• Email
  • Like
  • Save
  • Private Content
  • Embed
 

Securing Borderless Networks (2012 San Diego)

by on Jun 19, 2012

  • 1,228 views

This session features the Borderless Network Security architecture with a focus on technical implementation and best practices. The Borderless Network Security architecture offers an end-to-end ...

This session features the Borderless Network Security architecture with a focus on technical implementation and best practices. The Borderless Network Security architecture offers an end-to-end security implementation approach for business organizations focusing on security concerns in today's real world corporate networks. The foundation of the Borderless Network Security architecture approach use real-world cases, defense-in-depth and modular architectural components. This session will include the specific security considerations and details as described in a typical business use case. The Borderless Network Security architecture offers full interoperability with other Borderless Network security design blocks including Data Center, Campus, WAN Edge, Remote Office/Branch Office (ROBO) and Internet Edge. This Borderless Network Security session includes a detailed discussion of the security capabilities for today's corporations trying to solve tomorrow's security issues. Security discussions in this session will included Next-Generation Firewalls (NGFW), SSL VPNs, Secure Mobility, BYOD, AnyConnect, TrustSec and MACSec. Additional security conversations will include hosted (cloud-based) verses hybrid verses on-premise implementation of email and web security systems along with data loss presentation (DLP) and Enterprise Encryption.

Cisco Live 365: https://www.ciscolive365.com/connect/sessionDetail.ww?SESSION_ID=4605

Statistics

Views

Total Views
1,228
Views on SlideShare
1,228
Embed Views
0

Actions

Likes
4
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via SlideShare as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
Post Comment
Edit your comment

Securing Borderless Networks (2012 San Diego) Securing Borderless Networks (2012 San Diego) Presentation Transcript