Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Fortinet Unveils New FortiOS 5.0 for BYOD Management, Security

Network security firm Fortinet has updated its FortiOS operating system that powers its FortiGate security platform, the company said Wednesday.

Network security firm Fortinet has updated its FortiOS operating system that powers its FortiGate security platform, the company said Wednesday.

FortiOS 5.0 provides more security, intelligence, and control to help enterprises defend against advanced threats and secure devices being brought into the enterprise as part of the bring-your-own-device trend, Fortinet said. The company has added more than 150 features and enhancements to FortiOS to equip enterprises with tools to defend against new threats and manage and protect the network against an influx of new devices.

FORTINET LOGOThe new operating system features smarter, more effective security policies for enterprises new technologies to protect and manage their networks, according to the company. FortiOS integrated advanced identification and management of user and device behavior to secure the network. FortiOS 5.0 includes reputation based policies, better botnet detection, and protection and inspection of encrypted traffic.

“With new attack variants on the rise and the ‘bring your own device’ revolution in full swing, organizations need broad security measures that can scale, are highly flexible when it comes to enforcing granular policies and are easy to deploy,” Patrick Bedwell, vice-president of product marketing for Fortinet, said in a statement.

FortiOS is the foundation for all Fortinet FortiGate integrated security platforms.

The client reputation engine in FortiOS 5.0 gives enterprises a cumulative security ranking of each device based on a range of behaviors and provides specific, actionable information that allows organizations to identify compromised systems and potential attacks in real-time, Fortinet said. The new anti-malware detection system adds an on-device behavior-based heuristic engine and cloud-based AV services that includes an operating system sandbox and botnet IP reputation database.

FortiOS 5.0 also give administrators the ability to identify devices and apply specific access policies, as well as security profiles, according to the device type, device group, location, and usage, the company said. The role-based policies can also be adjusted automatically based on location, data, and application profile. Administrators can get more intelligence on the behavior of their network, users, devices, applications, and threats, the company said.

Fortinet also announced FortiManager 5.0, FortiAnalyzer 5.0, and FortiClient5.0 to address enterprises needing sophisticated management and analysis of the network infrastructure and endpoint devices. While there are new types of attacks, organizations have to also think about the changes in how users access the network, Fortinet said.

“We’re responding to these market requirements with the release of the industry’s most advanced network security operating system that works in tandem with our next-generation management, analysis and client protection technologies,” Bedwell said.

Advertisement. Scroll to continue reading.

FortiManager 5.0 offers more granular administrative profiles, enhanced provisioning capabilities, improved reporting and analysis, and the ability to manage physical and virtual security devices with a single Web-based user interface.

FortiAnalyzer 5.0, the application used for logging, analyzing, and aggregating data from Fortinet devices, has significantly improved data visualization and analysis to provide administrators with visibility into their network infrastructure. Reporting for all FortiOS devices and endpoints have been consolidated to give insights on bandwidth consumption, application usage, and network utilization.

FortiClient 5.0 features better enforcement of security policies for Windows and Mac OS X endpoints to ensure they follow corporate security policies even when not connected to the network.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.