fortinet | Page 4


With over 12 million downloads, Photo Gallery is one of the most popular WordPress plugins; users should be sure to upgrade to the latest version. FortiGuard Labs disclosed a vulnerability today in the WordPress Photo Gallery plugin that could potentially be used to gather information from system administrators. With over 100,000 active installations and robust photo management and editing tools, this particular cross-site scripting vulnerability has significant security implications across the many retail, media, and other WordPress-driven websites... [Read More]
by RSS Aamir Lakhani  |  Mar 20, 2015  |  Filed in: Security Research
As sales and marketing teams continue to search for that secret sauce of engagement in the buying cycle, one thing remains clear, the need for building relationships that lead to closed deals. Whether you’re selling the newest greatest line of latte’s or Next Gen Firewalls in the enterprise, buyers want an experience that has nothing to do with speeds and feeds. Our marketing team got a few minutes with Gartner VP and Distinguished Analyst, Tiffani Bova at the Fortinet Sales Kick Off in Fort Lauderdale, Florida for some interesting... [Read More]
by RSS Luanne Tierney  |  Jan 21, 2015  |  Filed in: Industry Trends
Just about everyone has a firewall of some sort. But does it really need to be “next gen”? Gartner and other industry analysts have made a lot of the “Next Generation Firewall” market, or NGFW for short. It isn’t just hype, though. Threats faced by organizations of all sizes as we head into 2015 are so sophisticated, varied, and, most importantly, dangerous, that traditional firewalls are simply inadequate to protect users and networked resources. The next gen firewall addresses both emerging threats and more common attacks without bogging... [Read More]
by RSS Chris Dawson  |  Dec 12, 2014  |  Filed in: Industry Trends
A recent Lightspeed GMI/Fortinet found that IT decision makers are under increasing pressure from the boardroom to secure the enterprise. The pressure, along with a host of new security threats, means they have some real challenges ahead. The 2014 Fortinet Security Census, recently conducted by Lightspeed GMI, surveyed 1610 IT decision makers (ITDMs) from a range of large companies in 15 countries around the world. There is a lot to unpack from the survey that dove into perceptions of enterprise security challenges, but the bottom line is that... [Read More]
by RSS Chris Dawson  |  Oct 20, 2014  |  Filed in: Industry Trends
It's time for part two of our look at firewalls, as we continue our series on layered security. The first part can be found here. Firewall Policies: How to Build a Better Policy As networks become more advanced, so do the demands placed upon your firewall. As such, it is equally important to know how to make a firewall policy work, and to make it work well. Improve Your Design Just because a firewall policy works doesn't mean that it's design is perfect. Since firewalls play such a key role in keeping your network secure, it's important to... [Read More]
by RSS Victoria Martin  |  Jul 11, 2014  |  Filed in: Security Q & A
"None of us is as good as all of us." This quote, attributed to Ray Kroc, co-founder of McDonald's, is echoed in many management and leadership success stories. It was the foundation to his business philosophy that not only transformed the fast food industry, but redefined enterprise teamwork and collaboration. And today, it embodies our efforts to stop cybercrime. In the news today, Fortinet and Palo Alto Networks announced the development of a jointly founded, cyber defense consortium (www.cyberconsortium.org), whose mission is to drive a coordinated... [Read More]
by RSS UnAttributed  |  May 30, 2014  |  Filed in: Industry Trends
Now that we've had a look at layered security, it's time to talk about each layer individually to figure out the steps you should take to secure your network. First and foremost is the DNS layer, the first "wall" of security that protects your network from attacks. DNS 101 Domain Name System (DNS) is used like a phonebook to help your computer find websites by translating a domain name to a website's IP address. For example, the domain name www.fortinet.com is translated to the IP address 66.171.121.34, which lets your computer successfully... [Read More]
by RSS Victoria Martin  |  Mar 03, 2014  |  Filed in: Security Q & A
Your FortiGate has just arrived. You've taken it out of its box and connected it to your network. All you need to do now is configure it to protect your network, which raises some questions: what features should you use, how should you use them, and most importantly, why? Before we get into the specifics, let's take a quick look at Fortinet's role layered security and how it can protect you. What is Layered Security? Layered security combines multiple security measures to make sure that you don't have all your security eggs in one basket. This... [Read More]
by RSS Victoria Martin  |  Jan 14, 2014  |  Filed in: Security Q & A
With the end of the year coming around, 'tis the season for threat predictions. Today, our very own Derek Manky spoke with Network World's Keith Shaw about Fortinet's take on what is to come for 2014. There is definitely a lot of talk about the ever looming threat and sleuth of the modern day botnet, new and ever-changing Android malwares, and the advent of ransomware on mobile devices. For more, see the interview for you self: For more follow the following links - Fortinet's 2014 Threat Predictions - A Day in the Life of a Mobile Ransomware -... [Read More]
by RSS Michael Perna  |  Dec 17, 2013  |  Filed in: Industry Trends
(This is a continuation from last week, in which we discussed the distinction between big data and security and how they intersect. ) Most know that the there is often a big disparity between theory and reality. And nowhere is that more evident than when big data and security solutions conflict. In fact, big data concepts often translate to challenges when given practical applications. Let’s look at a few examples provided by Ryan Potter, Fortinet director of security strategy. The Challenges of Security Information and Event Management (SIEM) Starting... [Read More]
by RSS Stefanie Hoffman  |  Dec 11, 2012  |  Filed in: Industry Trends