firewalls


We have seen from the previous two posts on cybersecurity and AI the importance of using advanced technology to stay ahead of cybercriminals. But far too often, a threat transcends the capacity of one particular box, especially when it has been deployed in a discrete place in the network and has been functionally isolated from the rest of the network and other security devices. This is where Fortinet’s innovations around collaboration are paramount. Regardless of the physical location of a doiscovered security event, FortiGuard Labs teams... [Read More]
by RSS Jack Chan  |  Sep 17, 2017  |  Filed in: Industry Trends
As cyberattacks become more frequent and impactful, security teams and executives across industries are taking notice. With new strains of malware being constantly reported, organizations want to make sure that their security solutions, and the vendors that provide them, are adapting to defend against this new normal. To ensure they have the capability to deal with these constantly evolving attacks, customers are turning to you, their solution providers, to answer their questions and ensure there is a structured strategy in place to deal with... [Read More]
by RSS Joseph Sykora  |  Sep 05, 2017  |  Filed in: Industry Trends
Malware has been known to use new and innovative ways to evade detection by Antivirus software, a phenomenon AV analysts have often seen with PC malware. Not a lot of examples of the same have been seen employed by mobile malware. A recently discovered Android malware has brought to light one such Antivirus evasion technique with its use of "a legitimate firewall to thwart security software". The legitimate firewall referred to is iptables which is a well-known "administration tool for IPv4 packet filtering and NAT" on... [Read More]
by RSS Ruchna Nigam  |  Jan 21, 2016  |  Filed in: Security Research
When I was "the tech guy" (and a math and science teacher and the Drama Club Advisor) at our local high school, I often said that if our students devoted as much time to their studies as they did to trying to bypass our content filter, we'd have a bunch of Rhodes Scholars. It only got worse when I made the mistake of getting into administration as the district's first technology director. Not only did I dramatically increase bandwidth at all of our schools, making the Internet a much more attractive place to look for trouble, but... [Read More]
by RSS Chris Dawson  |  Dec 11, 2015  |  Filed in: Industry Trends
I was recently made aware of a thread on a competitors forum that asked for "honest" advice on whether they should abandon their current firewall technology and adopt FortiGate firewalls instead. The vendor "X" in question was one that I have previously held a close relationship; so I have unique insight into the relative strengths and weakness of both technologies. For reasons of not wanting my door kicked down by the lawyers of two major networking companies, I held my tongue and didn't engage in the conversation. However, this thread led me to... [Read More]
by RSS Glen Kemp  |  May 26, 2014  |  Filed in: Business and Technology
Deutsche Telekom's interactive, real-time map of global cyberattacks reveals the bulk of recent attacks -- 27.3 million in February alone -- were against the Server Message Block (SMB), aka the Common Internet File System (CIFS). Reuven Harrison, CTO and co-founder of Tufin, a security and lifecycle management company and Fortinet solution partner, wrote in a blog that the map's revelations are significant. This attack vector, he explains, operates across an application-layer network protocol mainly used to provide shared access to files, printers,... [Read More]
by RSS Stefanie Hoffman  |  Jul 30, 2012  |  Filed in: Industry Trends