did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781587058868

Securing the Borderless Network Security for the Web 2.0 World

by
  • ISBN13:

    9781587058868

  • ISBN10:

    1587058863

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2010-04-09
  • Publisher: Cisco Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $45.00

Summary

Today's new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for business advantage. However, they also introduce daunting new security issues - many of which are already being exploited by hackers, crackers, and other cybercriminals. Secure Collaboration is the first book entirely focused on understanding, managing, and mitigating the security risks associated with today's new collaborative technologies. It brings together systematic, up-to-the-minute decision-making and technical guidance for companies of all sizes: specific information, techniques, and best practices for protecting today's new systems without compromising their business benefits. Cisco security technology expert Tom Gillis guides you through several common collaborative scenarios, from Cisco Webex conferencing to social networking and ERP usage. For each, he systematically identifies new and emerging security risks, and presents proven best-practice responses - ranging from revised Acceptable Use and Data Loss Prevention policies to technology solutions. The book's extensive high-level coverage of technology solutions covers Cisco offerings for managing identity, and for securing networks, contents, endpoints, applications, and more. Gillis concludes with a preview of "Web 3.0" - and what it will take to secure those applications, too.

Author Biography

Tom Gillis is the vice president and general manager for the high-growth Security Technology Business Unit (STBU) at Cisco, where he leads the company’s businesses for security management, appliances, applications, and endpoint services.

 

Formerly vice president of product management for the Cisco STBU, Gillis was promoted to the VP/GM position after significantly growing its security business and market share. During this time, Gillis successfully led the Cisco product management team and outbound marketing, technical marketing engineering, technical publications, and training organizations.

 

Prior to his role at Cisco, Gillis was part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000. Before joining IronPort, Gillis worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group.

 

Gillis is a recognized leader in the dynamically charged and high-growth Internet security industry, with in-depth knowledge of the challenges surrounding secure network infrastructure. As an author, speaker, and industry executive, he has made invaluable contributions to the security technology community. He has presented at major conferences and events ranging from Gartner Symposiums to Fox News Live. Gillis is also the author of two books, Get the Message and Upping the Anti, a business guide to messaging security.

 

Gillis holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.

Table of Contents

The Network Security Challenge
Network Security Yesterday, Today, and Tomorrow
Collaboration and Web 2.0 Technologies
Web 2.0
Cisco Webex Connect Case study
Social Networking Case study
ERP Applications Case study
Telepresence Case study
Mobile devices and their security challenges
"Watson can you hear me"
The future in your hand
Consumerization of IT
"The bad news"
The Bad Guys from Outside
Malware
Who are these guys?
A Ray of hope
The Bad Guys from Within
Acceptable use
Data Loss Prevention
Collaborating without confidence?
Securing the Network for the Next Generation Workforce
Secure Mobile Enterprise
Identity
Products for network security, content security, endpoint security, application security, and management
Protecting the Web 2.0 Workforce Today and a blue print for Web 3.0
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program