sb-nz logo
Story image

Fortinet's security fabric tackles IoT vulnerabilities head on

10 Feb 2017

Wearables, internet-enabled devices and the multitude of technologies that make up the Internet of Things (IoT) have another protection option, after global heavyweights Fortinet released an extension to the Fortinet Security Fabric this month.

The fabric enables visibility, integration, control and infrastructure required to navigate and protect IoT device attack surfaces, and Fortinet’s CISO Phil Quade says it’s crucial that enterprises identify, understand and protect their own infrastructures.

“Malicious cyber actors have been increasingly targeting the billions of IoT devices online today, essentially turning the Internet of Things into an Internet of Threats. The Fortinet Security Fabric arms enterprises with proven security capabilities today, while providing a foundation for the visibility and automation required to maintain an effective IoT cybersecurity posture in the future,” he says.

Fortinet believes that IoT devices are plagued with a lack of basic security features and management capabilities, which have led to recent cyber attacks.

The potential with which those devices could be used as a weapon is a major challenge, and current security solutions lack visibility and wider network integration to protect the IoT attack surface.

Fortinet says organisations need to consider three strategic network security capabilities to secure their infrastructure from IoT threats:

Learn: Use complete network visibility to securely authenticate and classify IoT devices, build risk profiles and assign IoT device groups based on trustworthiness.

Segment: Segment IoT devices into policy-driven groups, and grand baseline privileges suited for the specific IoT risk profile.

Protect: Use solutions that provide capability to correlate IoT security incidents and threat intelligence to deliver a synchronized response to IoT threats. 

Fortinet says it is ‘actively driving’ IoT security innovation, and already holds multiple issued and pending security patents. The company has more than 290,000 customers worldwide. 

Story image
Why IT and HR must work together to help businesses weather the storm
Employers are striving to balance team productivity, security and employee engagement. If remote work is the new norm, it’s impossible to ignore the challenging nature of the situation, writes Gigamon manager for A/NZ George Tsoukas.More
Story image
Cisco report: Remote working is here to stay, making cybersecurity a top priority
"With this new way of working here to stay and organisations looking to increase their investment in cybersecurity, there’s a unique opportunity to transform the way we approach security as an industry to better meet the needs of our customers and end-users.”More
Story image
Majority of industrial enterprises face increase cyber threats since COVID-19
Leadership's top cyber security priority was implementing new technology solutions since the onset of the pandemic.More
Story image
Insider threat report reveals deception in the workforce
Insider threats come from people inside an enterprise, whether they divulge proprietary information with nefarious intentions, or are just careless employees that unwittingly share sensitive data, writes Bitglass product marketing manager Juan Lugo.More
Story image
Report: Power utilities increasingly at risk of devastating cyber-attacks
“Utilities’ existing systems are becoming increasingly connected through sensors and networks, and, due to their dispersed nature, are even more difficult to control.”More
Story image
Surfshark rolls out WireGuard open source VPN protocol
When there is less code in a VPN, it is less susceptible to security vulnerabilities due to easier configuration and management, according to Surfshark.More