Business and Technology | Page 2


(Author's disclaimer: I originally pitched this as a humor piece, but the more I wrote, despite the light-hearted tone, the more serious I realized this is/was/will be.)  In Chapter II of Lewis Carroll's Alice in Wonderland, Alice, having eaten a small cake labeled "Eat Me" but with no other instructions or advisories, finds herself growing so tall that she considers communicating with her feet by mail, using the address:     Alice's Right Foot, Esq.        Hearthrug,    ... [Read More]
by RSS Daniel Dern  |  Sep 24, 2015  |  Filed in: Business and Technology
In the world of cyber security, not all vendors are the same. One way of knowing who stands out is through true third party testing, and among the best is NSS Labs. Fortinet's VP of Product Marketing and Digital Strategist Jonas Tichenor talk about some resent results that continue to put Fortinet ahead of the pack. [Read More]
by RSS Jonas Tichenor  |  Apr 24, 2015  |  Filed in: Business and Technology
Tucked deep in the Pacific Northwest, there is a global battle being faught. The battle is over the world’s data and no company is safe. But as Digital Strategy Director, Jonas Tichenor shows us, there is a team of hackers and analysts detecting, analyzing, and stopping attacks, sometimes before they start! [Read More]
by RSS Jonas Tichenor  |  Apr 20, 2015  |  Filed in: Business and Technology
With the recent announcement of the new FortiGate 300D, 500D, and new blades for the 5000 series chassis, Fortinet continues our roll-out of the NP6 processor across the FortiGate portfolio. The NP6 processor is the "beating heart" of the FortiGate firewall; like something from science fiction, there is often more than one of them. While the headline performance figures from the NP6 are impressive, a good design and pragmatic implementation are the keys to a successful implementation. What Makes the NP6 Special or Important? The demands placed... [Read More]
by RSS Glen Kemp  |  Sep 01, 2014  |  Filed in: Business and Technology
I was recently made aware of a thread on a competitors forum that asked for "honest" advice on whether they should abandon their current firewall technology and adopt FortiGate firewalls instead. The vendor "X" in question was one that I have previously held a close relationship; so I have unique insight into the relative strengths and weakness of both technologies. For reasons of not wanting my door kicked down by the lawyers of two major networking companies, I held my tongue and didn't engage in the conversation. However, this thread led me to... [Read More]
by RSS Glen Kemp  |  May 26, 2014  |  Filed in: Business and Technology
After working in the reseller channel for many years, I've spent a lot of time with many firewall products. It wasn't until I recently joined Fortinet that I had a real opportunity to get to grips with the FortiGate firewall. I was impressed at the wide capabilities of the box, but a few things stuck out as being unique. These are not necessarily the kind of features that a salesman would blurt out during his 30 second elevator pitch, but that make living with and using the product on a daily basis a pleasant experience. Out of box experience This... [Read More]
by RSS Glen Kemp  |  Mar 25, 2014  |  Filed in: Business and Technology
All too often, cyber space seems a vast and unregulated "Wild West," where anarchy is the norm and criminal justice remains by-and-large a concept rarely enforced. What's more, the Internet cloaks cybercriminals under a blanket of anonymity, where they have the ability to take down international governments and large-scale corporations at the touch of a button from any where in the world. It's no secret that the "lawless" nature of cyberspace has become an accepted status-quo - so much so that high-profile cybercrime, international privacy breaches... [Read More]
by RSS Stefanie Hoffman  |  Jan 30, 2014  |  Filed in: Business and Technology
I am sitting in the very active parking lot of a large campus in my blacked out van with several laptops and directional antennas. It is just me and my gear. I am trying to break into a "secure" wireless network that had been deployed there when this guy comes and taps on my window and asks me through the slightly open glass what I was doing there. Damn! I thought my cover was blown and that I'd be summarily escorted off campus or that the police would be called on me. That would have been the end of my day and would have put a damper on my progress.... [Read More]
by RSS Bryan Watson  |  Jan 23, 2014  |  Filed in: Business and Technology
As any competitive athlete can attest, if you want to win any game, you first have to understand the players. That's the premise behind ethical hacking. Frequently depicted in books and espionage thrillers as shadowy and mysterious, ethical hackers often appear to occupy a moral gray area - possessing the ability to commit nefarious crimes but instead applying their brilliance and technical acumen for the pursuit of justice. So who are these guys, anyway? As the name suggests, the practice of ethical hacking trains individuals to fight cybercrime... [Read More]
by RSS Stefanie Hoffman  |  Dec 26, 2013  |  Filed in: Business and Technology
The fair land of Scotland might seem an unlikely place to boost expertise and revolutionize tactics aimed at apprehending criminals. However, police departments and detectives in England's neighbor to the north are helping reshape the agency's direction a bit by bulking up their cyber security acumen. And they're turning to the research community to do so. According to the Edinburgh News, Scottish law enforcement agents have adopted a new Digital Investigator course into their curriculum, facilitated by cyber security experts at Edinburgh Napier... [Read More]
by RSS Stefanie Hoffman  |  Nov 21, 2013  |  Filed in: Business and Technology