Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Agents of Change: Fortinet

Jack Loo | Jan. 29, 2013
Singapore’s IDA unveiled its Infocomm Technology Roadmap outlining nine technology trends that will shape the future. We asked various enterprise IT heavyweights for their perspectives on the Roadmap, and next up, we have security specialist Fortinet.

An example is the Twitter Direct Message feature which allows someone to send a text message directly to another Twitter user. When the recipient replies, he must remember to type "dm" in front of their message or Twitter will treat the response as a public "Tweet" which will be automatically sent to all their followers.

Traditional port blocking and URL filtering does not protect enterprises against Web 2.0 applications, as application control is no longer as simple as "block" or "allow". This is because social networking sites often contain valuable features along with some features that should be blocked. Multiple layers of protection are now necessary. Organisations must be able to detect, monitor and control application usage and traffic at gateways and at endpoints. In addition, an association must be made between the application and the end user so that proper access rights can be assigned through a security policy.

Organisations need a security solution that provides complete content protection, including application detection, monitoring and control to discover threats embedded in Internet-based application traffic, and to protect against data loss resulting from inappropriate use of social media applications. In addition, content-based security enforcement is essential to mitigate these threats when they are discovered and to provide compete protection and threat elimination.

Our appliances already provide these multiple levels of protection when Fortinet Application Control is combined with our UTM features such as intrusion prevention, anti-virus/anti-spyware protection and data loss prevention, but we will continue to make the protection and control more intelligent, granular and accurate.


Previous Page  1  2  3  4  5  6 

Sign up for CIO Asia eNewsletters.