Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

AI Security & Quantum Readiness: Prisma AI 3.0 Launch

Palo Alto Networks
05/11/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Palo Alto Networks launches Prisma AI 3.0 with new AI Agent Gateway to centralize security and governance for enterprise AI agents, extending protection to model scanning, red teaming, posture management, and runtime security across applications and agentic workflows.
  • Plans to integrate Koi acquisition technology to secure AI agents on employee endpoints, addressing supply chain risks from MCP servers (one in three susceptible to takeover), identity bypass issues, and runtime threats from unsanctioned agents used by one in three employees.
  • Enhanced Prisma Browser enables agentic capabilities with user-choice LLMs while providing security guardrails, protecting against tool manipulation and data exfiltration as agents autonomously navigate websites, fill forms, and execute complex workflows.
  • Quantum readiness platform provides cryptographic visibility, quantum-compliant firewalls, and legacy application protection, while automated certificate lifecycle management addresses shortened TLS certificate lifecycles (200 days, reducing to 47 by 2029).
  • Platform approach integrates AI security, endpoint protection, browser security, and cryptographic trust into unified architecture, positioning network as ultimate source of visibility and control for emerging threats.

Prisma AI 3.0: Comprehensive Security for AI Applications and Agents

Palo Alto Networks announces Prisma AI 3.0, positioning it as the industry's most complete platform for securing AI applications and agents across the enterprise. The platform addresses the expanding attack surface created by AI adoption through four core capabilities: model and artifact scanning (extending vulnerability detection to agent components like MCP servers and tools), AI red teaming using multi-agent architecture to simulate attacker behavior, comprehensive posture management across 12 cloud and SaaS platforms, and runtime security protecting against both traditional threats and emerging AI-specific attacks like prompt injection, model DOS, and tool manipulation. The centerpiece of the announcement is the new AI Agent Gateway, which centralizes security and control plane traffic for all enterprise agents, providing unified agent registry, runtime policy enforcement, identity integration, end-to-end visibility, governance controls, and continuous risk assessment of agents and their artifacts.

Agentic Endpoint Security Through Koi Acquisition Integration

The presentation addresses the security challenges of AI agents running on employee workstations, noting that one in three employees use unsanctioned AI agents including coding assistants and personal productivity tools. While the Koi acquisition is not yet closed, Palo Alto Networks outlines plans to integrate Koi's technology with Prisma Airs to deliver agentic endpoint security across five pillars: discovery of all agent components on managed workstations (agents, tools, skills, plugins, local MCP servers), scanning of software and agent artifacts for vulnerabilities before use, governance to ensure only sanctioned agents operate within policy guardrails, identity and access management for agents as new enterprise identities, and runtime security that scans agentic traffic both locally on endpoints and as it connects to SaaS platforms and third-party MCP servers. The solution addresses supply chain risks (noting one in three MCP servers are susceptible to system takeover), identity risks from developers bypassing enterprise authentication, and runtime risks including indirect prompt injection attacks that could exfiltrate code from third-party repositories.

Prisma Browser Evolution for the Agentic Era

Palo Alto Networks positions the browser as the de facto enterprise workspace and announces the next phase of Prisma Browser designed for agentic capabilities. Building on the Talon acquisition from two and a half years ago, the enhanced browser integrates core security services to stop advanced phishing, malware, malicious agent extensions, and data exfiltration directly in the browser. The new agentic browser capabilities allow organizations to bring their choice of LLM or agent (OpenAI, Gemini, Anthropic) while providing security and governance to protect against runtime threats including tool manipulation, ensuring appropriate guardrails and governance across autonomous agent behaviors. The browser addresses the elevated risks created when agents access passwords, browser history, cache, and sensitive data while performing tasks like researching leads, booking flights, and executing complex workflows on behalf of users.

Quantum Readiness and Digital Trust Through Cryptographic Reset

The presentation frames quantum computing as a 'when not if' threat, with Gartner and McKinsey predicting viable quantum computers capable of breaking standard encryption by the end of the decade. Palo Alto Networks extends its network security platform to provide a path to quantum readiness through three components: discovery providing complete cryptographic visibility and inventory across applications, infrastructure, and endpoints with guided recommendations for quantum safety; protection through quantum-compliant firewalls (hardware, software, Prisma Access, browser) enabling quantum decryption at scale with cryptographic agility as standards evolve; and acceleration allowing legacy applications and endpoints to become quantum-compliant by passing traffic through next-generation firewalls. The platform addresses the parallel challenge of digital trust, noting the CA Browser Forum's reduction of public TLS certificate lifecycles from 398 days to 200 days (and 47 days by 2029). Leveraging Venafi technology from the CyberArk acquisition, the solution combines internet search discovery, third-party integrations, and network-native discovery to provide comprehensive certificate visibility, risk assessment, and automated lifecycle management across firewalls, load balancers, and applications.

Chapters

0:00 - Introduction: AI as Digital Surface
1:00 - AI Application Architecture Evolution
1:46 - Prisma Airs Platform Overview
3:01 - Agent Architecture and Risks
4:53 - AI Agent Gateway Announcement
5:23 - Prisma AI 3.0 Launch
6:46 - Platform Demo: Discovery and Remediation
10:11 - Agentic Endpoint Security
11:51 - Koi Acquisition Integration Plans
13:13 - Endpoint Security Demo
14:47 - Prisma Browser for Agentic Era
17:12 - Browser Security Demo
19:58 - Cryptographic Reset Introduction
20:49 - Quantum Readiness Strategy
22:49 - Digital Trust and Certificate Management
24:25 - Certificate Lifecycle Demo
25:38 - Quantum Security Demo
26:01 - Closing Remarks

Key Quotes

0:14 "AI is no longer just the destination. It's actually the digital surface."
4:46 "Nikesh talked about the need for an agent gateway. This needs to be core of how the enterprise thinks about securing agents."
10:17 "One in three employees today in organizations are using unsanctioned AI agents."
11:13 "I just read a study last week which said one in three MCP servers are susceptible to complete system takeover."
20:56 "I look at Quantum computing as, it's not a question of if. It's a question of when."
21:16 "We have folks in Gartner and McKinsey saying that by the end of this decade, there will be a Quantum computer that is viable enough to break standard encryption, which underpins all of our digital exchanges."

Categories:
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Cloud Security
  • » Cybersecurity » Endpoint Security
  • » AI & Machine Learning
  • » Data Protection
Channels:
News:
Events:
Tags:
  • AI & Machine Learning
  • Endpoint Management
  • Cloud Security
  • Identity & Access
  • Data Protection
  • Technical Deep Dive
  • Demo
  • AI Security
  • Agent Security
  • Quantum Computing
  • Post-Quantum Cryptography
  • Browser Security
  • Endpoint Security
  • Certificate Management
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: AI Security & Quantum Readiness: Prisma AI 3.0 Launch

              Upcoming Webinar Calendar

              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Perceptions of AI Risks and Threats through Data Lineage Insights
                https://www.truthinit.com/index.php/channel/1895/transforming-perceptions-of-ai-risks-and-threats-through-data-lineage-insights/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Data Lineage: Revealing AI Risks and Hidden Threats
                https://www.truthinit.com/index.php/channel/1894/transforming-data-lineage-revealing-ai-risks-and-hidden-threats/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-phases/
              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                APAC: Establishing an AI Governance Framework for GenAI Throughout the Deployment Process
                https://www.truthinit.com/index.php/channel/1953/establishing-an-ai-governance-framework-for-genai-throughout-the-deployment-process/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Harnessing AI: Transitioning from Illusion to Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                AI in the Fast Lane: Effectively Managing AI Security for Small Teams
                https://www.truthinit.com/index.php/channel/1951/ai-in-the-fast-lane-effectively-managing-ai-security-for-small-teams/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: What to Address First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-to-address-first/

              Upcoming Events

              • May
                12

                Transforming Perceptions of AI Risks and Threats through Data Lineage Insights

                05/12/202601:00 PM ET
                • May
                  12

                  Implementing Effective Strategies for Active Directory Security and Data Protection

                  05/12/202611:30 PM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Threats through Data Lineage

                    05/13/202601:00 AM ET
                    • May
                      13

                      Transforming Data Lineage: Revealing AI Risks and Hidden Threats

                      05/13/202605:00 AM ET
                      • May
                        19

                        Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases

                        05/19/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version