Aktueller Inhalt

  • SD-WAN im zeitalter der digitalen transformation

    SD-WAN im zeitalter der digitalen transformation

    Agilität für Ihr Unternehmen, ohne die Netzwerksicherheit zu beeinträchtigen

    Mehr erfahren
  • Fortinet Security Fabric

    Fortinet Security Fabric

    This one-minute animated video illustrates how Fortinet Security Fabric protects your entire network from IoT to the cloud.

    Mehr erfahren
  • FortiSandbox Free Trial

    Mehr erfahren
  • CISO Hiring Guide: Defining and Writing Effective Job Descriptions

    CISO Hiring Guide: Defining and Writing Effective Job Descriptions

    Staffing is a competitive business process. While it’s a given that the quality of people an organization hires determines its success, staffing does not occur in a marketplace vacuum...

    Mehr erfahren
  • Checkliste: Wie Fortinet die SD-WAN-Anforderungen löst

    Checkliste: Wie Fortinet die SD-WAN-Anforderungen löst

    Für effektive Sicherheit und Netzwerke muss die richtige SD-WAN-Lösung implementiert werden.

    Mehr erfahren
  • Webinar: Ransomware Solved. Cryptojacking, Next.

    Webinar: Ransomware Solved. Cryptojacking, Next.

    Join our panel of experts as they discuss the types of tactics cybercriminals are leveraging, plus learn about how Fortinet’s ATP approach stops delivery of malware across the dynamic attack surface.

    Mehr erfahren
  • WEBINAR: Fighting Cybercrime with Artificial Intelligence

    Watch Now
  • Fortinet SD-WAN Overview

    Fortinet SD-WAN Overview

    Watch this video to learn about SD-WAN and Fortinet's solution, and also catch up on what's happening in the market today.

    Mehr erfahren
  • Get Ready for the 5G Security Transformation

    Get Ready for the 5G Security Transformation

    5G will usher in a new era of wireless networking, or at least that is what the headlines would have us believe. The promise is that 5G will offer much faster connection speeds than...

    Mehr erfahren
  • CISO Hiring Guide: Planning a Job Posting Strategy

    CISO Hiring Guide: Planning a Job Posting Strategy

    Getting the word out to potential candidates about a new open opportunity at your organization represents the second phase of a six-part CISO Hiring Guide series...

    Mehr erfahren
  • Perspective: The Aftermath of the WannaCry Attack

    Perspective: The Aftermath of the WannaCry Attack

    A perspective blog with Derek Manky, Global Security Strategist, Fortinet. We asked Derek to put WannaCry into context. Is this just the eye of the storm?

    Mehr erfahren
  • CISO Hiring Guide: Prescreening and Shortlisting Strong Candidates for Interview

    CISO Hiring Guide: Prescreening and Shortlisting Strong Candidates for Interview

    The purpose of applicant prescreening is to make the hiring process more manageable by reducing the set of plausible candidates to a number that a hiring organization can evaluate without information.

    Mehr erfahren
  • New Ransomware Follows WannaCry Exploits

    New Ransomware Follows WannaCry Exploits

    Petya, a new ransomware variant sweeping across the globe. Understand its impact on a wide range of industries and organizations.

    Mehr erfahren
  • WannaCry: Five Steps Every CISO Should Consider for Protecting Your Organization from Ransomware

    WannaCry: Five Steps Every CISO Should Consider for Protecting Your Organization from Ransomware

    Over the past few days WannaCry malicious malware variants affect hundreds of organizations across the world. This cyberattack spread primarily by exploiting a vulnerability whose manufacturer...

    Mehr erfahren
  • CISO Hiring Guide: Interviewing as a Two-Way Communication Process

    CISO Hiring Guide: Interviewing as a Two-Way Communication Process

    Now that you’ve attracted the right applicants and narrowed down the list to the right number of candidates to interview, you can start prepping for the interviews.

    Mehr erfahren
  • CISO Hiring Guide: Selecting the Winning Candidate

    CISO Hiring Guide: Selecting the Winning Candidate

    The candidates have interviewed with key stakeholders, and now it’s time to select a winner to make an offer. How do you decide which candidate to choose? Ironically, if your organization has done...

    Mehr erfahren
  • Petya ransomware victims can't get their files back even if they pay up - TNW

    Petya ransomware victims can't get their files back even if they pay upTNWFollowing the spread of the dreaded Petya ransomware that did the rounds yesterday and locked people out of their files on...

    Mehr erfahren
  • Threat Landscape Report: Virtually No Firm is Immune from Severe Exploits

    Threat Landscape Report: Virtually No Firm is Immune from Severe Exploits

    Highlights from the latest Fortinet Threat Landscape Report, a valuable resource for any organization looking to stay ahead of today’s latest threat challenges.

    Mehr erfahren
  • Fortinet Announces Enhancements to Our Security Services Portfolio

    Fortinet Announces Enhancements to Our Security Services Portfolio

    Fortinet's threat intelligence security subscriptions ensure that your Fortinet security solutions are tuned continuously with up-to-the-minute insight into threats occurring anywhere in the world...

    Mehr erfahren
  • Is Cryptojacking Replacing Ransomware as the Next Big Threat?

    Is Cryptojacking Replacing Ransomware as the Next Big Threat?

    Cryptojackers have clearly discovered that, if done properly, leveraging the processing power of a hijacked system to mine for cryptocurrencies can be a potentially long-term profitable venture.

    Mehr erfahren
  • Closing the Sandbox Generation Gap

    Closing the Sandbox Generation Gap

    Changing times call for evolved security. 7 reasons why next-generation sandboxing is a requisite.

    Mehr erfahren
  • Webinar: Fighting Cybercrime with Artificial Intelligence

    Webinar: Fighting Cybercrime with Artificial Intelligence

    Learn more as we examine a system comprised of highly efficient deep machine learning neural networks that are currently deployed and proactively defeating malware attacks.

    Mehr erfahren
  • Outsmarting the Next Ransomware with Advanced Threat Protections

    Outsmarting the Next Ransomware with Advanced Threat Protections

    Ransomware has recently reasserted itself into the public eye in a big way. The May cyberattack carried out by the malware WannaCry was one of the worst ransomware attacks ever, affecting over...

    Mehr erfahren
  • MEF lines up SD-WAN and LSO Sonata standards for Q2 release

    MEF lines up SD-WAN and LSO Sonata standards for Q2 release

    MEF plans to have its SD-WAN and LSO Sonata API standards published late in the second quarter of 2019. The forum is aligning key components this year to aid operators with orchestrating their...

    Mehr erfahren
  • AT&T's Rita Marty: Machine learning is crucial to 5G security

    AT&T's Rita Marty: Machine learning is crucial to 5G security

    AT&T is relying on its machine learning capabilities to provide cybersecurity for its 5G deployments. Rita Marty wrote in a company blog on Thursday that AT&T's years of experience deploying...

    Mehr erfahren
  • Securing the New Network Edge

    Securing the New Network Edge

    A single, holistic security strategy comprised of interconnected solutions provides a comprehensive approach that is not only manageable and cost effective, but also fluid enough to adapt as...

    Mehr erfahren
  • Predator the Thief: New Routes of Delivery

    Predator the Thief: New Routes of Delivery

    FortiGuard Labs discovered a running campaign against Russian-speakers using a new version of “Predator the Thief” stealer malware. The same actor was using one set of dummy files to deliver the...

    Mehr erfahren
  • WEBINAR: Fighting Cybercrime with Artificial Intelligence

    Watch Now
  • Preparing for the Cy-Phy Future

    Preparing for the Cy-Phy Future

    We are entering the era of Cy-Phy — the convergence of cyber space with a plethora of devices and data in our physical spaces. Organizations need to start preparing today by developing security...

    Mehr erfahren
  • FortiProxy Secure Web Gateway Demo 15:12

    FortiProxy Secure Web Gateway Demo

    <p>With the increase in SSL web traffic, zero-day malware, and the growing number of social websites, enterprises are turning to secure web gateways to protect employees from Internet-borne attacks.</

    Video ansehen
  • Accelerate Keynote Opener-16x92:26

    Accelerate Keynote Opener-16x9

    Video ansehen
  • Intel scraps its 5G smartphone modem plans

    Intel scraps its 5G smartphone modem plans

    Intel said it will be exiting the 5G smartphone modem market in a surprising announcement, opting instead to continue to invest in its 5G network infrastructure business. Intel was expected to...

    Mehr erfahren
  • FortiDeceptor Enables a New Breach Protection Approach

    FortiDeceptor Enables a New Breach Protection Approach

    Mehr erfahren
  • Welcome Video0:39

    Welcome Video

    Video ansehen
  • Digital Big Bang Promo Video1:08

    Digital Big Bang Promo Video

    Video ansehen
  • MEC: The Definition Disparity

    MEC: The Definition Disparity

    Edge computing in a mobile environment promises to underpin a variety of new technologies and services. But what exactly does MEC even stand for? It depends on who you ask.

    Mehr erfahren
  • Mitigating OT Cyber Risk with the Fortinet Security Fabric

    Mitigating OT Cyber Risk with the Fortinet Security Fabric

    Mehr erfahren
  • Day 2 Accelerate Opener - 16x90:55

    Day 2 Accelerate Opener - 16x9

    Video ansehen
  • Accelerate Keynote Opener-16x9 [Archived on April 17, 2019]2:34

    Accelerate Keynote Opener-16x9 [Archived on April 17, 2019]

    Video ansehen
  • Industry Voices—Madden: Take it to the edge

    Industry Voices—Madden: Take it to the edge

    Where Amazon considers the “edge” to be hundreds of miles from the user, the mobile market sees it differently.

    Mehr erfahren
  • Report: Automation largely missing from enterprises' security efforts

    Report: Automation largely missing from enterprises' security efforts

    For the most part, enterprises aren't tapping into the benefits of automation for their security efforts, according to a report sponsored by IBM. According to IBM Security's global study, just 27%...

    Mehr erfahren
  • 10 operators, including AT&T and Verizon, align around creating task force for NFVi

    10 operators, including AT&T and Verizon, align around creating task force for NFVi

    The Common NFVi Telco Task Force is seeking to reduce the number of NVFi versions in use today in order to speed up the deployment of VNFs. The task force is comprised of AT&T, Bell Canada, China...

    Mehr erfahren
  • Höchstleistungsrechenzentrum Stuttgart (HLRS)

    Hochverfügbares Firewall-Cluster eliminiert Tempolimit beim Höchstleistungsrechenzentrum Stuttgart

    Mehr erfahren
  • How Cloud Shifts Security Balance of Power to the Good Guys

    How Cloud Shifts Security Balance of Power to the Good Guys

    Cloud providers have the resources to fortify their data centers and hire armies of security pros, but they wield other powerful weapons to protect customer data.

    Mehr erfahren
  • loading
    Mehr laden…