Business and Technology


ShipServ, in a recent move to a more cloud-based IT infrastructure, adopted several Fortinet products to protect the company’s networks. I recently talked to Dominic Aslan, ShipServ’s vice president of IT operations, about the company’s move to the cloud and its use of Fortinet tools. [Read More]
by RSS John Maddison  |  Jan 16, 2018  |  Filed in: Business and Technology
Tags:
The challenge is that most all email security vendors say the same thing: “99.9% catch rate, no false positives, easy to manage” and so forth, which is why Fortinet is firmly committed to regular participation in independent testing. Consider, for example, the Advanced Threat Defense certification testing conducted by ICSA Labs. [Read More]
by RSS David Finger  |  Jan 16, 2018  |  Filed in: Business and Technology
Fortinet is excited to be meeting with our partners at this year’s Accelerate conference, which promises to be the largest one yet. Around 2,000 thought leaders, IT and security experts, partners, and customers will convene in Las Vegas from February 26th – March 1st to attend keynotes and breakout sessions, network, and collaborate. [Read More]
by RSS Jon Bove  |  Jan 15, 2018  |  Filed in: Business and Technology
Learn the critical cybersecurity challenges plaguing K-12 schools today and how to mitigate them with this five-point cybersecurity checklist. [Read More]
by RSS Sowjanya O'Neill  |  Jan 12, 2018  |  Filed in: Business and Technology
As network leaders assess their SD-WAN options, however, what is often missing from their deliberations is how to adequately address security risks. SD-WAN vendors are increasingly embedding security features into their offerings, but these tend to be basic, Layer 3 network controls and not the robust security functions that these environments require. [Read More]
by RSS Nirav Shah  |  Jan 11, 2018  |  Filed in: Business and Technology
While organizations are adopting new technologies and services, cybercriminals are developing sophisticated methods of attack to target new attack vectors, exploit unforeseen vulnerabilities, and gain access to user data and other network resources. With this increased threat landscape and growing sophistication of cyberattacks, visibility into existing security measures, and identifying those places where there may be gaps is especially important. [Read More]
by RSS Carl Cayton  |  Jan 10, 2018  |  Filed in: Business and Technology, Industry Trends
FortiSandbox has already proven itself effective in the 2017 BDS test with a 99% Breach Detection rate, earning a Recommended rating four out of four years. And now, integrated with other Security Fabric components – namely, FortiGate, FortiMail, and FortiClient – it has achieved another NSS Recommended award with this latest 2017 BPS test. [Read More]
by RSS Damien Lim  |  Jan 08, 2018  |  Filed in: Business and Technology
HIMSS 2018 will be held this year on March 5-9th at the Sands Expo Center in Las Vegas. Fortinet is excited to be attending this event yet again to meet with healthcare IT professionals standing on the front lines of digital transformation initiatives at their organizations, and to attend the various workshops, roundtables, and keynotes presented by thought leaders. [Read More]
by RSS Susan Biddle  |  Jan 05, 2018  |  Filed in: Business and Technology
Earlier this week, it was announced that researchers uncovered two new side channel attacks that exploit newly discovered vulnerabilities found in most CPU processors, including those from Intel, AMD, and ARM. These vulnerabilities allow malicious userspace processes to read kernel memory, thereby potentially causing sensitive kernel information to leak. These vulnerabilities are known as Meltdown and Spectre. [Read More]
by RSS Fortinet  |  Jan 04, 2018  |  Filed in: Business and Technology, Security Research
The cybersecurity skills shortage is an issue impacting all industries. As cyberattacks become more frequent and sophisticated, organizations all over the world are struggling to outfit their teams with personnel that are armed with essential cybersecurity backgrounds and technical security skills, in addition to broader IT know-how. [Read More]
by RSS Jon Bove  |  Jan 03, 2018  |  Filed in: Business and Technology