- Example application with security best practices
10
- Robust network and security configuration
11
- How security holes happen
12
- Data leaks from errors in network configuration
13
- ZPR: next generation security platform
14
- Supremo example activating ZPR
15
- Writing one or more ZPR policies
16
- ZPR protects data despite network policy errors
17
- ZPR offers human readable policy language
18
- ZPR under the hood
19
- Key Takeaways
Description:
Explore Oracle's innovative solution for critical security gaps in this 22-minute video featuring Pradeep Vincent and Dr. Danny Hillis. Dive into the architecture of OCI Zero Trust Packet Routing (ZPR), which embeds security policy constraints into the network layer, ensuring data protection even when network configurations change. Learn about the challenges in cloud network security, the flaws in current network security paradigms, and how ZPR addresses these issues. Discover the performance-security tradeoffs, ZPR's potential as an open standard, and its application in real-world scenarios. Gain insights into how security holes occur, how ZPR prevents data leaks from network configuration errors, and the benefits of its human-readable policy language. Understand the technical aspects of ZPR "under the hood" and walk away with key takeaways for implementing robust data breach protection in your organization.
First Principles: Robust Data Breach Protection with OCI Zero Trust Packet Routing