Securing the Borderless Network Excerpt

    ‘Securing the Borderless Network’ Excerpt

    Web 2.0 offers huge leaps in productivity, but only if business can be confident in its security and reliability. This book chapter offers real-world examples of how businesses have embraced Web 2.0.

    Now is not the time to plan for a mobile Web 2.0 world. It’s already here, like it
    or not. Internet-based collaborative work tools. iPhones, BlackBerrys, and growing
    numbers of other “smart” mobile wireless devices with multimedia and PC-like
    capabilities. Social networking, instant messaging, and Skype. Virtualization, cloud
    computing, and SaaS. Cisco WebEx and TelePresence. Remote and mobile working. These
    trends, technologies, and tools enable people to work far more efficiently, and be more
    connected to information and one another, than ever before.

    The case studies and the comments from individuals featured in this book reveal that
    many organizations are proactively trying to find their place in the Web 2.0 world.
    They are truly eager to leverage new tools and technologies that can increase their
    competitive edge. They realize the potential these tools have to enable them to
    streamline their work processes, keep their workforce motivated and productive, connect
    with their customers, generate significant cost savings, and remain relevant in today’s
    fast-changing global business landscape.

    But we have also come to understand that two things are standing in the way of
    today’s workers achieving even greater heights of productivity and creating tremendous
    value for the enterprise: management’s fear and IT’s inflexibility.

    This excerpt is from chapter 15 of Tom Gillis’ “Securing the Borderless Network:
    Security for the Web 2.0 World,” published by Cisco Press.

    The attached Zip file includes:

    • Intro Page.doc
    • Cover Sheet and Terms.pdf
    • Securing the Borderless Network Excerpt.pdf

    Latest Articles