cloud


In the intensifying rush to develop and deploy network security strategies that can handle the drastic increase of today’s cyberthreats, I fear that many organizations are falling into a trap that is already having far-ranging consequences. Rather than approaching the admittedly intense challenges of security with the methodical approach and longview perspective of managers of complex data centers, they are behaving like harried consumers—reactively buying a specific, standalone solution to tamp down a challenge or crisis as it emerges. [Read More]
by RSS Michael Xie  |  Feb 12, 2018  |  Filed in: Industry Trends
The successful rollout of icare’s new cloud-based business model can be attributed to Fortinet’s proactive account management, our technical expertise and our wide range of security solutions certified for AWS environments. [Read More]
by RSS John Maddison  |  Jan 23, 2018  |  Filed in: Business and Technology
While organizations are adopting new technologies and services, cybercriminals are developing sophisticated methods of attack to target new attack vectors, exploit unforeseen vulnerabilities, and gain access to user data and other network resources. With this increased threat landscape and growing sophistication of cyberattacks, visibility into existing security measures, and identifying those places where there may be gaps is especially important. [Read More]
by RSS Carl Cayton  |  Jan 10, 2018  |  Filed in: Business and Technology, Industry Trends
Hyperconverged systems are on the horizon, connecting new and existing environments in ways we may have never imagined. But careful planning can ensure that we make this transition smoothly and securely. It starts with insisting on open standards and integrated and interactive security systems designed to talk to each other, share information, identify and adapt to changes, and respond to events in a coordinated and collaborative fashion. [Read More]
by RSS Jonathan Nguyen-Duy  |  Jan 09, 2018  |  Filed in: Industry Trends
2017 was another landmark year for cybersecurity. In reviewing our quarterly Threat Landscape reports, it is clear that 2017 has been notable primarily for three things: the rapid digital transformation and expansion of the potential attack surface, the increasing sophistication of cyber attacks, and a lapse in basic cybersecurity hygiene, largely being driven by digital transformation coupled with the growing cybersecurity skills gap. [Read More]
by RSS John Maddison  |  Dec 29, 2017  |  Filed in: Industry Trends
As global cyberattacks persist, cybersecurity is becoming a main focus in the C-suite. Gone are the days where it’s just a concern for IT teams. These rapid, sophisticated attacks across industries have demonstrated that cybersecurity is the responsibility of the entire organization as they seek to avoid the crippling effects associated with data breaches. [Read More]
by RSS Drew Del Matto  |  Dec 26, 2017  |  Filed in: Industry Trends
At the end of the day, complying with GDPR may very well simply turn out to be the right thing to do to protect the privacy and interests of all of an organization’s stakeholder communities. As a society, we simply can’t go on shrugging off data breaches that harm millions of people, often on multiple occasions in their lifetime. [Read More]
by RSS Patrick Grillo  |  Dec 08, 2017  |  Filed in: Business and Technology, Industry Trends
To keep up with this threat landscape, your customers’ IT teams require security solutions that can provide real-time visibility into network activity and regulatory compliance, as well as automatically initiate a response to security events, to increase the overall efficiency of IT management teams. In order to effectively manage network security, compliance, and performance, your customers should consider implementing a SIEM (security information and event management) solution that features automation, scalability, and actionable intelligence [Read More]
by RSS Lief Koepsel  |  Dec 06, 2017  |  Filed in: Business and Technology, Industry Trends
In general, if a cybercriminal is able to successfully launch an attack at an owner-operated IT infrastructure, they can also launch one at a cloud service provider. In fact, public cloud services have become highly attractive targets for cybercriminals. For them, breaking into a cloud service is like merging onto a superhighway that can deliver their little bundles of evil far and wide, potentially impacting hundreds or thousands of organizations with a single strike. [Read More]
by RSS Jeannette Jarvis  |  Dec 04, 2017  |  Filed in: Industry Trends
Securing the entire distributed infrastructure using single set of integrated security protocols and complementary policies require a Security Fabric approach built around interconnected security tools. Such an integrated fabric is able to span the entire network, and then dynamically adapt as network infrastructures adjust to meet changing data and workload needs. And it needs to do all of this at the speed of digital business.  [Read More]
by RSS Ken Xie  |  Nov 30, 2017  |  Filed in: Business and Technology, Industry Trends