本網站使用瀏覽器紀錄 (Cookies) 來提供您最好的使用體驗,我們使用的 Cookie 也包括了第三方 Cookie。相關資訊請訪問我們的隱私權與 Cookie 政策。如果您選擇繼續瀏覽或關閉這個提示,便表示您已接受我們的網站使用條款。 關閉
在AIoT驅動數位轉型的浪潮下,資安挑戰日益嚴峻,從關鍵基礎設施到企業營運,安全聯網成為不可忽視的核心課題。昇頻於「2025台北智慧城市展」以「Secure AIoT Connectivity」為主軸,攜手AI與資安專家夥伴,展示三大AIoT智慧聯網創新方案,並透過5G即時串流與實境互動,深度展示智慧城市應用場景。現場吸引政府機構、企業決策者與技術專家熱烈關注,共同探索智慧城市資安防禦的關鍵解方。 智慧物聯AIoT遠端智能控管平台 — AI輔助決策,運營更高效 面對不斷擴張的聯網設備與場域,如何強化可視化管理與遠端操控,成為智慧城市與企業亟需解決的挑戰。昇頻攜手VCA AI專家,推出「智慧物聯AIoT遠端智能控管平台」,結合即時串流邊緣AI影像監控分析與昇頻新一代O’smart SDn工業設備遠端管理系統,搭配工業級5G/4G強固安全路由器與閘道器,實現即時監測、雙向智能調控。該方案可顯著提升設備管理效率,透過數據驅動決策,協助產業加速數位升級,智能應用落地。 強固行動網路資安防護解決方案 — 端點強化,提升數位韌性 隨著5G、IoT與Edge AI技術的普及,行動網路的安全風險與日俱增,如何有效防範外部攻擊與內部威脅,成為產業關注焦點。昇頻與資安夥伴CTOne聯手推出「強固行動網路資安防護解決方案」,透過昇頻行動通訊路由器與閘道器整合CTOne edge agent與SMAC資安管理平台,構築5G/4G LTE多層次防禦機制,防範惡意攻擊、設備入侵與數據竊取。此解決方案不僅確保工業設備與IoT裝置通訊安全,更能穩定各式服務應用運行,降低企業營運風險與成本。 智慧安全聯網設備協同防禦平台 — 聯防聯控,主動精準防禦 面對不斷演變的資安威脅,傳統單點防護已難以應對新型攻擊。昇頻攜手眾志科技與飛泓科技,整合防火牆、NAC網路存取安全管理系統與工業級交換器,推出「智慧安全聯網設備協同防禦平台」,實現即時威脅偵測、可視化管理與多設備聯防聯控。該方案能快速辨識異常行為,並自動封鎖潛在攻擊,為政府與企業構築更具韌性的資安防禦體系。 昇頻本次展出的AIoT安全智慧聯網創新技術與應用,不僅為智慧城市與企業數位轉型提供強大助力,更展現其在智慧聯網安全領域的領導地位。未來,昇頻將持續深化技術合作,攜手產業生態夥伴,共同打造更安全、高效的智慧互聯網。 關於昇頻 (PROSCEND) 創立於1999年,賦能工業物聯智慧連結之領先企業,締造創新應用標竿。為卓越而生,致力精益求精,專注創造與眾不同,引領無限未來。全球銷售超過60個國家,堅持最嚴謹高品質研發設計,提供最頂尖強固安全的工業級網通設備與智能管理系統,賦予最佳化高效解決方案。秉持敏捷精實與用心信賴服務,促進各式垂直產業數位轉型,共創智慧城市、智慧交通、智慧能源、智慧工廠、智慧零售和智慧醫療等生態價值鏈之綜效,實現共榮成長、永續共好願景。網站: https://www.proscend.com/
Round led by global growth equity firm General Atlantic, along with StepStone Group and the D. E. Shaw group, to accelerate product innovation and increase reach of Zero Trust endpoint security to organizations globally. ORLANDO, Fla., April 24, 2024 (GLOBE NEWSWIRE) -- ThreatLocker®, a global cybersecurity leader that offers a Zero Trust endpoint security solution, today announced it has raised $115M in Series D funding led by existing investor General Atlantic, a leading global growth equity firm, with participation from other major investors StepStone Group and the D. E. Shaw group. With the new investment, ThreatLocker® will continue to focus on driving product innovation to bring the power of Zero Trust security to more organizations and accelerating the company’s global expansion. ThreatLocker® provides organizations with the ability to protect their IT operations with an effective Zero Trust approach to cybersecurity. The product suite provides enterprise-level server and endpoint security by blocking untrusted software, including ransomware, scripts and libraries, and exploits of known and unknown application vulnerabilities through Default Deny Application Control, Ringfencing™, Storage Control, Privileged Access Management, Network Access Control, as well as its new Endpoint Detection & Response (EDR) and Managed Detection & Response (MDR) solutions. ThreatLocker® believes that its customers should have complete control over their network and devices, know what is trying to infiltrate their stack, and not live in fear of the next cyberattack. With a powerful security tool suite designed to enable organizations to easily and directly control exactly what applications run on their endpoints, ThreatLocker® customers can rest assured knowing that their businesses are protected using the Zero Trust model framework that protects them from various cyber threats, including unknown malware, ransomware, and exploits for known and unknown vulnerabilities. ThreatLocker® CEO Danny Jenkins commented, “ThreatLocker has made a huge impact in the industry in driving a least-privilege approach forward over the last few years and has introduced new EDR and MDR products within a single cybersecurity platform for our customers. We believe this new injection of capital will enable us to continue to develop Zero Trust products and grow ThreatLocker's market presence. We are very excited to be partnering again with General Atlantic, as well as with new investors, StepStone Group & the D. E. Shaw group, and look forward to leveraging their teams' deep experience in bringing products to market and scaling technologically-disruptive businesses.” To add to this, ThreatLocker® COO Sami Jenkins commented, “We are thrilled to extend our partnerships with General Atlantic and look forward to working with StepStone and the D. E. Shaw group.” The new investment follows another year of growth as ThreatLocker® doubled its revenue and added 50% to its workforce. Today, ThreatLocker® has thousands of partners and protects over 50,000 organizations. Serving companies who are serious about security, ThreatLocker® partners with Enterprises and Managed Service Providers (and MSSPs), including many financial institutions, healthcare organizations, and airlines such as Emirates and JetBlue Airways. Gary Reiner, Operating Partner at General Atlantic, continued, “ThreatLocker effectively takes the guesswork out of threat detection with its Zero Trust approach. As companies of all sizes increasingly focus on filling in gaps in their security stacks, Zero Trust is becoming a necessity – and we view ThreatLocker as an emerging leader in this paradigm shift. We are thrilled to further our partnership with the team to accelerate ThreatLocker’s growth as an endpoint security disruptor.” About ThreatLocker® ThreatLocker® is a global cybersecurity leader, providing enterprise-level Zero Trust cybersecurity tools to improve the security of servers and endpoints. Founded in 2017 by Danny Jenkins, Sami Jenkins, and John Carolan, ThreatLocker® now serves thousands of organizations globally and is headquartered in Orlando, Florida, USA. For more information, visit: https://www.threatlocker.com/ About General AtlanticGeneral Atlantic is a leading global growth investor with more than four decades of experience providing capital and strategic support for over 520 growth companies throughout its history. Established in 1980 to partner with visionary entrepreneurs and deliver lasting impact, the firm combines a collaborative global approach, sector-specific expertise, a long-term investment horizon, and a deep understanding of growth drivers to partner with great entrepreneurs and management teams to scale innovative businesses around the world. General Atlantic has approximately $84 billion in assets under management inclusive of all products as of March 31, 2024, and more than 300 investment professionals based in New York, Amsterdam, Beijing, Hong Kong, Jakarta, London, Mexico City, Miami, Mumbai, Munich, San Francisco, São Paulo, Shanghai, Singapore, Stamford and Tel Aviv. For more information on General Atlantic, please visit: www.generalatlantic.com. About The D. E. Shaw GroupThe D. E. Shaw group is a global investment and technology development firm with more than $60 billion in investment capital as of March 1, 2024, and offices in North America, Europe, and Asia. Since our founding in 1988, our firm has earned a reputation for successful investing based on innovation, careful risk management, and the quality and depth of our staff. We have a significant presence in the world's capital markets, investing in a wide range of companies and financial instruments in both developed and developing economies. For more information, visit www.deshaw.com. Media ContactsThreatLocker®Spencer Ford(689) 217-4246spencer.ford@threatlocker.comGeneral AtlanticEmily Japlon & Sara Widmannmedia@generalatlantic.com The D. E. Shaw groupmedia-inquiries@deshaw.com
瞻博網路產品家族最新成員將卓越的網路存取控制和策略執行與AI驅動和雲原生的簡單性、洞察力、靈活性和規模結合在一起 香港2023年5月18日 /美通社/ -- 提供人工智慧驅動的安全網路的領導廠商瞻博網路(NYSE:JNPR)今天發佈了其屢獲殊榮的AI驅動企業產品家族的最新成員 -- Juniper Mist®訪問保障服務。這一新服務利用Mist AI和現代微服務雲,使用瞻博網路有線接入、無線接入、室內定位、軟體定義廣域網路和用戶端到雲安全產品使用的靈活簡單的框架,提供一整套網路存取控制和策略管理功能。該服務帶來了無與倫比的自動化、洞察力和保障,可實現卓越的存取控制和策略執行,並極大地節省運營成本。 瞻博網路產品集團副總裁Sudheer Matta表示:「網路系統管理員經常擔心自己所使用的傳統的網路存取控制解決方案,因為它們基於公司內部疊加的多層硬體,因此十分脆弱,難以部署和運行,規模受到限制,缺乏彈性。為解決這一難題,瞻博網路的全新Mist訪問保障解決方案將網路存取控制原生集成入網路基礎設施中,利用AIOps和雲原生架構,通過一個熟悉的介面在任何地方無縫設置和運行訪問管理、策略創建和執行。通過我們的開創性Mist AI和微服務雲,瞻博網路用戶端和合作夥伴可獲得傑出的用戶端級洞察力和自動化,將部署時間從數月縮減至幾分鐘,同時獲得具有成本效益的彈性和規模。通過將Mist AI與網路存取控制集成在一起,瞻博網路進一步提升了人工智慧驅動企業產品的價值,同時讓網路的一個關鍵組成部分實現了亟需的現代化。」 新的Juniper Mist訪問保障服務的特色包括: 精細化的安全性:與傳統疊加式網路存取控制系統不同,瞻博網路Mist訪問保障原生集成入網路中。它基於訪客設備、物聯網設備、自帶設備和企業管理設備採用的零信任原則,提供基於使用者、角色和設備的安全網路訪問。Juniper Mist訪問保障採用安全的802.1X標準,提供精細化的網路存取控制,根據使用者/設備的身份、角色和位置資訊,允許進行基於身份的微分段和策略分配。 AI驅動的自動化:瞻博網路解決方案可通過快速一鍵式設備配置提供自動化的零接觸網絡訪問。此外,它100%可程式設計,使用開放應用程式介面實現全面自動化,與瞻博網路安全分析(JSA)和其他安全事件管理(SIEM)或IT服務管理(ITSM)系統以及身份提供商無縫集成,以進行配置、身份驗證和即時資料提取。Juniper Mist訪問保障服務與瞻博網路其它AI驅動的企業產品一樣,由Mist AI和Marvis虛擬網路助手提供支援,進行主動排障和自主操作,以節省時間和費用。 雲原生的簡單性、彈性和規模:Juniper Mist訪問保障集成了基於雲的部署、易於使用的工作流程、簡化的策略、基於應用程式介面的自動化和連接設備排障能力,極大地簡化了管理員的工作。基於微服務的雲架構確保可支援數萬個網站、使用者和設備,使用極為方便,無需定期關機。該服務還為使用者提供了地理上的親和力,以實現可靠和低延遲的存取控制,因此無需複雜的網路設計,例如要求多臺本地網路存取控制設備和/或涵蓋多個資料中心的負載等化器。並且,瞻博網路®雲提供了彈性擴展,確保根據客戶的需求進行具有成本效益的擴展。 用戶端到雲端的保障:Juniper Mist為全網路棧IT運營提供統一的雲託管管理體驗,包括軟體定義廣域網路、安全服務邊緣、有線和無線接入。通過利用通用的雲和AI引擎,瞻博網路提供自動化和洞察力,實現卓越的端到端用戶體驗,包括統一事件關聯、異常檢測、規範性行動和甚至是網路自主運行。 Juniper Mist訪問保障服務與其他Juniper Mist雲和Connected Security服務協同工作,包括Wired Assurance、Wi-Fi Assurance、業界唯一由Mist AI驅動的虛擬網路助手Marvis™和Juniper Connected Security服務。Marvis將第七代數據科學與廣泛的網路(有線/無線/廣域網路)、位置和安全領域專業知識以及對話介面結合起來,提供卓越的用戶體驗可見性和主動自動化,在用戶察覺前自動檢測並解決問題。今天,瞻博網路還發佈了新的Marvis增強功能,包括大型語言模型和對Zoom的支援,可以更輕鬆地從用戶端到雲端提供可預測、可靠和可衡量的用戶體驗。 相關引言 「隨著全球企業開始進行數字基礎設施轉型,他們越來越多地尋找融合機會,以應對日益增長的複雜性。網路和安全領域的融合不斷加深。瞻博網路最新的AI驅動企業網路存取控制能力將網路和安全功能結合起來,由強大的基於雲的Mist AI引擎管理。這是該公司的一項重大進展,將説明企業加快數位化和網路轉型。」 -- Brandon Butler,IDC企業網路研究經理 「Juniper Mist 訪問保障服務提供了令人難以置信的性能和可擴展性。我們使用 Juniper Mist雲有線和無線解決方案已有多年。Mist AI使部署變得很簡單,只需點擊幾下即可提供全棧用戶連接體驗的可見性,運營效率大大提高。隨著訪問保障的發佈,我們可以改善對學生和員工的服務。預計我們IT團隊的擁有權總成本和花費的時間都會極大減少,這將使我們可以把精力集中在更具戰略性的工作上。」 -- Steve Mitzel,阿什蘭學區(Ashland School District )IT總監 其他資源 The Feed:瞻博網路Mist訪問保障:基於雲的網路存取控制 博客:NAC 歸來,更勝以往!Juniper Mist Access Assurance 借助雲技術和人工智慧技術重新定義 NAC Juniper Mist訪問保障頁面 Marvis產品頁面 關於瞻博網路 瞻博網路致力於簡化網路運營並為終端使用者提供卓越的服務體驗。瞻博網路解決方案憑藉領先的行業洞察,同時提供自動化、安全及人工智慧驅動的服務,説明客戶實現真正的業務成果。我們相信,強有力的聯繫能夠穩固合作關係,使我們都有能力面對世界上最大的挑戰 -- 社會福祉、可持續性和平等發展。更多資訊請參見瞻博網路(www.juniper.net)或瞻博網路在Twitter、LinkedIn和Facebook上的主頁。 Juniper Networks、the Juniper Networks標識、Juniper、Junos和在此列出的其他商標是瞻博網路公司在美國和其他國家的注冊商標。其他商標均為其各自所有者的財產。
93% of OT Organizations Experienced an Intrusion in Past 12 Months, and 78% Experienced More than Three SUNNYVALE, Calif., June 15, 2022 (GLOBE NEWSWIRE) -- John Maddison, EVP of Products and CMO at Fortinet “This year’s global State of OT and Cybersecurity Report demonstrates that while OT security has the attention of organizational leaders, critical security gaps remain. PLCs designed without security, continued intrusions, a lack of centralized visibility across OT activities, and growing connectivity to OT are some of the critical challenges these organizations need to address. Security converged into the OT networking infrastructure, including switches and access points and firewalls, is essential to segment the environment. This combined with a platform that spans OT, converged OT/IT and IT provides end-to-end visibility and control.” News Summary Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated, and automated cybersecurity solutions, today released its global 2022 State of Operational Technology and Cybersecurity Report. While industrial control environments continue to be a target for cyber criminals – with 93% of Operational Technology (OT) organizations experiencing an intrusion in the past 12 months – the report uncovered widespread gaps in industrial security and indicated opportunities for improvements. Key findings of the report include: OT activities lack centralized visibility, increasing security risks. The Fortinet report found that only 13% of respondents have achieved centralized visibility of all OT activities. Additionally, only 52% of organizations are able to track all OT activities from the security operations center (SOC). At the same time, 97% of global organizations consider OT a moderate or significant factor in their overall security risk. The report findings indicate that the lack of centralized visibility contributes to organizations’ OT security risks and weakened security posture. OT security intrusions significantly impact organizations’ productivity and their bottom line. The Fortinet report found that 93% of OT organizations experienced at least one intrusion in the past 12 months and 78% had more than three intrusions. As a result of these intrusions, nearly 50% of organizations suffered an operation outage that affected productivity with 90% of intrusions requiring hours or longer to restore service. Additionally, one-third of respondents saw revenue, data loss, compliance and brand-value impacted as a result of security intrusions. Ownership of OT security is not consistent across organizations. According to the Fortinet report, OT security management falls within a range of primarily director or manager roles, ranging from the Director of Plant Operations to Manager of Manufacturing Operations. Only 15% of survey respondents say that the CISO holds the responsibility for OT security at their organization. OT security is gradually improving, but security gaps still exist in many organizations. When asked about the maturity of their organization’s OT security posture, only 21% of organizations have reached level 4, which includes leveraging orchestration and management. Notably, a larger proportion of Latin America and APAC respondents have reached level 4 compared to other regions. More than 70% of organizations are in the middle levels toward having a mature OT security posture. At the same time, organizations face challenges with using multiple OT security tools, further creating gaps in their security posture. The report found that a vast majority of organizations use between two and eight different vendors for their industrial devices and have between 100 and 10,000 devices in operation, adding complexity. OT Security is a Corporate-Level Concern As OT systems increasingly become targets for cyber criminals, C-level leaders recognize the importance of securing these environments to mitigate risks to their organizations. Industrial systems have become a significant risk factor since these environments were traditionally air-gapped from IT and corporate networks, but now these two infrastructures are becoming universally integrated. With industrial systems now being connected to the internet and more accessible from anywhere, organizations’ attack surface is increasing significantly. With the IT threat landscape becoming more sophisticated, connected OT systems have also become vulnerable to these growing threats. This combination of factors is moving industrial security upward in many organizations’ risk portfolio. OT security is a growing concern for executive leaders, increasing the need for organizations to move toward full protection of their industrial control system (ICS) and supervisory control and data acquisition (SCADA) systems. Best Practices to Overcome OT Security Challenges Fortinet’s global 2022 State of Operational Technology and Cybersecurity Report indicated ways organizations can address OT systems’ vulnerabilities and strengthen their overall security posture. Organizations can address their OT security challenges by: Establish Zero Trust Access to prevent breaches. With more industrial systems being connected to the network, Zero Trust Access solutions ensure that any user, device or applications without proper credentials and permissions are denied access to critical assets. To advance OT security efforts, Zero Trust Access solutions can further defend against both internal and external threats. Implementing solutions that provide centralized visibility of OT activities. Centralized, end-to-end visibility of all OT activities is key to ensuring organizations strengthen their security posture. According to Fortinet’s report, top-tier organizations – which make up the 6% of respondents who reported no intrusions in the past year – were more than three times as likely to have achieved centralized visibility than their counterparts who suffered intrusions. Consolidating security tools and vendors to integrate across environments. To remove complexity and help achieve centralized visibility of all devices, organizations should look to integrate their OT and IT technology across a smaller number of vendors. By implementing integrated security solutions, organizations can reduce their attack surface and improve their security posture. Deploying network access control (NAC) technology. Organizations that avoided intrusions in the past year were more likely to have role-based NAC in place, ensuring that only authorized individuals can access specific systems critical for securing digital assets. Securing OT Environments with the Fortinet Security Fabric For more than a decade, Fortinet has protected OT environments in critical infrastructure sectors such as energy, defense, manufacturing, food, and transportation. By designing security into complex infrastructure via the Fortinet Security Fabric, organizations have an efficient, non-disruptive way to ensure that their OT environment is protected and compliant. With full integration and shared threat intelligence, industrial organizations gain fast, automated responses to attacks in any vector. Fortinet’s Security Fabric covers the entire converged IT-OT network to close OT security gaps, deliver full visibility and provide simplified management. About the Fortinet OT and Cybersecurity Survey: This year’s State of Operational Technology and Cybersecurity Report is based on a survey of more than 500 global OT professionals conducted in March 2022. The survey targeted people holding leadership positions responsible for OT and OT security, from managers to C-level executives. Respondents represent a range of industries that are heavy users of OT, including manufacturing, transportation and logistics, and healthcare. Additional Resources Learn more about the Fortinet OT and Cybersecurity Survey in this blog. Learn more about securing critical infrastructures with Fortinet. Watch how Fortinet makes possible a digital world you can always trust, and view how the Fortinet Security Fabric platform delivers broad, integrated, and automated protection across an organization’s entire digital infrastructure. Read more about how Fortinet customers are securing their organizations. Learn more about FortiGuard Labs threat intelligence and research or Outbreak Alerts, which provide timely steps to mitigate breaking cybersecurity attacks. Read more about Fortinet’s FortiGuard security services portfolio. Learn more about Fortinet’s free cybersecurity training initiative, which includes broad cyber awareness and product training. As part of the Fortinet Training Advancement Agenda (TAA), the Fortinet Training Institute also provides training and certification through the Network Security Expert (NSE) Certification, Academic Partner, and Education Outreach programs. Engage in the Fortinet User Community (Fuse). Share ideas and feedback, learn more about our products and technology, and connect with peers. Follow Fortinet on Twitter, LinkedIn, Facebook, and Instagram. Subscribe to Fortinet on YouTube. About Fortinet Fortinet (NASDAQ: FTNT) makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the world’s largest enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey. The Fortinet Security Fabric platform delivers broad, integrated, and automated protections across the entire digital attack surface, securing critical devices, data, applications, and connections from the data center to the cloud to the home office. Ranking #1 in the most security appliances shipped worldwide, more than 580,000 customers trust Fortinet to protect their businesses. And the Fortinet NSE Training Institute, an initiative of Fortinet’s Training Advancement Agenda (TAA), provides one of the largest and broadest training programs in the industry to make cyber training and new career opportunities available to everyone. Learn more at https://www.fortinet.com, the Fortinet Blog, or FortiGuard Labs. Copyright © 2022 Fortinet, Inc. All rights reserved. The symbols ® and ™ denote respectively federally registered trademarks and common law trademarks of Fortinet, Inc., its subsidiaries and affiliates. Fortinet’s trademarks include, but are not limited to, the following: Fortinet, the Fortinet logo, FortiGate, FortiOS, FortiGuard, FortiCare, FortiAnalyzer, FortiManager, FortiASIC, FortiClient, FortiCloud, FortiCore, FortiMail, FortiSandbox, FortiADC, FortiAI, FortiAP, FortiAppEngine, FortiAppMonitor, FortiAuthenticator, FortiBalancer, FortiBIOS, FortiBridge, FortiCache, FortiCall, FortiCam, FortiCamera, FortiCarrier, FortiCASB, FortiCenter, FortiCentral, FortiConnect, FortiController, FortiConverter, FortiCWP, FortiDB, FortiDDoS, FortiDeceptor, FortiDirector, FortiDNS, FortiEDR, FortiExplorer, FortiExtender, FortiFirewall, FortiFone, FortiGSLB, FortiHypervisor, FortiInsight, FortiIsolator, FortiLocator, FortiLog, FortiMeter, FortiMoM, FortiMonitor, FortiNAC, FortiPartner, FortiPenTest, FortiPhish, FortiPortal, FortiPresence , FortiProtect, FortiProxy, FortiRecorder, FortiReporter, FortiSASE, FortiScan, FortiSDNConnector, FortiSIEM, FortiSDWAN, FortiSMS, FortiSOAR, FortiSwitch, FortiTester, FortiToken, FortiTrust, FortiVoice, FortiVoIP, FortiWAN, FortiWeb, FortiWiFi, FortiWLC, FortiWLCOS and FortiWLM. Other trademarks belong to their respective owners. Fortinet has not independently verified statements or certifications herein attributed to third parties and Fortinet does not independently endorse such statements. Notwithstanding anything to the contrary herein, nothing herein constitutes a warranty, guarantee, contract, binding specification or other binding commitment by Fortinet or any indication of intent related to a binding commitment, and performance and other specification information herein may be unique to certain environments. This news release may contain forward-looking statements that involve uncertainties and assumptions, such as statements regarding technology releases among others. Changes of circumstances, product release delays, or other risks as stated in our filings with the Securities and Exchange Commission, located at www.sec.gov, may cause results to differ materially from those expressed or implied in this press release. If the uncertainties materialize or the assumptions prove incorrect, results may differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements. Fortinet assumes no obligation to update any forward-looking statements, and expressly disclaims any obligation to update these forward-looking statements. Media Contact: Investor Contact: Analyst Contact: Stephanie Lira Peter Salkowski Rebecca Bergman Fortinet, Inc. Fortinet, Inc. Fortinet, Inc. 408-235-7700 408-331-4595 650-554-0941 pr@fortinet.com psalkowski@fortinet.com analystrelations@fortinet.com
全方位整合與自動化網路資安領導廠商 Fortinet®(NASDAQ:FTNT)公布最新 FortiOS 7.2 版本,是 Fortinet 旗艦級網路安全作業系統 FortiOS 的最新升級,也是強化其作為 Fortinet 安全織網(Security Fabric)核心的穩健基礎。FortiOS 7.2 新增超過 300 項全新功能,將強化網路邊緣的安全性,並提供偵測和預防威脅,具備橫跨整個組織基礎架構所需的規模。 Fortinet 台灣區總經理吳章銘表示:「成立 20 多年來,Fortinet 已被定位為網路資安創新的驅動者,而隨著 FortiOS 7.2 的發布,Fortinet 也得以設立新的業界標準。Fortinet 將持續加強網路和安全的整合性,讓客戶和合作夥伴能夠在數位化的市場中規劃安全且有效的競爭策略。如今,網路和安全已不再被視為不同的策略,在混合網路主導的未來,唯有以安全為核心的網路才能適當地保護每個邊緣存取。」 FortiOS 7.2:在混合網路和持續成長的業務需求中,加速實現數位轉型 網路是實現雲端、邊緣和 IoT 應用服務安全、可擴展性和高效使用的基礎。如今混合網路分佈於本地(On-premises)、多個邊緣和雲端中,因此在發展和擴展數位業務的同時,保護分散式基礎架構越趨重要且複雜。現今企業皆須採用混合網路,使得應用服務和工作流程能在每個邊緣中無縫移動,同時也讓用戶或設備隨時存取關鍵資訊。由此可見,進階網路和安全的整合管理成為推動數位進展的強大動能。 FortiOS 7.2 提供了由人工智慧驅動的全新 FortiGuard 安全服務,是目前業界唯一整合網路和安全的平台,並進一步串聯跨網路、端點和雲端的產品安全。這些功能的強化使 FortiOS 能夠在不斷升級的威脅環境中保護組織的混合網路,同時幫助企業加速實現數位轉型。 為解決組織現今面臨的主要網路和安全挑戰,FortiOS 7.2 主要更新包含多項新服務和既有功能增強,更快速並有效地阻止威脅。FortiOS 7.2 新增功能如下: 沙箱即時線上協防(Inline Sandbox):將傳統的沙箱偵測功能轉變為即時性的線上協作聯防,以阻止已知和未知的惡意軟體入侵,並致力縮減對營運造成的影響。與原先讓可疑文件進入網路後,針對惡意軟體識別後再採取應變措施相比,此創新對於勒索軟體的即時性防護更加升級。 進階設備防護(Advanced Device Protection):根據獨特的網路功能,來自動偵測和分段 OT 和 IoT 設備、維護資產清單,並使用模式比對(Pattern Matching)來執行適當的策略和自動防護。透過與 FortiNAC 整合,在 FortiGate 新世代防火牆(NGFW)和區域網路(LAN)提供進階防護服務,包括針對受保護的資產進行網路存取控制的偵測和回應。 爆發威脅偵測(Outbreak Detection):透過自動識別和回應,對於新威脅即時警報和威脅獵捕(Threat Hunting),企業得以快速回應爆發的攻擊,讓安全營運中心(SOC)偵測更快速並進行修補。 安全營運中心即服務 (SOC-as-a-Service):將所有一級分析工作交給 Fortinet 的全球專家團隊,讓企業的安全營運中心能專注執行重要工作。該服務附加於Fortinet 新世代防火牆之上,企業負擔固定成本即能獲得此加值服務。 入侵防護系統(Intrusion Prevention System,IPS):專為金融和其他受監管的企業資安部署而設計,能讓單一硬體遷移至新世代防火牆後,同時保留營運效率和合規性。 雲端存取資安代理(Cloud Access Security Broker,CASB):此 FortiGate 新世代防火牆的新服務與 FortiClient 安全織網代理軟體整合,以啟用零信任網路存取(Zero Trust Network Access,ZTNA) 的線上流量狀態檢測。 Fortinet 提供最廣泛的安全解決方案組合,是業界領先的網路資安創新者,同時擁有 1,255 項專利,數量為其它網路安全公司的近 3 倍,Fortinet也將持續擴展其安全織網功能,並持續與技術聯盟生態系統整合,讓客戶能更輕鬆建構整合性的平台,提高安全有效性的同時也能簡化操作。 參考資料 閲讀更多關於 FortiOS 7.2 如何解決組織現今面臨的主要網路和安全挑戰。 了解 Fortinet 安全織網(Security Security Fabric)如何為企業組織的數位基礎架構提供全面、整合且自動化的保護。 深入了解 FortiGuard 實驗室 與 FortiGuard 安全服務產品組合。 深入了解 Fortinet網路資安專家訓練機構,包含免費網路資安培訓、網路資安專家計畫、網路資安學院計畫、教育外展計劃與 FortiVet計畫。 閲讀更多關於Fortinet客戶如何使用Fortinet服務保護其組織網路資訊安全 參加Fortinet 使用者社群(Fuse),分享你的想法與意見、深入了解我們的產品與技術並與其他人交流。 在Twitter、LinkedIn、Facebook、YouTube 與 Instagram上追蹤 Fortinet。 在官方網站、YouTube與LINE@上追蹤 Fortinet 台灣。 ### 關於Fortinet Fortinet(NASDAQ: FTNT)致力保護全球大型企業、服務供應商和政府組織的資安防禦,為客戶提供完整的可視性與控制力,以因應日趨擴大的攻擊範圍,並滿足今日與未來不斷增長的性能需求。唯有Fortinet安全織網(Security Fabric)能解決最嚴苛的資安挑戰,為網路、應用程式、多雲或邊緣環境中的數位基礎架構提供滴水不漏的資料防護。Fortinet的資安設備出貨量在全球排名第一,深受全球超過50萬客戶的信任。Fortinet 的NSE(Network Security Expert)Program 網路資安培訓計畫,免費為全球民眾提供界最完整的資安培訓課程。Fortinet 於 2020 年在Gartner 網路防火牆(Network Firewalls)魔力象限與廣域網路邊緣(WAN Edge)基礎架構魔力象限皆被評選為領導者。如欲瞭解更多資訊,請至Fortinet 台灣官網、YouTube、 LINE@、Fortinet部落格與FortiGuard 實驗室。
Network Access Control
請先登入後才能發佈新聞。
還不是會員嗎?立即 加入台灣產經新聞網會員 ,使用免費新聞發佈服務。 (服務項目) (投稿規範)