Blogs

Blog Articles

Secure Rise with SAP with Fortinet

Secure RISE with SAP – How to secure the unknown?What is RISE with SAP? Today enterprises are turning to new business models to avoid disruption, to gain efficiencies, to drive innovation, and to tran...

0 Comments

Bad Wi-Fi - a real world motel example

This is a real-world example of how not to design a Wi-Fi network. Some caveats upfront – the serious Wi-Fi guys around here are not going to learn anything new, but they might slow down and look, jus...

3 Comments

Announcing FortiEDR 5.2

We are pleased to announce the release of FortiEDR 5.2. Our focus this time around was to improve extended detection and response (XDR), the lives of our administrators, and introduce Japanese languag...

0 Comments

How MSSPs Can Turn Up Managed Services with FortiEDR

Due to staffing and technical challenges, organizations are turning to Managed Security Service Providers (MSSPs) for IT security management, and one of the biggest trends is to use MSSPs to deploy an...

0 Comments

FortiEDR Detection Capabilities

Exception Manager FortiEDR offers behavioral detection capabilities to detect living-of-the-land, file-less (memory-based), and script-based attacks. FortiEDR behavioral detection provides real-time c...

0 Comments

FortiEDR’s Investigation Capabilities

FortiEDR offers a single unified endpoint agent with machine learning Next Generation Anti-Virus (NGAV), application communication control, automated EDR, and XDR capabilities. All these features are ...

0 Comments

How FortiEDR Hunts for Threats Later in the Kill Chain

Our previous blog covered how FortiEDR eliminates malware and attacks early in the cyber kill chain and the benefits of proactive security. We know nothing in this life is guaranteed and no form of se...

2 Comments

How FortiEDR Hunts for Threats Early in the Kill Chain

As one of the most valuable tools of EDR, Threat Hunting helps identify bad actors that have otherwise circumvented the first line of defence. It achieves this by proactively identifying threat indica...

0 Comments

How FortiEDR Hunts for Threats Later in the Kill Chain

Our previous blog covered how FortiEDR eliminates malware and attacks early in the cyber kill chain and the benefits of proactive security. We know nothing in this life is guaranteed and no form of se...

0 Comments

FortiSIEM 6.4 Lookup Tables

FortiSIEM 6.4.0 introduces the ability of enriching Analytics with information from Lookup Tables to provide insight into the data being retrieved from logs. It also introduces the ability to create C...

4 Comments

Lateral movement through SAP Router

By: Moshe Ben Simon & Julian Petersohn Summary Every SAP customer has a minimum of one SAPRouter Instance running within the infrastructure. In addition, these instances are often directly accessible ...

0 Comments

Veterans Employment Toolkit

Team,Veterans bring valuable skills and experience from their military service to your workforce. This toolkit is designed to help you better understand how Veterans can be valuable assets to your com...

0 Comments

Deception Technology for SAP System Security

Protecting business-critical data is becoming increasingly complex—and by extension, increasingly relevant for today's organizations. One critical element of this evolution is their increasing relianc...

0 Comments

What makes your SIEM a Winner?

Let's talk about three important areas of SIEM deployments: functionality, scalability, and flexibility. Functionality What does a SIEM do? Wikipedia [1] suggests: Data aggregation; Correlation; Alert...

0 Comments

Cloud WAN brings a Secure MPLS-like Experience to AWS

By: Aidan Walden, Director, Public Cloud Architecture & Engineering at Fortinet It’s no coincidence that SD-WAN adoption has grown rapidly with increasing cloud consumption by enterprises. After all, ...

0 Comments
Announcements

Welcome to your new Fortinet Community!

You'll find your previous forum posts under "Forums"