CASE STUDYPrisma Cloud POC Implementation for a Pharmaceutical Company

Visualization of AWS and Azure resource configuration status using Prisma Cloud, and support for the implementation and operation of corresponding Prisma Cloud policies, as well as the implementation of cloud security policies for the client. Although the security policy for the cloud was still under development, we defined a cloud security policy suitable for the client’s environment and implemented the policy on Prisma Cloud based on the standard policy provided by Prisma Cloud and IdealRoute Consulting's knowledge.

Prisma Cloud POC Implementation for a Pharmaceutical Company


Customer's Request and Issue

The security policy has not been established, but there is a need to understand the configuration status of resources in AWS and Azure. Currently, AWS and Azure are black boxes, and not understood the configuration and the risks involved. We also have concerns about operations and would like assistance.


  • Prisma Cloud covers multi-cloud. Powerful visualization capabilities to identify risks
  • Cloud security policy development by experienced consultants
  • As a POC, we provide support for implementation as well as operational planning, albeit on a short-term basis.
  • Support to prepare for a smooth start of operations, including creation of operational guidelines and definition of alert handling methods


It is now possible to identify configuration setting errors in AWS and Azure, which had previously been black boxed.



Through the development of standard policies for Prisma Cloud and custom policies in  IdealRoute Consulting, the company gained a foothold in developing a security policies for the cloud.
The company was able to grasp once again the benefits of implementing the product and clearly understand the roadmap for future in-house operations, enabling it to move forward with plans for a more full-scale company-wide deployment.

Customer voice

The POC evaluation gave us a clear understanding of how security could be applied to the cloud.

We had already established our own security policy, but when it came to select a product to implement the policy, there is a concern of how flexibly the security policies can be applied. Through the POC, the company was able to determine how the security policy could be applied and the basic operations such as how violations of the security policy would be detected, was well identified.
The POC also gave us a clear picture of basic operations with various advice on corrective measures to be taken after an alert is generated.

Contact us