FORTINET

Displaying 1-5 of 5 results

  • White Papers // Jul 2015

    Head First Into The Sand Box - Applications to Modern Threat Landscape

    Sandboxes were traditionally used for executable files, but now they’re also used to run application data that can contain hidden malicious code. As cyber criminals figure out more about common methods of security detection, they tend to invest more of their research and development efforts in security evasion. Sandbox...

    Sponsored By FORTINET

  • White Papers // Jul 2015

    Fighting today’s Advanced Attacks

    Constructing a network security defense ad hoc, that is one product at a time as the need presents itself creates weak links in the overall strategy, weak links that can easily be broken. With multiple attack vectors and malware constantly increasing in volume and sophistication, what is needed is a...

    Sponsored By FORTINET

  • White Papers // Jul 2015

    Advanced Attacks Require an Advanced Solution

    The threat against networks today is greater than it has ever been. If there is a weakness it will be found and ruthlessly exploited. Designing an effective defense against these threats requires thinking beyond just putting products into the network. It’s no longer enough to only protect the perimeter against...

    Sponsored By FORTINET

  • White Papers // Jul 2015

    Cohesive Approach to Addressing Advanced Targeted Attacks

    2013 and 2014 saw many major brands and large companies making headlines for massive data breaches. More than 100 million customers had personal and/or credit card information stolen through just one of these bold and extended attacks. Malicious hackers have attempted to conceal malware by using different file types and...

    Sponsored By FORTINET

  • White Papers // Aug 2009

    Fortinet and the Comprehensive National Cybersecurity Initiative (CNCI)

    After numerous cyber attacks on several federal agency computer systems in the time period following 9/11, The White House determined that the government needed a more comprehensive strategy to defend government networks and sensitive information from hackers and nation states. On January 8, 2008, President Bush launched the Comprehensive National...

    Provided By FORTINET

  • White Papers // Jul 2015

    Head First Into The Sand Box - Applications to Modern Threat Landscape

    Sandboxes were traditionally used for executable files, but now they’re also used to run application data that can contain hidden malicious code. As cyber criminals figure out more about common methods of security detection, they tend to invest more of their research and development efforts in security evasion. Sandbox...

    Sponsored By FORTINET

  • White Papers // Jul 2015

    Fighting today’s Advanced Attacks

    Constructing a network security defense ad hoc, that is one product at a time as the need presents itself creates weak links in the overall strategy, weak links that can easily be broken. With multiple attack vectors and malware constantly increasing in volume and sophistication, what is needed is a...

    Sponsored By FORTINET

  • White Papers // Jul 2015

    Advanced Attacks Require an Advanced Solution

    The threat against networks today is greater than it has ever been. If there is a weakness it will be found and ruthlessly exploited. Designing an effective defense against these threats requires thinking beyond just putting products into the network. It’s no longer enough to only protect the perimeter against...

    Sponsored By FORTINET

  • White Papers // Jul 2015

    Cohesive Approach to Addressing Advanced Targeted Attacks

    2013 and 2014 saw many major brands and large companies making headlines for massive data breaches. More than 100 million customers had personal and/or credit card information stolen through just one of these bold and extended attacks. Malicious hackers have attempted to conceal malware by using different file types and...

    Sponsored By FORTINET

  • White Papers // Aug 2009

    Fortinet and the Comprehensive National Cybersecurity Initiative (CNCI)

    After numerous cyber attacks on several federal agency computer systems in the time period following 9/11, The White House determined that the government needed a more comprehensive strategy to defend government networks and sensitive information from hackers and nation states. On January 8, 2008, President Bush launched the Comprehensive National...

    Provided By FORTINET