Home » Fortinet » Page 2

Fortinet

iOCO Brings Fortinet’s Secure SD-WAN to Local Financial Services Institution

iOCO, the ICT services business of the JSE-listed EOH Group, has been chosen to assist a large financial services company in the implementation of its software-defined wide-area networking (SD-WAN) rollout. This has allowed the firm to take a bold move forward in its stated aim of building a network incorporating the ‘modernised branch of the future’.  Brett van Rensburg, Sales Director for iOCO’s Compute division, says: “Having recently undertaken a rigorous year-long request for proposal (RFP) process to choose our SD-WAN providers, we were duly impressed with the Fortinet Secure SD-WAN offering. “This new project with the financial services company has now allowed us to test the scope and breadth of the Fortinet solution, with truly impressive results. The top benefits that Fortine...

3 Things to Consider When Implementing an Effective Zero Trust Access Strategy

The most secure network is one that has no connections. Of course, that idea is not only impractical, it defeats the purpose of a network. The reality is that no network is an island, and as businesses become more digital, networks inevitably become more complicated and dispersed. Today’s networks now have many “edges,” so it’s much harder than it used to be to create a single defensible boundary. In the face of these changes, the traditional network perimeter is dissolving, and it’s far more difficult to tell who and what can be trusted. To respond to increasing threats, best practices now stipulate a “trust no one, trust nothing” attitude toward network access. Protecting the network with this zero-trust access (ZTA) approach means that all users, all devices, and all web appli...

6 Ways to Create a Ransomware Mitigation Strategy

Ransomware attack trends continue to evolve, and the current iterations seen during the COVID-19 pandemic are no exception. During this time, malicious actors have attacked healthcare organisations, medical trials, schools, and shipping agencies. Considering the impact these modern attacks can have on organisations everywhere, no matter the industry, security professionals must always be ready to secure their systems, networks, and software in new ways. And according to a recent FortiGuard Labs global threat landscape report, ransomware remains a prolific threat that increased in 2020 and became even more disruptive. Mature cyber hygiene is key Attackers know that end-users are high-target, high-value assets. Ransomware leverages social engineering attacks, preying on fears as a way to exe...

iOCO Offers Africa-Focused SD-WAN Solution to IT Landscape

Brett van Rensburg,  Sales Director for iOCO’s Compute Division After a year-long due diligence process, EOH, a JSE-listed technology services firm, through its IT services company, iOCO, has chosen to extend its partnership with Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, in order to offer its software-defined wide-area networking (SD-WAN) solution to the southern African market.  As explained by Fortinet, an SD-WAN solution connects users to any application wherever it resides, from the data centre to the cloud. SD-WAN intelligently determines which path best meets the ideal performance needs for a specific application. It then routes the traffic through to the best WAN path, whereas traditional WAN architectures only have the ability t...

Networks Unlimited Wins 2 Channel Awards at Fortinet Africa Virtual Security Day

Networks Unlimited Africa, a leading value-added distributor operating within sub-Saharan Africa, received two awards, namely the Technical Support Distributor of the Year: Southern Africa award and the DLB Growth Distributor of the Year: East Africa award at the recent Fortinet Africa Virtual Security Day. This was the first time that the event took place via a virtual platform, due to the current restrictions around the global COVID-19 pandemic. The online nature of the awards ceremony also ensured that this broadened its reach to other parts of Africa, and not only within South Africa. Stefan van de Giessen, General Manager: Cybersecurity at Networks Unlimited Africa, comments, “We have proudly maintained our business partnership with Fortinet, a global leader in broad, integrated and a...

T-Systems and Fortinet to Launch Cyber Security Academy in South Africa

T-Systems and Fortinet have teamed up to launch a Cyber Security Academy that’s accessible to local South African youth. The new Academy is expected to include Fortinet’s Network Security Expert (NSE) certifications, helping participants build cybersecurity awareness skills and ultimately tackle the global cybersecurity workforce shortage. “Cybersecurity has become a top C-level priority across the globe with skills in high demand. With the addition of this focus to our ICT Academy, we are empowering participants with new skills that will make them even more employable,” explains Marcus Karuppan, ICT Academy Manager at T-Systems South Africa. “T-Systems has been a Fortinet partner for many years. Building on our relationship, we are now collaborating with them to focus on cybersecurity ski...

Why SASE Should Extend Beyond Cloud

The emerging Secure Access Service Edge (SASE) model for cybersecurity, which is now gaining traction, needs to extend beyond cloud delivery to meet future needs. This is according to Patrick Grillo, Senior Director of Solutions Marketing at Fortinet, who was addressing the CNBC Africa Summit on The Future of Work. “SASE is a framework to bring together what are normally two distinct environments – network and security, so that connectivity and security options can be delivered from the cloud as a service. The principal connectivity option or networking feature is SD-WAN, which has been disrupting the industry for the past two to three years, a catalyst for SASE”, Grillo said. This emerging enterprise strategy combines network and security functions with WAN capabilities to support the dyn...

5 Steps to Protect Yourself and Employees from Android-Based Cyber Threats

Sourced from International IDEA While nearly 9 in 10 companies not only allow but actually rely on their employees to access critical business apps using their personal devices, according to a recent Fortinet Threat Landscape Report, Android-based malware now represents 14% of all cyber threats. In addition to direct attacks, the number of compromised web sites, email phishing campaigns, and malicious access points continue to grow exponentially, infecting unsuspecting users – regardless of their devices –with spyware, malware, compromised applications, and even ransomware. And whenever a personal device of any of your employees becomes compromised, they can represent an increased risk to your organisation as well. In addition to deploying mobile device management software a...

How Using Cloud Can Increase Security for Remote Working During the Pandemic

Sourced from Tapscape The cloud can enable organisations to quickly scale out enhanced security to a suddenly remote workforce, as part of efforts to ensure business continuity and disaster recovery – this is according to Patrick Grillo, Senior Director and Solutions Marketing at Fortinet. The pandemic had created unique challenges for employers and employees across all sectors around the world, with Varun Kukreja, Senior Program Manager – IT Security MEA, IDC Middle East, Africa, & Turkey, saying securing the teleworker had become a top priority, with some 90% of organisations looking to provide staff with secure access to IT services and applications. The pandemic had also accelerated digital transformation, he says, with an IDC Meta survey interim results revealing that some 56% of ...

7 Techniques Cybercriminals Could Use to Steal Your Private Data

Cyber threats do not rest and they continue to evolve as bad actors develop new attack techniques. Good cybersecurity hygiene requires more than a strong password to avoid compromise. The most important thing is to know how exactly cybercriminals may attempt to gain access to your data. Here are seven techniques they might try: Password Spraying: A form of brute force attack that targets multiple accounts in which adversaries try multiple guesses of the password on a single account that often leads to account lockout. With password spraying, the adversary only tries a few of the most common passwords against multiple user accounts, trying to identify that one person who is using a default or easy-to-guess password and thus avoiding the account lockout scenario. Key logging attack: By insta...

  • 1
  • 2