Thursday, February 14, 2019

How AI can help you stay ahead of cybersecurity threats - Fortinet Certifications


The rise of artificial intelligence


The goal of AI is to replicate the analytical processes of human intelligence but to enable decision making at machine speeds. The most effective AI uses a deep-learning model built around an artificial neural network (ANN). This network is comprised of hardware and software configured after the neuron patterns in the human brain. This design not only accelerates data analysis and decision making but also enables the network to adapt and evolve based on new information.

To accomplish this, an ANN goes through a machine learning (ML) training process where implanted learning models are carefully fed vast and increasingly complex amounts of information on an ongoing basis. Once the system has identified patterns and problem-solving strategies, it is then provided with new information that enables it to adjust its algorithms so that it can adapt to and identify new tactics and capabilities adopted by malware or an attack vector.

Fortinet and AI


As an early adopter of AI, Fortinet began developing a self-evolving threat detection system over six years ago. This system leverages a custom-designed ANN comprised of billions of nodes, and we have been meticulously training it with new threat data every day since, giving us a significant competitive threat intelligence advantage over every other vendor in the security marketplace.

Our FortiGuard Labs team now uses this advanced AI technology to analyze files and URLs and label them as clean or malicious—at machine speeds and with a high degree of accuracy. And because of those years of careful preparation, the threat intelligence produced by FortiGuard AI has become so fast and reliable that it has now been included as a fundamental cloud-based component of every solution in the Fortinet Security Fabric, and even as an in-line component of the FortiWeb web application firewall.

Training an AI


The most crucial element of any AI solution is the methodology used to train its analysis and decision-making algorithms. The ML model used to train FortiGuard AI leverages the three essential learning model strategies endorsed by the AI community:

  • Supervised learning. This initial model begins the training of the AI by feeding it a vast amount of labeled data, clearly identifying the characteristics of each labeled data set, and then repeatedly applying those characteristics to unlabeled data.
  • Unsupervised learning. In this next phase, the algorithm has no known solution set to follow. Instead, it recognizes patterns learned in phase one that enable it to label data without human help. At this point, new data can be slowly introduced to force it to deal with data it hasn't seen before and make new decisions.
  • Reinforcement learning. The results of supervised and unsupervised learning are then “tested,” by scoring the system’s performance with unlabeled files and “rewarding” the system for good results. Training then continues to cycle between these three learning strategies on an ongoing basis.

Because of the recursive requirements of machine learning, any AI system that does not use all three of these learning models is incomplete. Each learning model helps refine results and improve accuracy.

Delivering true AI to customers


Many cybersecurity companies claim to have introduced AI capabilities into their solutions. But the reality is, most fall short of true AI because their underlying infrastructure is too small or their learning models are incomplete. Others refuse to divulge the methods that they use, which raises concerns about the reliability of their AI. Fortinet instead opts to be more transparent about its methodology so that customers know the breadth and depth of the analysis involved.

To start, the best learning requires data, so to address a problem as complex as the current threat landscape, massive amounts of data are needed on an ongoing basis to give the ANN what it needs to adapt and reinforce rules over time. This is another area where Fortinet excels. Fortinet gathers intelligence from over 4 million global security sensors. That intelligence is then processed through our artificial neural network (ANN) where files are scanned against more than 5 billion nodes to identify unique clean or malicious features. This allows us to create detection capabilities that are then fed to products across our portfolio. Likewise, our web filtering AI/ML program processes over 100 billion web queries every day, and uses that data to block over 2,600 malicious URLS every second.

In addition to supervised, unsupervised, and reinforcement learning, FortiGuard AI also uses the following essential elements of a true AI:

  • User and Entity Behavior Analytics (UEBA) is used in conjunction with several solutions. FortiSIEM 5.0, FortiAnalyzer, and FortiWeb, for example, all use UEBA to uncover patterns in typical user behavior—such as location, time of day, devices or applications used, and specific servers or websites accessed. When anomalous activity is detected, UEBA can trigger applications to take automatic action, as well as notify security operations teams.
  • Proprietary unpackers perform deep inspection and analysis of the packaging and wrappers used to encrypt malicious code, allowing us to stop malware at the perimeter before it becomes a threat to the network.


Sharing intelligence across the Security Fabric


Intelligence in isolation is useless. The more it is shared, the more effective your defensive systems can become. This is why every time a threat is identified, FortiGuard AI generates threat intelligence that automatically updates defensive signatures for every solution across the entire Fortinet Security Fabric, enabling security tools to work together to defend customers with advanced threat detection and protection solutions.

And because AI powers it, all of this happens seamlessly and behind the scenes—requiring no staff time from an organization’s security analysts. This allows the Fortinet Security Fabric to integrate, collaborate, and automate threat detection, prevention, and remediation capabilities through sandboxing by sharing threat intelligence across each security element in real time.

Because Fortinet covers the network from end to end, we have a unique and comprehensive view that includes every component needed to protect an organization's ecosystem—from the data center to multiple clouds. This approach, unique in the industry, improves operational efficiencies while dramatically mitigating risks. And because FortiGuard AI threat detection is incorporated into the Security Fabric’s centralized visibility and controls, it also enables the network security team to work proactively based on the most accurate and timely information possible. 

Secret To Pass Fortinet Certification Exams In First Attempt



Wednesday, January 30, 2019

An Approach for Securing Advanced Threats for Your Customers - Fortinet Certifications


Threat Trends Capitalize on Poor Visibility and Control


Based on threat data taken from millions of Fortinet devices across the world, the latest Global Threat Landscape Report for Q3 indicates that cyberthreats not only continue to target network vulnerabilities, but also seek to exploit the poor visibility and control resulting from the expansion of networks into the cloud and the rapid adoption of mobility and IoT. This quarterly report serves as an analysis of the current threat landscape facing organizations and their network security, while aiming to help network security teams identify key trends and shifts across the threat landscape.

With this in mind, one of the predominant themes we documented in Q3 is the evolving threats and strategies cybercriminals are using to capitalize on current network vulnerabilities. Most notably, many of these vulnerabilities are being introduced as organizations of all sizes continue their digital transformation initiatives.

As customers continue to widen the scope of their network infrastructures with a range of IoT, mobile and cloud-based solutions, the resulting decrease in visibility and control of those solutions opens threat vectors for cybercriminals to leverage.

There are several important threat trends partners need to remain aware of:

  • Evolution of cryptojacking: Cryptojacking, or the process of leaching CPU resources from machines and devices, has long been recognized as a threat to organizations thanks to its ability to drastically slow system efficiency and leach processing power. And now, with new platforms available to advanced attackers, as well as “as-a-service” cryptojacking malware available for purchase on the dark web, the ability to launch large-scale, complex attacks is no longer limited to skilled cybercriminals. What’s more, these new crypto attacks have the potential to disable existing security solutions as well as open additional communications ports on existing firewalls. This means that not only is cryptojacking a serious problem on its own, but it can serve as a gateway through which bad actors are able to install new malware. Considering that the frequency of cryptojacking attacks jumped 38 percent in 2018, underestimating the impact of this cyberthreat can prove especially detrimental to organizations.
  • Mobile Malware: Mobile devices are posing a significantly larger threat to network security than ever before. Mobile malware variants attacked more than 25 percent of organizations in Q3 as a result of BYOD policies and unsegmented guest networks. What’s even more surprising, however, is that mobile made up 14 percent of all malware attacks this quarter. Considering the speed at which a mobile device can enter and connect to a network, organizations that cannot properly identify and control these devices are at a substantially high risk.
  • IoT Botnets: During Q3 IoT botnet infections rose a steady but anemic 2 percent. However, the period of time these bots were able to stay connected to the network increased by a staggering 34 percent from Q2, averaging 10.2 infection days per firm in Q3. This indicates that the sophistication of botnets is on the rise, that cyber hygiene within organizations is on the decline, or both In either case, if left unchecked these devices have the potential to spread malware laterally across networks and between devices, becoming a threat vector that can be leveraged to gain access to networks. What’s more, the ability for these devices to lie dormant, only returning when business operations resume, means that to effectively mitigate IoT botnets the source device needs to be found and removed.
  • Shift Toward Swarm-as-a-Service: A notable shift in the evolution of cyberthreats is that of swarm-based intelligence technology. With emerging capabilities like the AutoSploit toolkit, which provides cybercriminals with the means to automate remote host exploitation, the threat landscape is shifting that much closer toward the possibility of swarm-based botnets. With à la carte IoT botnets like Hajime and Reaper already making headlines for their intelligent, automated attack capabilities, the market for as-a-service attack options using advanced attack capabilities is growing. We’re seeing the attack needle shift toward collaborative, intelligent botnets that cybercriminals can “set and forget.”


A Learn, Segment, Protect Approach to Advanced Threats


As the attack capabilities of cybercriminals continue to evolve, customers need to rearchitect their network infrastructures into a fabric-based strategy that can unify and integrate threat analysis and security processes. From there, customers must then adopt a learn, segment and protect approach to their security efforts that identify and  inventory devices gaining access to their networks, and automate the controls and security solutions that track devices and enforce policy across the network.

  • Learn: To secure their networks, customers need to not only see every device connected to the network, but also understand their capabilities, limitations and network access. Moreover, they need to also understand the relationship between these devices and the network ecosystem. To this end, it’s crucial that customers leverage automated threat analysis across an integrated security fabric – allowing them to automatically discover and classify devices found within their networks.
  • Segment: Once customers are able to see the devices within their networks, they can effectively begin to control them, including limiting the extent and impact of their vulnerabilities. The most effective approach is to dynamically separate them from other resources through network segmentation. Dynamic segmentation allows IT professionals to authenticate devices that belong within the network and then restrict their access to specific segments of the network infrastructure. Moreover, such segmentation also helps them contain and mitigate the damage caused by modern, automated threats.
  • Protect: Armed with a comprehensive view into the network ecosystem, your customers then need the ability to monitor, inspect, and enforce access policies based on activity across their network infrastructure. To do this, each network segment must be woven into an integrated security fabric that can centralize threat analysis and deploy security functions across the network ecosystem.

As customers continue to further their digital transformations, cybercriminals have been quick to shift their capabilities and strategies to take advantage of emerging gaps in device visibility and control. This past quarter we documented advanced attack capabilities and trends designed to capitalize on poor device security. Knowing this, customers must update their network architectures to adopt a learn, segment and protect approach to their device security.

Our experts say about Fortinet Certification Exams



Sunday, January 20, 2019

Taking a Layered Approach to Cybersecurity - Fortinet Certifications


Cybercrime is an ever-present threat facing organizations of all sizes. In order to safeguard themselves against a successful data breach, IT teams must stay a step ahead of cybercriminals by defending against a barrage of increasingly-sophisticated attacks at high volumes. In Q3 of 2018 alone, FortiGuard Labs detected 1,114 exploits per firm, each representing an opportunity for a cybercriminal to infiltrate a network and exfiltrate or compromise valuable data.

What complicates this challenge further is that the strategies and attack vectors that cybercriminals rely on are always evolving. It’s the classic problem of security teams having to cover every contingency, while cybercriminals only need to slip past defenses once. Because of this, IT teams must continuously update their defenses based on current threat trends. Today, IoT, mobile malware, cryptojacking, and botnets are top focuses for cybercriminals, but they may have moved on to new threats by Q4.

With this in mind, IT security teams have a lot of ground to cover. Unfortunately, there is no silver bullet to guarantee effective security posture, nor a single defensive mechanism that can ensure security across modern distributed networks. In order to defend against today’s threats, IT teams must take a layered approach to their cybersecurity.

A Layered Approach to Cybersecurity


Many think of a layered approach to cybersecurity in terms of technology and tools. This means having various security controls in place to protect separate entryways. For example, deploying a web application firewall, endpoint protections, and secure email gateways, rather than relying only on traditional perimeter defenses. While these solutions are all part of a layered security approach, it actually goes well beyond deploying layers of different security tools. For cybersecurity to be effective, organizations must also consider how they leverage people and processes.

When combined into a single, integrated framework, an overlapping strategy based on security tools, people, and processes will yield the most effective defenses.

Security Tactics for People, Processes, and Technology


As IT teams seek to create a layered security environment, there are several tactics they should consider:

People

Employees can create some of the greatest risks to cybersecurity. However, when they are well informed they can also be an asset and a first line of defense. Oftentimes, cybercriminals will specifically target employees as an attack vector based on their lack of knowledge for security best practices. For example, cybercriminals might target employees with phishing emails designed to get them to click on a malicious link or divulge credentials. With this in mind, it’s imperative that organizations conduct regular training sessions throughout the year to keep employees aware of potential scams and the ways they can make their organization vulnerable.

Training programs like these will create a strong culture of cybersecurity that can go a long way toward minimizing threats. A few of the cyber hygiene points IT teams will want to inform employees of include:

Creating strong passwords that are unique to each account and not reused, ensuring personal and work passwords are separate.
Not opening or clicking links in suspicious emails or those from unfamiliar senders.
Ensuring applications and operating systems are updated regularly as soon as patches are released and not installing any unknown outside software, as they can open security vulnerabilities in the network.
Immediately reporting any unusual behavior or something strange happening on their computers.
Another way IT teams can improve cybersecurity at the employee level is with access management policies such as the principle of least privilege, which provides a person with access to data only if it is necessary to do their job – thereby reducing the exposure and consequences of a breach.

Processes

This layer of cybersecurity ensures that IT teams have strategies in place to proactively prevent and to respond quickly and effectively in the event of a cybersecurity incident.

First, IT security teams should have a cyber incident response plan in place. A good incident response plan will provide an organization with repeatable procedures and an operational approach to addressing cybersecurity incidents to recover business processes as quickly and efficiently as possible. In addition, ensuring proper backups are in place and regularly testing these backups is imperative to minimizing downtime and increasing the chances of data recovery from a cyber event.

Next is the collection and analysis of threat research. Every security strategy and tool must be informed by current threat intelligence in order to effectively detect and respond to threats. For example, threat research might reveal that cybercriminals have been carrying out attacks through a specific vulnerability, or targeting endpoints with a specific malware. Armed with this information, IT teams can then take proactive measures by making any necessary system updates, and increasing monitoring to detect behavior indicative of one of these attacks. It is also important that IT teams consult both local and global threat data for the most comprehensive understanding of the threat landscape.

Another important process on the road to effective cybersecurity is the prioritization of assets. While IT teams remain strained due to the cybersecurity skills gap, networks have become increasingly sophisticated, making it impossible to manually monitor each area of the network at all times. Therefore, IT teams must know where all their assets are and prioritize these assets based on which are most business critical and would have the greatest impact on the business if breached. From there, security teams can develop policies and deploy strategies to keep this data more secure and minimize consequences. This might mean using network segmentation to add an extra level of security or creating access control policies based on who needs access to this specific sets of data.

Technology

As discussed previously, there are a host of technologies that security teams can implement in order to layer their defenses. That being said, it’s important that IT teams do not implement isolated point solutions as they layer their defenses, but rather, select those tools based on their ability to be integrated and automated to create a Security Fabric that can facilitate the rapid detection and mitigation of threats.

Another tactic IT teams should leverage is deception technology. Network complexity is an Achilles heel for adversaries. Deception technologies level the playing field by automating the creation of dynamic decoys that are dispersed throughout the IT environment, making it harder for the adversary to determine which assets are fake and which are real. When an adversary can’t make this distinction, cybercriminals are forced to waste time on fake assets and exercise caution as they look for tripwires embedded in these fake environments. This may require them to alter their tactics, thereby increasing their chances of being detected by security teams.

Finally, IT teams should leverage segmentation. Adversaries target networks to gain access to and exploit organizations’ business-critical data, whether that is their customer and personnel information, intellectual property, financial records, etc. Segmenting corporate networks enables IT teams to separate their applications and sensitive data into different segments of subnetworks with varying degrees of security. This allows for greater access control on critical systems, thereby limiting exposure if there is a breach.

Success Secrets: How you can Pass Fortinet Certification Exams in first attempt 



Monday, January 7, 2019

100% Free Fortinet Certification Exam Dumps PDF - VCE Exams Files


Fortinet Practice Exam Questions Answers - 100% Free Demo


Question 1

Which statement is correct regarding virus scanning on a FortiGate unit?

A: Virus scanning is enabled by default.
B: Fortinet Customer Support enables virus scanning remotely for you.
C: Virus scanning must be enabled in a UTM security profile and the UTM security profile must be assigned to a firewall policy.
D: Enabling virus scanning in a UTM security profile enables virus scanning for all traffic flowing through the FortiGate device.

Correct Answer: C

Question 2

Which of the following statements are correct regarding URL filtering on the FortiGate unit? (Select all that apply.)

A: The allowed actions for URL Filtering include Allow, Block and Exempt.
B: The allowed actions for URL Filtering are Allow and Block.
C: The FortiGate unit can filter URLs based on patterns using text and regular expressions.
D: Any URL accessible by a web browser can be blocked using URL Filtering.
E: Multiple URL Filter lists can be added to a single protection profile.

Correct Answer: AC

Question 3

Which of the following regular expression patterns will make the terms "confidential data" case insensitive?

A: \[confidential data]
B: /confidential data/i
C: i/confidential data/
D: "confidential data"
E: /confidential data/c

Correct Answer: B

Question 4

Which of the following spam filtering methods are supported on the FortiGate unit? (Select all that apply.)

A: IP Address Check
B: Open Relay Database List (ORDBL)
C: Black/White List
D: Return Email DNS Check
E: Email Checksum Check

Correct Answer: ABCDE

Question 5

Which of the following email spam filtering features is NOT supported on a FortiGate unit?

A: Multipurpose Internet Mail Extensions (MIME) Header Check
B: HELO DNS Lookup
C: Greylisting
D: Banned Word

Correct Answer: C

Question 6

Which of the following statements best describes the green status indicators that appear next to the different FortiGuard Distribution Network services as illustrated in the exhibit?

A: They indicate that the FortiGate unit is able to connect to the FortiGuard Distribution Network.
B: They indicate that the FortiGate unit has the latest updates that are available from the FortiGuard Distribution Network.
C: They indicate that updates are available and should be downloaded from the FortiGuard Distribution Network to the FortiGate unit.
D: They indicate that the FortiGate unit is in the process of downloading updates from the FortiGuard Distribution Network.

Correct Answer: A

Question 7

A FortiGate unit is configured to receive push updates from the FortiGuard Distribution Network, however, updates are not being received.
Which of the following statements are possible reasons for this? (Select all that apply.)

A: The external facing interface of the FortiGate unit is configured to use DHCP.
B: The FortiGate unit has not been registered.
C: There is a NAT device between the FortiGate unit and the FortiGuard Distribution Network and no override push IP is configured.
D: The FortiGate unit is in Transparent mode which does not support push updates.

Correct Answer: ABC

Question 8

Which of the following statements best describes the proxy behavior on a FortiGate unit during an FTP client upload when FTP splice is disabled?

A: The proxy will not allow a file to be transmitted in multiple streams simultaneously.
B: The proxy sends the file to the server while simultaneously buffering it.
C: If the file being scanned is determined to be infected, the proxy deletes it from the server by sending a delete command on behalf of the client.
D: If the file being scanned is determined to be clean, the proxy terminates the connection and leaves the file on the server.

Correct Answer: A

Question 9

What is the correct behavior when the email attachment is detected as a virus by the FortiGate antivirus engine?

A: The FortiGate unit will remove the infected file and deliver the email with a replacement message to alert the recipient that the original attachment was infected.
B: The FortiGate unit will reject the infected email and the sender will receive a failed delivery message.
C: The FortiGate unit will remove the infected file and add a replacement message. Both sender and recipient are notified that the infected file has been removed.
D: The FortiGate unit will reject the infected email and notify the sender.

Correct Answer: B

Question 10

What are the valid sub-types for a Firewall type policy? (Select all that apply)

A: Device Identity
B: Address
C: User Identity
D: Schedule
E: SSL VPN

Correct Answer: ABC


Success Secrets: How you can Pass Fortinet Certification Exam in first attempt



Tuesday, December 18, 2018

More Encrypted Traffic Than Ever - Fortinet Certifications


As organizations invite more mobile and IoT devices into their networks and adopt increasingly complex multi-cloud architectures, data and workflows are no longer confined to a static and highly secured segment of the network. Web and application-based traffic comprise a higher volume of total traffic, with much of that traffic including sensitive data or accessing information that was traditionally hidden deep in the data center. To accommodate this change, organizations are increasing their reliance on encryption, primarily secure sockets layer (SSL) and transport layer security (TLS), to protect their data in motion.

More encrypted traffic than ever


As a result, encrypted traffic has hit a new all-time threshold of over 72 percent of all network traffic. That’s a nearly 20 percent increase in just a single year, up from 55 percent in Q3 of 2017. There are many benefits to this strategy, the most important of which is that it allows data, applications, workflows, and transactions initiated by both employees and consumers to travel wherever business requirements demand. In turn, this enables our global transition to a digital economy.

While in many ways the growth of encryption is a good thing for security, higher encryption rates also present severe challenges to deep inspection of traffic to monitor for and detect threats. Because encryption is merely a tool, it can be used to protect any traffic from detection, whether good or malicious. Cybercriminals, for example, are very aware of the growth of encryption and use it to their advantage to obscure their presence and evade detection, whether delivering malware of exfiltrating stolen data. And as the volume and percentage of encrypted data continue to grow, these criminal tactics are increasingly likely to be able to hide in plain sight.

Few security devices can keep up


One reason why this is a growing concern and is about to hit a critical threshold is that inspecting encrypted traffic imposes critical performance limitations on nearly all firewall and IPS devices available on the market today. Generally speaking, examining encrypted traffic puts an enormous strain on a security device. Using ciphers to decrypt and inspect SSL/TLS traffic correctly is extremely CPU-intensive. 

According to recent test results from NSS Labs, very few security devices can inspect encrypted data without severely impacting network performance. On average, the performance hit for deep packet inspection is 60 percent, connection rates dropped by an average of 92 percent and response time increased by a whopping 672 percent. Even more concerning, not all products were able to support the top 30 cipher suites either, meaning that some traffic that appeared to be analyzed wasn't being processed by some of the security devices at all.

Of course, these types of results render most traditional security devices nearly useless in today’s networks where encryption is the norm and performance is critical. It’s also why most security vendors literally don’t publish their SSL/TLS inspection numbers and why salespeople tend to avoid the issue when it comes up. As a result, much of today’s encrypted traffic is not being analyzed for malicious activity—making it an ideal mechanism for criminals to spread malware or exfiltrate data.

At the same time, enterprises must be aware of and concerned if they are not decrypting and inspecting SSL traffic, not just from untrusted sources, but from devices – especially IoT – that have been intentionally deployed inside the network.

Addressing the challenge


Here are a handful of suggestions to help organizations address this growing security concern:

Practice good security hygiene – Nearly every list of recommendations should start here. The reality is that most problems encountered in today's networks are the result of a failure to patch, upgrade or replace vulnerable devices, to check configurations for errors and to harden things like ports to prevent easy exploitation.

Our experts say about Fortinet Certification Exams



Tuesday, December 11, 2018

Cybersecurity Skills Report: Data Shows What CISOs Look for In Security Architects


A New Study on the Security Architect Recruiting Process


The role of Security Architect, who is tasked with building security infrastructures that not only responds to but can also anticipate threats, has traditionally drawn applicants that demonstrate hard, tactical skillsets. However, CISOs are increasingly focusing on candidates that share a balanced mix of hard and soft skills, as indicated by a recent Fortinet study.

Cybersecurity is an extremely competitive field due to the cyberskills shortage, an issue that goes beyond a lack of incoming talent but also encompasses those in the field without the skills necessary to meet today’s specific needs. To this end, the Security Architect Skill Gap Report illuminates the information needed to minimize the impact of this skills shortage. This is done by providing CISOs with the data and context needed to hone their recruiting process for Security Architects while demonstrating how applicants must adapt to evolving business requirements.

The Skills CISOs Are Looking for In Security Architects


As CISOs aim to build out their security teams with professionals who can combat modern cyberattacks and secure their digital transformation efforts, they seek a variety of hard and soft skills that highlight strategy and analysis in addition to traditional design and configuration abilities. While these requirements may vary across organizations based on specific needs, there are a few trends worth noting.

Hard Skillsets


CISOs require candidates to be proficient in risk management and security standards, as well as an understanding of business goals and how they will translate into security practices. These types of skills were mentioned more often in Security Architect job ads than tactical abilities such as encryption, firewalls, or security controls.

This is indicative of the need to focus on security in conjunction with business enablement. However, this does not mean that CISOs have stopped looking for technical skills and experience with specific systems altogether.

Among the top hard skillsets that organizations are looking for in Security Architect applicants include:  

·       Security architecture

·       Risk Management

·       Integration

·       Security Standards

·       Encryption

·       Firewalls

·       Security Controls

Soft Skillsets


As security teams play a greater role in business enablement, CISOs also seek candidates with demonstrated

abilities in the soft skillsets necessary to collaborate and strategize across lines of business. The data shows that the soft skills referenced in Security Architect job ads and responding resumes typically fall into four categories:

·       Analytical: Analysis, research, and problem solving

·       Leadership: Planning, mentoring, leading

·       Personal Characteristics: Integrity, focus

·       Communication / Interpersonal: Interpersonal, collaboration, communications

The data indicates that CISOs are now looking for candidates that are comfortable shifting between strategic and tactical tasks. For example, preparing for or responding to a security incident without ignoring important ongoing strategic tasks such as conducting risk assessments or defining secure approaches for cloud adoption.

Success Secrets: How you can Pass Fortinet Certification Exams in first attempt



Sunday, December 2, 2018

Over 50 Fortinet Security Fabric Solutions Earn the U.S. Department of Defense’s Endorsement for Its Approved Product List Certification


Bob Fortna, President of Fortinet Federal Inc.

“Achieving DoDIN APL certification for additional solutions within the Fortinet Security Fabric platform is important for us because it demonstrates our commitment to stringent testing and validation guidelines specifically for the Department of Defense. DoD agencies require the most comprehensive cybersecurity solutions available to scale for their complex and mission critical requirements, while maintaining high-performance.”

Manish Chadha, President and CEO, Federal Defense Solutions


“Fortinet serves both classified and unclassified federal systems and is used by all 15 cabinet-level agencies and numerous independent agencies. Gaining DoDIN certification provides authorized sales channels into DoD agencies including the Army, Navy, Marines, Air Force and more, serving up more opportunities for us based on Fortinet's Security Fabric solutions that have passed vigorous DoD compliance testing.”

News Summary


Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, today announced that over 50 additional Fortinet Security Fabric solutions have achieved Department of Defense Information Network (DoDIN) Approved Products List (APL) certification.

The certification qualifies designated Fortinet products for sale to Department of Defense (DoD) agencies based on stringent Security Technical Implementation Guide (STIG) testing, a standardized methodology for the secure installation and maintenance of computer software and hardware.
The addition of these products to the APL means that the DoD can choose from a wider range of Fortinet’s industry-leading Security Fabric solutions when seeking new technology to address its unique and demanding cybersecurity needs.
Fortinet’s U.S. Federal Agency security solution is ideally suited to protect agencies within the intelligence community and the Department of Defense, as well as civilian agencies. The Fortinet Security Fabric protects classified and unclassified Federal systems used by all of the 15 cabinet-level agencies and by numerous independent executive agencies. These platforms make use of our USG products that are specially configured for the Federal market. They comply with Federal certification requirements including the National Institute of Standards and Technology FIPS 140-2 certification, National Information Assurance Partnership Common Criteria certification, and the Commercial Solutions for Classified certification.

Fortinet products that have received DoDIN APL certification include the following: FortiGate Firewalls, (30D, 30D-POE, 50E, 51E, 52E, 60D, 60E, 60E-POE, 61E, 80D, 80E, 81E, 81E-POE, 90D, 90D-POE, 92D, 92D-POE, 100D, 100E, 100EF, 101E, 200D, 200E, 201E, 240D, 240D-POE, 300D, 400D, 500D, 600D, 800D, 900D, 1000D, 1200D, 1500D, 2000E, 2500E, 3000D, 3100D, 3200D, 3700D, 3810D, 3815D, 5001D), FortiGate-VM, FortiGate Rugged (60D, 90D), and FortiWifi (30D, 50E, 51E, 60D, 60E, 61E, 90D, 90D-POE)

To achieve DoDIN APL certification, all approved Fortinet products were tested against applicable Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs). This includes the following: Unified Capabilities Requirements 2013 (UCR 2013) Change 2, Application Layer Gateway (ALG) SRG v1r2, Firewall STIG v8r25, Intrusion Detection and Prevention Systems (IDPS) SRG v2r3, IPSec VPN Gateway STIG v1r15, Network Device Management SRG v2r13, Network Infrastructure Policy STIG v9r5, Remote Access VPN v2r7, Web Server SRG v2r2.