Richard Hannah is Vice President of Information Services and he oversees the entire IT environment at Gibson Energy. The company has doubled in size in recent years, and a major focus of Hannah’s has been to modernize and streamline the company’s IT infrastructure.
Home » Enterprise Security » Fireside Chat with Gibson Energy: Talking Data Center Consolidation, IoT and Cloud Security
The Evolution of Security: A Critical Panel Discussion at AT&T’s The Summit
On Wednesday, November, 1st, Fortinet held a critical panel discussion at The Summit, entitled “Winning the...
Other content in this Stream
Oil and Gas Company Secure IoT, Endpoints and Infrastructure with Fortinet NAC
Learn how a major oil and gas company uses Fortinet NAC for full visibility and control into all managed and unmanaged IoT devices, endpoints, and users.
NSS Labs NGIPS Test and Security Value Map
View the NSS Labs Security Value Map on IPS to see how FortiGate IPS and other IPS vendors were placed.
Fortinet Expands Security Fabric Offerings on Microsoft Azure with Sandbox and CASB Solutions
Learn more about our new product offerings and key capabilities now available on Azure.
Securing Your Azure Deployment with the Fortinet Security Fabric
This week during Microsoft’s Ignite conference, we introduced new Fortinet Security Fabric capabilities for the Azure cloud, further establishing our leadership position of offering the broadest,...
FortiGate Intrusion Prevention Continues to Excel in NSS Labs’ NGIPS Testing Results
NSS Labs gives coveted “Recommended” rating for Fortinet FortiGate IPS.
NSS Labs Next Generation IPS Test Report of FortiGate 3000D
FortiGate Next-Gen IPS receives a “Recommended” rating, again. Download the report and see the details of the test results.
Cyber Threat Alliance Members Issue First Collaborative Report on Cryptomining
The CTA has just released a new joint analysis report on the growing threat of cryptomining, an activity that poses both short and long-term threats to individuals and enterprises. This report...
Facilitating Digital Transformation with FortiGate’s Secure SD-WAN Solutions
As businesses make the digital transformation, the role of SD-WAN solutions is growing increasingly critical. Learn how Fortinet’s SD-WAN solutions secure remote office connections while providing...
Painting a New Security Landscape
Derek Mankey sheds light on current criminal activity and suggests how organizations can stay a step ahead.
Fortinet Announces Enhancements to Our Security Services Portfolio
Fortinet's threat intelligence security subscriptions ensure that your Fortinet security solutions are tuned continuously with up-to-the-minute insight into threats occurring anywhere in the world...
Fortinet Founder And CEO On How To Protect Next Generation IT Infrastructures
Ken Xie, Founder, Chairman of the Board, and CEO of Fortinet sits down for a discussion with Cybercrime Magazine
Fighting Network Silos
The problems created by old hub-and-spoke network architectures are happening again with the advent of the cloud. Following these strategies can avoid building a new set of silos.
Fortinet Introduces New Network Access Control Solution for IoT Security
FortiNAC Provides Visibility and Control of IoT Devices and Automated Response to Threats, Controls Access at Scale in Multi-Vendor Environments.
What is a Botnet? And Why They Aren't Going Away Anytime Soon
Newsmaker Interview: Derek Manky on 'Self-Organizing Botnet Swarms'
Recently Threatpost caught up with Derek Manky at Fortinet to discuss the latest developments around his research on botnet “swarm intelligence.”
Securing Web Applications in Microservices Architectures
As organizations move to adopt agile development strategies and deploy microservices architectures, security continues to be a critical concern.
Cybersecurity's Future: Powered by Hardware
Forbes Contributing Editor, Dan Woods, sits down with Ken Xie, Fortinet CEO and Founder to discuss the need for hardware to deliver computing power needed for cybersecurity.
4 Top Challenges to a Secure Digital Transformation
Infographic: Q2 2018 Threat Landscape Report
See the top takeaways at a glance, plus steps to defend against the top threat trends seen this quarter including cryptojacking, malware agile development, and vulnerability targeting. Read more.
Q2 2018 Threat Landscape Report