Chapter 3. Building a Security Strategy for Borderless Networks
The chapter covers the following topics:
Cisco Borderless Network Architecture
Traditional approaches to network security used well-defined borders to protect inside networks from outside threats and malware. Employees used corporate computers secured with antivirus and personal firewalls. Perimeter-based networks were protected using ...