Security Experts:

Connect with us

Hi, what are you looking for?


Mobile & Wireless

Fortinet Unveils New FortiOS 5.0 for BYOD Management, Security

Network security firm Fortinet has updated its FortiOS operating system that powers its FortiGate security platform, the company said Wednesday.

Network security firm Fortinet has updated its FortiOS operating system that powers its FortiGate security platform, the company said Wednesday.

FortiOS 5.0 provides more security, intelligence, and control to help enterprises defend against advanced threats and secure devices being brought into the enterprise as part of the bring-your-own-device trend, Fortinet said. The company has added more than 150 features and enhancements to FortiOS to equip enterprises with tools to defend against new threats and manage and protect the network against an influx of new devices.

FORTINET LOGOThe new operating system features smarter, more effective security policies for enterprises new technologies to protect and manage their networks, according to the company. FortiOS integrated advanced identification and management of user and device behavior to secure the network. FortiOS 5.0 includes reputation based policies, better botnet detection, and protection and inspection of encrypted traffic.

“With new attack variants on the rise and the ‘bring your own device’ revolution in full swing, organizations need broad security measures that can scale, are highly flexible when it comes to enforcing granular policies and are easy to deploy,” Patrick Bedwell, vice-president of product marketing for Fortinet, said in a statement.

FortiOS is the foundation for all Fortinet FortiGate integrated security platforms.

The client reputation engine in FortiOS 5.0 gives enterprises a cumulative security ranking of each device based on a range of behaviors and provides specific, actionable information that allows organizations to identify compromised systems and potential attacks in real-time, Fortinet said. The new anti-malware detection system adds an on-device behavior-based heuristic engine and cloud-based AV services that includes an operating system sandbox and botnet IP reputation database.

FortiOS 5.0 also give administrators the ability to identify devices and apply specific access policies, as well as security profiles, according to the device type, device group, location, and usage, the company said. The role-based policies can also be adjusted automatically based on location, data, and application profile. Administrators can get more intelligence on the behavior of their network, users, devices, applications, and threats, the company said.

Fortinet also announced FortiManager 5.0, FortiAnalyzer 5.0, and FortiClient5.0 to address enterprises needing sophisticated management and analysis of the network infrastructure and endpoint devices. While there are new types of attacks, organizations have to also think about the changes in how users access the network, Fortinet said.

“We’re responding to these market requirements with the release of the industry’s most advanced network security operating system that works in tandem with our next-generation management, analysis and client protection technologies,” Bedwell said.

FortiManager 5.0 offers more granular administrative profiles, enhanced provisioning capabilities, improved reporting and analysis, and the ability to manage physical and virtual security devices with a single Web-based user interface.

FortiAnalyzer 5.0, the application used for logging, analyzing, and aggregating data from Fortinet devices, has significantly improved data visualization and analysis to provide administrators with visibility into their network infrastructure. Reporting for all FortiOS devices and endpoints have been consolidated to give insights on bandwidth consumption, application usage, and network utilization.

FortiClient 5.0 features better enforcement of security policies for Windows and Mac OS X endpoints to ensure they follow corporate security policies even when not connected to the network.

Written By

Click to comment

Expert Insights

Related Content


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Cybersecurity Funding

Forward Networks, a company that provides network security and reliability solutions, has raised $50 million from several investors.