fabric | Page 2


Security vendors have been touting the advantages of next-generation firewalls (NGFW) that provide application inspection for several years now. As application traffic became more prevalent, criminals found that hiding malware inside application traffic was an excellent way to bypass traditional security. They still do. But now, application traffic is ubiquitous. The number of devices on our networks is growing exponentially, along with the volume of application and transactional traffic. While much of it is still passing through the traditional... [Read More]
by RSS John Welton  |  Jun 28, 2016  |  Filed in: Industry Trends
One of the biggest security challenges organizations face is being able to see enough of the network to identify today’s most advanced, multi-vector threats. Ideally, you need to be able to see across the distributed network, including cloud deployments and devices from multiple network and security vendors, correlate detected local activity with global threat intelligence and expected behaviors, and coordinate a response across the entire portfolio of installed security solutions. [Read More]
by RSS John Maddison  |  Jun 07, 2016  |  Filed in: Business and Technology
Business to Business, or B2B networks are pervasive within Financial Services network environments. They are also highly vulnerable to attack.  One reason is that these networks are often woefully unprotected. Some organizations have implemented simple firewall capabilities into these B2B networks, and most have VPNs. But because performance is paramount, security is often seen as a bottleneck; so many of these networks are often only secured using simple router ACLs (RACLs) and NAT. Seriously.With the global transition to digital business impacting... [Read More]
by RSS Araldo Menegon  |  May 25, 2016  |  Filed in: Industry Trends
Innovations in wireless and computing technology are driving the growth of connectivity between devices and appliances throughout the home, office, car, store, or practically any place that has a Wi-Fi connection. Known as ubiquitous computing, the reach of interconnected devices is widespread and ever expanding, providing opportunities for ground-breaking new services that improve safety, security, reliability, and convenience. But perhaps unsurprisingly, the growth of ubiquitous computing and network connections also creates new vulnerabilities... [Read More]
by RSS Fortinet  |  May 18, 2016  |  Filed in: Industry Trends
Market analysts estimate that by 2020 each person will own 26 IP-enabled devices, and over 50 billion IoT devices will come online. Each of these will need to transmit and receive data, run applications, perform transactions, and access services. At the same time, the line between our private and our public lives, including our work lives, will continue to blur. Because the network is the nexus point for this convergence, network borders are becoming increasingly porous, data it needs to process is growing exponentially, and the corporate network... [Read More]
by RSS Bill McGee  |  May 11, 2016  |  Filed in: Industry Trends
Networks are evolving rapidly. The proliferation of devices, users, applications, and services has made the network edge more porous, while at the same time expanding the attack surface. And these remote devices and applications are now commonly accessing data center resources in a way unimaginable just a few years ago. Add IoT and Cloud to a highly mobile and distributed network, and you have created the perfect storm for disaster. Security has evolved organically as well. But not in a way that complements the evolution of the network. Instead,... [Read More]
by RSS Bill McGee  |  May 02, 2016  |  Filed in: Industry Trends
This week Fortinet announced even more advances to our award-winning, ICSA-certified Advanced Threat Protection solution – because, apparently, awesome simply wasn’t good enough. What is Advanced Threat Protection? The unprecedented growth of devices, users, applications, transactions, and services passing through the increasingly distributed corporate infrastructure is transforming networks. And much of this data is highly prized by the cybercriminal community as it often includes confidential and sensitive information, customer... [Read More]
by RSS David Finger  |  Apr 25, 2016  |  Filed in: Industry Trends
Organizations are undergoing dramatic change, driven by their transformation to a digital business model and the resulting exponential increase in data, devices, users, applications, and transactions flooding their networks through the cloud. Managing, processing, and servicing this information is business critical, and it is putting a huge strain on budgets and IT resources. Of course, changes like this also exponentially expand the attack surface that needs to be protected. There are more targets than ever, and cybercriminals are developing... [Read More]
by RSS Bill McGee  |  Apr 25, 2016  |  Filed in: Industry Trends