Beruflich Dokumente
Kultur Dokumente
2014
2013 North
SSL Certificate
2014 Global
CyberAmerican
Threat Analysis
and Reporting
Product
Leadership
AwardAward
Enabling
Technology
Leadership
potential
clients
by
cataloging
threats
to
operating
systems,
devices,
and
We Accelerate Growth
We Accelerate Growth
contribute. Other competitors of Fortinet use the results of penetration testing, ethical
hacking, network vulnerability detection, IP abnormalities from mobile phone networks,
and the results of Web filtering. Like the proverbial blind man that is asked to describe an
elephant by what he touches, the cyber threat landscape can only be fully understood by
understanding the larger security picture.
Fortinet in its threat environment reporting has the ability to summon information from all
aspects of networking, mobile and Web environments to create an integrated threat
management story (as well as a layered defense system for its customers).
Attention to the Mobile Market
Bring-your-own-device (BYOD) networking is becoming a viable option for companies that
want to keep its expenses down and for workers who want a customized and personal
work experience. Mobility enables workers to moderate their own hours, but also offer the
opportunity for continuous productivity. Proactivity in discovering dangerous phone
applications
preserves
network
integrity
and
personal
productivity.
As
business
applications become more mobile, the threat environment will move along with mobility.
Fortinet has precise coverage of the mobile threat environment. At the beginning of 2013,
Fortinet was finding 50,000 incidence of malware on Google Android phones per day. By
the end of 2013, 500,000 incidents per day were being found. The viruses are changing
in 2013 alone, Fortinet found 1,800 new types of mobile viruses. In terms of mobile
malware incidents, the United States experiences the most with 31 percent of all mobile
incidents, but is closely followed by Israel and Germany.
Fortinet reports that there is a comparative explosion in malicious Google Apps. Fortinet
says Google takes many precautions to make sure its Apps store offers safe products;
however, third-party app stores offering Google Apps are especially vulnerable. A common
exploit might be to offer a popular application. An end user attempts to download the app
and instead receives a fraudulent product. Embedded in the phony app is a product design
kit (pdk) that has exploits designed to jailbreak the phone.
Comprehensive coverage of the mobile threat environment helps CSOs understand the
necessary technologies needed to protect heterogeneous networks from exploits.
Network Vulnerability Reporting
Traditionally, when the topic of vulnerabilities was brought up, the most common worry
was hackers trying to breach sensitive information hidden behind network firewalls. While
the threat environment is fluid and attacks are more likely to address Web and mobile
applications and less likely to attack networks through firewalls, secure networking is an
important aspect of any defense. In the context of the Internet of Things, a vulnerability is
a vulnerability regardless of source and method.
Frost & Sullivan
We Accelerate Growth
the
course
of
protecting
assets,
Fortinet
products
are
always
learning
and
We Accelerate Growth
each country has its own computer emergency response team (CERT) the US-CERT is
an example. An international global community that is representative of national CERTs is
the Forum of Incident Response and Security Teams (FIRST). Currently, the Common
Vulnerability Scoring System Special Interest Group (CVSS-SIG) is convening to develop
Version 3 (v.3) scoring methods for vulnerabilities.
Market vertical interests are important to interact with as well. In the United States,
HITRUST Health Information Trust Alliance is the technology SIG accompanying The
Health Insurance Portability and Accountability Act (HIPAA). Internationally, Payment Card
Industry
Data
Security
Standard
(PCI-DSS)
establishes
international
compliance
standards. Several other vertical markets convene to set standards for the handling of
personal information or assets. Security service and appliance providers make a powerful
contribution to the advocacy of these groups.
For
reporting
purposes,
knowledge
of
individual
countries
is
important.
While
communications are truly global each individual company has a different culture in what
phones are purchased, how business is conducted, and what applications are used.
Naturally, the ability to identify where a cyber threat is coming from goes a long way
toward mitigating the threat.
Fortinet is a prodigious and conscientious contributor to FIRST and participates in the
technical wings of the CVSS-SIG. Fortinet offers advisories and white papers suggesting
best practices for specific vertical markets. The 2014 Fortinet Threat Landscape Report
provided information about which countries were most attacked by malware, mobile
malware and botnets.
Impact on Customer Satisfaction/Value
Vulnerability reporting reveals a mixed bag of motivations. Penetration testers and ethical
hackers will scan a network for vulnerabilities with the idea that they can claim a bounty
or sell security products that will mitigate potential threats.
Yet Fortinet takes a more holistic approach. Because Fortinet has a global presence, it is in
the best interest of the company to encourage a global exchange of vulnerabilities. If
Fortinet discovers a vulnerability, it will report the vulnerability straight to the affected
vendor or CERT through its Product Security Incident Response Team (PSIRT). Fortinet
will then let the affected vendor or CERT report the vulnerability either in an advisory or to
a global interest group and after a patch or remediation has taken place.
In general, Fortinet intimates its relationships with major PSIRT teams (Cisco, Google,
Adobe, Microsoft, etc.) continue to improve. However, even as these relationships improve
and Fortinet has increased credibility with key vendors, nine out of ten vulnerabilities still
take six months or more to adequately patch.
We Accelerate Growth
Currently, Fortinet lists 61 of the Global 100 as customers who at some point purchased a
Fortinet product. This means that Fortinet can report on and design defenses based upon
market
verticals,
specific
network
types,
and
the
intersection
of
networks
and
applications. If customers wish to participate in the larger Fortinet net, Web facing and
network defense products can be upgraded almost simultaneously to reflect new data
about threats as Fortinet learns about them.
While Fortinet takes an egalitarian approach to threat landscape reporting, Fortinet
customers still gain an advantage. When the company uncovers a network vulnerability,
malware, a botnet, or a malicious IP site, Fortinet will program its products to block or
deny access to network or site instantaneously. This zero-day process happens even as an
affected product vendor is notified and waits to issue an advisory or otherwise publicly
report its vulnerability. Prior to a fix, zero-day protection is already available.
Frost & Sullivan independent analysis indicates that Fortinet clearly establishes equipoise
between being a good corporate citizen and offering proactivity for its clientele.
Conclusion
Frost & Sullivan recognizes Fortinet for excellence in cyber threat reporting for the depth of
its research. Fortinet seamlessly fuses the results of its research and product development.
Attributable to its internal best practices, Fortinet receives high marks for its ethical
reporting of vulnerabilities. The company is a powerful contributor to standards-based
organizations and CERT teams. In the process of cyber defense, Fortinet products are
gaining knowledge about attack vectors and pattern of malicious behavior. Its impressive
research team brings a high level of refinement to raw data sets: information obtained
about the Internet, network vulnerabilities, and cellular communications.
Driven by interior and ulterior motives, Fortinet research paints a comprehensive picture of
the threat environment facing companies in information and network technologies.
We Accelerate Growth
In a sense, then,
everything is truly about the customer and making those customers happy is the
cornerstone of any long-term successful growth strategy. To achieve these goals through
technology leadership, Frost & Sullivan believes that an organization must be best-in-class
in three key areas: understanding demand, nurturing the brand, differentiating from the
competition.
We Accelerate Growth
We Accelerate Growth
represents
the
analytical
often,
growth
companies
decisions
understanding
of
make
based
on
their
important
a
narrow
environment,
provides
an
evaluation
platform for benchmarking industry players and for identifying those performing at bestin-class levels.
Frost & Sullivan
10
We Accelerate Growth
11
We Accelerate Growth
Breadth of
Security Coverage
Attention to the
Mobile Market
Web-Specific
Weaknesses
Network
Vulnerability
Reporting
Coverage of
Platforms
Weighted Rating
Award Criteria
20%
20%
20%
20%
20%
100%
Fortinet
10.0
10.0
9.0
7.0
9.0
9.0
Company 2
9.0
8.0
8.0
8.0
8.0
8.2
Company 3
7.0
8.0
9.0
7.0
8.0
7.8
12
We Accelerate Growth
Number of Assets
Used to Discover
Vulnerabilities
Actionable
Intelligence
Interaction with
the Global
Community
International
Coverage
Impact on
Customer
Satisfaction/Value
Weighted Rating
Award Criteria
20%
20%
20%
20%
20%
100%
Fortinet
9.5
9.0
9.0
9.0
9.0
9.1
Company 2
9.0
8.0
8.0
8.0
8.0
8.2
Company 3
8.0
9.0
7.5
8.0
8.0
8.1
detail allowing IT teams to mitigate new threats based upon proven treatments of older
vulnerabilities.
Interaction with the Global Community
Requirement: Cyber threats are often targeted to specific market verticals.
International Coverage
Requirement: The best threat reporting addresses where the threat emanates, what the
consequences were (or are, if on-going) and which end-users are affected. Global
geographies matter.
Impact on Customer Satisfaction Values
Requirement:
vendors or managed service providers how to build intelligence into their defenses.
13
We Accelerate Growth
14
We Accelerate Growth