Palo Alto Networks Prisma Cloud Compute
Full-lifecycle security for containers, hosts and serverless — anywhere.

Twistlock software (to protect hosts, containers, serverless) in a customer operated environment (including private datacenters) with full customer custody of data.
Our Price: Request a Quote
Twistlock software for host security (to protect hosts) in a customer operated environment (including private datacenters) with full customer custody of data.
Our Price: Request a Quote
Click here to jump to more pricing!
Please Note: All Prices are Inclusive of GST
Overview:
Prisma® Cloud Compute is Palo Alto Networks' Cloud Workload Protection Platform (CWPP) that secures containerised workloads, hosts, and serverless functions across any environment — public cloud, private cloud, or on-premises. Previously known as Twistlock, it can be deployed as a self-hosted solution giving organisations full custody of their data.
Why Prisma Cloud Compute?
Protect containers, Kubernetes, hosts, and serverless functions with a single unified platform. Consistent policy enforcement across AWS, Azure, GCP, and on-premises.
Deploy Prisma Cloud Compute Edition in your own environment — on-premises or in your own cloud account — maintaining complete custody and control of your security data.
Integrate security into CI/CD pipelines and image registries. Catch vulnerabilities at build time before they reach production.
Key Capabilities
- Vulnerability Management — Scan images, containers, hosts, and functions for CVEs
- Compliance — Enforce CIS benchmarks and custom compliance policies
- Runtime Defence — Detect and block anomalous behaviour at runtime using machine learning
- Container Firewall — Layer 4 network policy enforcement for containerised workloads
- Host Security — Vulnerability and compliance scanning for cloud and on-prem VMs
- Serverless Security — Vulnerability management and runtime protection for AWS Lambda, Azure Functions, and GCP Cloud Functions
- Image Scanning — Registry scanning for Docker Hub, ECR, ACR, GCR, JFrog, and more
- CI/CD Integration — Jenkins, CircleCI, GitHub Actions, GitLab, and more
Features:
Container Security
Prisma Cloud Compute provides end-to-end security for containerised environments from image build through to production runtime.
Image Scanning
Scan container images for vulnerabilities (CVEs), malware, and compliance violations at every stage of the lifecycle — registry, CI/CD pipeline, and runtime.
- CVE database with daily updates
- Custom vulnerability policies
- Registry scanning (ECR, ACR, GCR, JFrog, Nexus)
- CI/CD pipeline integration
Runtime Defence
Machine learning-based behavioural modelling creates a unique fingerprint for each container, detecting and blocking anomalous process, network, and filesystem activity.
- Process allowlisting
- Network traffic analysis
- Filesystem integrity monitoring
- Automatic model learning
Kubernetes Security
Native Kubernetes integration provides visibility, compliance assessment, and runtime protection across any Kubernetes distribution — EKS, AKS, GKE, OpenShift, and Rancher.
- CIS Kubernetes benchmarks
- Admission controller integration
- Namespace-level policy
- Pod security
Host & Serverless Security
Host Security
Extend workload protection beyond containers to the underlying VMs and bare-metal hosts running your cloud workloads.
- Host vulnerability scanning
- CIS host benchmarks
- Host runtime defence
- Anti-malware
- Auto-discovery of hosts
Serverless Security
Protect AWS Lambda, Azure Functions, and GCP Cloud Functions with vulnerability scanning and lightweight runtime protection embedded directly into functions.
- Function vulnerability scanning
- Compliance checks
- Runtime protection via embedded defender
- CI/CD and repository scanning
Documentation:
Download the Palo Alto Networks Prisma Cloud At a Glance Datasheet (PDF).
Need Professional IT Security Services?
Contact our certified security experts today to discuss your specific requirements and learn how our professional services can enhance your organization's security posture.
Pricing Notes:
- All Prices are Inclusive of GST
- Pricing and product availability subject to change without notice.
Twistlock software (to protect hosts, containers, serverless) in a customer operated environment (including private datacenters) with full customer custody of data.
Our Price: Request a Quote
Twistlock software for host security (to protect hosts) in a customer operated environment (including private datacenters) with full customer custody of data.
Our Price: Request a Quote
