Fortinet’s Next-Generation System-on-a-Chip Accelerates the World’s Most Powerful Distributed Enterprise Firewall

Fortinet’s Next-Generation System-on-a-Chip Accelerates the World’s Most Powerful Distributed Enterprise Firewall

Source:: Fortinet

Fortinet’s Next-Generation System-on-a-Chip Accelerates the World’s Most Powerful Distributed Enterprise Firewall

Fortinet’s Next-Generation System-on-a-Chip Accelerates the World’s Most Powerful Distributed Enterprise Firewall

Source:: Fortinet

Time is of the Essence: Announcing the Cisco 2016 Midyear Cybersecurity Report

By John N. Stewart It’s time again for our Midyear Cybersecurity Report (MCR), providing updates from Cisco security researchers on the state of security from the first half of the year. The 2016 MCR supplements the 2016 Cisco Annual Security Report published in January with mid-year analysis and insights on the evolving trends and threats across the industry. It […]

Source:: Cisco Security Notice

Time is of the Essence: Announcing the Cisco 2016 Midyear Cybersecurity Report

By John N. Stewart It’s time again for our Midyear Cybersecurity Report (MCR), providing updates from Cisco security researchers on the state of security from the first half of the year. The 2016 MCR supplements the 2016 Cisco Annual Security Report published in January with mid-year analysis and insights on the evolving trends and threats across the industry. It […]

Source:: Cisco Security Notice

Fortinet schützt die Hacker-Spielwiese bei der Black Hat Konferenz

Seit 1997 gibt es die Black Hat Security-Konferenzen und in dieser Zeit haben sich die Veranstaltungen zum wohl renommiertesten Hacker- und Sicherheits-Event in der Welt entwickelt. Für die diesjährige Konferenz, die vom 30.07. bis zum 04.08.2016 in Las Vegas stattfindet, wurde vom Veranstalter unser Technologie-Partner Fortinet ausgewählt, um gemeinsam mit den Black Hat Technikern ein stabiles, schnelles und sicheres Netzwerk für die Teilnehmer bereitzustellen.

2016-07-20_09h28_12

Fortinet stellt hierfür die bekannten und vielfach ausgezeichneten FortiGate Enterprise Firewalls, Switches und sichere Enterprise WLAN-Access-Points bereit.

Für dieses spannende und anspruchsvolle Umfeld ausgewählt zu werden, ist Auszeichnung und Herausforderung zu gleich. Wir wünschen gutes Gelingen.

Fortinet-Lösungen in den Bereichen WLAN, Next-Generation-Firewalls, Sandbox, Web-Applikationsfilter und Secure-Mail bieten wir Ihnen bereits seit Jahren an. Dabei zeigt unsere Erfahrung bei Kunden und im eigenen Einsatz, dass diese Lösungen ausgesprochen gut funktionieren, gerade auch was die Performance anbelangt. Hier zahlt sich aus, dass Fortinet eigene Hardware mit spezialisierten ASICs baut, die bei Themen wie IPV6 und Filterung die CPU entlasten. Nennenswerte Einbrüche beim Durchsatz gibt es im Gegensatz zu vielen Marktbegleitern auch bei sehr kleinen Daten-Paketgrößen nicht.

Lassen Sie sich unsere Fortinet-Lösungen zeigen und erfahren Sie, wie wir mit Fortinet-Systemen auch Ihr Netzwerk besser schützen können. Unsere Experten freuen sich auf Ihre Terminvorschläge.

DSC_2012 klein

Dennis Goslar

goslar@oberberg.net

DSC_2022 klein

Bastian Breidenbach

breidenbach@oberberg.net

Dirk Zurawski
02261 9155051
zurawski@oberberg.net

Protect the Branch with Stealthwatch Learning Network License

By Brian Ford The threat environment faced by organization deploying branch networks continues to evolve. It’s time for a disruptive approach to handling network security across many distributed branch sites. Automation is becoming a requirement, because the growing volume and complexity of the threats to data security have made it impossible to keep up with them manually. Cisco […]

Source:: Cisco Security Notice

Protect the Branch with Stealthwatch Learning Network License

By Brian Ford The threat environment faced by organization deploying branch networks continues to evolve. It’s time for a disruptive approach to handling network security across many distributed branch sites. Automation is becoming a requirement, because the growing volume and complexity of the threats to data security have made it impossible to keep up with them manually. Cisco […]

Source:: Cisco Security Notice

Ransomware: Because OpSec Is Hard?

By Talos Group This blog was authored by Edmund Brumaghin and Warren Mercer Summary Talos recently published research regarding a new variant of destructive ransomware, which we dubbed Ranscam. During further analysis of Ranscam samples, we discovered several indicators of compromise (IOCs) that piqued our curiosity as to which malware this threat actor might be involved in or responsible […]

Source:: Cisco Security Notice

Ransomware: Because OpSec Is Hard?

By Talos Group This blog was authored by Edmund Brumaghin and Warren Mercer Summary Talos recently published research regarding a new variant of destructive ransomware, which we dubbed Ranscam. During further analysis of Ranscam samples, we discovered several indicators of compromise (IOCs) that piqued our curiosity as to which malware this threat actor might be involved in or responsible […]

Source:: Cisco Security Notice

Cognitive Bias in Incident Response

By Gavin Reid This blog is a co-authored by Jeff Bollinger & Gavin Reid Are You Too Confident in Your Incident Response? When Charles Darwin stated “Ignorance more frequently begets confidence than does knowledge,” civilization’s evolution from Industrial Age to Information Age was nearly a century away. Yet, when it comes to many aspects of IT, he nailed […]

Source:: Cisco Security Notice