Fortinet is an American multinational corporation headquartered in Sunnyvale, California. It develops and markets cybersecurity software, appliances and services, such as firewalls, anti-virus, intrusion prevention and endpoint security, among others. It is the fourth-largest network security company by revenue.

Wikipedia
Fortinet
Fortinet
Landing Page
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • The Need for Threat Intelligence
    These are challenging times for security leaders. Business pressures require faster processing of more data, and support for more devices than ever before. Critical data that used to be housed in a secured datacenter now moves across an increasingly complex ecosystem of networked environments, including IoT, cloud, mobile devices and workers, and virtualized networks. The rate of change in some en...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • The Evolution of the Firewall
    As the Internet and Digital Economy have grown up, the humble Firewall has continued to serve as their go-to security appliance. In this first of a two-part series, we will examine how, in spite of the evolution of the Firewall through a number of shapes, functions, and roles, it remains the security foundation for implementing the strategic pillars of Segmentation, Access Control, and Real-time a...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Byline: It’s Time to Get Serious About Web Application Security
    As application-focused threats continue to evolve, both in number and sophistication, a single web application security device is typically not enough to defend the entire, distributed network. Instead, organizations need to consider investing in a multi-pronged web application security approach that can tie different devices together, and leverage and share intelligence across a variety of other ...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Why Top Healthcare Institutions are Moving Toward Integrated Security Solutions
    According to a report posted by the Office of the National Coordinator for Health Information Technology, 87 percent of office-based physicians had adopted some form of electronic health record (EHR) as of 2015. This is more than double the 42 percent that had done so when data was collected in 2008. Along with an increase in EHR adoption, we have also witnessed a global healthcare revolution in ...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Black Hat Executive Interviews: Q&A with Phil Quade, Fortinet CISO
    Q: You joined Fortinet recently after three decades in cybersecurity roles in government, including most recently the NSA. What has that experience taught you about the nature and scope of the threats that organizations face these days? Some people say that street cops and detectives see an especially negative view of humanity, because, more often than not, they are called to assist with an unlaw...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Byline: What’s Your Network’s Threat IQ? 3 Steps Toward Actionable, Real-Time Threat Intel
    Many people will recognize the next few words as a gross understatement: The number of cyberthreats and cyberattacks targeting organizations won’t slow down anytime soon. In recent months, we’ve seen increasingly sophisticated attacks targeting specific organizations, compromised IoT devices used in DDoS attacks, and large-scale ransomware outbreaks spreading across the globe. Many businesses str...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Visit Fortinet at Black Hat 2017
    Fortinet is proud to be a Platinum Plus Sponsor at Black Hat’s 20th anniversary conference, being held this July 22-27 at the Mandalay Bay Convention Center in Las Vegas, NV. Our booth is #915. This year’s booth includes a live theater, and we have lined up great presentations from Fabric-Ready Partners, as well as from some of Fortinet’s top solutions experts.  The presentation schedule will be ...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Securing the Digital World, Part II
    Sixteen years ago, Fortinet predicted the emergence of a digital economy where data would be driving business. We understood that this would require scaling the Internet to support hyperconnected network infrastructures. To accomplish this, network infrastructures that hadn’t fundamentally changed for decades would have to be radically redesigned. The challenge was that traditional security soluti...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Byline: Know Your Enemy: Understanding Threat Actors
    This is Part II of a series. Read Part I here. Sun Tzu wrote in his famous book, The Art of War, “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” In my previous article, “Are you ...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Incomplete Patch: More Joomla! Core XSS Vulnerabilities Are Found
    Joomla! is one of the world's most popular content management systems (CMS). It enables users to build Web sites and powerful online applications. More than 3 percent of Web sites are running Joomla!, and it accounts for more than 9 percent of CMS market share. As of July 2017, Joomla! has been downloaded over 82 million times. Over 7,800 free and commercial extensions are available from the offi...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Don’t Take It from Us – FortiGate Enterprise Network Firewall Customer Reviews
    Last year, Gartner launched a new website and service called Peer Insights. Its goal is to provide organizations looking at adopting new technologies or solutions with access to the collective knowledge and experience of IT professionals that have already evaluated and adopted similar technology. Their posted reviews offer detailed perspectives and firsthand experience with a wide range of solutio...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Information Governance for Healthcare Institutions
    Information governance is nothing new, but for it to be effective, it requires understanding, flexibility, and collaboration between a variety of teams and departments. Fortinet’s Susan Biddle offers her insights into the role of information governance in organizational security and how healthcare organizations can adapt. Can solid information governance boost security for an organization? If so,...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Securing the Digital World, Part I
    Today’s digital economy is driving a technology revolution. Networks now include on-demand infrastructure, cloud-based services, software defined perimeters, and the growth of smart devices and IoT. Networks and infrastructures are also increasingly hyperconnected. What’s been missing is a security strategy to protect these new environments. The Internet was first begun as a point-to-point netwo...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Outsmarting the Next Ransomware with Advanced Threat Protections
    Ransomware has recently reasserted itself into the public eye in a big way. The May cyberattack carried out by the malware WannaCry was one of the worst ransomware attacks ever, affecting over 300,000 computers operating MS Windows around the world. Unfortunately, the attack has once again demonstrated that far too many organizations do not have an effective security protocol in place, or do not t...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • FortiGate Moves to the Leader’s Quadrant
    Fortinet’s FortiGate solution has just shifted into the leader’s quadrant in the 2017 Gartner Magic Quadrant for Enterprise Network Firewalls report. This report acknowledges the ‘completeness’ of our Security Fabric vision, along with our ability to execute, as factors for our advanced placement. We believe the Magic Quadrant results provide a great opportunity to highlight key innovations that ...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Considering the Cloud? Five Questions to Ask
    The cloud is an increasingly attractive prospect for federal agencies, but many still have unanswered questions about how public cloud security stacks up. With the president’s recent cybersecurity executive order emphasizing the shift to the cloud, agencies will have to move quickly to comply. Below are five questions that federal technology buyers should ask public cloud providers to see if they ...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Key Differences Between Petya and NotPetya
    There have already been a lot of write-ups for the NotPetya malware. This article is just a supplement for what is already out there. Our focus is to highlight some key differences between a previous strain of the Petya ransomware and the malware that scared everyone a few weeks ago, which is now sometimes being referred to as NotPetya. I posted a blog post a couple of months ago about the MBR (M...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Petya's Master Boot Record Infection
    Last week we started our technical analysis on Petya (also called NotPetya) and its so-called “killswitch.” In that blog post we mentioned that Petya looks for a file in the Windows folder that has the same filename (no extension) as itself (for example: C:\Windows\Petya). If it exists, it terminates by calling ExitProcess. If it doesn't exist, it creates a file with the attribute DELETE_ON_CLOSE....
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Unmasking Android Malware: A Deep Dive into a New Rootnik Variant, Part II
    In part I of this blog, I finished the analysis of the native layer of a newly discovered Rootnik malware variant, and got the decrypted real DEX file. Here in part II, we will continue our analysis. A look into the decrypted real DEX file The entry of the decrypted DEX file is the class demo.outerappshell.OuterShellApp. The definition of the class OuterShellApp is shown below. Figure 1. The ...
Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Unmasking Android Malware: A Deep Dive into a New Rootnik Variant, Part I
    Part I: How to Unpack the Malware App This past January I performed a deep analysis of an Android rootnik malware variant and posted them to this blog. Since then, I have continued to monitor this Android malware family. In early June, FortiGuard Labs found a new variant of the Android rootnik malware that disguises itself as a legal app. It then uses open-sourced Android root exploit tools to ga...
Fortinet
Fortinet
Landing Page

New mobile optimized landing page detected

Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Unmasking Android Malware: A Deep Dive into a New Rootnik Variant, Part III
    In this final blog in the Rootnik series we will finish our analysis of this new variant. Let’s start by looking into the script shell rsh. Analysis of the script shell Through our investigation we are able to see how the script shell works: First, it writes the content of the file .ir into /system/etc/install-recovery.sh. The file install-recovery.sh is a startup script. When the android de...
Fortinet
Fortinet
Landing Page

New mobile optimized landing page detected

Fortinet
Fortinet
Landing Page

New mobile optimized landing page detected

Fortinet
Fortinet
Blog Post

New blog articles detected.

  • Petya's Master Boot Record Infection
    Last week we started our technical analysis on Petya (also called NotPetya) and its so-called “killswitch.” In that blog post we mentioned that Petya looks for a file in the Windows folder that has the same filename (no extension) as itself (for example: C:\Windows\Petya). If it exists, it terminates by calling ExitProcess. If it doesn't exist, it creates a file with the attribute DELETE_ON_CLOSE....

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.