Securing Borderless Networks (2012 San Diego)
- 1,840 views
This session features the Borderless Network Security architecture with a focus on technical implementation and best practices. The Borderless Network Security architecture offers an end-to-end ...
This session features the Borderless Network Security architecture with a focus on technical implementation and best practices. The Borderless Network Security architecture offers an end-to-end security implementation approach for business organizations focusing on security concerns in today's real world corporate networks. The foundation of the Borderless Network Security architecture approach use real-world cases, defense-in-depth and modular architectural components. This session will include the specific security considerations and details as described in a typical business use case. The Borderless Network Security architecture offers full interoperability with other Borderless Network security design blocks including Data Center, Campus, WAN Edge, Remote Office/Branch Office (ROBO) and Internet Edge. This Borderless Network Security session includes a detailed discussion of the security capabilities for today's corporations trying to solve tomorrow's security issues. Security discussions in this session will included Next-Generation Firewalls (NGFW), SSL VPNs, Secure Mobility, BYOD, AnyConnect, TrustSec and MACSec. Additional security conversations will include hosted (cloud-based) verses hybrid verses on-premise implementation of email and web security systems along with data loss presentation (DLP) and Enterprise Encryption.
Cisco Live 365: https://www.ciscolive365.com/connect/sessionDetail.ww?SESSION_ID=4605
- Total Views
- Views on SlideShare
- Embed Views