- Enterprise Strategy Group, Inc.
It's easy to be skeptical about the technology industry vision du jour, so it is no surprise that many IT managers don't know what to make of the new "borderless network" rhetoric coming from Silicon Valley. Does this term signify a new network architecture built for new cloud computing requirements or is it just a new label for today's LANs, WANs, and public network infrastructure? While market cynicism is certainly understandable, borderless networks aren't a Madison Avenue creation; rather, this trend is extremely important and already well underway. ESG offers this warning to IT and business executives: ignore the borderless network evolution at your own peril!
This white paper provides a brief overview of borderless networks, discussing why this transition is an inevitable outgrowth of current business and technology trends. It also addresses a critical question: if borderless networks are already evolving, how can they be secured?
This paper by Enterprise Strategy Group is presented on behalf of Cisco Systems.
Download Paper
(Webtorials registration required for downloads. Click here if you forgot your username/password.)
This white paper provides a brief overview of borderless networks, discussing why this transition is an inevitable outgrowth of current business and technology trends. It also addresses a critical question: if borderless networks are already evolving, how can they be secured?
This paper by Enterprise Strategy Group is presented on behalf of Cisco Systems.
Download Paper
(Webtorials registration required for downloads. Click here if you forgot your username/password.)
Security used to be relatively simple. Oh, for the days when our biggest concern was whether point-to-point lines needed to be encrypted and there was no inter-company connectivity!
Now, as we enter the age of any-to-any connectivity on a plethora of planes, security is a MAJOR concern. To date, we have primarily addressed security on a technology-by-technology approach. The LAN infrastructure has one form of security, and the WAN infrastructure may or may not have integrated security. Application security may be on another level.
In fact, multiple security level often conflict. For instance, deep packet inspection for application performance is much more difficult if the traffic is encrypted. In this case, the security for one portion of the IT infrastructure "hides" critical information from another.
And this doesn't even start to address the security issues introduced by mobile devices.
This paper provides an excellent overview of the myriad issues that we're facing and offers a number of architectural considerations.