker 1 (01:16):
Fantastic.
So let's, look at the bigpicture.
Sase has been around for awhile now.
It's been embraced by theindustry, but requirements are
changing.
Customer needs and expectationsare changing.
What are some of the mostcritical capabilities you're
seeing right now in regards toSASE?
Speaker 2 (01:33):
Yeah.
So, Evan, if we really take astep back, SASE is a fundamental
pillar of zero-trustarchitecture.
And what does zero trust mean?
Zero trust means there is notrust between users,
applications, devices and data.
Applications could be owned byenterprise or could be
(01:57):
non-enterprise.
Every trust has to be explicitand has to be dictated.
That's what Zero Trust is, andSASE is manifestation of Zero
Trust in the cloud.
If you think about SASE, it'scloud-delivered secure access.
Our Prisma SASE runs on top ofGoogle Cloud and AWS and, Evan,
(02:20):
we recently announced that nowit extends to Oracle Cloud as
well.
The multi-cloud presence allowsus to build a highly resilient
secure services edgearchitecture which gives you
five nights of high availabilityand, beyond that, the few new
things that we are seeing,because that was your next
question we're definitely seeingan increased buzz around Prisma
(02:43):
Access Browser because itextends security to unmanaged
devices, provides last mile dataprotection and, more
importantly, gives you fullvisibility into all traffic.
There is some traffic, kevin,that is hard to decrypt, so it
gives you full visibility to theentire stack.
Then the second part that isexciting, apart from Prisma
(03:06):
Access Browser, is our AI andlarge language power data
classification, which gives usunparalleled visibility to
shadow data and provide theright data protection policies.
Our extension of AI appscatalog to more than 2,000.
That's available on our SASEplatform, including Prisma
(03:29):
Access Browser.
And, last but not the least,like I said, we also extended
our cloud infrastructure toOracle Cloud.
So that's the most excitingpart, evan, as we think about
SASE.
So much news, really exciting.
Speaker 1 (03:40):
Let's talk about the
secure browser.
I mean, the browser has beenthe focus of our personal lives
forever, but it's now reallyimportant to our professional
lives for hybrid work, remotework and work from anywhere.
In particular, Tell us whatmakes your approach to browsing
secure and the specificchallenges it solves.
Speaker 2 (04:02):
Yeah, I mean, if I
look at myself, I live my life
inside the browser.
Whether it's checking emails,looking at documents, looking at
spreadsheets or eveninteracting with my favorite
large language model or chatbotor extensions all that is in the
browser.
So when you're living your lifeinside the browser, the hackers
(04:23):
are also taking notice.
In fact, there was a recentsurvey that said 95% of
organizations have experienced abrowser-based attack.
So browser is becoming the newvenue where we are interacting
with applications, but hackersare also coming in.
So when you think about browser, when you think about
(04:46):
commercial browsers, they're notreally equipped to handle that
secure infrastructure or providethat security.
When you think about security,it's two pillars.
One is make part in the browser, so the browser is protected,
and the second is, as bad guyscome in to implant malware or
(05:06):
steal your data from the browser, the ability to protect against
that as well.
And that's what Prisma AccessBrowser provides giving you a
harder browser and giving youthat last-minute protection
against all kinds of attacksthat are happening in the
browser.
Speaker 1 (05:21):
Interesting.
So let's talk.
You know, usual big picturechallenge, encrypted traffic.
It's always been a challengefor this industry, and yet a
secure browser, you know, offersanother way to do threat
inspection.
How does that work exactly?
Speaker 2 (05:36):
Yeah, look, a lot of
times traffic is hard to decrypt
because of technology orbusiness reasons.
Let's start with businessreasons.
Right, you might have a validbusiness reason that you don't
want to decrypt specific trafficlike Microsoft Office, because
you want to honor their SLAs.
That could be one part.
Or it could be a technologyreason where there are protocols
(05:58):
like QUIC that are propagatedby Google or championed by
Google.
Or think about applicationsthat require certificate pinning
.
They are very hard to decrypt,evan, and when they become hard
to decrypt, traditional networksecurity inspection mechanisms
will find it very hard to detectmalware.
That's happening inside that.
(06:19):
There's one more aspect, evan.
It's just not the lack ofdecryption or the ability to
decrypt.
A lot of attacks are actuallybeing assembled in the browser
and those attacks get delivered,or malware gets delivered in
chunks to the browser.
And this is where I thinkPrisma Access Browser shines,
because it sees all the databefore that gets decrypted or
(06:42):
encrypted.
So I have the ability to figureout whether the protocol is
quick or whether the businessapplication does not allow for
decryption to happen.
I can run my security, whetherit's DNS, whether it's URL
filtering, malware or sandboxing, and that is how I can extend
security to traffic.
That was how to decrypt andthat's actually, in a way,
(07:06):
game-changing, because weanticipate more and more
protocols becoming harder todecrypt in the network and for
business and technology reasons,and this is where Prisma Access
Browser allows us to serve ourcustomers in a better fashion.
Speaker 1 (07:22):
Fantastic, well done.
So we're all participating inthe incitement around Gen AI and
LLMs and agentic AI, but up tonow security has been a bit of
an afterthought, maybe by some.
But you're building a kind ofbodyguard for the AI and Gen AI
world.
Maybe describe yourannouncement around Prisma and
(07:43):
some of the new capabilitiesyou're rolling out.
Speaker 2 (07:45):
Yeah, so Prisma AIRS
is the new thing that they have
announced, and look what'shappening.
Evan is, almost all of ourcustomers are dealing with AI
tools right, whether they'redevelop applications or
interaction with AI agents, andwhen that happens, you've got to
really first start with AImodel scanning making sure that
(08:09):
you scan the model to make surethere are no vulnerabilities.
That's the first part you wantto do, that you have the right
model with no vulnerabilities.
So that's the first pillar thatwe reduce AI model scanning.
The second is AI posturemanagement making sure that the
posture and the security aroundthe posture for your entire
ecosystem is not compromised.
(08:30):
There are no over permissionsin that entire AI ecosystem,
because that can lead intosecurity issues.
Third thing, when you startthinking about this is okay,
that's great, I got my modelsecured, I got my permission
secured.
Now, when you start thinkingabout attackers trying to create
(08:54):
vulnerabilities or exposevulnerabilities, that is where
red teaming comes in, where wecan provide automated AI tools
that can do penetration testingagainst your model to figure out
where the weak cracks are orwhere the weak spots are, so you
can go and patch those up, soyour model is secure.
So now we are done withbuilding, now you deploy the
model.
Now there'll be runtime issuesright, there could be.
(09:17):
How do you provide runtimesecurity?
So that becomes the fourthpillar giving you runtime, large
language model security.
And, last but not the least,when you think about AI agents
giving them security whetherit's about identity
impersonation or memory hijacksYou've got to make sure your
agent is secure as well.
(09:37):
So I've been really fivepillars right Agent, securing
the agent.
Second part is making sure thatyou have the right permissions.
Third is making sure that youhave the right AI red teaming
tools.
Fourth is the right runtimesecurity and, last but not the
least, securing your AI agent.
Fantastic, well, it's quite afoundation you've built.
Speaker 1 (10:02):
One of the challenges
as we head into this next phase
, I think, is balancing all ofthe innovation and opportunities
with these new SaaSapplications and Gen AI tools
with legacy technical debt,older networks, older VDI, et
cetera, et cetera, et cetera.
How do you see navigating thesetwo worlds of modern, new
(10:23):
innovations with the legacy thatwe're kind of tied to at the
moment?
Speaker 2 (10:27):
Yeah, even if you
think about VDI, that was a
great concept.
When applications are sittinginside the data center and you
wanted to provide access tothose applications while
maintaining the confidentialityof your data and making sure
applications are not compromised.
Speaker 1 (10:46):
But the world has
changed on us, evan.
Speaker 2 (10:48):
In the last 20 years,
applications have become
decentralized.
A lot of apps have moved to thelast 20 years.
Applications have becomedecentralized.
A lot of apps have moved to thecloud.
Internet and SaaS have becomemore important, and that's where
and people are moving a lot oftheir workloads that
historically sat in data centerto clouds.
Then the question really becomesdo you want VDI to be the choke
point or do you want to makesure that you provide consistent
(11:09):
security and superiorexperience?
And that's the problem.
We want to make sure that youprovide consistent security and
superior experience, and that'sthe problem we want to tackle.
So with Prisma Access Browser,evan, we already can provide you
internet and SaaS security.
That is a need to go back tothe VDI infrastructure.
That frees you from the VDIinfrastructure superior
experience, better security anda better total cost of ownership
(11:33):
.
And then what we have nowrecently added to our portfolio
as part of this launch is wealso support Azure Virtual
Desktops.
So as customers do theirmigration from legacy VDI to DAS
, we can support that, and ifyou enable app streaming on your
legacy VDI infrastructure, wecan support those applications
(11:55):
as well.
So what?
happens now Prisma AccessBrowser becomes your window into
all applications, whetheryou're sitting in internet, saas
, vdi or in the cloud, whileproviding you a better
experience and consistentsecurity Fantastic approach.
Speaker 1 (12:14):
So one thing I've
seen you have great demos here
in San Francisco at your bigevent and you're one of the few
vendors that really looks atuser experience, ui, ux, that
whole world.
What are some of the challengesthere?
Because you're clearly puttinga lot of effort into a next
generation user experience.
(12:35):
Cut for a second.