August 10, 2010

Threat Defense for Borderless Networks

  • Cisco Systems
To protect today's borderless networks, IT managers must adapt by implementing faster, smarter security measures that monitor the constantly changing global landscape. This new white paper examines the security risks and needs of borderless networks, details a systematic plan of action, and describes how Cisco can help implement threat defenses that will serve you today and for years to come.

Download Paper or Go To Comments/Discussion
(Webtorials registration required for downloads. Click here if you forgot your username/password.)


2 Comments

As borderless networks continue to permeate the networking architectures, the defense mechanisms for these networks continue to evolve as well.

I particularly like the approach in this paper of first defining the increased points that network threats can come from and then addressing the security needs at these access points.

The latter half of the paper enumerates Cisco's specific mechanisms for addressing these threats. Nevertheless, the paper offers an excellent benchmark for solutions regardless of your exact choice of supplier.

Please note that this paper supersedes the paper that was formerly available under the title "Threat Control and Containment".  The rather extensive discussion is still available by clicking here.

Search Webtorials

Get E-News and Notices via Email


  

 



  

I accept Webtorials' Terms and Conditions.

Trending Discussions

See more discussions...

Featured Sponsor Microsites






















Archives

Notices

Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2018, Distributed Networking Associates, Inc.