Blogs

Blog Articles

How FortiEDR Hunts for Threats Early in the Kill Chain

As one of the most valuable tools of EDR, Threat Hunting helps identify bad actors that have otherwise circumvented the first line of defence. It achieves this by proactively identifying threat indica...

0 Comments

How FortiEDR Hunts for Threats Later in the Kill Chain

Our previous blog covered how FortiEDR eliminates malware and attacks early in the cyber kill chain and the benefits of proactive security. We know nothing in this life is guaranteed and no form of se...

0 Comments

FortiSIEM 6.4 Lookup Tables

FortiSIEM 6.4.0 introduces the ability of enriching Analytics with information from Lookup Tables to provide insight into the data being retrieved from logs. It also introduces the ability to create C...

4 Comments

Lateral movement through SAP Router

By: Moshe Ben Simon & Julian Petersohn Summary Every SAP customer has a minimum of one SAPRouter Instance running within the infrastructure. In addition, these instances are often directly accessible ...

0 Comments

Veterans Employment Toolkit

Team,Veterans bring valuable skills and experience from their military service to your workforce. This toolkit is designed to help you better understand how Veterans can be valuable assets to your com...

0 Comments

Deception Technology for SAP System Security

Protecting business-critical data is becoming increasingly complex—and by extension, increasingly relevant for today's organizations. One critical element of this evolution is their increasing relianc...

0 Comments

What makes your SIEM a Winner?

Let's talk about three important areas of SIEM deployments: functionality, scalability, and flexibility. Functionality What does a SIEM do? Wikipedia [1] suggests: Data aggregation; Correlation; Alert...

0 Comments

Cloud WAN brings a Secure MPLS-like Experience to AWS

By: Aidan Walden, Director, Public Cloud Architecture & Engineering at Fortinet It’s no coincidence that SD-WAN adoption has grown rapidly with increasing cloud consumption by enterprises. After all, ...

0 Comments

Exploring the new FortiSIEM JSON Incident API

Today we're looking at the new FortiSIEM JSON Incident API. Need to extract some incident data from your FortiSIEM? This API's for you!Let's explore one of the API functions by building a simple Bash ...

0 Comments

JAN’s Workplace Accommodation Toolkit

JAN’s Workplace Accommodation Toolkit is a free, comprehensive online resource for employers seeking to move beyond basic compliance with the Americans with Disabilities Act (ADA) in order to create m...

0 Comments

SHRM Foundation Veterans at Work Certificate

The SHRM Foundation Veterans at Work Certificate program is completely free and open to all. You do not need to be a SHRM member, and you do not need to hold a SHRM credential to engage with the conte...

0 Comments

Return-to-Work Toolkit for Employees & Employers

An organization's workforce is its most valuable asset. And when an employee can't work due to illness or injury, it impacts not only an organization's productivity, but also its morale. This toolkit ...

0 Comments

FortiSIEM 6.3.0 Released

FortiSIEM 6.3.0 is now available. This major release introduces a range of new features.New Feature HighlightsCustomizable GUI Login BannerFortiSIEM can now display a customizable text login banner. T...

0 Comments

2021 FortiVet Military Service Survey

Fortinet Employees, As a proud sponsor and supporter of our military veterans, we are conducting a survey to understand the impact military service members and their families have on Fortinet’s busine...

0 Comments

As If the Perimeter was not Blurred Enough

As If the Perimeter was not Blurred Enough As cloud adoption began accelerating several years back the growing predictions of a doomed enterprise perimeter also increased. And then the pandemic hit… W...

0 Comments

NetFlow Collection and Analysis with FortiSIEM

Did you know that FortiSIEM can ingest NetFlow traffic? Send NetFlow traffic to FortiSIEM and it will be ingested, parsed, written to our common database, and made available for analysis, dashboards, ...

0 Comments

Fortinet and Gigamon: Making the Complex Simple

A pair of wireless headphones makes it easier to make and attend calls, although a phone can work standalone without them. Similarly, security tools can work fine on their own, but complementing them ...

0 Comments