First , when a user connects to
a cloud application service such as
Office 365 , the agency can
guarantee that the network
security policies that specific
govern- ment agency has in place have been applied .
Addition-
|
ally ,
|
the
|
dedicat-
ASTORS
AMERICAN SECURITY TODAY
2019
ed and
PLATINUM AWARD WINNER
|
sticky
|
IP
|
HOMELAND SECURITY AWARDS |
Address-
|
es
|
pro-
|
vided
|
by
|
the iboss
|
c l o u
d
|
SASE ser-
|
vice
|
al-
|
lows
|
the
|
government agency to apply
|
login restrictions
to cloud ap-
|
plications
|
making
|
originally
|
publicly accessible applications
|
private .
|
www . AmericanSecurityToday . com 2020 FINALISTS Edition - 49
That is because the source IP Ad- dress is only used by users
of that specific government agen- cy as the containerized gateways proxy and NAT traffic without mixing data and with the abili- ty to preserve the source IP re- gardless of user location .
This is unlike a non-container- ized model where the source IP
Addresses are shared
between any customer leveraging the cloud security service .
Although a security policy might be in place , it cannot be guaran- teed that it is the network
secu- rity policy specifically
assigned by the government agency
.
For more information , visit w
For example , a public cloud ap- plication like Microsoft
Office
365 can be locked down to only the source IP Addresses that
be- long to the government agency
. Only users connected through the iboss service , and
specifically connected through the agen-
26