Skip to content

Latest news

Catch up on all the latest

Maintaining Business Continuity Amid Changing Workplace Operations

Maintaining Business Continuity Amid Changing Workplace Operations

In show business, the adage “the show must go on” requires each member of the cast and crew to have an understudy whose sole purpose is to step in should…
Fortinet Named a 2020 Gartner Peer Insights Customers’ Choice for WAN Edge Infrastructure

Fortinet Named a 2020 Gartner Peer Insights Customers’ Choice for WAN Edge Infrastructure

Fortinet is proud to announce that we have been named a 2020 Gartner Peer Insights Customers’ Choice for WAN Edge Infrastructure in recognition of the reviews that customers have provided…
Secure Remote Access for the Teleworker Accessing the Cloud

Secure Remote Access for the Teleworker Accessing the Cloud

Most companies are now in the process of rapidly enabling teleworking, telelearning, and remote productivity solutions to maintain business and operational continuity. But their goal is to also enable those…
As Telemedicine Grows, Healthcare Organizations Must Secure Patient Care

As Telemedicine Grows, Healthcare Organizations Must Secure Patient Care

The healthcare industry is no stranger to adopting new technologies to improve patient care. While most think of physical equipment, like MRI and X-ray machines, there is another piece of…
Simple Steps to Protect You Against COVID-19 Social Engineering Attacks

Simple Steps to Protect You Against COVID-19 Social Engineering Attacks

As people around the world are faced with fears and concerns over the COVID-19 virus, criminals are also taking note. And unfortunately, they are using this as an opportunity to try…
Selecting Secure SD-WAN Solutions Based on Use Case Requirements

Selecting Secure SD-WAN Solutions Based on Use Case Requirements

To keep up with digital innovation efforts, organizations are increasingly replacing their traditional WAN edge, built around static MPLS and router deployments. New SD-WAN solutions include business application recognition and steering, WAN…
Leveraging a Secure SD-WAN Solution to Secure Digital Business

Leveraging a Secure SD-WAN Solution to Secure Digital Business

To keep up with digital innovation efforts, organizations are increasingly replacing their traditional WAN edge, built around static MPLS and router deployments. New SD-WAN solutions include business application recognition and steering, WAN…
CISO Voices: Ensuring Business Continuity During Transition

CISO Voices: Ensuring Business Continuity During Transition

Organizations around the world are engaged in one of the most rapid network transformation exercises in history. Tens of millions of workers are suddenly working from home, small branch offices,…
CSO Strategies for Navigating Challenging Times

CSO Strategies for Navigating Challenging Times

The one thing that all CSOs have in common is that we are risk owners. No matter the situation, even during times of extreme business transition and the need to…
As a FortiGate Customer, Your Teleworker Strategy is Already in Place

As a FortiGate Customer, Your Teleworker Strategy is Already in Place

Business continuity and contingency plans need to be able to adapt to today’s dynamic and distributed network requirements. When an emergency or crisis hits, networks need to be able to…
Six Steps for Securing Your Remote Workforce at Scale

Six Steps for Securing Your Remote Workforce at Scale

Business continuity and disaster recovery plans are designed to address an organization’s need to quickly suspend normal on-site operations in the event of a power outage, illness, or natural disaster…
To Beat Ransomware, Consider the Human Side of Cybersecurity

To Beat Ransomware, Consider the Human Side of Cybersecurity

This is a summary of an article written for Threatpost by Derek Manky, Chief, Security Insights & Global Threat Alliances, FortiGuard Labs. The entire article can be accessed here.  The average cost of…
Addressing the Four Most Critical Cybersecurity Challenges of our Generation

Addressing the Four Most Critical Cybersecurity Challenges of our Generation

T his is a summary of an article written for The World Economic Forum’s Agenda by Fortinet’s Ken Xie, Founder, Chairman of the Board, and CEO. The entire article can…
Why Network Segmentation Matters

Why Network Segmentation Matters

When IT leaders hear about segmentation, their first thought is usually about dividing a network up using VLANs or VXLANs. But segmentation also plays a critical security role in securing…
How the Global Cybersecurity Skills Shortage is Impacting Business

How the Global Cybersecurity Skills Shortage is Impacting Business

Far too often security is being overlooked in a rush to embrace digital innovation. As a result, as businesses rapidly adopt new technologies and computing platforms, they are also opening…
Fortinet Optimizes Network Performance With Secure SD-WAN

Fortinet Optimizes Network Performance With Secure SD-WAN

Fortinet Secure SD-WAN, deployed by over 21,000 customers globally, has transformed WAN edge architecture by delivering optimal user experience while reducing complexity. The ongoing creation and refinement of a WAN…
Staying Ahead of Cybercriminals with AI and Playbooks

Staying Ahead of Cybercriminals with AI and Playbooks

This is a summary of an article written for Threatpost by Derek Manky, Chief, Security Insights & Global Threat Alliances, FortiGuard Labs. The entire article can be accessed here.  For many…
The Functional Requirements of a Security Platform

The Functional Requirements of a Security Platform

Security manufacturers increasingly refer to their solutions as a platform, with the vague implication that this gives their technology a distinct advantage. The challenge, of course, is that the term…
Fortinet’s NP7 is Key to Secure the Hyperscalability Mandatory in 5G

Fortinet’s NP7 is Key to Secure the Hyperscalability Mandatory in 5G

As the availability of 5G begins what is likely to be known as the 5G era, a few daunting questions need to be addressed to ensure its ability to meet…
FortiAI: Virtual Security Analyst Revolutionizes Threat Protection for SecOps

FortiAI: Virtual Security Analyst Revolutionizes Threat Protection for SecOps

Today’s businesses are fully aware of the consequences of a successful cyber attack, and yet they continue to struggle to put together a cyber security strategy that can deal with…
Fortinet’s Longstanding History of AI-driven Security

Fortinet’s Longstanding History of AI-driven Security

Almost two years ago, we unveiled one of our most mature AI-based backend systems – the Self-Evolving Defense System (SEDS) leveraging artificial intelligence from FortiGuard Labs. Developed as an Artificial Neural Network (ANN)…
How Security Performance Drives Digital Innovation

How Security Performance Drives Digital Innovation

In 1969, the very first e-message was sent over the ARPANET from computer science Professor Leonard Kleinrock’s UCLA laboratory to a network node located at Stanford. That event kicked off…
Fortinet Prioritizes Cybersecurity Skills Gap Through Several Program Offerings

Fortinet Prioritizes Cybersecurity Skills Gap Through Several Program Offerings

Today’s networks are more sophisticated than ever, constantly welcoming new technology designed to boost productivity and more effectively manage customer relations. At the same time, this push for digital transformation…
Enhancing Your Security Team with AI-Driven Security Operations

Enhancing Your Security Team with AI-Driven Security Operations

Automatically Prevent, Detect, and Respond to Cyber Threats Managing security, regardless of the size of the organization, has always been a complicated task. This is usually the result of a…
Know “Who” and “What” With Zero-trust Network Access

Know “Who” and “What” With Zero-trust Network Access

Identify and Secure Users and Devices, On and Off Network When security is focused primarily on the perimeter, those attackers, malware, and infected devices that manage to bypass edge security…
Hyperscale Security Enables “The Art of What’s Possible”

Hyperscale Security Enables “The Art of What’s Possible”

Hyperscale security is actually possible. Of course, that’s probably not been your experience. You are probably imagining having to duct tape together a stack of firewall appliances and run them…
Fortinet Redefines the Open Security Platform

Fortinet Redefines the Open Security Platform

Fortinet uniquely delivers an effective security platform – the Fortinet Security Fabric – built around three critical principles:  Broad – Visibility and protection need to extend across the entire digital attack surface. With…
Protecting Today’s Networks with Dynamic Cloud Security

Protecting Today’s Networks with Dynamic Cloud Security

In today’s networks, organizations have to figure out how to secure data that is regularly moved back and forth between private and public clouds. Complicating things further, a growing number…
Defining Security-driven Networking

Defining Security-driven Networking

Secure and Accelerate the Network and User Experience Digital transformation has changed networks so thoroughly and so rapidly that traditional security tools can no longer provide the consistent security that…
Every Second Counts in Endpoint Protection: Why Real Time Matters

Every Second Counts in Endpoint Protection: Why Real Time Matters

When dealing with wildfire – such as the raging fires that have devastated large parts of Australia, or the chronic fires that have been plaguing both Southern and Northern California…