logo
#

Latest news with #FortiOS

Fortinet Named Leader By Gartner For Enterprise Wired & Wireless LAN Infrastructure
Fortinet Named Leader By Gartner For Enterprise Wired & Wireless LAN Infrastructure

Channel Post MEA

time3 days ago

  • Business
  • Channel Post MEA

Fortinet Named Leader By Gartner For Enterprise Wired & Wireless LAN Infrastructure

Fortinet has announced it has been recognized as a Leader in the 2025 Gartner Magic Quadrant for Enterprise Wired and Wireless LAN Infrastructure for the second year in a row. Fortinet believes this recognition reflects the strength of its industry-leading secure LAN edge portfolio, including secure networking solutions such as FortiSwitch and FortiAP. The portfolio is fully integrated with the Fortinet Security Fabric and powered by a single operating system, FortiOS, to deliver converged networking and security. 'Unlike traditional networking solutions that bolt security on after the fact, the Fortinet wired and wireless LAN portfolio was developed from the ground up with built-in AI-powered security and AI-assisted network operations. This convergence enables customers to simplify operations, improve performance, and extend security from IT into OT environments. We believe this is what continues to set Fortinet apart and make us a leader in this market,' says Nirav Shah, Senior Vice President, Products and Solutions, at Fortinet. The Fortinet Secure LAN Edge portfolio addresses evolving customer needs and delivers key benefits, including: Pervasive, built-in security at the LAN edge to reduce cyber risk: Customers can deploy intuitive architectures with integrated security and AI-assisted management via FortiAI. Fortinet's simplified licensing model avoids the complexity of managing multiple add-on subscriptions. Customers can deploy intuitive architectures with integrated security and AI-assisted management via FortiAI. Fortinet's simplified licensing model avoids the complexity of managing multiple add-on subscriptions. Stronger IT and OT convergence through a unified platform: As organizations demand more of their networks while navigating staffing shortages and the cybersecurity skills gap, it becomes increasingly difficult for limited staff to maintain and secure their networks. Fortinet reduces this burden with a single platform approach that minimizes misconfigurations, eases day-to-day operations, and delivers AI-driven insights across Fortinet's wired and wireless LAN solutions. As organizations demand more of their networks while navigating staffing shortages and the cybersecurity skills gap, it becomes increasingly difficult for limited staff to maintain and secure their networks. Fortinet reduces this burden with a single platform approach that minimizes misconfigurations, eases day-to-day operations, and delivers AI-driven insights across Fortinet's wired and wireless LAN solutions. Consistent capabilities and intuitive licensing to reduce cost and complexity: Fortinet's wired and wireless LAN solutions provide enterprise-grade flexibility without trade-offs, reducing network risk and simplifying operations without inflating costs. These capabilities are all delivered through a single operating system, FortiOS, which powers the Fortinet Security Fabric across the networking and security domains. Fortinet has also been recognized in the 2024 Gartner Peer Insights Voice of the Customer for Enterprise Wired and Wireless LAN Infrastructure as a Customers' Choice for the seventh consecutive time. 'One of the big reasons we chose Fortinet is that their networking tools are built from the ground up with security in mind… With the Fortinet solutions, our network speed has been amazing. We used to receive frequent performance-related complaints from end-users, but we have heard zero complaints since we deployed the Fortinet networking solutions.' Ed O'Kelley, Vice President of IT, Goodwill Industries of Middle Tennessee 'FortiAPs have better availability than their competitors and easier, single-pane-of-glass management. We considered an unmanaged AP, but when we realized how tightly FortiAP integrates with the Fortinet Security Fabric, the decision was a nobrainer. We expect the FortiSwitches and FortiAPs to work together to paint a very complete security picture for our team.'

Fortinet named Leader in 2025 Gartner Magic Quadrant for LAN
Fortinet named Leader in 2025 Gartner Magic Quadrant for LAN

Techday NZ

time4 days ago

  • Business
  • Techday NZ

Fortinet named Leader in 2025 Gartner Magic Quadrant for LAN

Fortinet has been recognised as a Leader in the 2025 Gartner Magic Quadrant for Enterprise Wired and Wireless LAN Infrastructure for the second consecutive year. The company's wired and wireless local area network solutions are part of its Fortinet Security Fabric, an artificial intelligence-powered platform that integrates networking and security functions. According to Fortinet, this approach aims to reduce complexity, mitigate threats, lower operational costs, and enhance system performance for its enterprise customers. Gartner recognition Being named a Leader in the 2025 Gartner Magic Quadrant reflects Fortinet's position in the enterprise LAN infrastructure sector. The company attributes this achievement to the continued strength of its secure LAN edge portfolio, which includes products such as FortiSwitch and FortiAP, all managed through FortiOS, Fortinet's unified operating system. "Unlike traditional networking solutions that bolt security on after the fact, the Fortinet wired and wireless LAN portfolio was developed from the ground up with built-in AI-powered security and AI-assisted network operations. This convergence enables customers to simplify operations, improve performance, and extend security from IT into OT environments. We believe this is what continues to set Fortinet apart and make us a leader in this market, said Nirav Shah, Senior Vice President of Products and Solutions, Fortinet." Securing the LAN edge The Fortinet Secure LAN Edge portfolio is designed to meet evolving enterprise requirements. The company points to several features in its platform, such as built-in security at the LAN edge, intuitive architecture, integrated security features, and AI-assisted network management via FortiAI. Fortinet also states that its simplified licensing model removes the complexity of managing various add-on subscriptions. In terms of operational efficiency, the company emphasises the convergence of IT and operational technology management through a unified system. Fortinet suggests that a single-platform approach can help organisations facing cybersecurity skills shortages and staffing constraints, minimise misconfiguration risks, and provide AI-driven insights across LAN deployments. The solutions are intended to offer enterprise-grade flexibility at a reduced cost and complexity, while maintaining operational simplicity. All these functions are integrated within FortiOS, powering the Security Fabric across Fortinet's wired and wireless solutions and related security applications. Customer feedback Fortinet has also been listed as a Customers' Choice in the 2024 Gartner Peer Insights Voice of the Customer for Enterprise Wired and Wireless LAN Infrastructure. This marks the seventh consecutive time the company has received this recognition. Ed O'Kelley, Vice President of IT at Goodwill Industries of Middle Tennessee, commented on their experience: "One of the big reasons we chose Fortinet is that their networking tools are built from the ground up with security in mind... With the Fortinet solutions, our network speed has been amazing. We used to receive frequent performance-related complaints from end-users, but we have heard zero complaints since we deployed the Fortinet networking solutions." Scott Scherer, Chief Information Officer at Jersey Mike's Franchise Systems, also shared feedback: "FortiAPs have better availability than their competitors and easier, single-pane-of-glass management. We considered an unmanaged AP, but when we realised how tightly FortiAP integrates with the Fortinet Security Fabric, the decision was a nobrainer. We expect the FortiSwitches and FortiAPs to work together to paint a very complete security picture for our team." Wider industry context The Gartner Magic Quadrant evaluates vendors in enterprise wireless and wired LAN infrastructure on several criteria, including ability to execute on current offerings and completeness of vision for future market needs. Fortinet's position as a Leader in this quadrant suggests strong performance across these aspects, as assessed by Gartner's analysts. The company has indicated its integrated platform strategy and alignment with user requirements as reasons for continued recognition within the sector. Follow us on: Share on:

What Makes FortiGate the Core Driver of Fortinet's Product Growth?
What Makes FortiGate the Core Driver of Fortinet's Product Growth?

Globe and Mail

time4 days ago

  • Business
  • Globe and Mail

What Makes FortiGate the Core Driver of Fortinet's Product Growth?

Fortinet 's FTNT FortiGate platform remains central to its secure networking strategy. As the first product for most customers, FortiGate firewalls help drive hardware adoption and make it easy to expand into other solutions. Powered by Fortinet's FortiASIC chips and unified FortiOS software, FortiGate delivers strong performance, simpler management and lower energy use. These strengths have supported wide adoption and helped Fortinet grow its market share. Customers often begin with FortiGate and later integrate Fortinet's switches, access points or software offerings through FortiLink and FortiOS. Large enterprise wins, such as an eight-figure deal with a Fortune 500 company in the first quarter of 2025, highlight the increasing stickiness of FortiGate-driven customer relationships. Fortinet launched the FortiGate 700G series in May, a high-performance firewall designed for mid-sized businesses and distributed enterprises. This new model delivers a 5-10 times performance boost over competitors and strengthens Fortinet's value proposition by combining performance with energy efficiency and low total cost of ownership. The company believes continued product innovation and deeper enterprise penetration will fuel near-term top-line growth. In the first quarter of 2025, product revenues, which accounted for 30% of total revenues, grew 12% year over year to $459 million. FortiGate hardware outpaced overall product growth, expanding in the mid-teens and remaining Fortinet's primary product driver. Our model estimate for 2025 product revenues is pegged at $2.14 billion, indicating 12.3% growth year over year. FTNT Faces Stiff Competition in the Firewall Space Fortinet faces increasing competition from Palo Alto Networks PANW and Check Point Software CHKP, both of which are seeing strong adoption of their firewall capabilities. In the third quarter of fiscal 2025, Palo Alto Networks saw 20% year-over-year growth in its Software Firewall ARR, driven by public cloud deployments. As AI accelerates cloud adoption, Palo Alto Networks' long-term demand for software firewalls is likely to expand. It is also seeing stable demand for its firewall appliances. In the first quarter of 2025, Check Point Software saw strong demand for its Quantum Force firewall appliances, which drove a 14% year-over-year rise in product and license revenues. Check Point Software expects this firewall momentum to continue through 2026, as customers increasingly adopt its next-generation appliances amid broader infrastructure refresh cycles. FTNT's Share Price Performance, Valuation and Estimates FTNT shares have risen 11.1% in the year-to-date (YTD) period, underperforming the Zacks Security industry's growth of 23.4%. FTNT has outperformed the Zacks Computer and Technology sector's return of 6.1%. FTNT's YTD Price Performance From a valuation standpoint, Fortinet stock is currently trading at a Price/Book ratio of 40.17X compared with the industry's 24.88X. FTNT has a Value Score of F. FTNT Valuation Image Source: Zacks Investment Research The Zacks Consensus Estimate for second-quarter 2025 earnings is pegged at 59 cents per share, unchanged over the past 30 days, indicating 3.51% year-over-year growth. Fortinet currently carries a Zacks Rank #3 (Hold). You can see the complete list of today's Zacks #1 Rank (Strong Buy) stocks here. Zacks Names #1 Semiconductor Stock It's only 1/9,000th the size of NVIDIA which skyrocketed more than +800% since we recommended it. NVIDIA is still strong, but our new top chip stock has much more room to boom. With strong earnings growth and an expanding customer base, it's positioned to feed the rampant demand for Artificial Intelligence, Machine Learning, and Internet of Things. Global semiconductor manufacturing is projected to explode from $452 billion in 2021 to $803 billion by 2028. See This Stock Now for Free >> Want the latest recommendations from Zacks Investment Research? Today, you can download 7 Best Stocks for the Next 30 Days. Click to get this free report Check Point Software Technologies Ltd. (CHKP): Free Stock Analysis Report Fortinet, Inc. (FTNT): Free Stock Analysis Report Palo Alto Networks, Inc. (PANW): Free Stock Analysis Report

What Makes FortiGate the Core Driver of Fortinet's Product Growth?
What Makes FortiGate the Core Driver of Fortinet's Product Growth?

Yahoo

time4 days ago

  • Business
  • Yahoo

What Makes FortiGate the Core Driver of Fortinet's Product Growth?

Fortinet's FTNT FortiGate platform remains central to its secure networking strategy. As the first product for most customers, FortiGate firewalls help drive hardware adoption and make it easy to expand into other solutions. Powered by Fortinet's FortiASIC chips and unified FortiOS software, FortiGate delivers strong performance, simpler management and lower energy use. These strengths have supported wide adoption and helped Fortinet grow its market often begin with FortiGate and later integrate Fortinet's switches, access points or software offerings through FortiLink and FortiOS. Large enterprise wins, such as an eight-figure deal with a Fortune 500 company in the first quarter of 2025, highlight the increasing stickiness of FortiGate-driven customer launched the FortiGate 700G series in May, a high-performance firewall designed for mid-sized businesses and distributed enterprises. This new model delivers a 5-10 times performance boost over competitors and strengthens Fortinet's value proposition by combining performance with energy efficiency and low total cost of ownership. The company believes continued product innovation and deeper enterprise penetration will fuel near-term top-line the first quarter of 2025, product revenues, which accounted for 30% of total revenues, grew 12% year over year to $459 million. FortiGate hardware outpaced overall product growth, expanding in the mid-teens and remaining Fortinet's primary product driver. Our model estimate for 2025 product revenues is pegged at $2.14 billion, indicating 12.3% growth year over year. Fortinet faces increasing competition from Palo Alto Networks PANW and Check Point Software CHKP, both of which are seeing strong adoption of their firewall the third quarter of fiscal 2025, Palo Alto Networks saw 20% year-over-year growth in its Software Firewall ARR, driven by public cloud deployments. As AI accelerates cloud adoption, Palo Alto Networks' long-term demand for software firewalls is likely to expand. It is also seeing stable demand for its firewall the first quarter of 2025, Check Point Software saw strong demand for its Quantum Force firewall appliances, which drove a 14% year-over-year rise in product and license revenues. Check Point Software expects this firewall momentum to continue through 2026, as customers increasingly adopt its next-generation appliances amid broader infrastructure refresh cycles. FTNT shares have risen 11.1% in the year-to-date (YTD) period, underperforming the Zacks Security industry's growth of 23.4%. FTNT has outperformed the Zacks Computer and Technology sector's return of 6.1%. Image Source: Zacks Investment Research From a valuation standpoint, Fortinet stock is currently trading at a Price/Book ratio of 40.17X compared with the industry's 24.88X. FTNT has a Value Score of F. Image Source: Zacks Investment Research The Zacks Consensus Estimate for second-quarter 2025 earnings is pegged at 59 cents per share, unchanged over the past 30 days, indicating 3.51% year-over-year growth. Fortinet, Inc. price-consensus-chart | Fortinet, Inc. Quote Fortinet currently carries a Zacks Rank #3 (Hold). You can see the complete list of today's Zacks #1 Rank (Strong Buy) stocks here. Want the latest recommendations from Zacks Investment Research? Today, you can download 7 Best Stocks for the Next 30 Days. Click to get this free report Check Point Software Technologies Ltd. (CHKP) : Free Stock Analysis Report Fortinet, Inc. (FTNT) : Free Stock Analysis Report Palo Alto Networks, Inc. (PANW) : Free Stock Analysis Report This article originally published on Zacks Investment Research ( Zacks Investment Research Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

Rapid7 Q1 2025 incident response findings
Rapid7 Q1 2025 incident response findings

Techday NZ

time05-06-2025

  • Techday NZ

Rapid7 Q1 2025 incident response findings

Rapid7's Q1 2025 incident response data highlights several key initial access vector (IAV) trends, shares salient examples of incidents investigated by the Rapid7 Incident Response (IR) team, and digs into threat data by industry as well as some of the more commonly seen pieces of malware appearing in incident logs. Is having no MFA solution in place still one of the most appealing vulnerabilities for threat actors? Will you see the same assortment of malware regardless of whether you work in business services or media and communications? And how big a problem could one search engine query possibly be, anyway? The answer to that last question is "very," as it turns out. As for the rest… Initial access vectors Below, we highlight the key movers and shakers for IAVs across cases investigated by Rapid7's IR team. While you'll notice a fairly even split among several vectors such as exposed remote desktop protocol (RDP) services and SEO poisoning, one in particular is clearly the leader of the pack where compromising organisations is concerned: stolen credentials to valid/active accounts with no multi-factor authentication (MFA) enabled. Valid account credentials — with no MFA in place to protect the organisation should they be misused — are still far and away the biggest stumbling block for organisations investigated by the Rapid7 IR team, occurring in 56% of all incidents this first quarter. Exposed RDP services accounted for 6% of incidents as the IAV, yet they were abused by attackers more generally in 44% of incidents. This tells us that third parties remain an important consideration in an organisation's security hygiene. Valid accounts / no MFA: Top of the class Rapid7 regularly bangs the drum for tighter controls where valid accounts and MFA are concerned. As per the key findings, 56% of all incidents in Q1 2025 involved valid accounts / no MFA as the initial access vector. In fact, there's been very little change since Q3 2024, and as good as no difference between the last two quarters: Vulnerability exploitation: Cracks in the armour Rapid7's IR services team observed several vulnerabilities used, or likely to have been used, as an IAV in Q1 2025. CVE-2024-55591 for example, the IAV for an incident in manufacturing, is a websocket-based race condition authentication bypass affecting Fortinet's FortiOS and FortiProxy flagship appliances. Successful exploitation results in the ability to execute arbitrary CLI console commands as the super_admin user. The CVE-2024-55591 advisory was published at the beginning of 2025, and it saw widespread exploitation in the wild. One investigation revealed attackers using the above flaw to exploit vulnerable firewall devices and create local and administrator accounts with legitimate-looking names (e.g., references to "Admin", "I.T.", "Support"). This allowed access to firewall dashboards, which may have contained useful information about the devices' users, configurations, and network traffic. Policies were created which allowed for leveraging of remote VPN services, and the almost month-long dwell time observed in similar incidents may suggest initial access broker (IAB) activity, or a possible intended progression to data exfiltration and ransomware. Exposed RMM tooling: A path to ransomware As noted above, 6% of IAV incidents were a result of exposed remote monitoring and management (RMM) tooling. RMMs, used to remotely manage and access devices, are often used to gain initial access, or form part of the attack chain leading to ransomware. One investigation revealed a version of SimpleHelp vulnerable to several critical privilege escalation and remote code execution vulnerabilities, which included CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728. These CVEs target the SimpleHelp remote access solution. Exploiting CVE-2024-57727 permits an unauthenticated attacker to leak SimpleHelp "technician" password hashes. If one is cracked, the attacker can log-in as a remote-access technician. Lastly, the attacker can exploit CVE-2024-57726 and CVE-2024-57728 to elevate to SimpleHelp administrator and trigger remote code execution, respectively. CVE-2024-57727 was added to CISA KEV in February 2025. The vulnerable RMM solution was used to gain initial access and threat actors used PowerShell to create Windows Defender exclusions, with the ultimate goal of deploying INC Ransomware on target systems. SEO poisoning: When a quick search leads to disaster SEO poisoning, once the scourge of search engines everywhere, may not be high on your list of priorities. However, it still has the potential to wreak havoc on a network. Here, the issue isn't so much rogue entries in regular search results, but instead the paid sponsored ads directly above typical searches. Note how many sponsored results sit above the genuine site related to this incident: Multiple sponsored searches above the official (and desired) search result This investigation revealed a tale of two search results, where one led to a genuine download of a tool designed to monitor virtual environments, and the other led to malware. When faced with both options, a split-second decision went with the latter and what followed was an escalating series of intrusion, data exfiltration and—eventually—ransomware. An imitation website offering malware disguised as genuine software On the same day of initial compromise, the attacker moved laterally using compromised credentials via RDP, installing several RMM tools such as AnyDesk and SplashTop. It is likely that the threat actor searched for insecurely stored password files and targeted password managers. They also attempted to modify and/or disable various security tools in order to evade detection, and create a local account to enable persistence and avoid domain-wide password resets. An unauthorised version of WinSCP was used to exfiltrate a few hundred GB of sensitive company data from several systems, and with this mission accomplished only a few tasks remained. The first: attempting to inhibit system recovery by tampering with the Volume Shadow Copy Service (VSS), clearing event logs, deleting files, and also attempting to target primary backups for data destruction. The second: deployment of Qilin ransomware and a blackmail note instructing the victim to communicate via a TOR link lest the data be published to their leak site. Qilin ranked 7 in our top ransomware groups of Q1 2025 for leak post frequency, racking up 111 posts from January through March. Known for double-extortion attacks across healthcare, manufacturing, and financial sectors, Qilin (who, despite their name, are known not to be Chinese speakers, but rather Russian-speaking) has also recently been seen deployed by North Korean threat actors Moonstone Sleet. Attacker behaviour observations Bunnies everywhere: Tracking a top malware threat BunnyLoader, the Malware as a Service (MaaS) loader possessing a wealth of capabilities including clipboard and credential theft, keylogging, and the ability to deploy additional malware, is one of the most prolific presences Rapid7 has seen this first quarter of 2025. In many cases, it's also daisy-chained to many of the other payloads and tactics which make repeated appearances. To really drive this message home: BunnyLoader is the most observed payload across almost every industry we focused on. Whether we're talking manufacturing, healthcare, business services or finance, it's typically well ahead of the rest of the pack. Here are our findings across the 5 most targeted industries of Q1: BunnyLoader is in pole position not only for the 5 industries shown above, but across 12 of 13 industries overall, with 40% of all incidents observed involving this oft-updated malware. Just over half of that 40% total involved a fake CAPTCHA (commonly used for the purpose of victims executing malicious code), with malicious / compromised sites appearing in a quarter of BunnyLoader cases. Rogue documents, which may be booby-trapped with malware or pave the way for potential phishing attacks, bring up the rear at just 9% of all BunnyLoader appearances recorded. First offered for sale in 2023 for a lifetime-use cost of $250, its continued development and large range of features make it an attractive proposition for rogues operating on a budget. Targeted organisations: The manufacturing magnet Manufacturing organisations were targeted in more than 24% of incidents the Rapid7 IR team observed, by far the most targeted industry in Q1 based on both Rapid7's ransomware analytics and IR team observations. The chart below compares Rapid7's industry-wide data (comprising a wide range of payloads and tactics) with ransomware leak post specific data. In both cases, manufacturing is a fair way ahead of other industries; this reflects its status as one of the most popular targets for ransomware groups over the last couple of years. The manufacturing industry is an attack vector for nation states because it is an important component of global trade. It is also an area that has many legacy and older, operational technologies (OT). Combine unpatched legacy systems with complicated supply chains, and you have a risk that nation state actors will find an attractive target. This is especially the case when considering that many manufacturing organisations have critical contracts with governments, and attacks can cause severe disruption if they're not speedily resolved. Conclusion Q1 2025 resembles a refinement of successful tactics, as opposed to brand new innovations brought to the table. Our Q1 ransomware analytics showed threat actors making streamlined tweaks to a well-oiled machine, and we find many of the same "evolution, not revolution" patterns occurring here. This progression is particularly applicable in the case of initial access via valid accounts with no MFA protection. We expect to see no drop in popularity while businesses continue to leave easy inroads open and available to skilled (and unskilled) attackers. In addition, the risk of severe compromise stemming from seemingly harmless online searches underscores the necessity for organisations to reexamine basic security best practices, alongside deploying robust detection and response capabilities. Businesses addressing these key areas for concern will be better equipped to defend against what should not be an inevitable slide into data exfiltration and malware deployment.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store