FEATURE
Labs uses AI-driven capabilities, including
ML, that leverage 4.4 million sensors
around the world and partnerships with
over 200 global organisations. This AI/
ML-driven threat intelligence uses five
billion nodes to identify unique malicious
or clean features for both known and
unknown threats.
In all, FortiGuard Labs processes more
than 100 billion web queries every day
and blocks 2,600 malicious URLs every
second. Fortinet AI/ML capabilities
are also integrated into FortiWeb and
FortiInsight, enabling organisations to
dramatically reduce false positives in the
case of FortiWeb and to use forensics
analysis at the user, system and network
layers to detect and prevent insider
threats in the case of FortiInsight.
Other capabilities such as sandboxing
and the use of decoys also play a critical
role in stopping advanced threats before
they impact operations or result in a data
breach. Specifically, both FortiSandbox
and FortiDeceptor are fully integrated
into the Security Fabric, enabling them
to automatically share their threat
intelligence in real time across all of the
security elements.
How does Fortinet ensure an
organisation is future-proof?
From the start, the Fortinet vision has
been to deliver broad, truly integrated,
high-performance security across the
IT infrastructure. We provide top-rated
network and content security, as well
as secure access products that share
intelligence and work together to form
a cooperative fabric. The Fortinet
Security Fabric combines security
processors, an intuitive operating
system and applied threat intelligence
to give organisations proven security,
exceptional performance and better
visibility and control, while providing
easier administration.
The Fortinet Security Fabric delivers
a unified approach that is broad,
integrated and automated. Reduce
and manage the attack surface
through integrated broad visibility, stop
advanced threats through integrated
AI-driven breach prevention and
www.intelligentciso.com
|
Issue 21
Automation of
security operations
reduces risk
through proactive
threat detection,
threat correlation,
intelligence-sharing
alerts and threat
research and
analysis.
reduce complexity through automated
operations and orchestration.
Our flagship enterprise firewall platform,
FortiGate, is available in a wide range
of sizes and form factors to fit any
environment and provides a broad
array of next-generation security and
networking functions. Complementary
products can be deployed with a
FortiGate to enable a simplified, end-to-
end security infrastructure covering:
• Network security: Protect the entire
attack surface from headquarters to
branch offices with advanced security
• Multi-cloud security: Complete
visibility and control across
the cloud that enables secure
applications and connectivity
• Secure access: Deliver secure
application, device access and
management without compromising
performance and speed
• Security operations: Implement
advanced threat intelligence to
detect, prevent and respond to
sophisticated malware and improve
security awareness
• Network operations: Leverage
a smart security strategy that
prioritises automation-driven network
operations that spots and prevents
network breaches
• Endpoint and device protection:
Proactive protection, visibility and
control for all endpoints and devices
across the network
• Application security: Protect critical
business web applications with an
integrated set of products to thwart
advanced threats
Our market position and solution
effectiveness have been widely validated
by industry analysts, independent testing
labs, business organisations and media
outlets worldwide. We are proud to count
the majority of Fortune 500 companies
among our satisfied customers.
What best practice approach
should organisations take
to ensure their networks are
robustly secured?
To effectively manage and mitigate the
cyber-risks organisations face today,
it is essential that today’s security
leaders monitor threat intelligence from
a variety of sources and then prioritise
those risks that map to their unique
network environment.
That approach needs to be coupled with
a security strategy designed to see and
stop, or at the least, strategically limit
the impact of an attack coming from an
unexpected quarter.
That starts with an integrated security
approach that incorporates every
security element deployed anywhere
across the distributed network into a
single security fabric.
That strategy then needs to be
augmented with intent-based
segmentation, consistent and relentless
best security practices, and automation
combined with Machine Learning. AI is
also increasingly essential as it can take
over tedious tasks such as patching, as
well as find and respond to threats at
digital speeds.
Any security strategy that does not
include all of these essential elements
will be unable to achieve the degree
of visibility and control that today’s
networks require. This, in turn, will
unnecessarily expose the network
to the efforts of today’s determined
cybercriminal organisations. u
39