August 23, 2010

2010 Midyear Security Report

  • The Impact of Global Security Threats and Trends on the Enterprise
  • Cisco Systems
Web 2.0, mobility, virtualization, and other dramatic shifts in how we communicate and collaborate are carving out a new landscape for business and for enterprise security.

The business world continues to evolve due to spectacular revolutionary forces that are changing the way we work, live, learn, and play, and how we communicate and share information. These changes aren't something enterprises can choose to take part in or ignore; in fact, they're already having a profound impact on your business and your life at this very moment, whether you are unaware of or welcome the change.

These changes are part of the dramatic shifts - "tectonic forces" - that are making it essential for businesses to rethink their approach to enterprise security. Gone are the days when a network firewall would deter teenagers looking to hack into corporate databases for the challenge, notoriety, or for the fun of it. Now, serious and well-resourced criminals with business plans are intent on stealing both personal data and business intelligence they can sell--and perimeter-based security alone cannot stop them.

The Cisco Midyear Security Report examines these changes and their impact on the enterprise, and highlights other significant trends and threats creating security challenges for organizations worldwide. The report also includes recommendations from Cisco security experts designed to help enterprises strengthen their security.

Download Paper
(Webtorials membership required. Click here to register or if you forgot your username/password.)

1 Comment

Cisco's midyear Security Report is always a very popular item with our Webtorials community.

I'm particularly glad that this year's report covers some of the issues that I consider to be among the most critical: mobility, virtualization, IPv6, and social media are high on the list.

Yet another "must read."

Search Webtorials

Get E-News and Notices via Email




I accept Webtorials' Terms and Conditions.

Trending Discussions

See more discussions...

Featured Sponsor Microsites



Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2018, Distributed Networking Associates, Inc.