Security Q & A | Page 4


The Government of Canada selected Fortinet to secure its IT infrastructure. Fortinet's Andy Travers shares some perspective on the unique security requirements of government agencies.    Fortinet has a longstanding history of working with the Canadian market. What is unique about Fortinet’s approach that has made it become a security partner of choice for businesses and agencies across the country?  First of all, Fortinet has a proud Canadian heritage. Significant elements of our product development, our... [Read More]
by RSS Darlene Gannon  |  Aug 17, 2016  |  Filed in: Industry Trends, Security Q & A
Editor’s note: We have been running a regular series highlighting Fortinet’s technology innovations, called Innovation Insights. Today’s blog begins a new set within our Innovation series highlighting Fortinet’s leadership team. Ken Xie is the founder and CEO of Fortinet. He is a network security visionary and an established and successful business leader, having founded several companies in his career. Ken has steered Fortinet from its founding sixteen years ago, and successful IPO in 2009, to become a billion dollar... [Read More]
by RSS Bill McGee  |  Aug 12, 2016  |  Filed in: Security Q & A
Fortinet’s Derek Manky offers some perspective on Fortinet’s most recent cooperative information sharing agreement and what this means for the future of global cyber threat intelligence.   What did Fortinet announce with KISA today? Fortinet took another important step in an effort to bolster the future of cybersecurity. We signed an agreement with KISA to formalize cybersecurity information sharing, in particular on cyber threats. This partnership is an excellent example of a call to action for intelligence collaboration... [Read More]
by RSS John Welton  |  Aug 09, 2016  |  Filed in: Business and Technology, Security Q & A
Cybercrime has no borders and the best way to combat the creativity and negative impact of adversaries is partnership based on actionable intelligence from wide and diverse sources. Derek Manky, Global Security Strategist at Fortinet, talks about the successful information cooperation between Fortinet and INTERPOL and also his thoughts on the importance of cybersecurity information sharing in general today. What did Fortinet announce today? Essentially our threat data helped the authorities effectively catch a global cyber criminal gang. What... [Read More]
by RSS John Welton  |  Jul 29, 2016  |  Filed in: Business and Technology, Security Q & A
This is part two of our look at the User layer, which focuses on user authentication. If you missed it, make sure to read part 1 to find about how you can protect your network from your users’ own actions. Also, you can catch up on the entire Layered Security series by either reading my past blog posts or checking out the PDF version, which will be updated to include the User Layer soon. The User Layer: Part 2 Last time we talked about user education, as well as a range of FortiOS security features that you can use to protect... [Read More]
by RSS Victoria Martin  |  Aug 24, 2015  |  Filed in: Security Q & A
We've now reached the User layer in our Layered Security series. This article is part one of two, because there's a lot going on with this layer. If you haven’t been following this series, you can catch up by using the link above or by checking out the PDF version, which contains all previous articles.   The User Layer (Part 1) We’ve finally reached the user layer, which in many ways is the most important and also the most difficult. As mentioned before, 80-90% of the threats to your network can come... [Read More]
by RSS Victoria Martin  |  Apr 18, 2015  |  Filed in: Security Q & A
Next up in the Layered Security series is the Device layer. If you haven’t been following this series, you can catch up by either reading my other blog posts (using the link above), or by checking out the PDF version, which contains all articles that have been written up to this point. The Device Layer While wired networks certainly have their own challenges (many of the precautions here are applicable to wired devices), it is wireless that really changed this layer’s landscape. The biggest change that came with wireless... [Read More]
by RSS Victoria Martin  |  Jan 28, 2015  |  Filed in: Security Q & A
In this entry of the layered security series, we look at layer 3, the network layer. The network layer Network layer security focuses on external threats that are able to bypass the firewall layer. Your FortiGate has two main features that deal with these threats: the Intrusion Prevention System (IPS) and Denial of Service (DoS) protection. What are IPS and DoS protection? IPS protects your network by actively seeking and blocking external threats before they can reach your network devices. These attacks are able to bypass the firewall because... [Read More]
by RSS Victoria Martin  |  Nov 22, 2014  |  Filed in: Security Q & A
It's time for part two of our look at firewalls, as we continue our series on layered security. The first part can be found here. Firewall Policies: How to Build a Better Policy As networks become more advanced, so do the demands placed upon your firewall. As such, it is equally important to know how to make a firewall policy work, and to make it work well. Improve Your Design Just because a firewall policy works doesn't mean that it's design is perfect. Since firewalls play such a key role in keeping your network secure, it's important to... [Read More]
by RSS Victoria Martin  |  Jul 11, 2014  |  Filed in: Security Q & A
Web Filtering is one of your first lines of network defense, preventing known threats from reaching your network so your other security features can handle the unknown threats, and preventing users from accessing content that could be distracting, a drain on bandwidth, or a liability risk. Below is a collection of videos to introduce you to Web Filtering, using FortiOS 5.0. User-specific Web Filtering This video introduces you to the concept of web filtering, and provides an example of how it can be used to grant or limit access based on user... [Read More]
by RSS Jonah Davidson  |  May 08, 2014  |  Filed in: Security Q & A