Chapter 15. Security for the Borderless Network: Making Web 2.0 and 3.0 Safe for Business

This chapter includes the following topics:

Security Policies for the New Open Networked World

The Borderless Network Security Architecture

Super-Charged Scanners

Security Everywhere in the Network

Collaboration with Confidence

Now is not the time to plan for a mobile Web 2.0 world. It’s already here, like it or not. Internet-based collaborative work tools. iPhones, BlackBerrys, and growing numbers of other “smart” mobile wireless devices with multimedia and PC-like capabilities. Social networking, instant messaging, and Skype. Virtualization, cloud computing, and SaaS. Cisco WebEx and TelePresence. Remote and mobile working. These trends, technologies, ...

Get Securing the Borderless Network: Security for the Web 2.0 World now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.