Cisco Blogs


Cisco Blog > The Platform

Security as a Bolt On: Myth # 2 of the Good-Enough Network

Network security has to keep pace with an ever-changing mobile workforce’s needs and an increased threat profile. And it doesn’t help that security risks are everywhere. There’s been a 46% increase in the spread of malware on mobile devices in 2010 while at the same time, 20% of workers have left devices unattended, and 46% have let others use their devices, according to the Connected World Report, 2010.

But with all these risks out there, so many “good enough” networks that are cobbled together with the least expensive equipment employ the bolt-on security method. This leaves the network (and valuable data) open to hackers and other security threats.

In the second installment of the Seven Myths of the Good Enough Network series, Mike Rau, VP & CTO of Cisco’s Borderless Network Architecture, delves into the myth of bolt-on security. In addition to outlining the pitfalls of taking a good-enough, bolt-on approach to security, Mike highlights the benefits of integrating security into the network architecture. Sound interesting? Here’s the full article on Silicon Angle.

Here’s some additional information on the myth of the good-enough network.

Blog:  The Myth of the Single Purpose Network

Blog:  The Seven Myths of the Good-Enough Network

Webcast:  Debunking the Myth of the Good-Enough Network

White Paper:  When Good Isn’t Good Enough

Tags: , ,

In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.

7 Comments.


  1. Great article, as a photographer network security is a very important aspect of our business.

       0 likes

  2. Very interesting article. I think that you will not be safe until they pull the plug from the Internet.

       0 likes

  3. I am the owner and operator an architectural services business. The architecture and construction industry is becoming increasingly organized around BIM (building information modeling and management) platforms. These platforms allow multiple firms (owners-managers, architects, engineers, bidders, contractors, subcontractors and suppliers) to access a substantial range of document types (drawings, specifications, contracts, etc.) These different users represent varying levels of access needs (authoring, editing, read-only). It has long appeared to me that security is an Achilles heel for this approach, not only due to vulnerability but also due to the complexity of managing this security. Thank you for your thoughtful article.

       0 likes

  4. Malware on mobile devices increasing? Do you offer security solutions for cellphones or tablets?

       0 likes

  5. Security is very important, but Good-Enough Network is not a myth, for the average user it is ok

       0 likes

  6. I run a large forum where lots of US servicemen come to chat and when they are away on service they now rely more and more on WWW communication.
    They are starting to complain that they are told not to use their access codes or they could be compromised by trackers.
    Its becoming more and more difficult to ‘enjoy’ the web we used to love and use as part of our daily life.

       0 likes

  7. Sometimes its best to hire a hacker to help you build a totally secure network. Myth or not, there can be a safe network.

       0 likes