Chapter 3. Building a Security Strategy

This chapter covers the following subjects:

Securing borderless networks

Controlling and containing data loss

In today’s networks, with so many access methods, including virtual private networks (VPN), remote employees, partner intranets, public access, and so on), we really need to consider all these types of access while building a security strategy. One term used often is borderless networks, which suggests the network does not simply start at one location and end at another location, but instead provides access without physical borders. As the world looks for uninterrupted and ubiquitous access, this concept shows how one person’s dream can be another person’s nightmare.

This chapter examines ...

Get CCNA Security 640-554 Official Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.