Fortinet

FortinetSecurity

Evolving Towards Intent-Based Security

Credit to Author: Phil Quade| Date: Wed, 26 Jul 2017 12:58:00 +0000

In this second installment, begun with ”The Evolution of the Firewall,” we will take a look at the direction security is headed. From its humble beginnings, the firewall has evolved through several stages of development. Its latest incarnation, built on the legacy of its first two generations, implements the strategic pillars of Segmentation, Access Control, and Real-time analytics/action to realize intent-based network security. The Three Generations of the Firewall With the advantage of looking backwards in time, it’s now…

Read More
FortinetSecurity

NSS Labs NGFW Report: Fortinet Receives 4th Consecutive Recommended Rating

Credit to Author: John Maddison| Date: Tue, 25 Jul 2017 12:58:00 +0000

One of the biggest security challenges organizations face is sorting through solutions from literally hundreds of vendors in the IT market to find the one that is going to provide them with the best protection at a cost they can afford. Each of these vendors claims to solve critical security issues, and they use volumes of white papers and marketing campaigns to promote their solutions. Of course, proper security is essential. As networks continue to expand and become more complex, organizations are increasingly reliant on effective…

Read More
FortinetSecurity

The Need for Threat Intelligence

Credit to Author: Neil Matz| Date: Mon, 24 Jul 2017 12:58:00 +0000

These are challenging times for security leaders. Business pressures require faster processing of more data, and support for more devices than ever before. Critical data that used to be housed in a secured datacenter now moves across an increasingly complex ecosystem of networked environments, including IoT, cloud, mobile devices and workers, and virtualized networks. The rate of change in some environments is so rapid that many organizations simply can’t keep up. A recent Forrester survey of 342 security leaders found that the largest…

Read More
FortinetSecurity

The Evolution of the Firewall

Credit to Author: Phil Quade| Date: Fri, 21 Jul 2017 19:06:05 +0000

As the Internet and Digital Economy have grown up, the humble Firewall has continued to serve as their go-to security appliance. In this first of a two-part series, we will examine how, in spite of the evolution of the Firewall through a number of shapes, functions, and roles, it remains the security foundation for implementing the strategic pillars of Segmentation, Access Control, and Real-time analytics/action now and into the future. Change is a fact of life; what doesn’t change usually withers and dies. This is true for both the biological…

Read More
FortinetSecurity

Byline: It’s Time to Get Serious About Web Application Security

Credit to Author: John Maddison| Date: Thu, 20 Jul 2017 12:58:00 +0000

As application-focused threats continue to evolve, both in number and sophistication, a single web application security device is typically not enough to defend the entire, distributed network. Instead, organizations need to consider investing in a multi-pronged web application security approach that can tie different devices together, and leverage and share intelligence across a variety of other security and network devices. It’s also increasingly important to have a centralized, unified console, such as a FortiWeb Web Application Firewall.

Read More
FortinetSecurity

Why Top Healthcare Institutions are Moving Toward Integrated Security Solutions

Credit to Author: Susan Biddle| Date: Wed, 19 Jul 2017 12:58:00 +0000

According to a report posted by the Office of the National Coordinator for Health Information Technology, 87 percent of office-based physicians had adopted some form of electronic health record (EHR) as of 2015. This is more than double the 42 percent that had done so when data was collected in 2008. Along with an increase in EHR adoption, we have also witnessed a global healthcare revolution in data collection and research. Access to such data improves the care and quality of life of those individuals these institutions serve. The challenge…

Read More
FortinetSecurity

Black Hat Executive Interviews: Q&A with Phil Quade, Fortinet CISO

Credit to Author: Darlene Gannon| Date: Tue, 18 Jul 2017 12:58:00 +0000

Q: You joined Fortinet recently after three decades in cybersecurity roles in government, including most recently the NSA. What has that experience taught you about the nature and scope of the threats that organizations face these days? Some people say that street cops and detectives see an especially negative view of humanity, because, more often than not, they are called to assist with an unlawful or sad situation.  Similarly, coming from the foreign intelligence business, you get a first-hand view of what foreign adversaries aspire to…

Read More
FortinetSecurity

Byline: What’s Your Network’s Threat IQ? 3 Steps Toward Actionable, Real-Time Threat Intel

Credit to Author: Derek Manky| Date: Mon, 17 Jul 2017 12:58:00 +0000

Many people will recognize the next few words as a gross understatement: The number of cyberthreats and cyberattacks targeting organizations won’t slow down anytime soon. In recent months, we’ve seen increasingly sophisticated attacks targeting specific organizations, compromised IoT devices used in DDoS attacks, and large-scale ransomware outbreaks spreading across the globe. Many businesses struggle to keep up with the security threats they face, and they don’t know how to take the next step to better protect their systems….

Read More