FortiSandbox


Although the calendar year is winding down, Fortinet and partners continue to sharpen security practitioner skills through training, along with applying Fortinet products and services to meet current and evolving cyber security challenges. As Fortinet advances on the knowledge and solutions fronts, independent industry observers increasingly recognize Fortinet’s industry leadership credentials. Read more below for the latest news, resources, and events for partners. [Read More]
by RSS Kate Rees  |  Nov 09, 2017  |  Filed in: Business and Technology
The growing complexity of today’s networks and the growing sophistication of today’s threats has outpaced the ability of most traditional security devices to keep up. Until now, the approach of far too many IT teams has been to simply throw more money at the problem by adding yet another device into their security wiring closet. Billions have been spent on this approach every year for decades, and we really don’t have much to show for it. If cybersecurity is an arms race, the good guys aren’t winning. Instead, security... [Read More]
by RSS Aamir Lakhani  |  Nov 06, 2017  |  Filed in: Industry Trends
Fortinet participated in the NSS Labs 2017 Breach Detection System (BDS) group test and was awarded a Recommended rating for its latest FortiSandbox 2000E appliance introduced in the second half of 2017. [Read More]
by RSS Damien Lim  |  Nov 01, 2017  |  Filed in: Business and Technology
On October 16th, the U.S. Department of Homeland Security (DHS) announced its intention to have all federal agencies revamp their email security protocol. The Binding Operational Directive (BOD-18-01) will require all federal agencies to deploy STARTTLS, Secure Policy Framework (SPF), Domain Keys Identified Mail (DKIM), and Domain-based Message Authentication Reporting and Conformance (DMARC) within three months of the directive’s announcement. While having these email security features enabled is generally considered to be a cybersecurity... [Read More]
by RSS Felipe Fernandez  |  Oct 30, 2017  |  Filed in: Industry Trends
Verizon’s 2017 Data Breach Investigations Report found that two-thirds (66%) of all installed malware that successfully made its way past established defenses were delivered by email.  This is particularly concerning as our weekly FortiGuard Labs Threat Intelligence Brief lists ransomware downloaders –typically delivered via email – as consistently among the top 5 pieces of malware in most weeks. {Update chart and excerpt closer to publication date} The reality is that while brand new attacks like WannaCry and Petya... [Read More]
by RSS David Finger  |  Oct 27, 2017  |  Filed in: Industry Trends
The strong ties between Fortinet and its channel partner community account for much of the value Fortinet delivers to customers, end users, and the world at large. Seeking to increase the amount of news about partner activity and initiatives, we are launching a bi-weekly blog post series. [Read More]
by RSS Amy Thompson  |  Oct 20, 2017  |  Filed in: Business and Technology
Over the last couple of years, cyberattacks have evolved in both scale and effectiveness, affecting organizations across all industries and geographic regions. Successful cyberattacks are a growing industry-wide problem in spite of billions being spent on cybersecurity solutions. Part of the reason is that new techniques- and in fact a mature supporting cybercrime ecosystem- for penetration and evading detection have reduced the effectiveness of many traditional defenses. The lingering effects of a successful attack often have devastating consequences,... [Read More]
by RSS Michael Xie  |  Oct 17, 2017  |  Filed in: Business and Technology
In this blog post we will analyze a couple of Android malware samples in the Android VM of the FortiSandbox. We'll also share a few interesting and useful tricks. Running a sample in the VM To run a given sample in the Android VM, you should log into the FortiSandbox, make sure an Android VM is available, and then "Scan Input" / Submit a New File. Next, if the objective is to run the malware in the sandbox, you must make sure to skip "static scan," "AV scan," and "Cloud Query"... [Read More]
by RSS Axelle Apvrille  |  Aug 17, 2017  |  Filed in: Security Research
We've now reached the User layer in our Layered Security series. This article is part one of two, because there's a lot going on with this layer. If you haven’t been following this series, you can catch up by using the link above or by checking out the PDF version, which contains all previous articles.   The User Layer (Part 1) We’ve finally reached the user layer, which in many ways is the most important and also the most difficult. As mentioned before, 80-90% of the threats to your network can come... [Read More]
by RSS Victoria Martin  |  Apr 18, 2015  |  Filed in: Security Q & A
When companies grow, their networks grow with them. What naturally follows is a growth in administration. As a Systems Engineer in the Nordics I meet a lot of quickly growing companies and they have a lot in common when it comes to facing the challenges of their rapid growth. Typically they will have very flat network structures and simple security solutions all managed by a single person or a very small team. These small teams are made up of generalists that need to cover everything including virtual environments, storage, networks, firewalls and... [Read More]
by RSS Nils von Greyerz  |  May 14, 2014  |  Filed in: Industry Trends