network security


Across industries, your customers are embracing BYOD and BYOA for the many benefits they have been shown to bring in terms of cost reduction, increased employee productivity and efficiency, as well as increased employee retention. However, there are also inherent risks with allowing devices and applications not managed by your customers’ organizations to access their corporate networks and digital resources. [Read More]
by RSS Phil Keeley  |  Nov 21, 2017  |  Filed in: Industry Trends
On Wednesday, November, 1st, Fortinet held a critical panel discussion at The Summit, entitled “Winning the Security Battle for Your Enterprise Requires a New Approach.” [Read More]
by RSS Jennifer McDonald  |  Nov 20, 2017  |  Filed in: Business and Technology, Security Q & A
Fortinet spoke with Fabric-Ready Partner, Ribbon Communications to learn what’s top of mind for its customers, the key IT challenges they are facing and how Versa Networks’ approach to integrated security is helping drive business and customer success. The Fortinet Fabric-Ready Partner Spotlight is a series of blogs that highlights the great work and achievements of Fortinet’s Fabric-Ready technical partners. Tell us a bit about Ribbon’s business and the types of customers that you serve. Ribbon is a company... [Read More]
by RSS Mykola Konrad  |  Nov 09, 2017  |  Filed in: Business and Technology, Security Q & A
In my previous article, I raised a red flag about the diminishing practical returns of “mom and pop” threat research as a proxy for mitigating vulnerabilities and bad consequences. Threat assessment is often both difficult and incomplete, and sometimes best left to those who have timely access to the best possible data (and the even then, left to those with the military and intelligence means to act on it). In that piece, I also begged an obvious question. If chasing threats are not the best allocation of an organization’s... [Read More]
by RSS Phil Quade  |  Nov 09, 2017  |  Filed in: Industry Trends
Welcome back to our monthly review of some of the most interesting security research publications. [Read More]
by RSS Axelle Apvrille  |  Nov 09, 2017  |  Filed in: Security Research
Today, your customers’ IT teams have to be aware of the movement and storage of valuable data across multiple applications, networks, devices, and virtual environments. In order to ensure data security and achieve defense in depth, there are many processes they must carry out, such as: Monitoring the movement of data to ensure that only authorized users are accessing it. Watching out for unusual behavior that might indicate a breach. Staying aware of the latest vulnerabilities, malware strands, and other attack vectors to ensure... [Read More]
by RSS Lief Koepsel  |  Nov 08, 2017  |  Filed in: Business and Technology
Fortinet takes industry recognition and evaluations seriously, and we were very pleased when in their 4th Next Generation Intrusion Prevention System (NGIPS) Test Report and Security Value Map NSS Labs rated Fortinet FortiGate IPS as “Recommended,” their somewhat understated way of according a product their highest rating. [Read More]
by RSS Nat Smith  |  Nov 07, 2017  |  Filed in: Business and Technology
Digital transformation is rapidly reshaping industries, generating explosive productivity growth, and creating entirely new business models. The Internet of Things (IoT) is an important technology pillar in today’s digital transformation process, as connected devices are able to collect unprecedented volumes of information, enabling data-driven decision making for better business outcomes and improved quality of life. From consumer to corporate, local to global, we are an increasingly interconnected digital society. IoT networks... [Read More]
by RSS Jonathan Nguyen-Duy  |  Nov 07, 2017  |  Filed in: Business and Technology
The T2 2017 conference took place on October 26 and 27, 2017 at the Radisson Blu seaside hotel in Helsinki, Finland. As in every edition, a CTF (Capture The Flag) competition is organized prior the conference, with the winner receiving a free ticket. This year, a private bug bounty was held by LähiTapiola, a well-known insurance company in Finland, under the supervision of T2 organizers through the HackerOne platform. As there were zero submissions, it was decided to reward Harri Kuosmanen, who was the LähiTapiola HackDay CTF winner. The... [Read More]
by RSS Francois Ropert    |  Nov 06, 2017  |  Filed in: Security Research
With industry-specific compliance requirements driving security spending and deployment, it’s natural to assume that best practices for securing access to sensitive data are different from vertical to vertical. However, that assumption may be changing.  [Read More]
by RSS Bill Hogan  |  Nov 03, 2017  |  Filed in: Industry Trends