Financial, Healthcare, Government, and Retail IT Professionals Review Fortinet’s Enterprise Firewall Solution
Recognition in the Magic Quadrant for Enterprise Network Firewalls
Each year, Gartner evaluates the enterprise firewall market based on the capabilities and features of the solutions being offered throughout the cybersecurity space. The Gartner Magic Quadrant for Enterprise Network Firewalls examines today’s solution providers based on completeness of vision and how effectively they are able to execute this vision. According to the report, “products in this market must be able to support single-enterprise firewall deployments and large and/or complex deployments. These include traditional “big firewall” data center placements, branch offices, multitiered demilitarized zones (DMZs), and, increasingly, virtual versions for the data center and various cloud environments.” Learn more about Fortinet’s Enterprise Firewall and the company’s position as a Leader in the Gartner Magic Quadrant.
Cinema might be over a century old. But it’s showing no sign of slowing down. Even a quick glance through its history tells its own filmic story of technology’s progress through the decades. From humble, silent monochrome beginnings, through to the lush, colourful expanse of CinemaScope, 3D and today’s jaw-dropping digital effects, film has both pushed and chronicled the latest in technology for audiences worldwide.
The silver screen’s sparkle is showing no sign of dimming just yet, and it’s technology that pushes the multi-billion dollar film industry to the next generation of movie-goers. So, how is film doing this, and what can audiences look forward to?
Today, Microsoft Azure announced a brand new storage tier, Ultra SSD, which delivers extreme performance for critical applications such as SAP HANA, MS-SQL, and other databases. Some salient features are:
As the value of cryptocurrency continues to rise, a new form of malware has grown in popularity: crypto-malware. Though “crypto” may seem like a buzzword that’s popping up everywhere, it is very real when it comes to cyber threats. Crypto-malware is one of the latest malware threats, and it’s particularly insidious because it only requires CPU cycles to do its best work. It is classified as a “silent threat” – the longer it remains undetected, the better it is for the criminal. It’s a threat that is not likely to go away any time soon. Indeed, in a survey of 235 security professionals that Lastline conducted at Black Hat 2018, 56% think that cryptomining will still be the number one threat vector in 2019.
Over the last year, the IT Central Station team reached out to LogRhythm customers with one goal: to find out what made them choose LogRhythm as their SIEM solution.
As we looked into this customer feedback, we discovered that many LogRhythm users provided reviews that highlighted four particular benefits (among others) that made the LogRhythm NextGen SIEM Platform a strong contender in the SIEM market. In this post, we will highlight these features in more detail through the lens of unbiased reviews from LogRhythm customers.
SD-WAN has gotten a lot of attention recently. But one aspect that has been noticeably absent is solid multi-vendor testing. Now that NSS Labs—the industry’s premier independent testing organization for cybersecurity solutions—has released the results of its 2018 SD-WAN Group Test, that’s changing. This inaugural report provides insights into many of the top approaches to SD-WAN and can help organizations figure out which vendors they should focus on in a crowded and noisy market.
Moving to the latest 100 threat reports that specifically target the finance industry we can see that we have captured a Microsoft Office-based campaign. Various office file extensions comprise 62% of the recent file types with the remaining 38% being Portable Executable Files (see Figure 1).
Of the recent file types, 69% are Unclassified in terms of the specific type of malware detected. This means that at time of submission to Lastline they had already been submitted to VirusTotal, but there was no positive detection of maliciousness (see Figure 6). The unclassified rate for Microsoft Office files is 99% in this time frame.
A newly reported botnet named VPNFilter targets SCADA/ICS environments by monitoring MODBUS SCADA protocols and exfiltrating website credentials. This new botnet has already infected over 500,000 routers and network-attached servers. It also includes a bricking component that can render a single targeted device useless, or even render all infected devices useless simultaneously in a mass-scale attack.
The Talos threat research team at Cisco recently reached out to the members of the Cyber Threat Alliance (CTA) to report on their discovery of this botnet. Their responsible “early warning” sharing of this threat intelligence with other leading security researchers is exactly the sort of activity that CTA was created to provide. It allows all participating security vendors to understand a new risk and deploy actionable controls prior to the public release of threat details. It also provides an opportunity for members like Fortinet to look for additional details and context that we can share.
Early research indicates that VPNFilter is likely an advanced, state-sponsored modular malware system that has resulted in the widespread infection of primarily home and small business routers and network attached storage (NAS) devices. Activity from the campaign was initially seen in targeted, specific attacks in Ukraine, but data indicates that devices in over 100 countries are being scanned on ports 23, 80, 2000, and 8080, which are indicative of additional scanning for vulnerable Mikrotik and QNAP NAS devices.
In 2014, Lastline published a blog titled “Web Security for Advanced Malware and Persistent Threats”. Four years later it remains a very popular post—describing how Lastline compliments Secure Web Gateways (SWGs) to dramatically bolster web security—particularly against Advanced Persistent Threats (APTs).
A lot has changed since 2014. Complimenting SWGs with enhanced protection is of course still necessary — even more so today than four years ago. What has changed is that the threat exposure has continued to increase. APTs are more common and dangerous than ever and understanding how these threats have grown in complexity and sophistication is critical for those tasked with keeping their networks safe.
Fortinet has just released its Quarterly Threat Landscape Report for Q1 of 2018, and the numbers are interesting. While some of the most common threat indicators actually dropped during the quarter, the data also shows that attackers may simply be refining their technologies and methodologies.
Another interesting trend was the variety of attack vectors that were targeted. While Meltdown and Spectre dominated the headlines in Q1, and Microsoft continued to be the number one target for exploits, routers took the number two spot in total attack volume. Growing from a tiny risk just a few years ago, over one in five organizations now report mobile malware (up 7%, to 21%). At the same time, Web oriented technologies were also heavily hunted by cybercriminals. Another technology area under attack in Q1 was web Content Management Systems (CMS).