Results for Government Sector

Industry Trends

5 Security Priorities for Government Agencies as TIC 3.0 is Announced

TIC 3.0 aims to address the very real change that cloud use has brought to government networks. Learn the five priority areas that government agencies must focus on to ensure security in the age of the cloud.

By Felix A. De La Torre, Jr.October 29, 2018

Partners | Business and Technology

Together, Fortinet and AWS Secure the Government

Fortinet’s Security Fabric cloud solutions are available to AWS enterprise, service provider, and public sector customers, providing comprehensive security, threat intelligence, and visibility to detect, isolate, and respond to threats in real time.

By FortinetJune 19, 2018

Business and Technology

Securing the Modernization of IT for State and Local Governments

State and local government entities are modernizing legacy IT systems. The modernization of security solutions should be done in tandem with these new deployments.

By Jonathan Nguyen-DuyJune 08, 2018

Partners | Business and Technology

Fortinet Federal Holds First Federal Partner Forum

A little less than a year ago, Fortinet launched a new subsidiary, Fortinet Federal, Inc., in order to better provide critical cyber solutions and professional services to the public sector. This past week, the Fortinet Federal team held its first Federal Partner Forum in Reston, VA to discuss how to successfully address the growing cybersecurity challenges being faced by Federal agencies. The Partner Forum was designed to help organizations better understand the Federal marketplace, navigate the complexities of Federal procurement programs, and identify Federal IT and cybersecurity challenges and budget priorities.

By Shelly ScarpelliMay 03, 2018

Industry Trends

Byline: The Move to Standardization and Open Architectures Enables Cybersecurity Automation For the Government Sector

In order to remain responsive, resilient, and agile, government organizations must adopt open, integrated, and automated security architectures that enable the collection and sharing of threat intelligence and the ability to coordinate a response to detected threats.

By Steve Kirk March 08, 2017