Excerpt Examines Network Security Solutions in the Web 2.0 World

Share it on Twitter  
Share it on Facebook  
Share it on Linked in  
Slide Show

The Eight Biggest Security Threats for 2010

Blue Coat Systems' predictions for the worst security threats for the year.

"Today's organizations need a new set of tools to express and enforce a more intelligent and relevant security policy that deals with the realities of Web 2.0, social networking, and the anywhere-anytime-any device nature of the borderless enterprise. Without these tools, policies are as effective as the ugly mattress tags that warn: Do not remove under penalty of law.' Most are removed." --Tom Gillis

Network security has become even more challenging in the age of Web 2.0, given its reliance on social media and mobility. As Tom Gillis points out in his book "Securing the Borderless Network: Security for the Web 2.0 World," users reject the idea that "personal" and "professional" technology use shouldn't be intertwined because they already are. The emergence of social-networking technology only serves to highlight how IT policies-particularly those relating to security-don't reflect reality. Organizations whose policies disallow use of social-collaboration tools lose out on opportunities for gains in productivity and efficiency.


The goal of Gillis' book is to encourage the security community to "adapt and evolve policies so that businesses can embrace these new technologies while not exposing themselves to harm through increased malware infection, acceptable use problems or data loss." To that end, he offers Cisco's plan for providing network security in the borderless enterprise. This identity-, application- and content-aware architecture consists of five components:

  • Scanning engines that examine content, identify applications and authenticate users.
  • Delivery mechanisms (routers, switches, etc.) that make the scanning elements available to the network.
  • Security intelligence operations that identify and stop malicious traffic.
  • Policy management consoles that provide a single point of policy definition across enforcement points like instant messaging, e-mail and the Web.
  • Next-generation endpoints that tie all the components together and ensure that all connections are routed through the scanning elements.
  • IT managers can better position themselves to take advantage of Web 2.0 tech by creating security policies that minimize risks associated with the reality of the "borderless" network.


Related Knowledge Network Content

.Network Security Policy Template

.Minimum Security Requirements for Federal Information and Information Systems

.Security Assessment Policy Template