The keynote speakers have gone home, the parties have ended, and another RSA Conference 2013 is over. By all reports, this year set records for attendance and business conducted. With a complex and evolving threat landscape and the accelerating adoption of disruptive technologies, exhibitors had a field day on the show floor with sophisticated releases that vied to differentiate in the burgeoning security markets
04 – Power to Control Applications
Artist: Terry Devine-King-Solar Storm
One Product Line, Three NSS Labs Awards
Fortinet has earned three NSS Labs’ coveted “Recommend” ratings by delivering outstanding enterprise management, security effectiveness and TCO in three group tests: 2013 Next Generation Firewall 2013 Network Firewall 2012 Network Intrusion Prevention NSS Labs put the FortiGate-3600C, FortiGate-800C and FortiGate-3240C appliances through extensive real-world tests and awarded each the “Recommend” rating for providing “a very high level of protection, manageability and value for money.” These awards are a big deal for several reasons. First, NSS Labs provides solid insight into the true performance of network security devices and their ability to protect against a wide range of threats. Network security professionals understand the need to balance the potentially competing requirements of more performance and more security at an abstract level, but often lack the information they need to make informed buying decisions.
UTM 9.005 Up2Date Released
We have just released stable version 9.005 via Up2Date for Sophos UTM. This release contains many compatibility improvements and stability enhancements for your installation.
One Brand of Firewall is a Best Practice
In case you haven’t seen it, there’s an interesting research note authored by Greg Young of Gartner that posits “one brand of firewall is a best practice for most enterprises.” And, in particular we have to agree. Why? Let’s go back to 1999 and see. Taking a quote from Bruce Schneier’s, A Plea for Simplicity, “the worst enemy of security is complexity.” Thirteen years later, Gartner also seems to agree; saying basically that having different firewall platforms increases configuration and m…
NBC.com Infected With Malware Targeting Personal Financial Information
46 security vendors were tested and only 3 were able to detect and mitigate the infected NBC.com malware.
Twitter Hacks: How Avoid Being the Next Victim
Perhaps it had been too long since Twitter was the center of the public attention. Drama junkies were treated to a triple-whammy of cyber news this week when miscreants hacked into the Twitter accounts of Jeep, Burger King and none other than the global hacker collective Anonymous. In an ironic twist of plot, the infamous hacker group’s Twitter account was apparently overtaken by rival hacktivists, according to the BBC.
The Game of Security Evasion
Evasion techniques have existed ever since attacks were created, that’s no secret.
FortiOS Cookbook – Remote AP (5.0)
In this video, you’re going to learn how to use a Remote AP to provide secure remote access to protected networks and the internet.
02 – Power to Control Data
Artist: Terry Devine-King-Solar Storm