Are Organizations Continuously Compromising Safety?

Integrated solutions are needed to prevent data theft and network disruption. There is no magic bullet, says Fortinet.

The threat landscape has seen a proliferation of highly targeted zero-day attacks and APTs that are designed to steal intellectual property or other critical enterprise data. Researchers at Fortinet’s FortiGuard Labs have discovered more than 140 new zero-day vulnerabilities to date, including 18 found in 2013 alone. 

“More than ever, enterprises require intelligent, integrated solutions to prevent data theft and network disruption caused by stealthy, targeted attacks. Despite what many vendors would have you believe, there is no one product or ‘silver bullet’ to solve this problem,” said John Maddison, vice president of marketing for Fortinet.

Fighting Advanced Persistent Threats
Fortinet today unveiled a major update to the company’s FortiOS network security operating system which incorporates few enhancements to combat Advanced Persistent Threats (APTs), zero-day attacks and other sophisticated malware. This Framework addresses increasingly complex cyber threats and reduces the risk of network breach and data loss. 

FortiOS 5.2
Fortinet’s ATP framework supports the recommendation of Gartner on protection from advanced targeted attacks. According to their report, “Designing an Adaptive Security Architecture for Protection from Advanced Attacks,” authors Neil MacDonald and Peter Firstbrook wrote, “All organizations should now assume that they are in a state of continuous compromise."

The authors added, “Comprehensive protection requires an adaptive protection process integrating predictive, preventive, detective and response capabilities.”

Key highlights of Advanced Threat Protection Framework

  • Access control: Reduces the attack surface by only allowing authorized users to access the network via authorized ports
  • Threat prevention: Proactively stops as many attacks as possible by inspecting code, traffic, web sites and applications
  • Threat detection: Continues seeking out indicators of compromise in order to identify previously unknown attacks that bypass traditional defenses
  • Incident response: Validates and contains incidents with expert security services, as well as automated actions and updates
  • Continuous Monitoring: Assesses and improves security posture against individual and industry baselines, while accommodating a rapidly evolving threat environment. 

Availability
FortiOS 5.2 software and the patch releases for FortiAnalyzer 5.0 and FortiManager 5.0, are all expected to be available in Q214. A release candidate of FortiOS 5.2 is available now for download and testing by registering: http://forti.net/beta 

Nike x Fragment Women


Add new comment