Securing the Borderless Network

Securing the Borderless Network : Security for the Web 2.0 World

2 (1 rating by Goodreads)
By (author) 

List price: US$45.00

Currently unavailable

We can notify you when this item is back in stock

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

Securing the Borderless Network: Security for the Web 2.0 WorldTom Gillis Securing the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applications Today's new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for enhancing productivity and competitive advantage. However, they also introduce daunting new security issues, many of which are already being exploited by cybercriminals. Securing the Borderless Network is the first book entirely focused on helping senior IT decision-makers understand, manage, and mitigate the security risks of these new collaborative technologies. Cisco (R) security technology expert Tom Gillis brings together systematic, timely decision-making and technical guidance for companies of all sizes: information and techniques for protecting collaborative systems without compromising their business benefits. You'll walk through multiple scenarios and case studies, from Cisco Webex (R) conferencing to social networking to cloud computing. For each scenario, the author identifies key security risks and presents proven best-practice responses, both technical and nontechnical. Securing the Borderless Network reviews the latest Cisco technology solutions for managing identity and securing networks, content, endpoints, and applications. The book concludes by discussing the evolution toward "Web 3.0" applications and the Cisco security vision for the borderless enterprise, providing you with a complete security overview for this quickly evolving network paradigm.
show more

Product details

  • Paperback | 168 pages
  • 185.42 x 228.6 x 12.7mm | 317.51g
  • Pearson Education (US)
  • Cisco Press
  • Indianapolis, United States
  • English
  • 1587058863
  • 9781587058868

Back cover copy

Securing the Borderless Network: Security for the Web 2.0 World Tom Gillis " " "Securing the Borderless Network" reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applications Today's new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for enhancing productivity and competitive advantage. However, they also introduce daunting new security issues, many of which are already being exploited by cybercriminals. Securing the Borderless Network is the first book entirely focused on helping senior IT decision-makers understand, manage, and mitigate the security risks of these new collaborative technologies. Cisco(R) security technology expert Tom Gillis brings together systematic, timely decision-making and technical guidance for companies of all sizes: information and techniques for protecting collaborative systems without compromising their business benefits. You'll walk through multiple scenarios and case studies, from Cisco Webex(R) conferencing to social networking to cloud computing. For each scenario, the author identifies key security risks and presents proven best-practice responses, both technical and nontechnical. Securing the Borderless Network reviews the latest Cisco technology solutions for managing identity and securing networks, content, endpoints, and applications. The book concludes by discussing the evolution toward "Web 3.0" applications and the Cisco security vision for the borderless enterprise, providing you with a complete security overview for this quickly evolving network paradigm.
show more

About Tom Gillis

Tom Gillis is the vice president and general manager for the high-growth Security Technology Business Unit (STBU) at Cisco, where he leads the company's businesses for security management, appliances, applications, and endpoint services. Formerly vice president of product management for the Cisco STBU, Gillis was promoted to the VP/GM position after significantly growing its security business and market share. During this time, Gillis successfully led the Cisco product management team and outbound marketing, technical marketing engineering, technical publications, and training organizations. Prior to his role at Cisco, Gillis was part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000. Before joining IronPort, Gillis worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group. Gillis is a recognized leader in the dynamically charged and high-growth Internet security industry, with in-depth knowledge of the challenges surrounding secure network infrastructure. As an author, speaker, and industry executive, he has made invaluable contributions to the security technology community. He has presented at major conferences and events ranging from Gartner Symposiums to Fox News Live. Gillis is also the author of two books, Get the Message and Upping the Anti, a business guide to messaging security. Gillis holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.
show more

Table of contents

Foreword xiIntroduction xiiiChapter 1 Network Security-Yesterday, Today, and Tomorrow 1The Evolution of Firewalls 2Proxy Versus Stateful Inspection 2From Proxy to Stateful Inspection-and Back Again 4Endnote 5Reference 5Chapter 2 Collaboration and Web 2.0 Technologies 7Viral Uncertainty Principle 8Only Connect Digitally 9Easy Online Collaboration 9Enterprise-Level Online Collaboration Tools 10Storage and Applications in the Cloud 11Endnotes 12Chapter 3 Building Relationships with Web 2.0 13Demolishing Communication "Silos" 15No Future for the Faceless 16Endnotes 17References 17Chapter 4 The Cloud Computing Revolution 19Managing the "Islands" 20Disconnected Workflows: Minimal Security 22Sleeping Easier About Security 24Endnotes 26References 26Chapter 5 You're in San Jose, I'm in Bangalore-Let's Meet 27Breakthrough Technology 28Travel Costs Drop Dramatically 29Richer, More Productive Meetings 32Network Implications 33Endnotes 35References 35Chapter 6 Watson, Can You Hear Us? 37Human Need for Connectedness 38Cutting the Cord 39One Chip Makes You Smaller 41Handheld Harvest: Apples to BlackBerrys 44These Unprecedented Times 45Evolution of the Smartphone 47Endnotes 49References 50Chapter 7 The Consumerization of IT 53Talkin' `bout an Evolution 54Blame It on the Music 55More Than Just Smartphones 56Consumerization: A Pull and a Push 57Safely Consumerizing IT 59References 60Chapter 8 The Bad Guys from Outside: Malware 61Modern Malware Overview 61 Types of Malware 62 Botnets 63 Even Trusted Sites Can't Be Trusted 64Finding the Weak Points 64Social Engineering for Success 65Spamming and Phishing Get Targeted 67Profit Motive 70Endnotes 71References 71Chapter 9 Who Are These Guys? 73The Business of Malware 73Studying Pharmaceutical Spam 75Other Links in the Global Chain 77Taking on the Bad Guys 78Endnotes 79References 79Chapter 10 Signs of Hope 81Harnessing the Network 82 Bad Guys Team Up 82 Staying in Front of the Threats 83Scanning for Signatures 83Behavioral Analysis of Bad Code 84The Power of Reputation 85Global Threat Correlation 88Combining Countermeasures 89Endnotes 90Reference 90Chapter 11 Acceptable Use Policies 91The Inevitable Evolution of AUPs 91Gen X/Gen Y "Problem" 92"Necessary" Noncompliance 94AUPs Versus the Will of the Employees 96Endnote 98References 98Chapter 12 The Realities of Data Loss 99One Breach, Multiple Shockwaves 100Insiders 102Compliance Pitfall 103DLP: Chasing Rainbows? 103Endnotes 104References 105Chapter 13 Collaboration Without Confidence 107Saying "No Thanks" to the "Culture of No" 109One Workforce, Diverse Needs 111Secure Collaboration: Anytime, Anywhere, from Any Device 112Countervailing Forces 114Endnotes 115References 116Chapter 14 Identity Management: We Need to Know if You Are a Dog 117Identity: The Key to the Security Kingdom 118Establishing Identity 120A Flexible Identity Fabric 122Endnote 123References 123Chapter 15 Security for the Borderless Network: Making Web 2.0 and 3.0 Safe for Business 125Security Policies for the New Open Networked World 126The Borderless Network Security Architecture 127Super-Charged Scanners 128Security Everywhere in the Network 129 Security Intelligence Designed In 130 The Line Between Policy and Enforcement 131 Redefining the Endpoint 132Collaboration with Confidence 133Endnote 134Reference 134 9781587058868 TOC 3/16/2010
show more

Rating details

1 ratings
2 out of 5 stars
5 0% (0)
4 0% (0)
3 0% (0)
2 100% (1)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X