Menu

Crypto-Segmentation: Protecting Networked Applications When Firewalls Fail

  • Thursday, 23 July, 2015 | 10.00 – 10.45 hrs | Peony Room 4401

View all Sessions

In the global wave of data breaches, a common failure is weak isolation of applications from unauthorized scans and exploits. Attackers compromise low-privilege user credentials to gain access past the firewall then move to sensitive applications. This presentation gives a case study of poor app isolation and discusses user-role based access to application crypto-segments to reduce attack surface.

Participants

This document was retrieved from https://www.rsaconference.com/events/ap15/agenda/sessions/2176/crypto-segmentation-protecting-networked on Wed, 07 Dec 2016 07:27:44 -0500.
© 2016 EMC Corporation. All rights reserved.