Securing the Borderless Network: Security for the Web 2.0 World

Overview

Securing the Borderless Network: Security for the Web 2.0 World

Tom Gillis

Securing the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applications

Today?s new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for enhancing productivity and competitive advantage. However, they also ...

See more details below
Paperback
$37.62
BN.com price
(Save 16%)$45.00 List Price
Other sellers (Paperback)
  • All (12) from $1.99   
  • New (9) from $18.99   
  • Used (3) from $1.99   
Securing the Borderless Network: Security for the Web 2.0 World

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac

Want a NOOK? Explore Now

NOOK Book (eBook)
$19.99
BN.com price
(Save 44%)$35.99 List Price

Overview

Securing the Borderless Network: Security for the Web 2.0 World

Tom Gillis

Securing the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applications

Today’s new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for enhancing productivity and competitive advantage. However, they also introduce daunting new security issues, many of which are already being exploited by cybercriminals. Securing the Borderless Network is the first book entirely focused on helping senior IT decision-makers understand, manage, and mitigate the security risks of these new collaborative technologies.

Cisco® security technology expert Tom Gillis brings together systematic, timely decision-making and technical guidance for companies of all sizes: information and techniques for protecting collaborative systems without compromising their business benefits. You’ll walk through multiple scenarios and case studies, from Cisco Webex® conferencing to social networking to cloud computing. For each scenario, the author identifies key security risks and presents proven best-practice responses, both technical and nontechnical.

Securing the Borderless Network reviews the latest Cisco technology solutions for managing identity and securing networks, content, endpoints, and applications. The book concludes by discussing the evolution toward "Web 3.0" applications and the Cisco security vision for the borderless enterprise, providing you with a complete security overview for this quickly evolving network paradigm.

Read More Show Less

Product Details

Meet the Author

Tom Gillis is the vice president and general manager for the high-growth Security Technology Business Unit (STBU) at Cisco, where he leads the company’s businesses for security management, appliances, applications, and endpoint services.

Formerly vice president of product management for the Cisco STBU, Gillis was promoted to the VP/GM position after significantly growing its security business and market share. During this time, Gillis successfully led the Cisco product management team and outbound marketing, technical marketing engineering, technical publications, and training organizations.

Prior to his role at Cisco, Gillis was part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000. Before joining IronPort, Gillis worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group.

Gillis is a recognized leader in the dynamically charged and high-growth Internet security industry, with in-depth knowledge of the challenges surrounding secure network infrastructure. As an author, speaker, and industry executive, he has made invaluable contributions to the security technology community. He has presented at major conferences and events ranging from Gartner Symposiums to Fox News Live. Gillis is also the author of two books, Get the Message and Upping the Anti, a business guide to messaging security.

Gillis holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.

Read More Show Less

Table of Contents

Foreword xi

Introduction xiii

Chapter 1 Network Security—Yesterday, Today, and Tomorrow 1

The Evolution of Firewalls 2

Proxy Versus Stateful Inspection 2

From Proxy to Stateful Inspection—and Back Again 4

Endnote 5

Reference 5

Chapter 2 Collaboration and Web 2.0 Technologies 7

Viral Uncertainty Principle 8

Only Connect Digitally 9

Easy Online Collaboration 9

Enterprise-Level Online Collaboration Tools 10

Storage and Applications in the Cloud 11

Endnotes 12

Chapter 3 Building Relationships with Web 2.0 13

Demolishing Communication “Silos” 15

No Future for the Faceless 16

Endnotes 17

References 17

Chapter 4 The Cloud Computing Revolution 19

Managing the “Islands” 20

Disconnected Workflows: Minimal Security 22

Sleeping Easier About Security 24

Endnotes 26

References 26

Chapter 5 You’re in San Jose, I’m in Bangalore—Let’s Meet 27

Breakthrough Technology 28

Travel Costs Drop Dramatically 29

Richer, More Productive Meetings 32

Network Implications 33

Endnotes 35

References 35

Chapter 6 Watson, Can You Hear Us? 37

Human Need for Connectedness 38

Cutting the Cord 39

One Chip Makes You Smaller 41

Handheld Harvest: Apples to BlackBerrys 44

These Unprecedented Times 45

Evolution of the Smartphone 47

Endnotes 49

References 50

Chapter 7 The Consumerization of IT 53

Talkin’ ‘bout an Evolution 54

Blame It on the Music 55

More Than Just Smartphones 56

Consumerization: A Pull and a Push 57

Safely Consumerizing IT 59

References 60

Chapter 8 The Bad Guys from Outside: Malware 61

Modern Malware Overview 61

Types of Malware 62

Botnets 63

Even Trusted Sites Can’t Be Trusted 64

Finding the Weak Points 64

Social Engineering for Success 65

Spamming and Phishing Get Targeted 67

Profit Motive 70

Endnotes 71

References 71

Chapter 9 Who Are These Guys? 73

The Business of Malware 73

Studying Pharmaceutical Spam 75

Other Links in the Global Chain 77

Taking on the Bad Guys 78

Endnotes 79

References 79

Chapter 10 Signs of Hope 81

Harnessing the Network 82

Bad Guys Team Up 82

Staying in Front of the Threats 83

Scanning for Signatures 83

Behavioral Analysis of Bad Code 84

The Power of Reputation 85

Global Threat Correlation 88

Combining Countermeasures 89

Endnotes 90

Reference 90

Chapter 11 Acceptable Use Policies 91

The Inevitable Evolution of AUPs 91

Gen X/Gen Y “Problem” 92

“Necessary” Noncompliance 94

AUPs Versus the Will of the Employees 96

Endnote 98

References 98

Chapter 12 The Realities of Data Loss 99

One Breach, Multiple Shockwaves 100

Insiders 102

Compliance Pitfall 103

DLP: Chasing Rainbows? 103

Endnotes 104

References 105

Chapter 13 Collaboration Without Confidence 107

Saying “No Thanks” to the “Culture of No” 109

One Workforce, Diverse Needs 111

Secure Collaboration: Anytime, Anywhere, from Any Device 112

Countervailing Forces 114

Endnotes 115

References 116

Chapter 14 Identity Management: We Need to Know if You Are a Dog 117

Identity: The Key to the Security Kingdom 118

Establishing Identity 120

A Flexible Identity Fabric 122

Endnote 123

References 123

Chapter 15 Security for the Borderless Network: Making Web 2.0 and 3.0 Safe for Business 125

Security Policies for the New Open Networked World 126

The Borderless Network Security Architecture 127

Super-Charged Scanners 128

Security Everywhere in the Network 129

Security Intelligence Designed In 130

The Line Between Policy and Enforcement 131

Redefining the Endpoint 132

Collaboration with Confidence 133

Endnote 134

Reference 134

9781587058868 TOC 3/16/2010

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 6 Customer Reviews
  • Posted July 11, 2011

    An executive review of modern security

    "Securing the Borderless Network" is a good executive level summary of the issues that any IT manager needs to understand. At only 148 pages it can be read fairly quickly and the author has a writing style that made the subject engaging. I have read books that made their subjects more boring than was needed and luckily the author does a fine job of making security sound interesting and critical for an organization.

    The topics range from cloud computing, smart phones, malware, identity management, data backup and loss, and real world security policies. Each topic does a good job showing enough history for understanding how a subject came to be relevant today. I had not seen a picture of an Apple Newton in a long time, but there it was in the history section of the smart phone chapter.

    It should be pointed out that this is by Cisco Press and they do modestly discuss their own products as ways to address pretty much all of the issues brought up in the book. The author made this reasonably unobtrusive and I was left with a better appreciation for Cisco products without feeling intruded upon during the presentation of any issues.

    Also, this is not a technical book. A programmer wanting to better secure their database programming will not necessarily need this book, but their manager and executive staff will be well served by it. While there are some graphs, the diagrams are usually screenshots, product pictures, and bullet points. Actual implementation is left as an exercise for the reader or, certainly, the subject of a much more technical book. Instead, get this book for decision makers who need to understand why the IT staff wants more emphasis on securing their network rather than simply providing services.

    Was this review helpful? Yes  No   Report this review
  • Posted June 3, 2010

    Calming fears about data security

    If you have employees begging to be allowed to use their cool new smartphones to read company email and access corporate data - and you're nervous as heck about it - this book is for you. t seems to me that concerns about security are natural when sensitive information moves outside of the relative safety of corporate networks. Securing the Borderless Network tells you how to create an open, collaborative environment for your workers, no matter how far-flung they are, while at the same time explaining how this collaboration can coexist with security. The writing is clear and straightforward, and the advice is practical.

    Was this review helpful? Yes  No   Report this review
  • Posted May 2, 2010

    more from this reviewer

    Handy reference book on security threats in the Web 2.0 world

    The goal of this book is to educate the senior IT 'decision- makers' on the issues surrounding securing collaborative technologies. Starting with a review of network security in general, moving to what collaboration technologies are all about and the expectations around these technologies to the modern workforce, and then to what cloud computing means, Tom Gillis from Cisco covers a lot of territory in a brief period of time in a language that anyone can understand.

    Gillis continues the book by covering other threats that can't be ignored: smartphones, malware, and some of the technology that can be used to combat these threats. He then wraps up with the importance of Acceptable Use policies, the actualities of data loss, and most importantly delivers the message: hope exists that these threats can be mitigated.

    One word of caution: as Gillis is an employee of Cisco, there is a heavy emphasis on some of the tools that they offer in the collaboration area. Readers need to keep in mind that these are examples of part of the market- there are other options out there!

    In a small, lightweight paperback, 'Securing the Borderless Network' is a helpful explanation of the information security threats that face the modern network. It's useful for the non-technical individual interested in learning what the big fuss is all about.

    Was this review helpful? Yes  No   Report this review
  • Posted April 25, 2010

    more from this reviewer

    Solid intoduction to Web 2.0, Cloud Computing and Security challenges posed by them

    This book is an entertaining and fun read and any technology enthusiast should read it. I was able to read this book in two nights and enjoyed it like I was reading Dan Brown's Angels and Demons. The author Tom Gillis clearly explains new challenges faced by IT Security Managers due to Web 2.0, Cloud Computing and mobile workforce. The author clearly explains why Web 2.0 and Cloud Computing are Enterprise management's biggest fear and clearly expose IT's inflexibility. Web 2.0 gives rise to Work 2.0 and whether IT departments like it or not, this trend is here to stay. Today employees work anytime from anywhere using any device and need connectivity 24x7x365 which increases their productivity and job satisfaction. But this trend is major headache for C-Level enterprise executives and IT Security managers as they don't know how to secure this information flow when communication may not even touch their networks like Salesforce hosting your company's CRM and employee access this data using his iPhone. Traditional network boundaries are blurring and it is becoming very difficult to protect data whether it is in motion or rest. Tom also explains Next Generation Firewalls that will not do filtering based on port, protocol and IP but instead will be Content, Application and User Identity aware. How about writing a firewall policy saying "John Doe" from "Engineering" department can access "[...]" and cannot exceed "2 Mbps"instead of IP address x.x.x.x/32 can access y.y.y.y/32 on port 80. I think you got the point :-)

    The problem statement is clearly defined with many excellent examples and interview excerpts from real enterprises. Last few chapters are fully focused on highlighting solutions for Web 2.0 security challenges and I have to admit, Cisco vision is neat and they are focusing on both On-Prem and Cloud based security solutions. The author didn't go into implementation or design details but ideas like Flexible Identity Fabric and multilayer scanning engines are pretty encouraging. The concept of Policy Management consoles (where enforcement and Policy management functions are decoupled) along with Security Intelligence Operations (SIO) are good initiatives by Cisco.

    Overall I thoroughly enjoyed this book and in my opinion the content is very well organized, timely and fresh. Tom Gillis is very knowledgeable and he certainly delivered a book that will benefit many IT managers,executives and staff members.

    Shahid Shafi CCIE#12665 (RS,Security,SP)

    Was this review helpful? Yes  No   Report this review
  • Posted April 23, 2010

    more from this reviewer

    nice explanation of firewalls

    Cisco is making a big push into cloud computing and the much bruited Web 2.0. Gillis explains these trends in a concise way, and tries to minimise the technical jargon.

    The first chapter is distinguished by an excellent summary of how firewalls work. Gillis skips all the low level product details that you typically find in other discussions about firewalls. Instead, he describes that all firewalls are divided into 2 types - proxy and packet filters. And that the latter are now largely represented by stateful packet filters. The relative merits of these are given, along with the trends in the last 15 or so years. If you have another book devoted to firewalls, consider perhaps first reading this chapter of Gillis to orient yourself before plunging into the former.

    Gillis then goes on to talk about cloud computing. Note however that the two example companies he covers are small. They don't have and cannot afford much in the way of dedicated IT people or equipment. So perhaps for situations like theirs, a so-called cloud remote access, where their data is hosted on some third party data center, makes sense. More plausibly, cloud computing usage may indeed expand, but likely there will always be both cases; of companies using it and others going with their own data centers.

    The book also delves into the various manifestations of malware, like viruses, botnets, spam and phishing. If you want more details, try Malware: Fighting Malicious Code or The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted May 29, 2012

    No text was provided for this review.

Sort by: Showing all of 6 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)