ips | Page 2


Angler/Flash 0-day FAQ Version 1.1 - Friday, January 23 15:45PST This document will be updated and maintained as new or updated information becomes available. Continue to check this page for updates.   What is Angler? The Angler Exploit Kit (EK) is a toolkit used by malware authors and cybercriminals to deliver other pieces of malware. Typically these exploit kits are used in compromised websites that victims are guided to through links and phishing emails in order to infect victims.  What has happened? Noted malware... [Read More]
by RSS Richard Henderson  |  Jan 22, 2015  |  Filed in: Industry Trends
In this entry of the layered security series, we look at layer 3, the network layer. The network layer Network layer security focuses on external threats that are able to bypass the firewall layer. Your FortiGate has two main features that deal with these threats: the Intrusion Prevention System (IPS) and Denial of Service (DoS) protection. What are IPS and DoS protection? IPS protects your network by actively seeking and blocking external threats before they can reach your network devices. These attacks are able to bypass the firewall because... [Read More]
by RSS Victoria Martin  |  Nov 22, 2014  |  Filed in: Security Q & A
If you're a small to mid-size Enterprise, you have seen the headlines about increasingly advanced, and targeted, attacks but you may not be sure how to protect your network and data. Or you might be thinking you're too small to attract targeted attacks. Or even if you may be a target you think you can't afford to deploy Next Generation Firewalls. Today, Fortinet announced the availability of the new FortiGate-300D and 500D. These new models extend our top-rated NGFW line, setting a new level in affordability and threat protection with 5x Next Generation... [Read More]
by RSS Tamir Hardof  |  Jul 09, 2014  |  Filed in: Industry Trends
What's going on? Over the past weekend information became available about a previously-unknown vulnerability in all modern versions of Microsoft's Internet Explorer browser that allow an attacker to remotely execute code without the victim's permission. This can lead to compromise of your system and various malware to be installed. The exploit leverages a technique often used by attackers via Adobe Flash to bypass certain features of IE that are designed to prevent remote code execution (RCE). Why is this a big deal? This vulnerability (which... [Read More]
by RSS Richard Henderson  |  Apr 28, 2014  |  Filed in: Industry Trends
All too often, cyber space seems a vast and unregulated "Wild West," where anarchy is the norm and criminal justice remains by-and-large a concept rarely enforced. What's more, the Internet cloaks cybercriminals under a blanket of anonymity, where they have the ability to take down international governments and large-scale corporations at the touch of a button from any where in the world. It's no secret that the "lawless" nature of cyberspace has become an accepted status-quo - so much so that high-profile cybercrime, international privacy breaches... [Read More]
by RSS Stefanie Hoffman  |  Jan 30, 2014  |  Filed in: Business and Technology
Intrusion prevention system, or IPS, is like the secret ingredient in a favorite recipe -- it is rarely consumed by itself, but most security suites and Unified Threat Management devices wouldn't be considered complete without it. In fact, it's often taken for granted. IPS is a vital component of any comprehensive security solution and a necessary part of a compliance-driven environment. And while it is one of the most traditional security solutions on the market, its features continue to evolve to tackle a maelstrom of modern attacks. Essentially... [Read More]
by RSS Stefanie Hoffman  |  Nov 13, 2013  |  Filed in:
Once upon a time, Unified Threat Management (UTM) devices were perceived as a simple and relatively basic security tool created to pacify fundamental requirements for mid-sized enterprises and SMBs. And while that more or less remains true, UTMs have also undeniably evolved to meet the growing demands of an increasingly diverse and nuanced market. No doubt Unified Threat Management, or UTM, devices still have a strong and viable presence in the SMB. That said, it should come as little surprise that the same characteristics that generate higher... [Read More]
by RSS Stefanie Hoffman  |  Aug 07, 2013  |  Filed in:
(This is a continuation from last week, in which we discussed the distinction between big data and security and how they intersect. ) Most know that the there is often a big disparity between theory and reality. And nowhere is that more evident than when big data and security solutions conflict. In fact, big data concepts often translate to challenges when given practical applications. Let’s look at a few examples provided by Ryan Potter, Fortinet director of security strategy. The Challenges of Security Information and Event Management (SIEM) Starting... [Read More]
by RSS Stefanie Hoffman  |  Dec 11, 2012  |  Filed in: Industry Trends
[Read More]
by RSS Rick Popko  |  Aug 18, 2010  |  Filed in: Security Research