application control


Anonymous browsing with Tor presents serious challenges for IT as well as possible opportunities for organizations that need it. One of my best friends growing up was named Tor. He was Norwegian through and through and looked like he could wield a giant hammer (for those of you without any Scandinavian stock in you, Tor is the traditional Anglicized spelling of Thor). This blog isn’t about him. Just a good story. Anyway, what we’re talking about here is the Tor Browser and the related Tor protocol that enables anonymous web browsing... [Read More]
by RSS Chris Dawson  |  Jan 21, 2015  |  Filed in: Industry Trends
There are many options available for Web Application Firewalls in today’s marketplace. Selecting the right one for your organization can be difficult and costly. Vendors claim their products are the best, fastest and most secure, including Fortinet. The only reliable way to evaluate the many solutions is to put them in side-by-side real world testing to see how they perform. That’s where NSS Labs excels with their own lab facilities and comprehensive testing methodologies. In its first-ever WAF public test, Fortinet’s FortiWeb-1000D web... [Read More]
by RSS Mark Byers  |  Oct 01, 2014  |  Filed in: Industry Trends
If you're a small to mid-size Enterprise, you have seen the headlines about increasingly advanced, and targeted, attacks but you may not be sure how to protect your network and data. Or you might be thinking you're too small to attract targeted attacks. Or even if you may be a target you think you can't afford to deploy Next Generation Firewalls. Today, Fortinet announced the availability of the new FortiGate-300D and 500D. These new models extend our top-rated NGFW line, setting a new level in affordability and threat protection with 5x Next Generation... [Read More]
by RSS Tamir Hardof  |  Jul 09, 2014  |  Filed in: Industry Trends
Gone are the days when Application Control was considered a luxury. Or even a kind of security value-add. In fact, it's safe to say, that for any business with an Internet connection the ability to secure and manage applications is not only a necessity but an inherent component of IT infrastructure. That said, Application Control has come a long ways since its inception. And it's had to. Its rapid evolution is driven, in part, by the fact that security solutions for other components in the network have already reached their stride. Many firewalls,... [Read More]
by RSS Stefanie Hoffman  |  Sep 25, 2013  |  Filed in:
It seems that lately, threats that were once were simply known as “malware” or “viruses” have been elevated to the status of Advanced Persistent Threat (APT), a term that has strategically been used to strike fear in the hearts of consumers. These days, APTs have a much more common presence in the media, and some of the most notorious have included major global threats such as Ghostnet (a botnet deployed in various offices and embassies to monitor the Dalai Lama agenda), Shady RAT (like Ghostnet but with government and global corporate... [Read More]
by RSS Stefanie Hoffman  |  Apr 25, 2012  |  Filed in: Industry Trends
Slowly but surely, Application Control is changing the way most people think about traditional security policies. And in this day and age, it's becoming a mainstay in a comprehensive security-driven environment. The reason? Major security threats have evolved, says Jason Clark, Fortinet security evangelist. But the way users consume information and access the Internet has evolved too. Instead of consuming static content such as a hardbound encyclopedia, users consistently now access dynamic content such as Wikipedia - a development not lost on... [Read More]
by RSS Stefanie Hoffman  |  Apr 19, 2012  |  Filed in: Industry Trends
Today was another big milestone in the history of the company I co-founded and I'm very happy to have this opportunity to tell you about it. Fortinet has released FortiOS 4.0, the firmware upgrade for our FortiGate security systems. This release is the result of a tremendous effort by our development teams over the better part of 12+ months. These highly skilled and talented teams worked hard to design and implement these technology innovations so that we could confidently put the product in front of our customers. Even in this time of economic... [Read More]
by RSS Michael Xie  |  Mar 03, 2009  |  Filed in: Security Research