2020 'ASTORS' Finalists Edition | Page 26

First , when a user connects to

a cloud application service such as

Office 365 , the agency can

guarantee that the network

security policies that specific

govern- ment agency has in place have been applied .

Addition-

ally ,

the

dedicat-
ASTORS
AMERICAN SECURITY TODAY

2019

ed and

PLATINUM AWARD WINNER

sticky

IP

HOMELAND SECURITY AWARDS

Address-

es

pro-

vided

by

the iboss

c l o u

d

SASE ser-

vice

al-

lows

the

government agency to apply

login restrictions

to cloud ap-

plications

making

originally

publicly accessible applications

private .

www . AmericanSecurityToday . com 2020 FINALISTS Edition - 49

That is because the source IP Ad- dress is only used by users

of that specific government agen- cy as the containerized gateways proxy and NAT traffic without mixing data and with the abili- ty to preserve the source IP re- gardless of user location .

This is unlike a non-container- ized model where the source IP

Addresses are shared

between any customer leveraging the cloud security service .

Although a security policy might be in place , it cannot be guaran- teed that it is the network

secu- rity policy specifically

assigned by the government agency

.

For more information , visit w

For example , a public cloud ap- plication like Microsoft

Office

365 can be locked down to only the source IP Addresses that

be- long to the government agency

. Only users connected through the iboss service , and

specifically connected through the agen-

26