Crypto-Segmentation: Protecting Networked Applications When Firewalls Fail

  • Thursday, 23 July, 2015 | 10.00 – 10.45 hrs | Peony Room 4401

View all Sessions

In the global wave of data breaches, a common failure is weak isolation of applications from unauthorized scans and exploits. Attackers compromise low-privilege user credentials to gain access past the firewall then move to sensitive applications. This presentation gives a case study of poor app isolation and discusses user-role based access to application crypto-segments to reduce attack surface.


This document was retrieved from on Fri, 22 Feb 2019 22:44:03 -0500.