Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
What is included with this book?
Tom Gillis is the vice president and general manager for the high-growth Security Technology Business Unit (STBU) at Cisco, where he leads the company’s businesses for security management, appliances, applications, and endpoint services.
Formerly vice president of product management for the Cisco STBU, Gillis was promoted to the VP/GM position after significantly growing its security business and market share. During this time, Gillis successfully led the Cisco product management team and outbound marketing, technical marketing engineering, technical publications, and training organizations.
Prior to his role at Cisco, Gillis was part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000. Before joining IronPort, Gillis worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group.
Gillis is a recognized leader in the dynamically charged and high-growth Internet security industry, with in-depth knowledge of the challenges surrounding secure network infrastructure. As an author, speaker, and industry executive, he has made invaluable contributions to the security technology community. He has presented at major conferences and events ranging from Gartner Symposiums to Fox News Live. Gillis is also the author of two books, Get the Message and Upping the Anti, a business guide to messaging security.
Gillis holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.
|The Network Security Challenge|
|Network Security Yesterday, Today, and Tomorrow|
|Collaboration and Web 2.0 Technologies|
|Cisco Webex Connect Case study|
|Social Networking Case study|
|ERP Applications Case study|
|Telepresence Case study|
|Mobile devices and their security challenges|
|"Watson can you hear me"|
|The future in your hand|
|Consumerization of IT|
|"The bad news"|
|The Bad Guys from Outside|
|Who are these guys?|
|A Ray of hope|
|The Bad Guys from Within|
|Data Loss Prevention|
|Collaborating without confidence?|
|Securing the Network for the Next Generation Workforce|
|Secure Mobile Enterprise|
|Products for network security, content security, endpoint security, application security, and management|
|Protecting the Web 2.0 Workforce Today and a blue print for Web 3.0|
|Table of Contents provided by Publisher. All Rights Reserved.|