Fortinet - Experts & Thought Leaders
Latest Fortinet news & announcements
SecurityBridge, creator of the Cybersecurity Command Centre for SAP, announced Secure Together New York 2025, an in-person SAP security event on November 12, 2025, at the Accenture Office, One Manhattan West, New York. SecurityBridge’s expertise in SAP cybersecurity has been featured by top-tier media outlets, including Forbes, TechRadar, and The Hacker News. The company will join forces with partners - Accenture, Bowbridge, Fortinet, NextLabs, and Saviynt to deliver a full day of expert sessions exploring the future of SAP security. These sessions will cover AI-powered segregation of duties (SoD) controls, quantum-resistant strategies, and defence mechanisms against modern ransomware and file-based exploits. Next generation of enterprise security “Secure Together New York 2025 brings the SAP community face-to-face with the pioneers shaping the next generation of enterprise security,” said Bill Oliver, U.S. Managing Director, SecurityBridge, adding “From quantum-ready controls to zero trust transformation, attendees will gain actionable insights they can apply immediately within their organisations.” Secure digital cloud transformation Attendees will gain practical insights into SAP Business Technology Platform (BTP) security, zero-trust data segregation, and secure digital cloud transformation, as well as an early look at SAP’s GRC 2026 roadmap and new Fiori-first security usability enhancements. Designed for security and compliance professionals, the program combines innovation, practicality, and real-world use cases to help enterprises strengthen their SAP security posture with confidence. Why attend Expert Sessions from global SAP security leaders on AI, quantum security, and ransomware defense. Real-World Use Cases highlighting zero-trust data segregation and SAP cloud security transformations. Peer Networking with industry leaders and partners shaping SAP security in North America. Forward-Looking Insights into SAP’s GRC roadmap and AI-driven identity governance. Attendance is free, and the one-day format minimises disruption to work schedules, while delivering maximum value for SAP security teams.
Keysight Technologies, Inc. announces that Fortinet chose the Keysight BreakingPoint QuickTest network application and security test tool to validate SSL deep packet inspection performance capabilities and security efficacy of its FortiGate 700G series next-generation firewall (NGFW). BreakingPoint QuickTest is Keysight’s turn-key performance and security validation solution with self-stabilising, goal-seeking algorithms that quickly assess the performance and security efficacy of a variety of network infrastructures. Enterprise networks Enterprise networks and systems face a constant onslaught of cyberattacks Enterprise networks and systems face a constant onslaught of cyberattacks, including malware, vulnerabilities, and evasions. These attacks are taking a toll, as 67% of enterprises report suffering a breach in the past two years, while breach-related lawsuits have risen 500% in the last four years. Fortinet developed the FortiGate 700G series NGFW to help protect enterprise edge and distributed enterprise networks from these ever-increasing cybersecurity threats, while continuing to process legitimate customer-driven traffic that is vital to their core business. The FortiGate 700G is powered by Fortinet’s proprietary Network Processor 7 (NP7), Security Processor 5 (SP5) ASIC, and FortiOS, Fortinet’s unified operating system. Security test solution Requiring an application and security test solution that delivers real-world network traffic performance, relevant and reliable security assessment, repeatable results, and fast time-to-insight, Fortinet turned to Keysight’s BreakingPoint QuickTest network applications and security test tool. Using BreakingPoint QuickTest, Fortinet validated the network performance and cybersecurity capabilities of the FortiGate 700G NGFW using: Simplified Test Setup and Execution: Pre-defined performance and security assessment suites, along with easy, click-to-configure network configuration, allow users to set up complex tests in minutes. Reduced Test Durations: Self-stabilising, goal-seeking algorithms accelerate the test process and shorten the overall time-to-insight. Scalable HTTP and HTTPS Traffic Generation: Supports all RFC 9411 tests used by NetSecOPEN, an industry consortium that develops open standards for network security testing. This includes the 7.7 HTTPS throughput test, allowing Fortinet to quickly assess that the FortiGate 700G NGFW’s SSL Deep Inspection engine can support up to 14 Gbps of inspected HTTPS traffic. NetSecOPEN Security Efficacy Tests: BreakingPoint QuickTest supports the full suite of NetSecOPEN security efficacy tests, including malware, vulnerabilities, and evasions. This ensures the FortiGate 700G capabilities are validated with relevant, repeatable, and widely accepted industry standard test methodologies and content. Robust Reporting and Real-time Metrics: Live test feedback and clear, actionable reports showed that the FortiGate 700G successfully blocked 3,838 of the 3,930 malware samples, 1,708 of the 1,711 CVE threats, and stopped 100% of evasions, earning a grade “A” across all security tests. FortiGate 700G series Nirav Shah, Senior Vice President, Products and Solutions, Fortinet, said: “The FortiGate 700G series next-generation firewall combines cutting-edge artificial intelligence and machine learning with the port density and application throughput enterprises need, delivering comprehensive threat protection at any scale.” “Keysight's intuitive BreakingPoint QuickTest application and security test tool made our validation process easy. It provided clear and definitive results that the FortiGate 700G series NGFW equips organisations with the performance and advanced network security capabilities required to stay ahead of current and emerging cyberthreats.” Landscape of cyber threats Ram Periakaruppan, Vice President and General Manager, Keysight Network Test and Security Solutions, said: “The landscape of cyber threats is constantly evolving, so enterprises must be vigilant in adapting their network defences, while also continuing to meet their business objectives.” “Keysight's network application and security test solutions help alleviate the pressure these demands place on network equipment manufacturers by providing an easy-to-use package with pre-defined performance and security tests, innovative goal-seeking algorithms, and continuously updated benchmarking content, ensuring solutions meet rigorous industry requirements.”
Coalition, the world's first Active Insurance provider designed to prevent digital risk before it strikes, published its Cyber Threat Index 2025, detailing insights on cybersecurity trends from 2024 and emerging threats businesses should be aware of in 2025. According to the report, most ransomware claims in 2024 started with threat actors compromising perimeter security appliances (58%), like virtual private networks (VPNs) or firewalls. Remote desktop products were second-most (18%) exploited for ransomware attacks. Ransomware cyber attack “While ransomware is a serious concern for all businesses, these insights demonstrate that threat actors’ ransomware playbook hasn’t evolved all that much—they’re still going after the same tried and true technologies with many of the same methods,” commented Alok Ojha, Coalition’s Head of Products, Security. “This means that businesses can have a reliable playbook, too, and should focus on mitigating the riskiest security issues first to reduce the likelihood of ransomware or another cyber attack. Continuous attack surface monitoring to detect these technologies and mitigate possible vulnerabilities could mean the difference between a threat and an incident.” Other key findings from the report The total number of published software vulnerabilities will increase to over 45,000 in 2025, a rate of nearly 4,000 per month and a 15% jump over the first 10 months of 2024. Across all ransomware claims, the most common initial access vectors (IAVs) were stolen credentials (47%) and software exploits (29%). Vendors such as Fortinet®, Cisco®, SonicWall®, Palo Alto Networks®, and Microsoft® build the most commonly compromised products. Exposed logins are an underappreciated driver of ransomware risk. Coalition detected over 5 million internet-exposed remote management solutions and tens of thousands of exposed login panels across the internet. When applying for cyber insurance, most businesses (65%+) had at least one internet-exposed web login panel. Crucial security risks Policyholders received critical alerts for just 0.15% of vulnerabilities published in the first ten months “This year’s report focuses on the most crucial security risks that under-resourced organisations should understand to better calibrate their defensive investments to bolster resilience,” said Daniel Woods, Senior Security Researcher at Coalition. “Calibration involves balancing security investment across vulnerabilities, misconfigurations, and threat intelligence while also responding to emerging threats, such as zero-day vulnerabilities exploited in the wild. That’s why Coalition issues Zero-Day Alerts to help businesses, especially SMBs with limited security resources, stay ahead of these vulnerabilities and reduce alert fatigue by prioritising those posing the greatest risk.” Risk prioritisation for policyholders Coalition employs artificial intelligence, honeypots, and human judgement to prioritise high-risk vulnerabilities based on their likelihood of exploitation. This risk prioritisation reduces alert fatigue for policyholders and helps them focus on the most critical risks. Policyholders received critical alerts for just 0.15% of vulnerabilities published in the first ten months of 2024, and 90% never received an alert at all. These timely notifications enabled Coalition customers to remediate over 32,000 vulnerabilities last year.
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download