fortinet | Page 5


(This is a continuation from last week, in which we discussed the distinction between big data and security and how they intersect. ) Most know that the there is often a big disparity between theory and reality. And nowhere is that more evident than when big data and security solutions conflict. In fact, big data concepts often translate to challenges when given practical applications. Let’s look at a few examples provided by Ryan Potter, Fortinet director of security strategy. The Challenges of Security Information and Event Management (SIEM) Starting... [Read More]
by RSS Stefanie Hoffman  |  Dec 11, 2012  |  Filed in: Industry Trends
In the following video, IT-Harvest's Richard Stiennon interviews John Maddison, Fortinet's vice president of marketing on how Fortinet views itself in the security market. Topics covered include network security performance, the depth and breadth of the company's product line and the company's technology innovation. [Read More]
by RSS Rick Popko  |  Jul 30, 2012  |  Filed in: Industry Trends
In this monthly video series focusing on the latest digital security threats, Keith Shaw and Fortinet's Derek Manky discuss the recent Twitter hack on the Associated Press, the Spamhaus arrests and DNS amplification, and the latest Android hacks. [Read More]
by RSS Rick Popko  |  Jul 30, 2012  |  Filed in: Industry Trends
It’s a fact: Today’s threats have made the threats of yesterday a vision in the rear-view mirror, along with the security counterparts developed to tackle them. It’s also quite known that the legacy firewall is easily circumvented by modern threats. For example, botnets frequently communicate over common ports like HTTP to do their dirty work – sending stolen information and receiving tasks to carry out. Thus, one could deduce that TCP port 80 is a security threat and, on the strongest countermeasure, should be blocked. However, in today's... [Read More]
by RSS Derek Manky  |  Apr 12, 2011  |  Filed in: Security Research
In the September edition of Security Minute with Fortinet, researcher Derek Manky talks about the most prevalent threats and threat trends plaguing the internet over the last 30 days, including the latest Twitter worm, Zeus and Zitmo, various software vulnerabilities, and the "Here You Have" virus. [Read More]
by RSS Rick Popko  |  Sep 30, 2010  |  Filed in: Security Research
As a follow-up to my earlier blog post on the subject of Trend Micro's history of patent aggression, there are a couple recent developments worth noting: First, on September 16, the United States Patent and Trademark Office (US PTO) issued a formal order granting Fortinet's petition to re-examine the validity of Trend Micro's patent on antivirus functionality, the 5,623,600 patent, stating that a “substantial new question of patentability” exists with respect to the patent based on prior art currently being considered by the US PTO. Second,... [Read More]
by RSS Patrick Bedwell  |  Sep 23, 2010  |  Filed in: Security Research
[Read More]
by RSS Rick Popko  |  May 12, 2010  |  Filed in: Security Research
When it comes to antivirus, how much coverage do you need? Everyone has different concerns when it comes to antivirus coverage. Some people want to circle the wagons and let very little into their networks, while others need some basic protection but prefer speed, speed and more speed. In this article I'll discuss the new antivirus features in the FortiOS 4.0 MR2 for the FortiGate family and how your device can be configured for your preferred level of coverage versus performance. Malware Lifecycles All malware have a life cycle. Some are like... [Read More]
by RSS Jeff Crawford  |  Apr 05, 2010  |  Filed in: Security Research
Today was another big milestone in the history of the company I co-founded and I'm very happy to have this opportunity to tell you about it. Fortinet has released FortiOS 4.0, the firmware upgrade for our FortiGate security systems. This release is the result of a tremendous effort by our development teams over the better part of 12+ months. These highly skilled and talented teams worked hard to design and implement these technology innovations so that we could confidently put the product in front of our customers. Even in this time of economic... [Read More]
by RSS Michael Xie  |  Mar 03, 2009  |  Filed in: Security Research