Headline
CVE-2017-16544: Prisma Cloud | Comprehensive Cloud Security
In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.
How Mature Is Your Security Program?****Leverage the insights of 1,000 IT and security pros
- See the benchmarks
Prisma Cloud: A Leader in Cloud Workload Security****Prisma Cloud has been recognized as a Leader, receiving the highest possible scores in 18 criteria, including scalability, malware protection, Azure support, IaC, future plans in 3 categories, and more.
- Read the report
Unit 42 Cloud Threat Report Volume 6****IAM the first line of defense.
Find out who, how and what is being targeted within cloud environments.
- Read the report
Introducing Supply Chain Security****Visibility and protection for cloud native development
- Learn more
Experience cloud native security firsthand with hands-on workshops
Secure infrastructure, applications and data across hybrid and multi-cloud environments with Prisma Cloud
Comprehensive
Prisma® Cloud secures infrastructure, applications, data and entitlements across the world’s largest clouds, all from a single unified solution. With a combination of cloud service provider APIs and a unified agent framework, users gain unmatched visibility and protection.
Best-in-class
Prisma Cloud integrates capabilities from the world’s most innovative security startups and delivers them on an enhanced platform to provide market-leading functionality across all our individual modules. From container security to threat detection to web application and API security, security teams benefit from best-in-class protection.
Full lifecycle
Prisma Cloud integrates with any continuous integration and continuous delivery (CI/CD) workflow to secure cloud infrastructure and applications early in development. Scan infrastructure-as-code (IaC) templates, container images, serverless functions and more while gaining powerful, full-stack runtime protection. This is unified security for DevOps and security teams.
A single platform for all your cloud security needs. See how it works.
Prisma Cloud leverages cloud service provider APIs to provide visibility and control over public cloud environments while extending security to hosts, containers and serverless functions with a single, unified agent framework. With support for hybrid and multi-cloud environments, this is comprehensive cloud native security.
Cloud security the way you want it with flexible, integrated modules
Trusted by the world’s best companies
77%
of fortune 100 trust prisma cloud
1,700+
enterprises trust Prisma Cloud
3 B+
cloud resources secured
A single solution for your entire organization
If you are a
Cloud Architect
You should know that Prisma Cloud is the industry’s only comprehensive Cloud Workload Protection solution that secures hosts, containers and serverless functions.
If you work in
Security
You should know that Prisma Cloud delivers the most comprehensive Cloud Security Posture Management controls across cloud infrastructure, data and identities.
The Pokémon Company International Experian Sabre
Hear from our customers
Pokémon uses Prisma Cloud to simplify security and compliance
play
Experian gains a unified view of security and compliance across multi-cloud environments.
Sabre relies on Prisma Cloud to shift left and foster a culture of secure innovation on Google Cloud
DATASHEET
Prisma Cloud: At a Glance
WHITE PAPER
Implementing Cloud Native Security: Shift Left to Increase Effectiveness
BUYER’S TOOLKIT
Prisma Cloud RFP Checklist
ANALYST REPORT
Forrester Total Economic Impact™ Study for Prisma Cloud
See all Resources
Related news
libnx_apl.so on Nexans FTTO GigaSwitch before 6.02N and 7.x before 7.02 implements a Backdoor Account for SSH logins on port 50200 or 50201.
Nexans FTTO GigaSwitch industrial/office switches HW version 5 suffer from having a hardcoded backdoor user and multiple outdated vulnerable software components.