Fortinet is an American multinational corporation headquartered in Sunnyvale, California. It develops and markets cybersecurity software, appliances and services, such as firewalls, anti-virus, intrusion prevention and endpoint security, among others. It is the fourth-largest network security company by revenue.

Wikipedia
Fortinet
Fortinet
Blog Post
  • Building an effective security framework designed for your organization needs to start with three basic strategies. With these best practices in place, you should be able to quickly cut through the noise, avoid the “shiny new toy” syndrome, and quickly assess whether a particular solution is right for your organization right now.

Fortinet
Fortinet
Blog Post
  • Information sharing is one of the most critical elements of any security strategy. Without it, security has to be painted with abroad brush when literally anything is possible. Being able to compare the device or network you are trying to protect against a set of threats that are known to be currently active is invaluable in pitting the right resources and countermeasures against the appropriate t...

Fortinet
Fortinet
Blog Post
  • To help organizations adapt to the new realities of the emerging digital marketplace and the related threats targeting digital businesses, IBM Security just announced that their X-Force Threat Management (XFTM) Framework is now available as a Threat Management-as-a-Service offering. We are also pleased to announce that this news also includes that Fortinet was selected to be a key security partner...

Fortinet
Fortinet
Blog Post
  • Healthcare has long been a regulated space due to the sensitive personal information collected and stored. Top of mind when thinking of healthcare regulations is HIPAA, which provides comprehensive and mandatory standards for ensuring the security and privacy of protected health information (PHI). Noncompliance can result in heavy fines, as well reputational damage.

Fortinet
Fortinet
Blog Post
  • The explosion of new applications and connected IoT devices has created a wealth of data that, when analyzed, provides businesses with critical insights into consumer behaviors and interests, allowing them to create more customized offerings. Combined with the accelerated adoption of solutions across IaaS, PaaS and SaaS, the cloud is here to stay. However, this also means that cybercriminals will ...

Fortinet
Fortinet
Blog Post
  • Educators across the country are challenged to ensure students have access to safe and productive environments where they can advance their education and careers. In 2018, achieving this goal is becoming increasingly difficult. Maintaining efficient security means schools and universities need a combination of physical and cybersecurity solutions that work together to keep students and faculty saf...

Fortinet
Fortinet
Blog Post
  • In a previous blog post, the FortiGuard Labs team analyzed the implementation of Spectre and detailed the technical implementation of Kernel Virtual Address Shadow (KVAS), which is a key feature used to block the Meltdown attack. We decided to perform a deep dive analysis of the new patch (particularly the patch for x86) and share the results in this blog post.

Fortinet
Fortinet
Blog Post
Fortinet
Fortinet
Blog Post
  • Fortinet is proud to announce that BGP Flowspec has now been incorporated into FortiDDoS This new functionality enables Service Providers to provide an effective solution to customers when a DDoS attack saturates their Internet links. Flowspec automates the coordination of traffic filtering by providing service providers with information that identifies specific packets to be dropped during a flo...

Fortinet
Fortinet
Blog Post
  • Recent reports of large data breaches are alarming for everyone. Customers worry about the implications of having their financial and personal information hijacked. The organizations that were compromised worry about both the near-term and the long-term effects on their business. And other organizations worry if they will be next. Two things are certain, though. The cost of a data breach is going ...

Fortinet
Fortinet
Blog Post
  • Over the last few months, the Microsoft Security Response Centre (MSRC) has released a number of Windows updates to fix multiple Use-After-Free (UAF) vulnerabilities discovered by FortiGuard Labs. As stated in our previous blog post, we will provide a technical write-up for one of the UAF issues that was rated as critical by MSRC. The issue is assigned to CVE-2018-0797. In this blog post we will s...

Fortinet
Fortinet
Blog Post
  • Over the years, the FortiGuard Labs team has learned that it is very common for macOS malware to launch a new process to execute its malicious activity. So in order to more efficiently and automatically analyze the malicious behaviors of malware targeting macOS, it is necessary to develop a utility to monitor process execution. The MACF on macOS is a good choice to implement this utility. The Mand...

Fortinet
Fortinet
Blog Post
  • In the previous blog from FortiGuard Labs in this series, we discussed how to monitor process execution with command line arguments using MACF on macOS. In this blog, we will continue to discuss how to monitor file system events (including file open, read, write, rename, and delete operations) and dynamic library loading via MACF on macOS. I will provide all the technical details below. Let’s get ...

Fortinet
Fortinet
Blog Post
  • In the two previous blogs in this series from FortigGuard Labs, we discussed how to monitor process execution with command line arguments, file system events, and dylib loading events using MACF on macOS. In this blog, we will continue to discuss how to monitor network activities (another significant behavior for malware) using Socket Filters (a part of the Network Kernel Extension) on macOS. The ...

Fortinet
Fortinet
Blog Post
  • The biggest security challenge facing individuals and businesses today isn’t scale. It’s hyperconnectivity. The various devices and applications being used in homes or at organizations have now become so intertwined that it’s hard to keep them separate. The cloud allows users to access data and information from any device with a Wi-Fi connection or data plan, and IT consumerization encourages thos...

Fortinet
Fortinet
Blog Post
  • Cloud adoption is on a steady upward march. It's not uncommon to hear that laggard organizations, even those that are highly regulated and historically slow to adopt new tech, are leveraging SaaS applications or a private cloud. But one thing that has surprised some pundits: As digital transformation pushes CIOs forward, your customers are not moving workflows to a single massive public cloud. The...

Fortinet
Fortinet
Blog Post
  • As data becomes the new currency of the digital marketplace, one of the biggest security challenges organizations face is the number and kinds of endpoint devices that need access to the network. Smartphones, laptops, Chromebooks, tablets, and IoT devices of every function and size, and belonging to both employees and consumers, now regularly connect to some segment of the network to access data.

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.