ngfw | Page 4


It's that time of year again. Indeed, RSA Conference 2014 is just a few days away and Fortinet has a host of announcements, presentations and social events lined up for the event. First, the basics: Fortinet's booth is #1317, located in the center aisle of Moscone South Hall. That's important to know, because it will be the launching point for myriad of our product demos, presentations and giveaways the week of February 24. Fortinet Booth As always, Fortinet presenters will be on hand at the booth to demonstrate an extensive array of products.... [Read More]
by RSS Stefanie Hoffman  |  Feb 19, 2014  |  Filed in: Industry Trends
A psychologist might tell you that the way a child plays in the sandbox is a reflection of how they will act in their adult life. The same is true for malicious software, though we aren't speaking about the same sandbox. There is a growing concern among security professionals about advanced persistent threats (APTs). The problem is not new, but it is of growing importance. Now, more than ever, highly targeted attacks (often specifically crafted to beat traditional defenses) pose a significant risk to enterprise level organizations. Despite advances... [Read More]
by RSS David Finger  |  Nov 19, 2013  |  Filed in:
In light of new and sophisticated network security technology that stretches from Next Generation Firewalls to Unified Threat Management devices, the blogosphere has turned its attention to the importance and relevancy of an age old technology: the firewall. Opinions undoubtedly run the gamut, with not just a few concluding that firewalls in general are within throwing range of obsolescence. In actuality, nothing could be further from the truth. Firewalls, like anti-virus and spam filters, are esteemed as a cornerstone of any security arsenal -... [Read More]
by RSS Stefanie Hoffman  |  Oct 02, 2013  |  Filed in:
Let's face it, there is a lot of confusion about Next Generation Firewalls and how they differentiate themselves from Unified Threat Management (UTM) devices, secure Web, and email security gateways. The myriad terms used to describe them are often used interchangeably -- and all too often incorrectly. So what exactly is a Next Generation Firewall (NGFW)? Gartner defines a NGFW as an "in-line security control that implements network security policy between networks of different trust levels in real time." If nothing else, a NGFW provides a... [Read More]
by RSS Stefanie Hoffman  |  Aug 21, 2013  |  Filed in:
This solution brief describes how Fortinet's NGFW technology offers identification and control of applications running over your network, an integrated intrusion prevention system (IPS) with deep packet scanning capabilities, and the ability to verify a user or device’s identity and enforce access policies accordingly. Also, this document describes additional technologies that provide you with a real-time ranking of the security risk of devices on your network along with cloud-based threat detection and prevention Download Link: http:... [Read More]
by RSS Rodney Mock  |  Jan 22, 2013  |  Filed in: Industry Trends
Tags: ngfw
In the following video, IT-Harvest's Richard Stiennon interviews John Maddison, Fortinet's vice president of marketing on how Fortinet views itself in the security market. Topics covered include network security performance, the depth and breadth of the company's product line and the company's technology innovation. [Read More]
by RSS Rick Popko  |  Jul 30, 2012  |  Filed in: Industry Trends
It’s a fact: Today’s threats have made the threats of yesterday a vision in the rear-view mirror, along with the security counterparts developed to tackle them. It’s also quite known that the legacy firewall is easily circumvented by modern threats. For example, botnets frequently communicate over common ports like HTTP to do their dirty work – sending stolen information and receiving tasks to carry out. Thus, one could deduce that TCP port 80 is a security threat and, on the strongest countermeasure, should be blocked. However, in today's... [Read More]
by RSS Derek Manky  |  Apr 12, 2011  |  Filed in: Security Research