Pasarela
entre redes que implementan diferentes políticas de seguridad.
1. (I) An internetwork
gateway that separates trusted (or relatively more trusted) hosts on one side
from untrusted (or less trusted) hosts on the other side. (See: firewall and
guard.)
2. (O) /IPsec/ "An
intermediate system that implements IPsec protocols." [R4301]
[RFC4949:2007]
A security gateway is a
point of connection between networks, or between subgroups within networks, or
between software applications within different security domains intended to
protect a network according to a given security policy. A security gateway
comprises more than only firewalls; the term includes routers and switches
which provide the functionality of access control and encryption. [ISO-18028-3:2005]
Cloud
security gateways are on-premises
or cloud-based security policy enforcement points placed between cloud service
consumers and cloud service providers to interject enterprise security policies
as the cloud-based resources are accessed. Cloud security gateways consolidate
multiple types of security policy enforcement. Example security policies
include authentication, single sign-on, authorization, security token mapping,
encryption, tokenization, logging, alerting, API control and so on.
http://www.gartner.com/it-glossary/
Cloud encryption gateways provide cloud security proxy (typically at
the application level), which performs encryption, tokenization or both on an
item-by-item basis as data flows through the proxy. The obfuscated (encrypted
or tokenized) data can then be stored in a cloud-based software-as-a-service
(SaaS) application, such as salesforce.com. Cloud encryption gateways typically
provide a choice of various encryption and tokenization algorithms, depending
on the strength of protection required and how much format preservation is necessary
(for example, to preserve sorting).
http://www.gartner.com/it-glossary/