Results for fabric

Business and Technology

Enable Deep Security Fabric Integration with Fortinet Fabric Connectors

New Fabric Connectors tie traditionally disparate security solutions into a single, integrated system to automate security workflows, tighten SOC environments, correlate threat feeds, and seamlessly enforce consistent security across the distributed security infrastructure, including multi-cloud environments.

By Rajoo NagarMay 22, 2018

Industry Trends

Strengthening the Security Fabric of Blockchain

Blockchain is a shared and continuously reconciled database used to maintain a list of digital records, called blocks. It is quickly becoming an important tool not just for financial information, but also for managing and recording virtually all types of data, such as medical and other records, identity management, and transaction processing. Because a blockchain database is distributed and interconnected, it provides several essential services. The first is transparency. Because data is embedded within the network as a whole, it is by definition...

By Hemant JainJune 20, 2017

Industry Trends

The Open Security Requirement in the Age of the Cloud

In a 2015 article posted by Forbes, it was reported that 87 percent of people hadn’t heard of the term “Internet of Things” (IoT). At that time, Gartner Inc. estimated that there were 4.9 billion connected devices in use. Fast forward to 2017, and Gartner now reports that number has grown  to 8.4 billion, with a look ahead to 2020 predicting that 20.4 billion connected devices will be in use. The IoT has gained traction in day-to-day life by adding new applications and capabilities at a rapid rate, and as this technology begins...

By Amy ThompsonMay 08, 2017

Business and Technology | Partners

Fortinet Fabric-Ready Partner Spotlight: Attivo Networks

Q&A with Carolyn Crandall, CMO at Attivo Networks Fortinet sits down with Fabric-Ready Partner, Attivo Networks, to learn what’s top of mind for its customers, the key IT challenges they are facing, and how Attivo Networks’ approach to integrated security is helping drive business and customer success. Tell us a bit about Attivo Networks business and the types of customers that you serve. Attivo Networks® is the leader in deception for cyber security defense. Founded on the premise that even the best security systems...

By Darlene GannonApril 20, 2017

Industry Trends

Fabric-Ready: Q&A with Ziften’s Josh Applebaum

Fortinet recently sat down with Fabric-Ready Partner Ziften to learn what’s top of mind for its customers, the key IT challenges they are facing, and how Ziften’s approach to integrated security is helping drive business and customer success. Tell us a bit about Ziften’s business and the types of customers that you serve. Ziften provides client-to-cloud visibility and security, offering unprecedented access to user behavior, system, application, and network data originating from client devices, data centers, and the cloud....

By Darlene Gannon November 09, 2016

Industry Trends

Fortinet Fabric Ready Program- More Open than Ever

On September 26th, Fortinet announced our new Fortinet Fabric Ready Program, which delivers on the “Open” attribute of the Fortinet Security Fabric by providing threat intelligence visibility across multi-vendor cybersecurity solutions. Cross-product  coordination (regardless of vendor) is a critical capability for today’s enterprises, as it is rare for an organization to completely source all IT security components from a single vendor across the entirety of their network and covering all attack vectors.  Leaving...

By David FingerOctober 18, 2016

Industry Trends

Innovation Insights: Defining Open with the Fortinet Security Fabric

Securing networks has been a serious challenge ever since DEC salesman Gary Thuerk sent the first spam message to 400 unsuspecting users of the ARPANET back in 1978. Sure, security devices have become more sophisticated over time, and their evolution is a fascinating subject. But they all tend to suffer from a common problem: because they are a siloed technology, they can only solve the problem sitting right in front of them. This is one of the reasons why, in spite of the millions being spent on security by today’s organizations, the incidents...

By John MaddisonSeptember 26, 2016

Industry Trends

Innovation Insights: Securing Today’s Evolving IT Environments Requires Four Things

Networks are evolving rapidly. The transformation to a digital business model has extended the network beyond the perimeter, which means that today’s networks and their related security are becoming borderless. IoT and cloud solutions require organizations to worry about an attack surface that may not even be visible to IT. Worse, many IoT devices are headless, run simple communications protocols, and are unable to run a client or even be patched. Instead, they rely exclusively on the access layer for security. In addition, critical and...

By Bill McGee and John MaddisonSeptember 26, 2016

Industry Trends

Wrapping Financial Services in a Security Blanket: How the Fortinet Security Fabric enhances the security of Financial Services organizations.

The Enterprise security market has grown extremely complicated over the past decade. This complexity is being compounded as the business of Financial Services moves from person-to-person transactions to automated high-speed machine-to-machine operations and workflows. We originally designed security systems that protect people from other people – vaults, teller cages, guards, armored cars, alarms, and security cameras. These tools allowed us to trust people as business partners.  This has all changed. Financial Services is moving to...

By Araldo MenegonJune 30, 2016

Industry Trends

Q&A: How Secure Are Your Company’s Applications?

Security vendors have been touting the advantages of next-generation firewalls (NGFW) that provide application inspection for several years now. As application traffic became more prevalent, criminals found that hiding malware inside application traffic was an excellent way to bypass traditional security. They still do. But now, application traffic is ubiquitous. The number of devices on our networks is growing exponentially, along with the volume of application and transactional traffic. While much of it is still passing through the traditional...

By John WeltonJune 28, 2016