Fortinet Provides Threat Intelligence Technology Cloud Based Sandboxing and IP Reputation Services

Fortinet Provides Threat Intelligence Technology Cloud Based Sandboxing and IP Reputation Services

Fortinet, a provider of high-performance network security, today announced that the company’s FortiGuard Labs launched new, cloud-based sandboxing and IP reputation services that are designed to help protect against advanced persistent threats (APTs). The new services provide additional protection capabilities for the company’s FortiGate, FortiCloud,  FortiWeb, FortiDDoS  and FortiDNS, all network and application security platforms.

Advanced Persistent Threats (APTs)

APTs are usually operated by highly-skilled teams or governments and use advanced technology and multiple methods and vectors to reach specific targets and obtain sensitive or classified information. Also known as targeted attacks, reconnaissance is carried out on each target to determine the best method of entry. Social engineering or zero day vulnerabilities are the most common infection vectors.

FortiGuard Cloud-Based Sandboxing Service

The FortiGuard, cloud-based, sandboxing service uses behavioral attributes to detect malware by executing them within a virtual environment. This serves as an additional protection layer that complements FortiGate’s existing, award-winning, antivirus engine and its unique, inline, and lightweight sandbox. Suspicious files can be submitted automatically to the new, hosted service for further scanning, without significantly impacting FortiGate’s performance. In addition, FortiCloud has added a new feature that serves as the online, sandboxing portal, providing detailed status and visibility into the scanned results.

FortiGuard IP Reputation Service

FortiGuard Labs continually investigate and monitor IPs that are compromised or behaving abnormally. The service uses a number of different techniques, including historical analysis, honeypots and botnet analysis to provide immediate protection for FortiGate, FortiWeb and FortiDDoS platforms against wide-scale, automated attacks. The service also continuously learns from a global footprint of threat sensors, tracking malicious events to IP addresses in real time.

“Today’s advanced persistent threats are challenging both IT personnel and network security vendors. While the signature approach to malware abatement is not going away overnight, additional dynamic safeguards need to be implemented now in order to effectively combat these threats at all layers in rapid fashion,” said Derek Manky, global security strategist for Fortinet. “The new services announced today offer a strategic approach to detect and respond to breaking threats from numerous attack vectors. Modern threats strike and shift quickly, and so should detection.”

For more information, please visit Fortinet at http://www.fortinet.com/.

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • Today's Enterprise

    Protecting servers and data has evolved rapidly over the past 15-plus years. Early on, concerns centered around the environmental conditions of where servers were housed within a building and the effects of humidity, temperature and air quality on their performance. This led to a better understanding of the need for a controlled environment to maximize equipment lifespan and capacity. It was also a driving force behind consolidating servers in a common space, i.e., the data center. Read Now

  • Study Proves It: Security Awareness Training Reduces Phishing Attacks

    Attackers are increasingly targeting human-based vulnerabilities to infiltrate organizations. Humans have direct access to insider systems and data – any threat actor can easily phish users, steal their credentials and secure keys to the kingdom without having to fight advanced cybersecurity defenses. Studies show social engineering attacks and human errors are behind 68% of all breaches.  Read Now

  • Security Questions Persist After Attempted Assassination Attempt of Donald Trump

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3