logo
Fortinet expands AWS Marketplace suite to boost cloud security

Fortinet expands AWS Marketplace suite to boost cloud security

Techday NZ18-06-2025
Fortinet has introduced updates to Lacework FortiCNAPP and expanded the availability of several security solutions in the AWS Marketplace, aimed at improving cloud security for organisations operating across hybrid and multi-cloud environments.
The latest releases are intended to make it easier for customers to protect their applications, workloads, and data as businesses accelerate their adoption of cloud technologies. Fortinet's expanded presence in AWS Marketplace extends options for procurement and management of its products for Amazon Web Services (AWS) users.
Enhanced protection features
Fortinet's enhancements to Lacework FortiCNAPP offer reinforced security for cloud-native applications throughout their development and operational lifecycles. Key improvements include real-time CloudTrail alerting, which can now detect critical activities such as compromised credentials or anomalous API behaviour much more quickly by reducing AWS CloudTrail alert latency from 24 hours to under 15 minutes.
Other new features include an Explorer (Security Graph) tool, which allows for an interactive visualisation of attack paths and asset relationships, making it more straightforward to identify and investigate threats such as internet-facing vulnerabilities. FortiCNAPP also now supports agentless scanning for Windows workloads across any cloud environment, enabling vulnerability and secret detection without the need to install software. Additional fleet management capabilities provide greater visibility over large-scale deployments including inventory, health, and coverage.
Product bundles newly available include options with Dynamic Application Security Testing (DAST), content delivery network (CDN) functionality, and Security Operations Centre as a Service (SoC-as-a-Service), alongside AI-powered zero-day threat detection and remediation. These elements are designed to improve web application and API security.
Expanded AWS Marketplace portfolio
The company has increased the number of its solutions accessible via AWS Marketplace, allowing customers to acquire and manage Fortinet offerings within their existing cloud procurement workflows and apply AWS Enterprise Discount Program (EDP) commitments. Among the services that are now available are FortiAppSec Cloud, which provides unified web application and API protection (WAAP), FortiMail Workspace Security, which delivers protection across platforms like Microsoft 365 and Google Workspace, FortiNDR Cloud for AI-based threat detection, and FortiSIEM for scalable incident response.
Fortinet Incident Response Services have also been added to AWS Marketplace. The services are designed to deliver expert support for AWS customers, integrating with both AWS-native tools and FortiGuard threat intelligence to support a comprehensive approach to incident management and response.
Fortinet has achieved the AWS Security Incident Response Specialisation, which recognises the company's ability to deliver streamlined incident response solutions that are supported by AWS security response experts. This reflects Fortinet's strategic emphasis on offering end-to-end security expertise managed through a single vendor and deployment model. "Fortinet is committed to accelerating secure cloud transformation for our customers. By making more of our services available in AWS Marketplace and enhancing leading cloud-native solutions like Lacework FortiCNAPP and FortiAppSec Cloud, we're making it easier than ever for organisations to protect every cloud workload, application, and network edge."
That statement was provided by Nirav Shah, Senior Vice President, Products and Solutions, Fortinet.
All-in-one approach
These launches are part of Fortinet's strategic data to help organisations reduce reliance on isolated point products by offering integrated security capabilities across application, network, and user layers. Consolidating various services—including WAAP, network detection and response (NDR), security information and event management (SIEM), cloud-native application protection platform (CNAPP), and workspace security—aims to give businesses full-stack protection with simplified management, better scalability, and reduced cost.
For customers with significant cloud spend commitments seeking investment optimisation, Fortinet's FortiFlex licensing model provides a flexible, daily usage-based approach, supporting rapid deployment and elastic scaling, and allowing customers to only pay for the services that they use.
The Fortinet Security Fabric and consulting teams offer proactive risk assessment and incident response, aiming to help AWS customers strengthen their security postures as cloud usage continues to grow.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

When trusted tools go rogue: The return of the ‘Confused Deputy Problem'
When trusted tools go rogue: The return of the ‘Confused Deputy Problem'

Techday NZ

time2 days ago

  • Techday NZ

When trusted tools go rogue: The return of the ‘Confused Deputy Problem'

A decades-old cybersecurity vulnerability is staging a dangerous comeback, and this time it involves modern tools and has far-reaching consequences. Known as the 'Confused Deputy Problem,' this flaw sees trusted software - such as administrative tools, privileged scripts, or even AI agents - being manipulated to misuse their powers on behalf of less-privileged applications operating autonomously or by users. And in today's rapidly evolving threat landscape, the consequences are more severe than ever. From compiler quirk to enterprise crisis The confused deputy problem isn't new. First described by computer scientist Norm Hardy in 1988, it referred to a case where a compiler (legitimately empowered to write to billing files) was tricked by less-privileged applications into overwriting those sensitive files. The applications themselves didn't have the necessary access, but the compiler acted on their behalf, unwittingly executing their intent. Fast forward to today, and this fundamental breakdown of privilege separation is now playing out in some of the most advanced enterprise systems, including those that rely on artificial intelligence, automation, and cloud-native infrastructure. In most modern enterprises, trusted systems or processes - like automation scripts, CI/CD pipelines, and privileged service accounts - are the deputies. These programs are entrusted with elevated access because they serve as conduits to essential business functions. However, if they lack mechanisms to evaluate the context of the commands and honour least privilege performing functions, they can be exploited just as easily as Hardy's compiler. The problem becomes even more alarming when applied to Agentic AI which are tools that act independently to complete tasks using delegated authority. If these AI agents are manipulated into making requests or executing operations they weren't intended to, they become confused deputies on a much larger scale. Real-world risks The confused deputy issue surfaces in multiple ways across enterprise IT today. These include: SuDo misuse: Scripts with superuser privileges can be hijacked by untrusted inputs, elevating user privilege without directly attacking the OS. Scripts with superuser privileges can be hijacked by untrusted inputs, elevating user privilege without directly attacking the OS. CI/CD exploits: Shared service accounts in development pipelines can be coerced into leaking secrets or deploying malicious artifacts, especially in the absence of role isolation and context validation. Shared service accounts in development pipelines can be coerced into leaking secrets or deploying malicious artifacts, especially in the absence of role isolation and context validation. Cloud token abuse: In AWS or Azure environments, services can inadvertently use their assumed roles to fulfill malicious requests initiated by compromised peers, turning secure microservices into agents of privilege escalation. Why the problem persists Despite increasing awareness and tooling, the confused deputy problem persists largely because enterprises have not fully embraced the principle of least privilege. That is, systems, applications, and users continue to have more access than they need. What's more, the explosion of machine identities, such as automated services, scripts, bots, and now AI agents, has made it far harder to track privilege boundaries. Machines now communicate with other machines more frequently than humans do, and without adequate oversight, these interactions become fertile ground for exploitation. Reimagining Privileged Access Management To confront this resurgent threat, businesses must rethink their approach to Privileged Access Management (PAM). It's no longer enough to store secrets or manage user credentials. Modern PAM must be dynamic, context-aware, and tightly integrated into every aspect of the IT ecosystem. Key strategies to consider include: Command validation and filtering: Systems should whitelist commands, sanitise inputs, and block privilege escalation via indirect parameters. Systems should whitelist commands, sanitise inputs, and block privilege escalation via indirect parameters. Context-aware decisions: Access should be evaluated based on behavioural context and not just identity. Why is a session being initiated? What other systems has the user accessed? What's the broader pattern? Access should be evaluated based on behavioural context and not just identity. Why is a session being initiated? What other systems has the user accessed? What's the broader pattern? Segregation of duties: Different roles and accounts should be used for automation, deployment, and debugging. A single account with broad entitlements poses a massive risk if compromised. Different roles and accounts should be used for automation, deployment, and debugging. A single account with broad entitlements poses a massive risk if compromised. Real-time monitoring and forensics: PAM solutions must include session recording, keystroke logging, and audit trails to detect both deliberate abuse and accidental misuse. AI's double-edged sword Agentic AI represents both the future and the frontier of the confused deputy problem. These systems are capable of incredible operational gains, but their autonomous nature makes them ripe for exploitation. A prompt, parameter, or request that seems benign on the surface can trigger actions that cause significant harm or data leakage, especially if the agent can't distinguish between valid commands and malicious manipulation. This isn't just a technical flaw but a governance challenge. Enterprises must ensure that, as they embrace AI and automation, they do so with controls that prioritise intent verification, privilege minimization, and oversight. A strategic imperative The confused deputy problem is no longer a relic of early computing. It's a central challenge for modern digital security. As organisations deploy more intelligent and powerful tools, they must recognise that privilege without perspective is an attack vector in its own right. To prevent trusted systems from becoming dangerous liabilities, enterprises need to enforce least privilege not just as a policy, but as a design principle embedded in every layer of infrastructure, automation, and AI deployment.

Fortinet named Leader in 2025 Gartner Magic Quadrant for LAN
Fortinet named Leader in 2025 Gartner Magic Quadrant for LAN

Techday NZ

time2 days ago

  • Techday NZ

Fortinet named Leader in 2025 Gartner Magic Quadrant for LAN

Fortinet has been recognised as a Leader in the 2025 Gartner Magic Quadrant for Enterprise Wired and Wireless LAN Infrastructure for the second consecutive year. The company's wired and wireless local area network solutions are part of its Fortinet Security Fabric, an artificial intelligence-powered platform that integrates networking and security functions. According to Fortinet, this approach aims to reduce complexity, mitigate threats, lower operational costs, and enhance system performance for its enterprise customers. Gartner recognition Being named a Leader in the 2025 Gartner Magic Quadrant reflects Fortinet's position in the enterprise LAN infrastructure sector. The company attributes this achievement to the continued strength of its secure LAN edge portfolio, which includes products such as FortiSwitch and FortiAP, all managed through FortiOS, Fortinet's unified operating system. "Unlike traditional networking solutions that bolt security on after the fact, the Fortinet wired and wireless LAN portfolio was developed from the ground up with built-in AI-powered security and AI-assisted network operations. This convergence enables customers to simplify operations, improve performance, and extend security from IT into OT environments. We believe this is what continues to set Fortinet apart and make us a leader in this market, said Nirav Shah, Senior Vice President of Products and Solutions, Fortinet." Securing the LAN edge The Fortinet Secure LAN Edge portfolio is designed to meet evolving enterprise requirements. The company points to several features in its platform, such as built-in security at the LAN edge, intuitive architecture, integrated security features, and AI-assisted network management via FortiAI. Fortinet also states that its simplified licensing model removes the complexity of managing various add-on subscriptions. In terms of operational efficiency, the company emphasises the convergence of IT and operational technology management through a unified system. Fortinet suggests that a single-platform approach can help organisations facing cybersecurity skills shortages and staffing constraints, minimise misconfiguration risks, and provide AI-driven insights across LAN deployments. The solutions are intended to offer enterprise-grade flexibility at a reduced cost and complexity, while maintaining operational simplicity. All these functions are integrated within FortiOS, powering the Security Fabric across Fortinet's wired and wireless solutions and related security applications. Customer feedback Fortinet has also been listed as a Customers' Choice in the 2024 Gartner Peer Insights Voice of the Customer for Enterprise Wired and Wireless LAN Infrastructure. This marks the seventh consecutive time the company has received this recognition. Ed O'Kelley, Vice President of IT at Goodwill Industries of Middle Tennessee, commented on their experience: "One of the big reasons we chose Fortinet is that their networking tools are built from the ground up with security in mind... With the Fortinet solutions, our network speed has been amazing. We used to receive frequent performance-related complaints from end-users, but we have heard zero complaints since we deployed the Fortinet networking solutions." Scott Scherer, Chief Information Officer at Jersey Mike's Franchise Systems, also shared feedback: "FortiAPs have better availability than their competitors and easier, single-pane-of-glass management. We considered an unmanaged AP, but when we realised how tightly FortiAP integrates with the Fortinet Security Fabric, the decision was a nobrainer. We expect the FortiSwitches and FortiAPs to work together to paint a very complete security picture for our team." Wider industry context The Gartner Magic Quadrant evaluates vendors in enterprise wireless and wired LAN infrastructure on several criteria, including ability to execute on current offerings and completeness of vision for future market needs. Fortinet's position as a Leader in this quadrant suggests strong performance across these aspects, as assessed by Gartner's analysts. The company has indicated its integrated platform strategy and alignment with user requirements as reasons for continued recognition within the sector. Follow us on: Share on:

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store