SlideShare a Scribd company logo
1 of 19
AppGate Technical Architecture
Individualized perimeter for each user
What Does AppGate Look Like?
2
Fine-grained authorization for on-premises and cloud
What Does AppGate Look Like?
3
Dynamically adjusts to new cloud server instances
What Does AppGate Look Like?
4
Consistent access policies across heterogeneous
environments
What Does AppGate Look Like?
Contextual awareness drives access and
authentication
What Does AppGate Look Like?
6
AppGate Architecture
Controller
Authentication and
token-issuing service
Distributed
Architecture
with 3 Functions
Gateway
Distributed, dynamic
access control
LogServer
Provides secure
logging services
7
Virtual
Network
Adapter
Secure, Encrypted Tunnel
AppGate Policy Model
8
Filter Entitlement
ConditionAttributes
A Policy-Centric Approach
• Controller applies filters to
decide which policies apply
upon authentication
• All the permitted entitlements
are applied to the user
• Resulting entitlements and
conditions are embedded in a
token
Site 2
Site 1
Site 3
Database Database
Controller
LogServer
Sales
System
RDP
Access
Web Staging
SSH
9
FinanceApp
DatabaseFinanceApp
Entitlements
Definition of
the protected
resource
10
Filters
Determine
which users are
allowed access
11
Conditions
Determine how
and when users can
access resources
12
Attributes
User, device
and context
information
13
AppGate
14
DEVICE TIME
CUSTOM
ATTRIBUTES
ANTI-VIRUS
LOCATIONAPPLICATION
PERMISSIONS
Looks at both context and
identity to grant access1
AppGate
15
DEVICE TIME
CUSTOM
ATTRIBUTES
ANTI-VIRUS
LOCATIONAPPLICATION
PERMISSIONS
Managed Networks
Cloud, On-premises or Hybrid
SharePoint Secured
Email
CRM Group File
Share
Executive
Files
Enterprise
Finance
EXEC_SE
RVER
Looks at both context and
identity to grant access1
Creates dynamic ‘Segment of One’
(1:1 firewall rule)2
ENCRYPTED & LOGGED
ERP
AppGate
16
DEVICE TIME
CUSTOM
ATTRIBUTES
ANTI-VIRUS
LOCATIONAPPLICATION
PERMISSIONS
Managed Networks
Cloud, On-premises or Hybrid
Looks at both context and
identity to grant access1
Creates dynamic ‘Segment of One’
(1:1 firewall rule)2
Makes everything else invisible3
ENCRYPTED & LOGGED
ERP
AppGate
17
DEVICE TIME
CUSTOM
ATTRIBUTES
ANTI-VIRUS
LOCATIONAPPLICATION
PERMISSIONS
Managed Networks
Cloud, On-premises or Hybrid
Looks at both context and
identity to grant access1
Creates dynamic ‘Segment of One’
(1:1 firewall rule)2
Makes everything else invisible3
Adjusts automatically to changes in
posture and infrastructure4
ENCRYPTED & LOGGED
ERP
AppGate Benefits
18
Creates an identity before connecting to anything on the network
Removes attacks including zero day, DDOS and lateral movement
The Cloud Fabric can now be extended all the way to the user and device
Leverages legacy applications by extending the SDP Architecture
No longer need traditional network defense equipment (Firewall, VLAN, VPN, etc.)
• Identity-centric security • Policies on user and cloud instances
Identity-Centric Network Security
Learn More About
AppGate

More Related Content

What's hot

The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforceThe Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforcePerimeter 81
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Government Technology & Services Coalition
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trustZscaler
 
How Google Protects Its Corporate Security Perimeter without Firewalls
How Google Protects Its Corporate  Security Perimeter without FirewallsHow Google Protects Its Corporate  Security Perimeter without Firewalls
How Google Protects Its Corporate Security Perimeter without FirewallsPriyanka Aash
 
How VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskHow VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskCyxtera Technologies
 
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)Robb Boyd
 
Microservices Security: dos and don'ts
Microservices Security: dos and don'tsMicroservices Security: dos and don'ts
Microservices Security: dos and don'tsMinded Security
 
BeyondCorp - Google Security for Everyone Else
BeyondCorp  - Google Security for Everyone ElseBeyondCorp  - Google Security for Everyone Else
BeyondCorp - Google Security for Everyone ElseIvan Dwyer
 
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...DevOps.com
 
Security in microservices architectures
Security in microservices architecturesSecurity in microservices architectures
Security in microservices architecturesinovia
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISERobb Boyd
 
Take It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitectureTake It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitecturePriyanka Aash
 
Cisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkCisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkRobb Boyd
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-idAlberto Rivai
 
Azure security architecture
Azure security architectureAzure security architecture
Azure security architectureKarl Ots
 
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...DATA SECURITY SOLUTIONS
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Priyanka Aash
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecRobb Boyd
 
Designing Virtual Network Security Architectures
Designing Virtual Network Security ArchitecturesDesigning Virtual Network Security Architectures
Designing Virtual Network Security ArchitecturesPriyanka Aash
 

What's hot (20)

The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforceThe Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 
How Google Protects Its Corporate Security Perimeter without Firewalls
How Google Protects Its Corporate  Security Perimeter without FirewallsHow Google Protects Its Corporate  Security Perimeter without Firewalls
How Google Protects Its Corporate Security Perimeter without Firewalls
 
How VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskHow VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at Risk
 
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
 
Microservices Security: dos and don'ts
Microservices Security: dos and don'tsMicroservices Security: dos and don'ts
Microservices Security: dos and don'ts
 
BeyondCorp - Google Security for Everyone Else
BeyondCorp  - Google Security for Everyone ElseBeyondCorp  - Google Security for Everyone Else
BeyondCorp - Google Security for Everyone Else
 
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
 
Security in microservices architectures
Security in microservices architecturesSecurity in microservices architectures
Security in microservices architectures
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISE
 
Take It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitectureTake It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security Architecture
 
Azure security basics
Azure security basicsAzure security basics
Azure security basics
 
Cisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkCisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your Network
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
 
Azure security architecture
Azure security architectureAzure security architecture
Azure security architecture
 
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 
Designing Virtual Network Security Architectures
Designing Virtual Network Security ArchitecturesDesigning Virtual Network Security Architectures
Designing Virtual Network Security Architectures
 

Viewers also liked

Downtown Wilmington Growth and Development
Downtown Wilmington Growth and DevelopmentDowntown Wilmington Growth and Development
Downtown Wilmington Growth and DevelopmentAlexis Milas
 
Наталья Гульчевская. Ретроспектива по Диснею
Наталья Гульчевская. Ретроспектива по ДиснеюНаталья Гульчевская. Ретроспектива по Диснею
Наталья Гульчевская. Ретроспектива по ДиснеюScrumTrek
 
Modelo de Examen de reparación de Ciencias Naturales Séptimo Grado
Modelo de Examen de reparación de Ciencias Naturales Séptimo GradoModelo de Examen de reparación de Ciencias Naturales Séptimo Grado
Modelo de Examen de reparación de Ciencias Naturales Séptimo GradoCliffor Jerry Herrera Castrillo
 
Modelo de Examen de reparación de Filosofía Undécimo Grado
Modelo de Examen de reparación de Filosofía Undécimo GradoModelo de Examen de reparación de Filosofía Undécimo Grado
Modelo de Examen de reparación de Filosofía Undécimo GradoCliffor Jerry Herrera Castrillo
 
March 2017 Corporate Presentation
March 2017 Corporate PresentationMarch 2017 Corporate Presentation
March 2017 Corporate Presentationoncolyticsinc
 
Adopting Kubernetes with Puppet
Adopting Kubernetes with PuppetAdopting Kubernetes with Puppet
Adopting Kubernetes with PuppetPuppet
 
"Ελίτσα Μαυρομάτα" από την Έφη
"Ελίτσα Μαυρομάτα" από την Έφη"Ελίτσα Μαυρομάτα" από την Έφη
"Ελίτσα Μαυρομάτα" από την Έφηmagdalinikalatheri
 

Viewers also liked (16)

Downtown Wilmington Growth and Development
Downtown Wilmington Growth and DevelopmentDowntown Wilmington Growth and Development
Downtown Wilmington Growth and Development
 
Media phots
Media photsMedia phots
Media phots
 
Reel History
Reel HistoryReel History
Reel History
 
Receta de albondigas y sus nutrientes
Receta de albondigas y sus nutrientesReceta de albondigas y sus nutrientes
Receta de albondigas y sus nutrientes
 
Наталья Гульчевская. Ретроспектива по Диснею
Наталья Гульчевская. Ретроспектива по ДиснеюНаталья Гульчевская. Ретроспектива по Диснею
Наталья Гульчевская. Ретроспектива по Диснею
 
Love in Action: Episcopal Churches Welcome Refugees
Love in Action: Episcopal Churches Welcome Refugees Love in Action: Episcopal Churches Welcome Refugees
Love in Action: Episcopal Churches Welcome Refugees
 
Letters
LettersLetters
Letters
 
Modelo de Examen de reparación de Ciencias Naturales Séptimo Grado
Modelo de Examen de reparación de Ciencias Naturales Séptimo GradoModelo de Examen de reparación de Ciencias Naturales Séptimo Grado
Modelo de Examen de reparación de Ciencias Naturales Séptimo Grado
 
Modelo de Examen de reparación de Filosofía Undécimo Grado
Modelo de Examen de reparación de Filosofía Undécimo GradoModelo de Examen de reparación de Filosofía Undécimo Grado
Modelo de Examen de reparación de Filosofía Undécimo Grado
 
March 2017 Corporate Presentation
March 2017 Corporate PresentationMarch 2017 Corporate Presentation
March 2017 Corporate Presentation
 
Adopting Kubernetes with Puppet
Adopting Kubernetes with PuppetAdopting Kubernetes with Puppet
Adopting Kubernetes with Puppet
 
Presentation
PresentationPresentation
Presentation
 
Menú especial
Menú especialMenú especial
Menú especial
 
90 90-90
90 90-9090 90-90
90 90-90
 
Benjamin Wardell | Recruiters Campaign CV | Contracting
Benjamin Wardell | Recruiters Campaign CV | ContractingBenjamin Wardell | Recruiters Campaign CV | Contracting
Benjamin Wardell | Recruiters Campaign CV | Contracting
 
"Ελίτσα Μαυρομάτα" από την Έφη
"Ελίτσα Μαυρομάτα" από την Έφη"Ελίτσα Μαυρομάτα" από την Έφη
"Ελίτσα Μαυρομάτα" από την Έφη
 

Similar to Cryptzone AppGate Technical Architecture

Similar to Cryptzone AppGate Technical Architecture (20)

Securing FIWARE Architectures
Securing FIWARE ArchitecturesSecuring FIWARE Architectures
Securing FIWARE Architectures
 
Hyperledger Fabric update Meetup 20181101
Hyperledger Fabric update Meetup 20181101Hyperledger Fabric update Meetup 20181101
Hyperledger Fabric update Meetup 20181101
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
 
Nicolas destor pres_f5agility2018
Nicolas destor pres_f5agility2018Nicolas destor pres_f5agility2018
Nicolas destor pres_f5agility2018
 
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice Architecture
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 

Recently uploaded

chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 

Recently uploaded (20)

chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 

Cryptzone AppGate Technical Architecture

Editor's Notes

  1. Site is Protected by Gateway Servers only accept incoming connections from Gateway Plaintext traffic for standard logging, monitoring tools
  2. Policies are tools used to assign entitlements to a user, group of users, or administrators. Policies include a list of entitlements, and filters that define who those entitlements should be assigned to. The list of entitlements within a policy is used by the Controller to create the entitlement token(s) for each user. The policy defines all the entitlements allowed by a user for use during the session. The conditions within each entitlement are used by the Gateway to control whether the entitlement is permitted at the time of consumption.  The Controller uses the filters within a policy to check if the policy applies to a user. If no filters have been included in the policy, then it won't be assigned to any users. If a user's claims don't match any filters, then no policies will be allocated and the user will not receive any entitlements.
  3. This is a screen shot of how you would create an entitlement within AppGate. Entitlements specify the network resources that are applied to users for network access. Some types of network access include IP access, ICMP access or reverse IP access, target hostnames, AWS security groups and tags. In this example, we are showing the Client is entitled to TCP access to port 443 on host 10.1.0.4. Entitlement can allow, block or alert and are subject to filters and conditions. Define the exact network resources which users may access Network access types include: IP access, reverse IP access, or ICMP access Target hostnames, IP addresses, subnets, AWS security groups & tags Examples of a user entitlement : TCP access to port 443 on host 10.1.0.4 TCP access to port 22 on subnet 10.1.0.0/24 TCP access to port 3389 on all AWS resources with Security Group Dev_Team4 ICMP access to host QA_Server_11 Entitlements can allow, block or alert Entitlements are associated with conditions
  4. Entitlements are filtered at authentication time and conditions are evaluated at time of access. AppGate allows you to get to a very granular level when defining these criteria as you can see above. Policies are filtered at authentication time Policies are evaluated by Controller upon user device authentication (and renewal) Policies determine the set of entitlements (targets, ports, and protocols)
  5. Conditions are evaluated at time of access Entitlements are evaluated by the Gateway when user tries to access target resource Conditions may prompt for password, OTP, require explanation Conditions may permit or block access based on attributes such as network location, time of day, etc.
  6. The attributes mapping defines how the database attributes in each user identity provider directory will be mapped to AppGate XDP claim names. This mapping defines which user-claims will be available to include in filter and condition expressions. (In addition to being used to authenticate the user at login, the database attributes in your identity provider directory are used to populate user-claims.  Filters and conditions use these user-claims to control the allocation and authorization of entitlements. By creating different filter expressions that use different user-claims, administrators can be very precise about how entitlements are allocated to prevent over-provision.)