July 14, 2010

The Future of Borderless Network Security

  • Enterprise Strategy Group, Inc.
It's easy to be skeptical about the technology industry vision du jour, so it is no surprise that many IT managers don't know what to make of the new "borderless network" rhetoric coming from Silicon Valley. Does this term signify a new network architecture built for new cloud computing requirements or is it just a new label for today's LANs, WANs, and public network infrastructure? While market cynicism is certainly understandable, borderless networks aren't a Madison Avenue creation; rather, this trend is extremely important and already well underway. ESG offers this warning to IT and business executives: ignore the borderless network evolution at your own peril!

This white paper provides a brief overview of borderless networks, discussing why this transition is an inevitable outgrowth of current business and technology trends. It also addresses a critical question: if borderless networks are already evolving, how can they be secured?

This paper by Enterprise Strategy Group is presented on behalf of Cisco Systems.


Download Paper
(Webtorials registration required for downloads. Click here if you forgot your username/password.)


1 Comment

Security used to be relatively simple. Oh, for the days when our biggest concern was whether point-to-point lines needed to be encrypted and there was no inter-company connectivity!

Now, as we enter the age of any-to-any connectivity on a plethora of planes, security is a MAJOR concern. To date, we have primarily addressed security on a technology-by-technology approach. The LAN infrastructure has one form of security, and the WAN infrastructure may or may not have integrated security. Application security may be on another level.

In fact, multiple security level often conflict. For instance, deep packet inspection for application performance is much more difficult if the traffic is encrypted. In this case, the security for one portion of the IT infrastructure "hides" critical information from another.

And this doesn't even start to address the security issues introduced by mobile devices.

This paper provides an excellent overview of the myriad issues that we're facing and offers a number of architectural considerations.

Get E-News and Notices via Email


  

 



  

I accept Webtorials' Terms and Conditions.

Featured Sponsor Microsites






















Recent Tweets

Archives

Notices

Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at https://www.webtorials.com/Sonus_logo.jpgreg/.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2015, Distributed Networking Associates, Inc.