Results for noc

Business and Technology

Fortinet Delivers the Industry’s First Integrated NOC-SOC Solution

Fortinet just announced at the RSA Conference 2018 the industry’s first purpose-built NOC-SOC solution designed to bridge workflows, analysis, and automated response between operational and security processes.

By Nat SmithApril 16, 2018

Industry Trends

The Critical Need for MSSPs

Congratulations, you built a company worth breaking into! Seriously – there are, right now, Criminal Enterprises that are executing deliberate and methodical plans of attack in order to breach your company and strip it of its most valuable assets. Cybercrime is a multi-billion dollar business, and cybercriminals capitalize on finding new ways to exploit increasingly complex network environments like yours. To stay ahead of detection technologies, cybercriminals are continually developing new techniques and resources to bypass security and...

By Steven YurkunasApril 25, 2017

Business and Technology

Accelerate 2017 Update General Sessions Overview – Day One

If anyone was unsure of Fortinet’s vision for the future of the digital world, or the impact they plan to have on the cybersecurity industry, the first day of Accelerate 2017 left no doubt in anyone’s mind. Network Security Evolution– Ken Xie, Fortinet Founder and CEO The morning kicked off with the primary Keynote from Ken Xie, founder and CEO of Fortinet. He started by walking everyone through the transformation of the Internet and networking over the past 40 years, and drove home a couple of critical points: 1. The...

By Bill McGeeJanuary 11, 2017

Business and Technology

Innovation Insights: Extending the Security Fabric: FortiOS 5.6 and Intent-Based Network Security

The financial potential of the new digital economy is driving the rapid evolution of today’s networks. For decades, the substructure of the network remained relatively unchanged: data traffic was routed from point A to point B over a predictable array of devices, cables, and ports using well established protocols and commands. Over the past couple of years, however, things have begun to change dramatically. Virtualization, Software Defined Networks (SDN), and the cloud have fundamentally changed where data is stored and how it is accessed....

By John MaddisonJanuary 10, 2017

Business and Technology

Extending the Security Fabric: Refining the Security Operations Center

Monitoring, managing, and protecting the formless scope and scale of today’s highly distributed and dynamically changing digital enterprise network is a daunting task for IT and Security Operations Teams. The proliferation of IoT and mobile devices, the convergence of IT and OT, and adoption of cloud-based networking and services is making detection and response to threats increasingly difficult, if not impossible with today’s tools. When the network around you is constantly adapting to shifting demands, how do you effectively track...

By Michael ReinhartJanuary 10, 2017

Industry Trends

Defending the Hacker Ethic At Black Hat 2015

This year’s Black Hat keynote speaker, Jennifer Granick, gave her talk to applause yesterday rather than the boos and/or skepticism that have greeted other recent speakers. In a nutshell, she delivered a powerful call to action to preserve the hacker ethic, keep the Internet open, and make way for innovation and the hands-on exploration she called tinkering.  At the same time, she was clear that security is critical to this openness and to building safe places that respect and protect our privacy. It was a great message and interesting...

By Chris DawsonAugust 06, 2015