‘Securing the Borderless Network’ Excerpt
Now is not the time to plan for a mobile Web 2.0 world. It’s already here, like it
or not. Internet-based collaborative work tools. iPhones, BlackBerrys, and growing
numbers of other “smart” mobile wireless devices with multimedia and PC-like
capabilities. Social networking, instant messaging, and Skype. Virtualization, cloud
computing, and SaaS. Cisco WebEx and TelePresence. Remote and mobile working. These
trends, technologies, and tools enable people to work far more efficiently, and be more
connected to information and one another, than ever before.
The case studies and the comments from individuals featured in this book reveal that
many organizations are proactively trying to find their place in the Web 2.0 world.
They are truly eager to leverage new tools and technologies that can increase their
competitive edge. They realize the potential these tools have to enable them to
streamline their work processes, keep their workforce motivated and productive, connect
with their customers, generate significant cost savings, and remain relevant in today’s
fast-changing global business landscape.
But we have also come to understand that two things are standing in the way of
today’s workers achieving even greater heights of productivity and creating tremendous
value for the enterprise: management’s fear and IT’s inflexibility.
This excerpt is from chapter 15 of Tom Gillis’ “Securing the Borderless Network:
Security for the Web 2.0 World,” published by Cisco Press.
The attached Zip file includes:
- Intro Page.doc
- Cover Sheet and Terms.pdf
- Securing the Borderless Network Excerpt.pdf