fortinet | Page 3


Your FortiGate has just arrived. You've taken it out of its box and connected it to your network. All you need to do now is configure it to protect your network, which raises some questions: what features should you use, how should you use them, and most importantly, why? Before we get into the specifics, let's take a quick look at Fortinet's role layered security and how it can protect you. What is Layered Security? Layered security combines multiple security measures to make sure that you don't have all your security eggs in one basket. This... [Read More]
by RSS Victoria Martin  |  Jan 14, 2014  |  Filed in: Security Q & A
With the end of the year coming around, 'tis the season for threat predictions. Today, our very own Derek Manky spoke with Network World's Keith Shaw about Fortinet's take on what is to come for 2014. There is definitely a lot of talk about the ever looming threat and sleuth of the modern day botnet, new and ever-changing Android malwares, and the advent of ransomware on mobile devices. For more, see the interview for you self: For more follow the following links - Fortinet's 2014 Threat Predictions - A Day in the Life of a Mobile Ransomware -... [Read More]
by RSS Michael Perna  |  Dec 17, 2013  |  Filed in: Industry Trends & News
(This is a continuation from last week, in which we discussed the distinction between big data and security and how they intersect. ) Most know that the there is often a big disparity between theory and reality. And nowhere is that more evident than when big data and security solutions conflict. In fact, big data concepts often translate to challenges when given practical applications. Let’s look at a few examples provided by Ryan Potter, Fortinet director of security strategy. The Challenges of Security Information and Event Management (SIEM) Starting... [Read More]
by RSS Stefanie Hoffman  |  Dec 11, 2012  |  Filed in: Industry Trends & News
In the following video, IT-Harvest's Richard Stiennon interviews John Maddison, Fortinet's vice president of marketing on how Fortinet views itself in the security market. Topics covered include network security performance, the depth and breadth of the company's product line and the company's technology innovation. [Read More]
by RSS Rick Popko  |  Jul 30, 2012  |  Filed in: Industry Trends & News
In this monthly video series focusing on the latest digital security threats, Keith Shaw and Fortinet's Derek Manky discuss the recent Twitter hack on the Associated Press, the Spamhaus arrests and DNS amplification, and the latest Android hacks. [Read More]
by RSS Rick Popko  |  Jul 30, 2012  |  Filed in: Industry Trends & News
It’s a fact: Today’s threats have made the threats of yesterday a vision in the rear-view mirror, along with the security counterparts developed to tackle them. It’s also quite known that the legacy firewall is easily circumvented by modern threats. For example, botnets frequently communicate over common ports like HTTP to do their dirty work – sending stolen information and receiving tasks to carry out. Thus, one could deduce that TCP port 80 is a security threat and, on the strongest countermeasure, should be blocked. However, in today's... [Read More]
by RSS Derek Manky  |  Apr 12, 2011  |  Filed in: Security Research
In the September edition of Security Minute with Fortinet, researcher Derek Manky talks about the most prevalent threats and threat trends plaguing the internet over the last 30 days, including the latest Twitter worm, Zeus and Zitmo, various software vulnerabilities, and the "Here You Have" virus. [Read More]
by RSS Rick Popko  |  Sep 30, 2010  |  Filed in: Security Research
As a follow-up to my earlier blog post on the subject of Trend Micro's history of patent aggression, there are a couple recent developments worth noting: First, on September 16, the United States Patent and Trademark Office (US PTO) issued a formal order granting Fortinet's petition to re-examine the validity of Trend Micro's patent on antivirus functionality, the 5,623,600 patent, stating that a “substantial new question of patentability” exists with respect to the patent based on prior art currently being considered by the US PTO. Second,... [Read More]
by RSS Patrick Bedwell  |  Sep 23, 2010  |  Filed in: Security Research
[Read More]
by RSS Rick Popko  |  May 12, 2010  |  Filed in: Security Research
When it comes to antivirus, how much coverage do you need? Everyone has different concerns when it comes to antivirus coverage. Some people want to circle the wagons and let very little into their networks, while others need some basic protection but prefer speed, speed and more speed. In this article I'll discuss the new antivirus features in the FortiOS 4.0 MR2 for the FortiGate family and how your device can be configured for your preferred level of coverage versus performance. Malware Lifecycles All malware have a life cycle. Some are like... [Read More]
by RSS Jeff Crawford  |  Apr 05, 2010  |  Filed in: Security Research