Securing the Borderless Network: Security for the Web 2.0 World

  • ISBN13: 9781587058868
  • Condition: New
  • Notes: BUY WITH CONFIDENCE, Over one million books sold! 98% Positive feedback. Compare our books, prices and service to the competition. 100% Satisfaction Guaranteed

Product Description
Securing the Borderless Network: Security for the Web 2.0 World Tom Gillis   Securing the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applications   Today’s new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for enhancing productivity and competitive advantage. However, they also introduce daunting new security issues, many of wh… More >>

Securing the Borderless Network: Security for the Web 2.0 World

5 replies
  1. Shahid Shafi says:

    This book is an entertaining and fun read and any technology enthusiast should read it. I was able to read this book in two nights and enjoyed it like I was reading Dan Brown’s Angels and Demons. The author Tom Gillis clearly explains new challenges faced by IT Security Managers due to Web 2.0, Cloud Computing and mobile workforce. The author clearly explains why Web 2.0 and Cloud Computing are Enterprise management’s biggest fear and clearly expose IT’s inflexibility. Web 2.0 gives rise to Work 2.0 and whether IT departments like it or not, this trend is here to stay. Today employees work anytime from anywhere using any device and need connectivity 24x7x365 which increases their productivity and job satisfaction. But this trend is major headache for C-Level enterprise executives and IT Security managers as they don’t know how to secure this information flow when communication may not even touch their networks like Salesforce hosting your company’s CRM and employee access this data using his iPhone. Traditional network boundaries are blurring and it is becoming very difficult to protect data whether it is in motion or rest. Tom also explains Next Generation Firewalls that will not do filtering based on port, protocol and IP but instead will be Content, Application and User Identity aware. How about writing a firewall policy saying “John Doe” from “Engineering” department can access “[…]” and cannot exceed “2 Mbps”instead of IP address x.x.x.x/32 can access y.y.y.y/32 on port 80. I think you got the point :-)

    The problem statement is clearly defined with many excellent examples and interview excerpts from real enterprises. Last few chapters are fully focused on highlighting solutions for Web 2.0 security challenges and I have to admit, Cisco vision is neat and they are focusing on both On-Prem and Cloud based security solutions. The author didn’t go into implementation or design details but ideas like Flexible Identity Fabric and multilayer scanning engines are pretty encouraging. The concept of Policy Management consoles (where enforcement and Policy management functions are decoupled) along with Security Intelligence Operations (SIO) are good initiatives by Cisco.

    Overall I thoroughly enjoyed this book and in my opinion the content is very well organized, timely and fresh. Tom Gillis is very knowledgeable and he certainly delivered a book that will benefit many IT managers,executives and staff members.

    Shahid Shafi CCIE#12665 (RS,Security,SP)
    Rating: 4 / 5

  2. Ofir Ronen says:

    This is a good book for the starting tech guy or for the non-techie who wants to get basic understanding on the way things work in the cloud and what is web 2.0. On the more professional note, you get a good explanation on the enterprise point of view – why they should like and dislike it, what are the needs and the problems that come as a result of cloud usage.

    My problem with this book (and its kind) is that the average guy that look at the title will get scared and will not buy it, it sound like too techie (where its right the opposite). That is also what I liked about it… You don’t have to be super techie and experienced with web 2.0 to understand the author’s accurate and simple explanations.

    The book provide a sneak peak to the future, the next generation technology – which is always nice and overall, cover the topics without the pretentious that you often find in technological books. Other than defining the audience, they did a nice job.

    Rofi Neron, CCNP

    […]
    Rating: 3 / 5

  3. A. Stephens says:

    This is a small book, but it makes a big impact. Mr. Tom Gillis is very knowledgeable on networking security and he’s put together a great book that what should be on the desk of CIOs and IT managers everywhere, using layman language to explain technical concepts and giving the reader an easier time grasping the important ideas that drive modern network security.

    Gillis covered a lot of ground in a concise, clear manner, producing a “Bible” for IT Network/Security pros, and it’s a fun read for technology geeks everywhere.

    By nature of my work as paranoid network security admin, I never get bored, and the book offers a lot of new threats to watch out for, particularly with all the new ways workers can connect their new toys to my network 24/7, running from iPods and iPhones to the latest malware attacks, but the book offers plenty of tools and ideas to combat these threats.

    It’s also worth noting that the book explains where traditional approaches to network boundaries are dead and gone, which often makes it almost impossible to protect data whether it is static or dynamic, and the pace of evolution for cloud computing and related processes and services means security hasn’t always had time to catch up.

    This book clearly identify these problems of the IT Security with excellent examples and interview excerpts from real enterprises.

    One of the negatives, however, is that Tom Gillis is an employee of Cisco and it natural for him to promote Cisco technology/future development ideas, and it’s important to keep in mind that there are other options out there; as in this life you have a few Bible versions, like translations from Aramaic language (if I was Cisco employee I would do the same way!).

    I do like this book and highly recommend it to my friends and co-workers in the field of IT Network Security.

    Disclosure: The publisher of the book provided a free copy for this review.

    Also I would like to thank Mr. Michael Morisy Community Editor, […] – for sending me this book.
    Rating: 5 / 5

  4. Stephen Northcutt says:

    I am giving this four stars because in June 2010, this really helps me see the big picture from a seasoned tech executive, Harvard MBA’s point of view. Through no fault of his own, the manuscript will age fast and be less valuable fast. For instance, chapter 6 doesn’t have the iPad however, it does have the Apple Newton from 1993. There is a lot of history built into Gillis’s research and I found that really helpful, we have to know where we have been to understand where we are going. If you need to understand the emerging trends in security and computing in general and it is still 2010, I recommend you buy this book. If it is later than 2010 and it is not second edition or updated, ask around for a copy to borrow. I guess I am a bit of a Gillis fan, I only recycled his Get the Message from 2004 last month.
    Rating: 4 / 5

  5. Nilesh Bhandari says:

    If you have employees begging to be allowed to use their cool new smartphones to read company email and access corporate data – and you’re nervous about it – this book is for you. I think that concerns about security are natural when sensitive information moves outside of the relative safety of corporate networks. Securing the Borderless Network tells you how to create an open, collaborative environment for your workers, no matter how far-flung they are, while at the same time explaining how this collaboration can coexist with security. The writing is clear and straightforward, and the advice is practical.
    Rating: 5 / 5

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.