Why is Network Access Control So Hard? Is there a Better Way?

SOURCE Boston 2016

Presented by: Jason Garbis
Date: Thursday May 19, 2016
Time: 13:20 - 14:00
Location: Library
Track: Security & Technology

Most organizations do a relatively good job of controlling user authorization within applications. However, these same organizations often grant far too much network access to users, which represents a significant vulnerability that adversaries have consistently exploited. There are several reasons for this, ranging from limitations in fundamental TCP/IP design principles, to shortcomings in traditional network security tools.

Join us for an engaging session where we explore the limitations of traditional security, and explain how a Software-Defined Perimeter (SDP) model -- which verifies and secures all access to all resources, and strictly limits network access – can significantly improve enterprise security.

We’ll dive into the technical details of how the SDP specification works, showing how an implementation can deliver fine-grained network access control, in a way that’s tied to each user’s context, and is dynamically responsive to changes in Cloud or DevOps environments.

We’ll make this concrete with a customer case study, showing how one enterprise obtained technical, business, and compliance benefits from deploying a Software-Defined Perimeter solution. And we’ll wrap up with an eye toward the future, exploring current work on applying the Software-Defined Perimeter architecture into IaaS environments.

Jason Garbis

Jason Garbis, Vice President of Products at Cryptzone, has over 25 years of technology experience in roles that span engineering, product management, professional services, and marketing. He has a BS in Computer Science from Cornell, an MBA from Northeastern, and is also a published author. Currently, he is leading the Cloud Security alliance initiative on applying the Software-Defined Perimeter architecture into Infrastructure-as-a-Service environments.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats