ips


In meeting with large financial institutions, the single biggest thing we keep hearing about is the need to simplify and consolidate their security infrastructure. As Financial Services has evolved from person-to-person transactions to a fully digital business model, the industry’s networks have evolved as well, become increasingly complex and more difficult to defend. During this evolution, as new threats have emerged, financial organizations have gone out and purchased a host of different security products, often from different vendors,... [Read More]
by RSS Bart Richards  |  Jan 23, 2017  |  Filed in: Industry Trends & News
NSS Labs 2016 NGIPS Group Testing Fortinet is highly committed to the public testing of its products and solutions because it helps us to continuously improve our products and provide the best technology to our customers. We participate in dozens of tests across a spectrum of labs and approaches.  In the most recent NSS Labs Next-Generation Intrusion Prevention System (IPS) group test, Fortinet received an almost perfect score with an overall rating of 99.6%. However, during testing an issue was identified that resulted in an evasion... [Read More]
by RSS John Maddison  |  Oct 13, 2016  |  Filed in: Industry Trends & News
The Show Floor I’m always interested to walk the show floor the first day of a conference to get a sense of what the vendor community has decided is important. The show floor at Black Hat is especially interesting, because while most of the vendors are responding to the security demands of their customers, just upstairs researchers are demonstrating the next generation of threats that haven’t yet, for the most part, been addressed. A quick walk around the floor shows two major trends. The big bets vendors are making are cloud security... [Read More]
by RSS Bill McGee  |  Aug 04, 2016  |  Filed in: Industry Trends & News
Last week, FortiGuard Labs announced a remote denial of service vulnerability in the Teradata Gateway and Teradata Express. Teradata is a leading provider of big data solutions including business intelligence, data warehousing, CRM, and more. Many high-profile global enterprises use Teradata and the vulnerability could be used for corporate espionage or to to draw attention away from other malicious actions such as exfiltrating data and compromising other systems. Because this vulnerability does not require an attacker to be authenticated, it... [Read More]
by RSS Anthony Giandomenico  |  Jul 23, 2015  |  Filed in: Security Research
As our networks evolve and perimeter protection becomes just one of many necessary layers of security, organizations are turning to next generation intrusion prevention systems (NGIPS) to lock down networks from the edge to the core. The next generation firewall (NGFW) revolutionized network security by incorporating a variety of critical functions into a single, easy to manage appliance. For vendors who found the secret sauce of high-performance hardware, optimized software, and powerful threat intelligence mechanisms, NGFWs were a real leap... [Read More]
by RSS John Maddison  |  Apr 21, 2015  |  Filed in: Industry Trends & News
Angler/Flash 0-day FAQ Version 1.1 - Friday, January 23 15:45PST This document will be updated and maintained as new or updated information becomes available. Continue to check this page for updates.   What is Angler? The Angler Exploit Kit (EK) is a toolkit used by malware authors and cybercriminals to deliver other pieces of malware. Typically these exploit kits are used in compromised websites that victims are guided to through links and phishing emails in order to infect victims.  What has happened? Noted malware... [Read More]
by RSS Richard Henderson  |  Jan 22, 2015  |  Filed in: Industry Trends & News
In this entry of the layered security series, we look at layer 3, the network layer. The network layer Network layer security focuses on external threats that are able to bypass the firewall layer. Your FortiGate has two main features that deal with these threats: the Intrusion Prevention System (IPS) and Denial of Service (DoS) protection. What are IPS and DoS protection? IPS protects your network by actively seeking and blocking external threats before they can reach your network devices. These attacks are able to bypass the firewall because... [Read More]
by RSS Victoria Martin  |  Nov 22, 2014  |  Filed in: Security Q & A
If you're a small to mid-size Enterprise, you have seen the headlines about increasingly advanced, and targeted, attacks but you may not be sure how to protect your network and data. Or you might be thinking you're too small to attract targeted attacks. Or even if you may be a target you think you can't afford to deploy Next Generation Firewalls. Today, Fortinet announced the availability of the new FortiGate-300D and 500D. These new models extend our top-rated NGFW line, setting a new level in affordability and threat protection with 5x Next Generation... [Read More]
by RSS Tamir Hardof  |  Jul 09, 2014  |  Filed in: Industry Trends & News
What's going on? Over the past weekend information became available about a previously-unknown vulnerability in all modern versions of Microsoft's Internet Explorer browser that allow an attacker to remotely execute code without the victim's permission. This can lead to compromise of your system and various malware to be installed. The exploit leverages a technique often used by attackers via Adobe Flash to bypass certain features of IE that are designed to prevent remote code execution (RCE). Why is this a big deal? This vulnerability (which... [Read More]
by RSS Richard Henderson  |  Apr 28, 2014  |  Filed in: Industry Trends & News
All too often, cyber space seems a vast and unregulated "Wild West," where anarchy is the norm and criminal justice remains by-and-large a concept rarely enforced. What's more, the Internet cloaks cybercriminals under a blanket of anonymity, where they have the ability to take down international governments and large-scale corporations at the touch of a button from any where in the world. It's no secret that the "lawless" nature of cyberspace has become an accepted status-quo - so much so that high-profile cybercrime, international privacy breaches... [Read More]
by RSS Stefanie Hoffman  |  Jan 30, 2014  |  Filed in: Behind the Firewall