Securing the Internet of Medical Things: What to Do Now

  • in Blog Posts
  • by
  • August 4, 2017
  • Comments Off on Securing the Internet of Medical Things: What to Do Now

Due to the sensitive information housed within medical records (Social Security numbers, addresses, medical claim data etc.), healthcare has always been one of the most frequently targeted industries by cybercriminals. Hackers who successfully steal this data can profit in a big way, as it has high value in the cybercrime black Continue Reading

3CX is Paving the Way for Rapid Growth in Germany with Askozia Acquisition

  • in Blog Posts
  • by
  • August 3, 2017
  • Comments Off on 3CX is Paving the Way for Rapid Growth in Germany with Askozia Acquisition

3CX acquires Askozia’s skills, Linux technology and user base to increase German market presence LONDON, UK, HANOVER, GERMANY, 03 AUGUST 2017 – 3CX, developer of next-generation software-based Unified Communications solution, announces the acquisition of Askozia, German provider of the Asterisk based IP telephone system AskoziaPBX. With more than 10.000 SMEs Continue Reading

FortiCloud Now Manages FortiGate UTM Appliances

  • in Blog Posts
  • by
  • August 3, 2017
  • Comments Off on FortiCloud Now Manages FortiGate UTM Appliances

We are proud to announce that full cloud-based management will be available on August 14th for our FortiGate UTM products through the FortiCloud services.  We have seen impressive growth in the adoption of our FortiCloud solution over the past several years that has validated the value of a cloud management model Continue Reading

15.5 Update 1 (SP1) Released in BETA

  • in Blog Posts
  • by
  • August 2, 2017
  • Comments Off on 15.5 Update 1 (SP1) Released in BETA

We have managed to make Update 1 (SP1) available just in time for your holidays! Update 1 has a good number of features for administrators and users of 3CX alike. Extensive IP Phone Configuration options We have greatly expanded the configuration options available for supported phones. Now you can configure Continue Reading

Bringing Your Cloud Visibility Back Into Focus

  • in Blog Posts
  • by
  • August 2, 2017
  • Comments Off on Bringing Your Cloud Visibility Back Into Focus

Like data center sprawl, virtualization sprawl occurs when the numbers, locations, and functions of virtual machines distributed across a network grow to the point that they can no longer be managed effectively. As organizations continue to move applications and other core workloads into the cloud, virtualization sprawl can give way Continue Reading

How FortiSIEM Works to Keep Schools Safe

  • in Blog Posts
  • by
  • July 30, 2017
  • Comments Off on How FortiSIEM Works to Keep Schools Safe

Networks used by educational institutions benefit from being open and promoting a limitless flow of information and ideas. However, much like the student-teacher relationship, the user-network relationship is one that must be built on trust. The extent of personal information and intellectual data that is often housed on these networks Continue Reading

For Cybercrime, Innovation is the Land of Opportunity

  • in Blog Posts
  • by
  • July 30, 2017
  • Comments Off on For Cybercrime, Innovation is the Land of Opportunity

The first day here at Black Hat is over. On the expo floor, a number of vendors are promoting that they now provide critical threat intelligence along with the other technologies they provide. Of course, in general, this is a good thing. The biggest challenge organizations have historically faced has Continue Reading

Thoughts from Black Hat on Threat Intelligence and Automation

  • in Blog Posts
  • by
  • July 30, 2017
  • Comments Off on Thoughts from Black Hat on Threat Intelligence and Automation

The biggest trend in security today seems to be information sharing. Everyone agrees that sharing threat intelligence is key to detecting and stopping attacks. The challenge isn’t that there aren’t enough sources for threat intelligence, but that there is simply too much information being generated, and that includes far too Continue Reading

Evolving Towards Intent-Based Security

  • in Blog Posts
  • by
  • July 30, 2017
  • Comments Off on Evolving Towards Intent-Based Security

In this second installment, begun with ”The Evolution of the Firewall,” we will take a look at the direction security is headed. From its humble beginnings, the firewall has evolved through several stages of development. Its latest incarnation, built on the legacy of its first two generations, implements the strategic Continue Reading

NSS Labs NGFW Report: Fortinet Receives 4th Consecutive Recommended Rating

  • in Blog Posts
  • by
  • July 30, 2017
  • Comments Off on NSS Labs NGFW Report: Fortinet Receives 4th Consecutive Recommended Rating

One of the biggest security challenges organizations face is sorting through solutions from literally hundreds of vendors in the IT market to find the one that is going to provide them with the best protection at a cost they can afford. Each of these vendors claims to solve critical security Continue Reading

Page 5 of 135« First...34567...102030...Last »