Advertisment

At Moscow, Indian CIOs gain knowledge on comprehensive Fortinet’s security strategies

Fortinet says that the growth of IoT devices represents both an opportunity and a threat to today’s digital businesses. Having a comprehensive security strategy, including a single pane-of-glass view of security management and policy across IoT to Cloud, is essential

author-image
VoicenData Bureau
New Update
cyber incidents

BENGALURU: At the recently conducted Annual Security Conference for Indian CIOs in Moscow, Russia by Fortinet, over 100 CIOs were briefed that there is a need for simplicity and emphasized that secure complicated networked environments require the implementation of Segmentation, Universal Policy and Collaborative Intelligence as three important strategies for securing evolving environments.

Advertisment

Presenting at the conference, Joe Sarno, Vice President, International Emerging, MEA, Eastern Europe, India & SAARC, Fortinet said, “Data centers are evolving along with customer demands for fast and secure cloud infrastructure and services. The growth of IoT devices and traffic represents both an opportunity and a threat to today’s digital businesses. Having a comprehensive security strategy, including a single pane-of-glass view of security management and policy across IoT to Cloud, is essential in establishing a consistent security posture for an organization.”

Fortinet, has outlined 3 key strategies to help organizations in India protect their businesses.

  1. Segmentation – Networks need to be intelligently segmented into functional security zones. End to end segmentation, from IoT to the cloud, and across physical and virtual environments, provides deep visibility into traffic that moves laterally across the distributed network, limits the spread of malware, and allows for the identification and quarantining of infected devices.
Advertisment
  1. Collaborative intelligence – Local and global threat intelligence needs to be shared between security devices, and a coordinated response between devices needs to be orchestrated centrally.
  1. Universal policy – A centralized security policy engine that determines trust levels between network segments, collects real time threat information, establishes a unified security policy, and distributes appropriate orchestrated policy enforcement.

These are also some compelling reasons on why Fortinet has introduced its new Security Fabric architecture. This architecture is designed to integrate security technologies for the endpoint, access layer, network, applications, data center, content, and cloud into a single collaborative security solution that can be orchestrated through a single management interface.

Fortinet security experts also highlighted that the region is tipped to be at the forefront of  IoT growth, with market researcher IDC estimating that Asia-Pacific’s industries will connect 8.6 billion things by 2019. As IoT devices are subjected to a wide variety of attacks including targeted code injection, physical alteration of firmware, man-in-the-middle attacks, remote control of devices to alter or disable their functionality, spoofing, or simply hiding of malware in the volume of IoT data, they are becoming a security nightmare for CIOs.

fortinet cybersecurity-threats
Advertisment