Story image

Are your systems already compromised? Probably.

23 Sep 2015

Cyber security solutions firm Fortinet has entered into an agreement with Splunk to help enterprises and service providers protect themselves from cyber attacks that threaten their networks.

As part of the alliance, Fortinet will provide customers a method for facilitating better response times and mitigation capabilities, as part of their Splunk software deployments, designed to thwart fast-acting cyber threats.

Jon McGettigan, Fortinet’s senior director Australia, NZ & South Pacific Islands, says the growing sophistication of cyber attacks means companies must now assume attackers have already compromised their systems at some level.

 “Better visibility of advanced threats gives enterprises a powerful tool for mitigating risk,” he says.

McGettigan says the strategic alliance with Splunk is ‘another proof point’ of Fortinet’s enterprise capabilities.

“Traditional, siloed security solutions are not adequate,” he says. “A collaborative security model that extends the aggregate awareness and capability of the siloed solutions is required to strengthen the enterprise defence posture.

“This alliance with Splunk gives organisations with large complex IT infrastructure advanced capabilities to prevent, detect and mitigate threats before they can do significant damage,” McGettigan explains.

He says an effective security framework must include well-coordinated defence systems that enable quick reaction to advanced attacks.

“Through our partnership with Splunk, we provide customers with the means to surface and respond to the most critical, time-sensitive threats to significantly reduce the associated risks.”

Fortinet’s FortiGate App for Splunk® Enterprise delivers real-time multivariate threat querying, visualisation and anomalous behaviour detection within the context of all of the organisation’s security data.

Fortinet leverages Splunk solutions to enable enterprise security teams with large and complex IT environments to more quickly and effectively identify the most critical threats posing risk to their organisations.

McGettigan says the interoperability with Splunk’s collaborative security model takes the solution one step further, enabling teams to accelerate and automate defence against those critical threats.

“The ability to more seamlessly bring security logs and threat intelligence from Fortinet into Splunk Enterprise and Enterprise Security represents a leap forward for our joint customers," adds Haiyan Song, senior vice president of Security Markets, Splunk.

“By harnessing the threat data captured by the FortiGate devices, and translating that quickly into actionable intelligence and remediation steps, organisations can better leverage Splunk as the Nerve Center in their command centres to turn the tables on hackers and advanced threats,” Song says.

Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”