PGA TOUR’s Fortinet Championship Returns September 15-18, 2022

We are thrilled to again sponsor this year’s PGA TOUR tournament held in Napa, California at the Silverado Resort and Spa. The Fortinet Championship will tee off September 15-18, 2022, as the first event of the PGA TOUR’s 2022-23 FedExCup Regular Season.

Aligned with the PGA TOUR, the Fortinet Championship provides Fortinet with the continued opportunity to deliver positive community impact with Bay Area non-profit organizations and the local Napa Valley community. Nearly all PGA TOUR tournaments are organized as non-profit organizations to maximize charitable giving, and to date tournaments across all Tours have generated more than $3.37 billion.

“We are excited to again have the Fortinet Championship leading off the 2022-23 FedExCup Regular Season in September,” said Tyler Dennis, PGA TOUR President. “Last year, the Fortinet team did a stellar job of meeting and often exceeding the PGA TOUR’s high standards for our tournaments. Our players, their families, and our fans love visiting Napa Valley. With Fortinet, we expect another spectacular event this year. We appreciate the company’s help in continuing to grow the popularity of our sport as well as the charitable impact the Fortinet Championship has on the local community.”

Last year’s highly successful inaugural Fortinet Championship set in California’s beautiful wine country was voted the most fan-friendly PGA TOUR event and included a Security Summit and Technology Vendor Exposition. The weekend brought together some of the world’s best golfers and their worldwide fan-base with the Fortinet community of customers, partners, and employees—some of the technology industry’s most accomplished leaders.

Security Summit and Tech Vendor Expo

This year’s Fortinet Championship will again feature a Security Summit and Technology Vendor Exposition, where we will facilitate discussions about the latest security innovations and networking trends. For over 20 years, Fortinet has been a driving force in the evolution of cybersecurity and the convergence of networking and security. Fortinet secures over half a million enterprises, service providers, and government organizations around the world. The company’s network security solutions are the most deployed, most patented, and among the most validated in the industry.

Supporting Local Nonprofits

Net proceeds from the Fortinet Championship support local nonprofits that share the Fortinet vision of building an inclusive and diverse workplace by helping close the cybersecurity skills gap. Fortinet helps to make possible a digital world that you can always trust. Its mission is to secure people, devices, and data everywhere.

“The Fortinet Championship brings together the greatest minds in the industry to double down on the most pressing cybersecurity challenges today.  A digital world you can always trust is essential to achieving just and sustainable societies,” said Fortinet CMO and EVP of Products John Maddison. “Fortinet has pledged to train 1 million people globally over 5 years through its Training Advancement Agenda (TAA) and Fortinet Training Institute programs to help close the cybersecurity skills gap. The partnership between Fortinet and the PGA TOUR and the Fortinet Championship itself benefits our community and customers as well as local nonprofit organizations.”

Fortinet and Corporate Social Responsibility

Fortinet has designated proceeds from the Fortinet Championship to benefit non-profit organizations in the areas of STEM, diversity and inclusion, and reskilling programs. These and other programs, such as Fortinet’s TAA Initiative, which provides free Network Security Expert (NSE) Certifications and training, as well as academic partner and education outreach programs are cultivating a skilled, inclusive, and diverse cybersecurity workforce to help close the cybersecurity skills gap.

Because a digital world you can always trust is essential to achieving just and sustainable societies, at Fortinet, we believe it is our corporate social responsibility to deliver on that vision by innovating sustainable security technologies, diversifying cybersecurity talent, and promoting responsible business across our value chain.

More About the Fortinet Championship and the PGA TOUR

All four rounds of the Fortinet Championship will be televised on Golf Channel, featuring a competitive player field playing for the chance at 500 FedExCup points.

This week of amazing golf will be paired with the award-winning culinary and wine experiences people have come to expect from Napa.

For more, visit

Fortinet Brand Ambassadors

At the inaugural Fortinet Championship event last September, Fortinet brought together the world’s best players and technology leaders, an event that culminated in Max Homa winning the Fortinet Championship trophy on Sunday. Later that year, Max, the inaugural champion, was named a Fortinet Global Brand Ambassador. David Lipsky was added as a Fortinet Brand Ambassador in 2022.

About Max Homa

A Southern California native, Max Homa was born and raised in Valencia and earned a golf scholarship to attend the University of California Berkeley. He went on to win the PAC-12 Conference Championship, as well as the 2013 NCAA Championship individual honors, and competed in the 2013 US Open as an amateur. Before turning professional, Max was a member of the victorious 2013 Walker Cup team. Max won his first PGA TOUR event at the 2019 Wells Fargo Championship.

Since then, Max has had numerous great finishes on the PGA TOUR, highlighted by three wins. After claiming his first TOUR win at the 2021 Genesis Invitational, Homa followed up this season by winning the 2021 Fortinet Championship and 2022 Wells Fargo Championship. We expect that Max will return to Napa this year to defend his title.

About David Lipsky

David Lipsky – a rookie on the PGA TOUR this year – also grew up in California, competing on the La Canada High School golf team in Southern California. He attended college at Northwestern University in Illinois, and Lipsky won multiple tournaments in his college career, including the 2010 Big Ten Individual Championship, and was honored as an All-American in 2011. Following his graduation in 2011, Lipsky turned professional. Lipsky’s secured a win at the Korn Ferry Tour’s TPC San Antonio Challenge in 2020. This victory put Lipsky in position to earn his PGA TOUR card.

 Learn more about the Fortinet Championship here.

Sourced from Fortinet

Fortinet Elevates Its Commitment to MITRE Engenuity Center for Threat-Informed Defense

Fortinet is now an official Research Partner with MITRE Engenuity’s Center for Threat-Informed Defense (Center), a nonprofit organization with a global mission to “advance the state of the art and the state of the practice in threat-informed defense.”

As a new Research Partner, Fortinet will have a more prominent role in the organization’s high-profile projects. The ultimate goal for the Center, Fortinet, and other Center Participants is to change the game on the adversary by continually advancing our understanding of cyber adversaries and their tactics, techniques, and procedures and applying that knowledge to systematically advance the community’s ability to defend against those threats.

Center leadership considers Fortinet’s new Research Partner status as a very positive development. Jonathan Baker, Center Director and Co-Founder says, “Fortinet has taken a hands-on approach to changing the game on the adversary and advancing threat-informed defense. I appreciate their active engagement in the Center’s research program and their commitment to enabling defenders around the world to understand and defend against the latest threats. Fortinet has been a great Research Sponsor and now as a Research Partner, I am looking forward to seeing Fortinet continue to help us change the game on adversaries and advance threat-informed defense.”

The Beginnings of the Center for Threat-Informed Defense

In the fall of 2019, the Cyber Threat Alliance along with several other organizations, including major banks and high-tech corporations, came together as founders to create the Center and “a whole new approach to collaborative R&D in the public interest.” Currently, the Center is comprised of 29 member organizations (partners, sponsors, nonprofits, and affiliates) from around the globe and has 17 published projects.

Within a year of its founding, Fortinet was collaborating with the Center. In fact, Fortinet was instrumental in helping create a recently published research paper titled 2021 ATT&CK Sightings Report.

This paper is based on a research project run by the Center in collaboration with some of our FortiGuard Labs staff and several other Center participants’ employees. The researchers analyzed more than one million attacks using the MITRE ATT&CK® framework, collected over 28 months (April 1, 2019, to July 31, 2021), to provide contextual and actionable threat intelligence that details how attackers are conducting their criminal activity.

The key intelligence found in the Sightings Report is that 90% of all cyberattacks use one of just 15 techniques across six tactics. This takeaway is extremely helpful because it significantly reduces the number of likely threats from the entire list of more than 370 possible techniques across 14 tactics. Therefore, defenders can focus their efforts on the “usual suspects,” instead trying to use limited resources to protect against hundreds of unlikely threats. Imagine trying to play Whack-a-Mole with almost 400 possibilities instead of just 15 or 20 “moles.”

Where the Action Is

In the Center’s collaborative R&D process, Fortinet has found the results extremely beneficial and the experience rewarding. An additional Center project that Fortinet was deeply involved in along with the Sightings Report is called Attack Flow. This project’s goal was to show how the latest attacks are moving from left to right on the kill chain or the ATT&CK framework. The data acquired not only indicates how attackers are moving through compromised networks but also what assets attackers are targeting. The Attack Flow findings provide a window into where actions occur, enabling IT security teams to deploy specific defense strategies to use in response.

Lacking attack flow data, leadership cannot see how attacks map to specific assets in their network, especially when multiple attack flows are possible. The Center described the problem as “Defenders often track adversary behaviors atomically, focusing on one specific action at a time. This makes it harder to understand adversary attacks and to build effective defenses against those attacks.” This enables more realistic attack scenarios for red team exercises and more focused threat hunting. Shortening the dwell time is paramount to limiting the exposure after a breach.

The attack flow intelligence that the Center collaboration generated in this project assists defenders on what techniques, tactics, and processes to keep an eye out for and which assets to keep under close scrutiny. Attack Flow helps “defenders and leaders understand how adversaries operate and compose atomic techniques into attacks to better understand defensive posture.”

Future Projects

Fortinet is committed to new projects that extend the work invested into Sightings and Attack Flow, with the intent to help build corpus, develop tools for visualization, and add further contextual insight into the data.

Fortinet’s FortiGuard Labs believes that helping to drive these projects will have a meaningful and positive impact on the abilities of cyber defenders worldwide to continue to detect and mitigate the latest attack vectors.

Fortinet is looking forward to continuing to work with the Center for Threat-Informed Defense on important projects as a Research Partner. Stay tuned as we’ll share here about them when they are published.

Learn more about Fortinet’s FortiGuard Labs threat research and intelligence organization and the FortiGuard Security Subscriptions and Services portfolio.

Sourced from Fortinet

Fortinet Receives Highest Rating (AAA) from CyberRatings in Cloud Network Firewall Third-Party Test

In the first-ever third-party testing of cloud network firewalls, Fortinet FortiGate-VM earned the highest possible rating of AAA in all five categories of a test by CyberRatings, an independent, nonprofit member organization that provides transparency and expert guidance on cybersecurity risks via research and testing programs.

The CyberRatings “scorecard” for the Fortinet Cloud Network Firewall states, “Security Effectiveness was excellent; Fortinet blocked 35 out of 35 evasion techniques, 977 out of 977 exploits, and passed all the stability and reliability tests.”

Fortinet Continues to Raise the Bar for NGFWs Across the Infrastructure

Below is a summary of the Fortinet scores in the five testing categories of the CyberRatings test: 

  1. Management and Reporting Capabilities
  2. Routing and Policy Enforcement
  3. SSL/TSL Functionality
  4. Threat Prevention
  5. Performance

Efficient Routing and Policy Enforcement

Proper routing and policy enforcement is critical to secure perimeters and ensure compliance of the IT infrastructure in hybrid and cloud deployments. They encompass segmentation and access control of different virtual networks on the cloud and in the virtual data center.

FortiGate-VM received the highest possible rating (AAA) for all CyberRatings’ Routing and Policy Enforcement tests, ranging from simple to complex policies. IT teams can use FortiGate-VM to apply proper segmentation, ensuring isolation and protection of internet-facing zones (north-south perimeter). And they can also use appropriate access control to filter traffic in environments with multiple zones (east-west perimeter) at different trust levels.

Robust SSL/TLS Functionality

About 80% of internet traffic is encrypted and almost all e-commerce websites use HTTPS traffic. It is imperative that firewalls protecting IT assets correctly decrypt SSL/TLS traffic to inspect and make policy-based decisions. The TLS 1.2 and 1.3 cipher suites tested by CyberRatings are used by 98% of all websites.

FortiGate-VM received the highest rating possible (AAA) for preventing insecure ciphers, decrypting, and inspecting SSL/TLS traffic to block prohibited content, and improving performance by reusing TLS sessions.

Highest Level of Threat Prevention

As organizations shift to more hybrid IT architectures, spanning from on-premises to the cloud, the attack surface continues to expand. And with threats more advanced and persistent than ever before, the protection against known and unknown exploits and attacker tactics becomes even more paramount.

FortiGate-VM received an AAA rating for blocking 100% of all exploits and evasions in the threat prevention tests. Organizations can use FortiGate-VM to protect trusted networks from untrusted networks while allowing only authorized communications to pass—thereby facilitating secure business use of the internet.

Strong Management and Reporting Capabilities

One of the key concerns for organizations adopting cloud is management and operational complexity. IT teams need solutions that enable them to apply consistent policies across on-premises and cloud deployments. It is vitally important for cloud network firewalls to have management and reporting capabilities that support authentication, including role-based access control, as well as policies for customization, logging, alert handling, summary reporting, and change control.

FortiGate-VM received the top AAA rating from CyberRatings for the Management and Reporting Capabilities section of their test. FortiGate-VM firewall rules and device configuration can be managed using native web interface. Alternately, the FortiManager management application can be used for larger deployments with tens or hundreds of FortiGate-VMs and physical firewalls.

Excellent NGFW Price/Performance (TCO)

Unlike Fortinet, many other cloud network firewall vendors lack the performance needed to deliver effective security at an optimal price point. In many cases they must scale out to many instances even to deliver a minimum level of performance that does not impact user experience, driving up operational costs.

Again, Fortinet received top scores in the CyberRatings Performance category. Because we believe that effective security should not break budgets, the FortiGate-VM cloud network firewall supports virtual SPU (security processor) technology that applies packet acceleration and other optimizations to deliver significant performance advantages at an optimal cost point. With Fortinet, organizations can right-size their investment without compromising security on the cloud.

At the Foundation of Integrated Cloud Security

Not only has Fortinet been validated as a top-flight achiever across CyberRatings’ five categories, as well as by other reviews in the past, we have also designed our solutions to interoperate as part of our unique Fortinet Security Fabric, comprised of a broad portfolio of converged networking and security offerings across endpoints, networks, and clouds. By connecting FortiGate-VM to the Fortinet Security Fabric, we can support hybrid networks (on-premises and in the cloud) and multi-cloud environments.

IT teams struggle to address the many challenges that come with cloud network security. They must deal with architectural complexities like elastic scaling, management complexities with multiple consoles for different security aspects like NGFW, NAT, logging, SSL VPN, IPsec VPN, etc., and fragmented policies between on-premises and cloud deployments. Fortinet simplifies all aspects of network security management and operations in the cloud.

Powered by FortiGuard services, FortiGate-VM delivers a consistent and agile network security solution that keeps up with the dynamic cloud environment through deep cloud-native integrations with AWS, Azure, Google Cloud, and Alibaba Cloud. It also secures virtual data center environments through seamless integrations with software-defined network platforms like VMware, Nutanix, OpenStack, and others.

For large-scale cloud and virtual data center environments with many FortiGate-VM virtual firewalls and/or FortiGate physical firewalls, FortiManager can be used as a single pane of management, and FortiAnalyzer can be used for deep visibility into security events.

FortiGate-VM deployed in the Security Fabric with other Fortinet security technologies and third-party products delivers full visibility and control across the entire attack surface in the cloud—helping reduce risk, improving compliance, increasing operational efficiency, and optimizing costs.

Commitment to Third-party Testing

Fortinet is committed to third-party testing because we know it can aid customers in the decision-making process. IT teams are always searching for the vendor that can best support their security needs, but they have to wade through marketing materials—all claiming the superiority of their solutions.

The problem is that no two vendors use the same standards for marketing the performance and functionality of their solutions, so window shopping is nearly impossible. When it comes to security, the stakes are extremely high. This is why we believe independent, unbiased third-party nonprofits like CyberRatings are invaluable.

Unbiased Ratings, Reports, and Advice

The CyberRatings team has a unique combination of experience and breadth of knowledge with three decades of security-product testing expertise and proficiency. It provides unbiased ratings, technical reports, and expert advice to help organizations understand their cyber-vulnerability profile.

CyberRatings has well-established relationships with most large and small security vendors and has built a strong trust with vendors and enterprises. As a result, its tests are designed and conducted to the highest technical standards with meaningful independence.

Download the CyberRatings Cloud Network Firewall Report and learn why FortiGate-VM should be an essential part of your cloud network security.

Sourced from Fortinet

Strengthening the Human Element in Your Cybersecurity Stack

Many of us reach a point in life—and in our business—where we feel the need to refocus on our core capabilities and strengths and outsource or ask for expert advice on the rest. This strategic decision allows us to make even more significant leaps forward in those places we are uniquely capable of solving the issues at hand. 

In cybersecurity, we talk a lot about the need for end-to-end automation to support a dynamic and agile security posture capable of responding to new threat information in near real-time. Our industry translates this to being able to stop attacks in their tracks. We have all invested and will keep investing time and resources in building toward this vision as we choose to add new technologies, vendors, and partners to our cybersecurity ecosystem.

However, one area many security leaders tend to talk less about is the human component of cybersecurity strategies and how we can increase its impact on our overall success. Today, two-thirds of global leaders claim that the global skills shortage creates additional cyber risks for their organization, including 80% who reported experiencing at least one breach during the last 12 months they could attribute to the cybersecurity skills gap.

It is time to talk about the human element as part of your overall cybersecurity framework. 

Enhance, Automate, and Outsource – The Human Element 

If I asked you today how many of your technology security capabilities are being consumed as a service and how many more you are currently evaluating, the answer would be—most. Security vendors already operate, maintain, and advance critical security capabilities for your technology, be it your IPS, URL, DNS, sandbox, AV, CASB, IoT, etc., by providing security intelligence to keep them tuned to the latest threats. Teams of cybersecurity experts are already helping keep you ahead of today’s cybercriminals. The same goes for automated processes. Many of you are on a path to creating a fully automated security posture, SOC, and process flows. And in many cases, you and your vendors are on this journey together.

But when we talk about your people, there is less of an organized process, strategy, or priority—or, even time for skill enhancement. And even fewer are evaluating which tasks the SOC team performs that would be best to outsource.    

There are three strategies for applying services to your security team, employees, and partners to better protect your organization. The first is to enhance their capabilities with the skills and technologies of dedicated cybersecurity professionals who spend every day on the front lines of today’s cyber war. Next is to automate many of your team’s processes to improve accuracy, mean time to detect (MTTD), and mean time to respond (MTTR). And there are simply some aspects of cybersecurity you will choose to outsource to keep your team focused on the critical tasks at hand.



Many attacks today start with the exploitation of a vulnerability, whether it’s a technology or human failing (for example, phishing). We all strive to prevent and stop attacks as early as possible during the attack cycle by adding advanced capabilities like EASM, NDR, Deception, EDR, and even Secure Mail Gateways, and WAF to front critical assets. All to minimize damage and avoid the long process of remediation.

In many cases, your employees are your first line of defense. Suppose you evaluate your employees in the same way you assess technologies, looking for vulnerabilities (knowledge and skills gaps) that need to be “patched” on a regular basis? It should then be easy to understand the need for cyber-safe programs. This process of continual improvement can and should be built alongside partnering with a cybersecurity vendor/team well-versed in current attack tactics that can integrate that knowledge into your organization’s employee training program.

SOC teams and cybersecurity professionals

If you’re like most of us, your SOC teams are heads-down sifting through alerts, logs, and tasks. As a result, they find it difficult to find the time to stay sharp when it comes to the evolving attack threat landscape and the overarching state of your end-to-end security posture.

Practice will make your team better and faster in responding to attacks. Make time for it. Allocate time for tactical training a complete evaluation of capabilities, AND to build and test effective automation and playbooks, leveraging tools like SOAR. Cybersecurity experts actively working in threat hunting and Incident Response will have the real-world, hands-on experience needed to build and execute training for your team. It is also recommended that you evaluate and take advantage of onboarding and training programs that support short learning curve objectives and the optimization of investments.


The current intensity, both in velocity and sophistication, we are experiencing across the threat landscape means we all need to work even harder to stay on top of our game. But that can only get us so far. So, we must also work smarter, which is the driver behind building automated, self-learning systems and outsourcing some functions to dedicated experts. Such enhancements are a critical way to eliminate noise and help your team focus on their most critical tasks and advance your business. Outsourcing can serve many purposes. It can be used temporarily until your team is past the learning curve of new technology or as a permanent arrangement as an extension of your security team.

There are generally three areas where we see organizations outsourcing security functions: 

Evaluating security effectiveness

There is a maxim among cybersecurity professionals that the team that builds a security posture should not be the one that assesses its effectiveness. Leveraging an external team to perform these tasks will invariably produce a better result. These services can range from individual point-in-time assessments, like vulnerability or ongoing monitoring of your external attack surface management (EASM) to determine end-to-end readiness for attacks like ransomware. These assessments also support a much-needed risk-based prioritization of future investments.   

Outsourcing some or all of your SOC threat hunting capabilities

The outsourcing of active monitoring detection and response to threats extends from the endpoint (MDR), to the network, to full SOC responsibilities (SOC as a Service). And given the speed of today’s threats, prevention is best served with a fully automated cycle from detection to response. However, in most cases, the adoption of fully automated response will be tied to the trust level the SOC team has in the machine learning recommendations and data and not in technology capabilities, which as in all automation-driven fields, will evolve and expand with time, data, and expertise.  

Outsourcing some or all of your Incident Response capacities

The benefits of working with an incident response (IR) team before you are under active attack cannot be stressed enough. By engaging early, an IR team can help you evolve and strengthen your security posture. They will also obtain critical knowledge on your existing security deployment and any agreed-upon response and remediation processes. That, in time, will help reduce incidents and shorten the time required for remediation once an incident occurs.  


Everyone contributes to the problem of increasingly complex work environments. Marketing and engineering teams use multiple systems. Users employ numerous devices to connect to an even larger number of applications. The goal of every cybersecurity leader today should be to establish a unified security framework across the entire organization that prioritizes synergetic systems and centralized processes to deliver ML-powered automation.

But AI and ML are only as good as the data they are trained on and the people who teach them. When engaging with vendors offering ML-powered solutions, it is essential that you look inside the organization and figure out who’s designing their models. What datasets are they working with? Ensure that the process and automation used to gather, process, identify, and respond to incidents are trustworthy. 

FortiGuard Services Provide a Full Spectrum of Business-critical Support

As part of the industry’s leading fully integrated Security Fabric, delivering native synergy and automation across your security ecosystem, Fortinet also provides an extensive portfolio of technology and human-based as-a-service offerings. These services are powered by our global FortiGuard team of seasoned cybersecurity experts.

Book some time with this team of cybersecurity experts to learn more about how we can help you enhance, automate, and outsource critical security functions to keep your organization secure.  

Find out how Fortinet remains a global leader in broad, integrated and automated cybersecurity solutions: Fortinet Innovation series.

Sourced from Fortinet

Optimizing IT and User Experience by Bringing AIOps and DEM to SD-WAN

SD-WAN has emerged as a vital technology for enabling reliable and consistent connectivity, whether between users and the cloud or data center, between branch offices, or even between cloud platforms. Its ability to provide rapid cloud on-ramp, accelerate access to applications, monitor and resolve connectivity issues, and maintain optimal user experience has played a vital role in enabling organizations to compete effectively in today’s digital marketplace.

But as connections between networks, users, and devices continue to grow—both in scale and complexity—the ability of many IT teams to effectively monitor and manage them is reaching its limit. AIOps and DEM (digital experience monitoring) are designed to help organizations optimize and improve their SD-WAN business outcomes. Fortinet’s AIOps and DEM (Digital Experience Monitoring) solutions provide NOC teams with the advanced tools to manage and enhance user experience, ensure productivity, and increase business uptime.

Leveraging AIOps and DEM to enhance connectivity and user experience

Artificial Intelligence (AI) reduces the time needed to detect and resolve SD-WAN issues that can impact performance, productivity, and user experience which severely impact business outcomes. To address this challenge, organizations are increasingly turning to AIOps. According to Gartner, 40% of enterprises with SD-WAN deployments will be relying on AI by 2025 to automate Day 2 SD-WAN operations, up from fewer than 5% in 2021. They will also depend on AI to provide predictive maintenance to prevent issues by identifying and addressing them before they fail.

The other side of SD-WAN is user experience. User experience is directly tied to profitability and productivity. And managing user experience can be just as challenging as managing connections, and for many of the same reasons. However, many IT teams simply do not have the time or resources to adequately track and manage it. Because of this, nearly two-thirds of I&O leaders will be relying on DEM by 2026 to monitor and measure application, services, and endpoint performance, enabling them to address challenges before they impact the business.

Benefits of bringing Fortinet’s DEM and AIOps solutions to SD-WAN 

Adding DEM and AIOps to SD-WAN benefits both the business and IT sides of an organization. Improved user experience increases productivity directly impacting business competitiveness and profitability. But those outcomes are only possible because of the impact DEM and AIOps have on the underlying WAN infrastructure and the IT teams that need to support it.

The key advantages of adding these solutions to an SD-WAN deployment include the ability to pinpoint network issues faster, accelerate troubleshooting, and optimize network performance and resiliency to achieve operational efficiency. They also enable IT teams to stay ahead of potential issues in the WAN.

Adding AIOPs to SD-WAN empowers network admins to laser focus on the source of issues, quickly answering questions like, what is causing an outage or issue? How can we address it and ensure it’s avoided in the future? 

Additionally, adding DEM to SD-WAN helps address those critical troubleshooting issues all IT teams wrestle with, like, is the network the problem? Or is it coming from the PC, Wi-Fi, a service provider, or the server the application is hosted on?

What makes Fortinet DEM different? 

Legacy application and network performance monitoring tools lack the holistic, end-to-end visibility necessary to monitor, troubleshoot, and optimize today’s user-to-application experience. FortiMonitor, Fortinet’s digital experience monitoring platform, gives IT teams unmatched end-to-end visibility across their entire infrastructure, enabling them to observe and track any application, starting from the end-user (who could be working from anywhere—i.e., off- or on- network), across any network, and even into the infrastructure on which the application is hosted.

FortiMonitor monitors SD-WAN performance metrics such as link bandwidth, packet loss, jitter, and server response time to detect and alert IT teams about potential issues with actionable intelligence. This allows IT teams to realign user-to-application performance to maintain business objectives before the user experience is impacted.

What makes Fortinet AIOps different?

The challenge with adding AI to SD-WAN is that not all AI solutions are the same. The ability of an AI system to identify and address new challenges depends not only on the quality of the AI engine and on how carefully it has been trained, but also on the volume of data it has available from which to make decisions. Essentially, the more visibility, the better the outcomes for AI/ML

FortiAIOps builds upon some of the industry’s most sophisticated AI and ML technology, leveraging solutions across Fortinet’s AI-enabled Security Fabric. Our platform approach provides complete visibility across all of Fortinet’s networking solutions in addition to our security appliances and Fabric-enabled products. Centralized ML algorithms pour through and analyze these data sets, enabling dynamic insights and event correlation for the network operations center (NOC). 

Illustrating the value of DEM and AIOps to SD-WAN 

Fortinet is committed to continuous WAN Edge innovation and exploring new capabilities, features, and functionality to deliver new and emerging use cases to our global customers. Let’s explore some of the new potential ways adding DEM and AIOps to SD-WAN can address real-world challenges:

Use Case 1 (DEM): Optimizing employee digital experience over SD-WAN connections

Problem: For many organizations, Zoom is a business-critical application. SD-WAN connections that experience excessive jitter or packet loss can degrade Zoom performance and impact employee productivity. If this occurs, employees will be dissatisfied, and productivity and business outcomes will suffer.

Solution: By continuously monitoring multiple SD-WAN connections and testing Zoom application performance, DEM can proactively identify the best-performing SD-WAN connection. IT teams can then reroute Zoom traffic through that connection to optimize employee digital experience.

Use Case 2 (AIOps): Correlating and optimizing LAN to WAN experience

Problem: Maintaining performance is critical for ensuring a consistent user experience for users connected over a WAN. In this use case, while SLA data monitored by AIOps looks healthy, performance metrics for specific users being monitored are trending towards a potential issue.

Solution: AIOps determines that the SD-WAN performance and SLA settings are not the issue in this case (despite them manifesting to users as an issue with their cloud-based toolset). In this case SD-WAN is proved to be healthy, instead, AIOps determines that proactive LAN remediation is necessary and provides recommendations. This enables IT teams to address user issues before an application complaint is registered.

Adding AIOps and DEM creates a network capable of proactively identifying and addressing issues before users and systems are impacted. By automatically monitoring and optimizing user experience, troubleshooting performance issues, and reducing the risk of downtime, organizations can effectively maintain issues like productivity and user experience that are essential for effectively competing in today’s rapidly evolving digital marketplace.

Take a security-driven networking approach to improve user experience and simplify operations at the WAN edge with Fortinet Secure SD-WAN.

Sourced from Fortinet

Fortinet Training Institute Wins Industry Accolades

The Fortinet Training Institute has been recognized with various industry awards and accolades that highlight Fortinet’s commitment to cybersecurity training and certification. More recently, Fortinet was named one of SC Media’s 2022 Awards finalists for Best Professional Certification Program. Programs recognized in this award category contribute to the skilled cyber workforce through offerings that deliver custom expertise needed to ensure security teams are up to speed on the latest threats and security technologies and techniques.

These industry recognitions shed light on Fortinet’s commitment to closing the cybersecurity skills gap and its ongoing investment in training and certification, pledging to train 1 million people on cybersecurity across the next 5 years. Fortinet strives to deliver the best cybersecurity training and certification program in the industry.

The Evolution of Cybersecurity Training and Certification at Fortinet

In 2004, Fortinet introduced its first certification program, which included the designations Fortinet Certified Network Security Administrator (FCNSA) and Fortinet Certified Network Security Professional (FCNSP). These initial certification designations were supported by comprehensive hands-on technical training delivered directly by Fortinet and a small number of Authorized Training Centers (ATCs). While this initial Certification Program met the needs of our customers and partners at the time, the threat landscape has evolved dramatically and so too have the needs of cybersecurity training and certification.

Since the launch of the initial designations, the Fortinet NSE Certification program has evolved from two certifications (FCNSA and FCNSP) to an eight level Network Security Expert (NSE) program with over 400 hours of supporting training curriculum. The ecosystem supporting this program has also evolved from a small number of Authorized Training Centers (ATCs) to a global network in more than 130 countries and territories, more than 400 academic partners and a growing number of select non-profit organizations supporting diversity and inclusion within the cybersecurity industry.

While the ever evolving threat landscape has driven the need for the Fortinet NSE Certification program to expand, the quality of the program has been a direct result of continued corporate investment as well as the longstanding dedication to the program by our Curriculum Development team at the Fortinet Training Institute, many of our Fortinet Certified Trainers (FCTs) and ATCs. Our Curriculum Development team takes the lead on the program’s development, but several FCTs have been teaching Fortinet courses since the start of the program and have driven many quality improvements over the years as well. These quality improvements and program expansion have resulted in more than 840,000 NSE certifications being issued to date. Certainly, a major step towards our goal of closing the cybersecurity skills gap.

Cybersecurity Training Industry Recognitions

The goal of building the best cybersecurity training and certification program is also showing progress and those efforts have recently been recognized and validated by industry through a series of awards. The Fortinet Training Institute has been recognized with: 

  • Finalist for SC Media’s 2022 Awards for Best Professional Certification Program
  • Gold for Best Cybersecurity Training from the 2022 Cyber Security Excellence Awards
  • Silver for Best Security Training and Educational Programs from the Globee 2022 Cyber Security Global Excellence Awards®
  • 2021 Cybersecurity Breakthrough Award for Professional Certification Program of the Year
  • Gold for Best Cybersecurity Education Provider from the 2021 Cyber Security Excellence Awards
  • Gold for Best Cybersecurity Training from the 2021 Cyber Security Excellence Awards
  • Gold for Best Security Training and Educational Programs from the Globee 2021 Cyber Security Global Excellence Awards®
  • Silver for Best Security Training Marketing Program from the Globee 2021 Cyber Security Global Excellence Awards®

The Cybersecurity Excellence awards are produced by Cybersecurity Insiders in partnership with the Information Security Community on LinkedIn, tapping into the vast experience of over 400,000 plus cybersecurity professionals to honor the world’s best cybersecurity products, professionals and organizations.

The 17th Annual 2021 Cyber Security Global Excellence Awards® are produced by Globee Awards who issue business awards for eleven different award programs. Globee Awards nominations are reviewed and judged by industry peers and experts and the average score decides the winner in each category.

The silver award for Best Security Training Marketing Program was awarded for the Training Institute’s marketing campaign to open its entire catalog of self-paced NSE training courses to the public for free for anyone looking to learn new cybersecurity skills or upskill or add to their existing skills-base. Since launching the program, more than 1 million users have registered for self-paced courses and the program was so successful that Fortinet announced in January 2021 that the courses will remain free for the foreseeable future.

Fortinet Training Institute

For all awards, the Fortinet Training Institute was evaluated based on its breadth, depth and accessibility of its program offerings. Fortinet’s eight-level Certification Program is geared to all knowledge levels:  

  • NSE Levels 1 to 3 assess a user’s knowledge of the threat landscape and can be helpful for anyone who wants to become more cyber aware. 
  • NSE levels 4 to 6 are courses designed for a technical audience. These focus on one’s ability to install, configure, and troubleshoot comprehensive, integrated network security controls in live environments. 
  • NSE Levels 7 and 8 hone in on the expertise needed to fully leverage Fortinet solutions. To become NSE 8 certified, an elite distinction, candidates must have related industry experience and should have completed the appropriate Professional, Analyst, Specialist, and Architect designation training. Candidates are required to take a written exam plus a 2-day hands-on practical exam.

Find out more about how Fortinet’s Training Advancement Agenda (TAA) and Training Institute programs—including the NSE Certification programAcademic Partner program, and Education Outreach program—are helping to solve the cyber skills gap and prepare the cybersecurity workforce of tomorrow.

Sourced from Fortinet

Why ZTNA in the Cloud Isn’t Enough

Trying to secure an increasingly dispersed workforce isn’t easy. Work from anywhere could be just as accurately described as work from everywhere. Employees use their own devices to access critical business applications deployed in multi-cloud environments and on-premises corporate assets from home, office, and the road. Many organizations are managing complex ecosystems that are increasingly difficult to defend. And the problem is compounded when organizations attempt to rely on an array of rigid, outdated security tools.

To support work from anywhere, organizations use SD-WAN and tools that support the zero-trust network security model, particularly Zero Trust Network Access (ZTNA), which is used to secure application access. At a high level, zero-trust is based on the principle that a user or device can only be trusted after explicitly confirming their identity and status. It focuses on users, devices, and the specific resources being accessed, utilizing segmentation and zones of control. Every request for access must be authorized and continuously verified. Even once they have been granted access, users and devices only can access the resources required to do their job and nothing more.

The need to secure access any time and from virtually any place means ZTNA has become crucial to nearly every security strategy. A comprehensive zero-trust implementation needs to cover everything and everyone, no matter where they’re located. And because hybrid IT architectures aren’t likely to disappear for the foreseeable future, a cybersecurity approach that supports both cloud-delivered and on-premises is critical.

How ZTNA Works

Unlike a VPN, which assumes that anything that passes the network perimeter controls using an encrypted connection can be trusted, ZTNA takes the opposite approach: no user or device can be trusted to access anything until proven otherwise. At a high level, ZTNA has three pieces. The first is a client agent on the employee’s device. The second is a policy engine that determines whether the person is allowed access and what they are able to access. The ZTNA application access policy and verification process are the same whether users are on or off the network.

The final piece is the enforcement part, which needs to happen as close to the application as possible. Once a user has provided appropriate access credentials, they are given what is known as least privileged access, which means the person can access only those applications that they need to perform their job and nothing else. ZTNA operates in terms of identity rather than securing a place in the network, which allows policies to follow applications and other transactions end to end.

ZTNA Isn’t Just for Cloud Access

The ZTNA implementation from many vendors is limited to cloud-based applications, but cloud-only ZTNA doesn’t work for those organizations that have a combination of hybrid cloud and on-premises applications.

From an IT standpoint, setting up client-based ZTNA offers better visibility and control of devices, and you can perform application firewalling within the agent. So, if a security issue is detected, a file can be sent to the sandbox, or quarantine can be requested.

There’s also a performance aspect. Some vendors do enforcement from their cloud, which may work for certain SaaS applications, but isn’t great if you’re accessing resources in a data center. In that case, traffic needs to go back to the data center to do the enforcement, or it’s on-premises with edge compute.

A better approach is to have enforcement built into the firewall, which is distributed across the entire network through appliances or virtual machines. This design offers significant advantages from an efficiency standpoint.

All Firewalls are Not Created Equal

Some vendors have proclaimed that firewalls or even the entire network are “dead.” Or they’ll say you can’t put too much on the firewall because it will degrade performance. But it depends entirely on the firewall. A FortiGate can run Next Generation Firewall (NGFW) security, ZTNA, an access point controller, 5G controllers, and SD-WAN, which means you have one appliance, not five, and still deliver better performance than competitive offerings.

Legacy firewalls based on commercially available, generic CPUs can’t handle multiple applications, but the Fortinet FortiGate NGFWs can run ZTNA quickly and efficiently. ZTNA can sit in a FortiGate at a branch office and run proxy enforcement there. As an example of this branch architecture, some retailers now are putting edge compute in their retail outlets.

Networks are very much alive, even in cloud-centric environments. Security must be seamlessly converged with the underlying network to enable protections that can dynamically adapt to a constantly shifting network. In this environment, the network firewall becomes the foundation of a converged security and networking platform.

To provide exceptional performance for both security and networking functions, Fortinet uses custom ASICs that deliver an average of 15x more performance for the same price point of competitive solutions. The same engineering codebase that enables these physical security processors (SPUs) also enables the delivery of virtual chips (vSPUs) that provide similar acceleration in private and public cloud deployments.

Network and Security Convergence

To adapt to the shifts in the workforce and threat landscape, organizations need consistent converged networking and security that is available both on-premises and in the cloud. Trying to meld yet another point solution into an already complex networking situation is confusing at best. But Fortinet ZTNA provides application access and continuous verification of users with enforcement available everywhere using NGFW that you may already have. Today, users need access to all of their applications, no matter where the application or the user is located. ZTNA should be everywhere with everything secured through consistent policies and controls across all operating environments, including both on-premises and cloud.

Learn more about Zero Trust solutions from Fortinet that enable organizations to see and control all devices, users, and applications across the entire network.

Sourced from Fortinet

FortiNDR: Adding AI-Powered Network Detection and Response to Your Security Fabric

Today we are pleased to announce the availability of FortiNDR which, as the name reflects, adds robust network detection and response (NDR) to the Fortinet Security Fabric. Specifically, it provides purpose-built machine learning, deep learning, pragmatic analytics, and advanced AI capabilities to detect anomalous network activity that may indicate a security incident in progress.

Like everything else in our digital world, advanced persistent cybercrime continues to evolve. Today, it is faster, more destructive, and able to exploit vulnerabilities anywhere across the expanding attack surface. Many security operations teams are trying to fight back using legacy point security solutions with separate management consoles and reporting systems to manually identify and respond to threats. And they are trying to do this as their organization doubles down on digital acceleration efforts that expand the scale and complexity of their hybrid IT architecture, all during a global cybersecurity skills shortage.

These cybersecurity professionals are experiencing a challenge being felt in organizations worldwide. Technological advances are transforming networks, enabling employees and customers to access any data or application using any device from any location. These advances have transformed today’s global marketplace and fueled a transition to a digital economy. However, that evolution has not been met with the same level of innovation by today’s security vendors, leading the Word Economic Forum to declare that cybersecurity failure is among the greatest threats facing humanity within the next ten years.

The simple fact is, as networks continue to evolve and cybercriminals become more sophisticated, so too must an organization’s security tools.

Using Self-learning AI Capabilities to Accelerate Threat Detection With New FortiNDR

With three times more security and networking patents than any other cybersecurity vendor, Fortinet is committed to delivering solutions that leverage the latest technological advances, including AI and ML, to keep organizations ahead of the evolving threat landscape. FortiNDR is the latest outcome of this commitment, helping security operations teams shift from being reactive to being proactive by delivering the following features:

  • Detects signs of sophisticated cyberattacks utilizing advanced analytics and ML: With its self-learning AI capabilities, FortiNDR establishes sophisticated baselines of normal network activity for an organization and then identifies deviations that may indicate that a cyber campaign is in progress. This means earlier detection as organizations no longer need to rely on generic threat feeds that depend on threats or components becoming globally known before identifying indications of compromise.  
  • Utilizes both artificial intelligence and pragmatic analytics to identify threats: FortiNDR delivers pre-trained neural networks and ML-based on-premises traffic profiling to identify threats. Its advanced detection system provides sub-second malware classification and advanced analytics to identify high-risk network activity, such as the use of weak ciphers or communications with compromised IPs that may indicate an active intrusion. Its unique cloud-plus-on-prem AI approach combines the power of cloud computing with customization for each specific organization.
  • Offload intensive human analyst functions with a Virtual Security Analyst: FortiNDR includes a Virtual Security Analyst (VSATM) designed to offload human security analysts. It employs a Deep Neural Network – the next generation of AI – to analyze code generated by malicious traffic and determine its spread. VSA can also identify encrypted attacks, malicious web campaigns, weak ciphers and protocols, and classify malware. From outbreak search to tracing the source of infections, FortiNDR frees up expert cyber security professionals to focus on higher-order tasks, providing much needed relief given today’s cybersecurity skills shortage.
  • Identify compromised users and agentless devices: One of the most challenging tasks is detecting a compromise in the numerous devices on the network that cannot support an endpoint detection and response agent.) FortiNDR addresses this challenge by deploying a dedicated network sensor to analyze traffic originating from all devices, including personal, third-party, IoT, and OT devices.
  • Strong integration with the Security Fabric and fabric partners: FortiNDR is built to natively leverage Fortinet Security Fabric solutions. For example, it can work with FortiOS for inline blocking of previously unknown cyberattacks and use FortiNAC and FortiSwitch to quarantine at layer2 to contain threats in the event of a network breach. SecOps teams can also leverage FortiNDR APIs to integrate seamlessly with the hundreds of certified Fortinet fabric partners.

Implementing Fortinet’s Advanced Detection and Response Across Your Organization

As ransomware and other cyber risks continue to grow, most organizations are looking to add dynamic detection and response capabilities to their traditional prevention-oriented security controls. There are numerous solutions within this category.

  • FortiEDR for Endpoint Detection and Response: Many organizations are replacing their traditional endpoint security with advanced EDR technology that provides deep, host-level analysis to identify the signs of infection, including the presence of ransomware, on the endpoint.
  • FortiResponder MDR for Managed Detection and Response: Smaller organizations, or teams looking to offload the heavy lift of first-line alert monitoring and triage are adding MDR to add detection capabilities without needing a specialized SecOps team to run it effectively. 
  • FortiNDR for Network Detection and Response: Organizations with a seasoned cybersecurity staff are adding NDR to enable broader analytics and anomaly detection across segments of the network or the entire organization and provide a macro-level view of activity. It also provides insight into activity from devices without agents, such as IoT or unmanaged devices. And it supports faster deployment with zero impact to production systems
  • FortiXDR for eXtended Detection and Response: Organizations with multiple Fortinet security controls can implement FortiXDR to add curated detection analytics, AI-powered alert investigation, and automatable incident response.

Fortinet Enhances Your Detection and Response Strategy

Because Fortinet’s detection and response solutions suite is part of the Security Fabric, they fully interoperate with Fortinet’s networking, security, and third-party partner products. That means advanced threat correlation, centralized management and orchestration, and coordinated response to any threat anywhere across your distributed network, from the campus and data center to the cloud, branch and home offices, and mobile users and devices. 

As the world’s number one network security vendor based on devices shipped, our insight into cybercriminal activity on the network is unmatched and we encourage you to learn more or to test FortiNDR out for yourself. 

Visit the FortiNDR page for everything you need to know about network detection and response from Fortinet.

Sourced from Fortinet

Accelerate Keynotes: Fortinet is Uniquely Positioned to Address the Security and Networking Needs of Today & Tomorrow

Accelerate 2022 kicked off today with a series of keynote addresses from Fortinet’s executive team. Despite this being the first hybrid in-person and virtual event in over two years, these leaders’ vision and enthusiasm for the future were clear. While many competitor organizations struggled due to the global challenges of the recent pandemic, Fortinet not only experienced unprecedented growth but was also able to demonstrate the value of its founding vision.

Over these past two years, business continuity required networks to rapidly adapt and diversify, resulting in the creation of hybrid networks and highly distributed workforces. This resulting digital acceleration also led to fundamental changes in businesses, customers, industries, and governments. Today, people worldwide expect to access any information or application, regardless of where it has been deployed, using any device, and from any location.

Hybrid Networks Require a Converged Strategy

To meet these expectations, organizations have had to support two critical functions. First, they have had to rapidly expand the network edge, resulting in hybrid networks that span data centers, campus networks, branch and home offices, mobile users and devices, and multi-cloud environments. And second, they have had to provide consistent protection against the rising rate of cybercrime.

Helping customers effectively address these changes requires rethinking critical strategies, resulting in the need to converge networking and security. One result of this transition has been the merging of these markets, resulting in a total addressable cybersecurity market of nearly $200 billion. However, as networks and user demands continue to grow, the need for effective cybersecurity is growing significantly faster than the overall market. This demand is driven by a heightened awareness of the issues and challenges of cybercrime and the need to maintain visibility, control, and response by consolidating vendors to reduce overhead. 

Key Fortinet Differences

As the Accelerate 2022 keynote presenters made clear, Fortinet’s dramatic growth is a direct result of our founders seeing, and then acting on, the growing need for security performance, consolidated security functions, and the convergence of security with the network. Fortinet is enjoying the benefits of being uniquely positioned to address current market opportunities by being the only vendor to provide the following unique capabilities:

The industry’s fastest hardware

Rapid network expansion is outpacing the ability of IT teams to maintain their traditional point solution security approach. The reason, outlined by Ken Xie during his keynote session, is that security traditionally operates much slower than the network. To keep pace, security devices need to operate nearly a hundred times faster than the networking solutions they need to monitor and protect. While networking devices are all about connectivity, security solutions need to perform higher-level functions and provide deep inspection of traffic to protect the organization.

However, Fortinet is still the only security vendor to have invested in technology that can continue to deliver the performance organizations need. Fortinet’s custom security, networking, and SoC processors enable us to provide an average of five to ten times the performance of similarly priced solutions. And in some critical areas, such as inspecting encrypted traffic, that difference can be as much as 40 times faster.

And as anyone can see, as organizations invest in digital acceleration, the demand for performance will only increase. And without the innovation required to deliver the performance and integration today’s networks require, security vendors will continue to lag further and further behind. Investing in custom hardware can cost hundreds of millions of dollars and take a decade to produce an effective solution. Fortinet took that leap early and is already on its 7th generation (in the case of NP7) and 9th generation (in the case of CP9) of these processors.

And the result of this investment is not limited to hardware. The same engineering techniques used to build our custom ASICs have also allowed Fortinet’s engineering teams to develop and deliver virtual processors. This innovation ensures that Fortinet customers can enjoy reliable security performance that meets their networking needs across their entire distributed network.

FortiOS everywhere

Most organizations are becoming overwhelmed by the dozens of security solutions they have in place and the rapid expansion of those solutions and vendors as they add new network edges and environments. Point security solutions—even those bundled together in a single device—struggle to share and correlate threat intelligence, detect threats, and automatically deliver a coordinated response. Rather than building effective defense systems that can span the network, most IT organizations spend a third of their time simply trying to troubleshoot the workaround they have put in place to achieve a workable level of visibility and control.

FortiOS was designed over 20 years ago to address this issue. Beginning with four essential functions—firewall, VPN, antivirus, and IPS, today’s FortiOS supports nearly 30 critical technologies, including the industry’s broadest portfolio of security solutions and advanced networking functions. Because these solutions run on the same OS, they don’t just work well together. They are all actually the same product. This unique approach to product development means that management, orchestration, correlation, and interoperability are seamless and that a level of automation can be achieved that is simply impossible using separate point solutions.

This is possible because most Fortinet solutions are built organically. An SD-WAN solution built natively using the same OS as a firewall will simply function better than a solution that attempts to add security after the fact. And by building critical network capabilities into the OS, every solution is better able to see and leverage networking functions. And for those solutions acquired through M&A, Fortinet intentionally acquires organizations early in their development cycle to simplify their integration into FortiOS.

The Fortinet Security Fabric 

Because today’s networks are highly distributed, it is also imperative that security can be deployed consistently and run natively in any environment. FortiOS is also designed to be deployed anywhere—hardware, software, endpoints, clouds, containers, and even highly specialized OT environments. This enables organizations to deliver the same security regardless of where their network, applications, resources, and users are deployed, from offices to manufacturing floors to smart cars to harsh OT environments.

FortiOS powers the Fortinet Security Fabric to ensure that every deployment operates as part of an expansive, integrated platform. Fortinet solutions deployed natively in one cloud environment, for example, can use specialized Fabric Connectors to dynamically translate policies and configurations so applications and workflows that span hybrid networks, including multi-cloud environments, can provide consistent visibility and enforcement end-to-end. Similarly, Fortinet’s cloud-based solutions not only provide essential security SASE functions for remote and mobile users but also seamlessly tie them to the physical network, addressing a critical gap in most SASE offerings today.

The Fortinet Security Fabric also enables organizations to leverage their existing security and networking investments through its extensive use of common standards and open APIs. Over 500 integrations from across the industry, spanning security, management, networking, and even specialized OT solutions, interoperate seamlessly with the Security Fabric.

Fortinet is Uniquely Positioned to Secure the Network of the Future

Looking at the development of the security market over the past two decades makes it clear that the original insight of Fortinet’s founders will continue well into the future: Security will become a larger share of the networking market. And Fortinet is well-positioned to continue to meet the needs of organizations looking to enable digital acceleration through convergence. New advanced solutions, such as AIOps, integrated ZTNA and identity, zero-trust, and AI-enhanced outbreak detection, are only possible because Fortinet has converged critical security and network functions into a single, expansive platform.

Our unique approach makes Fortinet the only company able to excel at all key stages of network security. While virtually every security company claims the ability to detect threats, less than 50 have developed technology able to provide effective prevention and remediation. And of those, only a handful offer any sort of meaningful integration between solutions. But in most of those cases, not only is that integration superficial, but it also tends to only address a small subset of the entire expanding network. With our unique focus on organic innovation, only Fortinet provides a converged network and security platform that also delivers the performance and value that today’s networks require.

Fortinet is one of the world’s top cybersecurity brands, delivering broad, integrated, and automated protection via the Fortinet Security Fabric to enable organizations to securely accelerate their digital journey. 

Sourced from Fortinet

Ultimate Fabric Challenge Global Championship Winners Honored at Accelerate 2022

The winners of this year’s inaugural Fortinet Ultimate Fabric Challenge (UFC) Global Championship were honored at our annual customer and partner conference, Accelerate 2022. The Ultimate Fabric Challenge (UFC) is a series of regional cybersecurity skills–based competitions that occur during Fortinet conferences and training events around the world over the course of a year. The winners from each of these regional partner challenges faced off at the UFC Global Championship at Accelerate where first, second, and third prize winners were announced.

The UFC leverages curriculum from the award-winning Fortinet Training Institute, which is made up of various programs — including the NSE Certification program — focused on closing the cybersecurity skills gap.

Competition Details

After a very competitive and close competition, Ben Le Huray from Ingram Micro Australia (who is based in Sydney, Australia) came in first place, capturing the top spot in the UFC Global Championship. In addition to bragging rights, Ben received a first-place gold medal and $10,000 (USD). Second and third place winners, Rafael Rosseto dos Santos from Protega Security Consulting based in Brazil and Bart Sikkes from Pinewood, based in the Netherlands, received silver and bronze medals, respectively, and cash prizes. All three winners are NSE level 7 certified and attribute their expertise and knowledge to hours of training and preparation. 

The UFC is accessible to partners through Fortinet’s XPERTS Summits that take place around the world and virtually. Each XPERTS Summit competition acts as a qualifying event for the UFC Global Championship. The top-finishing teams in the four regions of North America, APAC, LATAM, and EMEA are acknowledged during each summit and invited to participate in the annual global competition.

In the competitions that lead up to the UFC Global Championship, small teams of two play against the clock and against other teams to complete several technical cybersecurity challenges presented to them in a “capture-the-flag-style” competition. Each team is required to securely deploy Fortinet Security Fabric core products into a modelled customer network

Upskilling Security Professionals Through the UFC

The Ultimate Fabric Challenge helps provide a forum for individuals who have invested time and effort to become skilled with Fortinet products to demonstrate their expertise to a wider audience. Participants use their skills and knowledge of Fortinet products to solve a series of objectives in a limited amount of time. In addition to Security Fabric products, the competition contains other “levels” (sets of objectives) covering important areas, such as SD-WAN, incident response, zero-trust network access, and others.

Narrowing the Skills Gap With the Fortinet Training Institute

The UFC is designed to support the larger Fortinet mission of closing the cybersecurity skills gap through the promotion of continued cybersecurity education and best practices. The Fortinet Training Institute provides certification and training in the growing field of cybersecurity through its programs, including the NSE Certification programAcademic Partner program, and Education Outreach program, which includes a focus on veterans. Fortinet is committed to closing the cyber skills gap through its TAA initiative and Training Institute programs, with a pledge to train 1 million professionals by 2026.

Learn more about Fortinet’s efforts in closing the cybersecurity skills gap: Skills Gap Perspectives.

Learn more about the Fortinet free cybersecurity training initiative and Fortinet’s Training Institute, including the NSE Certification program, Academic Partner program, and Education Outreach program which includes a focus on Veterans.

Sourced from Fortinet