A more updated version of this blog is now available:
https://www.fortinet.com/blog/threat-research/what-we-have-learned-so-far-about-the-sunburst-solarwinds-hack
By now you may have read from various...
Endpoints are a critical and growing part of a corporate infrastructure.
Especially now in changing times with a growing teleworker force,
endpoints need to be protected vigilantly. Cybersecurity atta...
In this blog post, I would like to bring to the attention one of the key
features in FortiManager 6.4 release which has considerably improved the
workflow for IPS Administrator for organizations that ...
SD-WAN has taken the WAN Edge market by storm over the past few years.
Businesses and organizations are rapidly choosing SD-WAN in favor of
traditional routers due to the added resiliency, traffic eng...
Many organizations have recently seen a shift to more remote and home
working in response to world events. An expansion of the off-net
workforce brings additional organizational security challenges. H...
If you haven't used the open source iperf tool before, there is a lot of
info on it (see https://iperf.fr), and I will only say it allows us to
generate UDP/TCP traffic between 2 hosts of any bandwidt...
Today Fortinet is proud to announce our enhanced support for securing
SAP S/4HANA – SAP’s flagship ERP application. Fortinet offers
unprecedented security and visibility for organizations seeking to
s...
SAP is among the world's largest software companies, with some 92% of
the Forbes Global 2000 using at least some of their enterprise
application solutions. Most of these companies will deploy SAP S/4H...
Securing Email before the advent of Data-Centric Security Teleworking,
public and home networks, personal devices, and cloud email services
have combined to open up email to become the dominant source...
Companies are leveraging the power of Kubernetes to accelerate the
delivery of resilient and scalable applications to meet the pace of
business. These applications are highly dynamic, making it operat...
When discussing our Fortinet Security Fabric, we often focus heavily on
the integration between the solutions across our own product suite. And
why not? The Fortinet Security Fabric spans multiple sol...
Fortinet just released another free offer for organizations designed to
further enhance the ability of their workforce to be cyber aware. This
new Information Security Awareness and Training service w...
[Recap] It’s now been about 2 years since Wi-Fi 6 Access Points first
showed up on the market, and about one year since we first looked at
Wi-Fi 6 last year on our FortiCast podcast (link) where we ta...
Fortinet is proud to announce our latest addition to the FortiCloud
group of products: FortiPenTest. FortiPenTest is a subscription based
Penetration Test tool that can perform OWASP Top 10 vulnerably...
Protect your Datacenter infrastructure and deliver uptime with FortiDDoS
Appliances By Vinod Sundarraj and Hemant Jain | Just when you thought
DDoS attacks are being taken care by large cloud-based DD...
The Case in Point : How to block incoming connections sourced from IP
addresses supplied as a list by a 3rd party commercial Threat
Intelligence feed. Until FortiOS 6.0.1 we had to resort to custom
sc...
The Fortinet Veterans Program (FortiVet) Community is LIVE! This is an
open group for #veterans and #militaryspouses that are looking to
transition into a career in #cybersecurity, military ready #emp...
One of our nonprofit partners, IVMF has issued a brief, “The Business
Case for Hiring a Veteran: Beyond the Clichés,” which draws from
academic literature to suggest a robust, specific and compelling
...
Are you a Fortinet Expert and interested in sharing your technology &
industry expertise with your peers? If so, here comes an opportunity to
showcase your knowledge, and show-off a Blogger badge on y...
There are more than 2.9 million unfilled cybersecurity jobs globally,
according to a study by (ISC)2. And 59 percent of cybersecurity
professionals surveyed for that study believe the widening talent ...
Use case: Customer has two ISP connections at both sites. Two VPNs
configured. ISP1 to ISP1 and ISP2 to ISP2. Customer wanted to lower the
time it takes for the VPN to drop and the other VPN come up. ...
First and foremost, a special shout out to a friend that helped with
this config. Juan Perez, thank you brother. Use Case: Customer wants a
single SSID in his environment. He wants Teachers on a VLAN ...
Networks are undergoing fundamental changes fuelled by the accelerated
adoption of BYOD, the Internet of Things, and the cloud-first strategy.
The new dynamic affects the efficiency of traditional net...
Fuse community just got an update! The latest site provides a refreshing
look and feel, simplified UI, enhanced functionality for user engagement
& group administration and opportunities for leadershi...
Veterans bring valuable skills and experience from their military
service to your workforce. This toolkit is designed to help you better
understand how Veterans can be valuable assets to your company....
Container use continues to grow, and Kubernetes is the most widely
adopted container orchestration system, managing nearly half of all
container deployments. Nearly every enterprise on the planet is a...
I am a BIG supporter of Central NAT. I believe it is in-line with the
present day firewall platforms. Even if you use Policy NAT (the original
way on FortiOS) or Central NAT you normally want bidirect...
I am currently running FortiOS 6.4 on this FortiGate. The use case is to
have an out-of-band interface that points to a separate routing table or
in this case, a VRF which stands for Virtual Routing a...
Today, a customer asked me about selectively assigning FortiTokens to AD
users using FortiAuthenticator. In this use case, I am going to use an
AD group Token-Users to auto-assign FortiTokens to and a...
Realms are a feature on the FortiGate that I have written about in the
past, but I never really did a detailed dive into them and how and when
to use them. When a customer tells me they want to assign...