Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

8/22/2012
05:58 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Fortinet Further Enhances Bring-Your-Own-Device (BYOD) Network Security Solution With New Mobile Clients

Introducing new versions of its FortiClient application for iOS and Android platforms

SUNNYVALE, Calif., August 20, 2012 - Fortinet® (NASDAQ: FTNT) - a world leader in high-performance network security – today announced key enhancements to address the numerous challenges surrounding network, data and device security posed by the Bring Your Own Device(BYOD) phenomenon wherein end users are bringing their own smartphone and tablet devices to their work environments. As part of its broad strategy to apply effective security measures for BYOD environments, Fortinet is introducing new versions of its FortiClient application for iOS and Android platforms that are downloadable from the iTunes store at: http://itunes.apple.com/us/app/forticlient/id525600370?mt=8.

And on Google Play at:

https://play.google.com/store/apps/details?id=com.fortinet.forticlient&hl=en

The FortiClient application for Android platforms allows for both SSL tunnel mode and IPSec VPN connections to FortiGate appliances. The end user connection is fully encrypted and all traffic is sent over a secure tunnel. The updated FortiClient application for iOSdevices provides Web-mode SSL VPN functionality and has been modified for the iPad platform.

Fortinet's comprehensive BYOD security strategy, which is designed to help protect organizations by authenticating devices, controlling user behavior in the network and restricting data access rights, is built around a combination of six key differentiating capabilities:

· A wide range of high-performance deployment options supporting LAN and WAN connectivity centered around the FortiGate family of appliances

· No 'per-user' or 'per-seat' licensing fees mean that customers can add new devices to their network without incurring additional license fees. This feature becomes critical as the number of devices attached to the network can double or even triple due to users bringing their smartphones and tablets to work

· Centralized "single pane of glass"management

· Integrated wireless controllers in all FortiGate appliances for improved application and user visibility and control, rogue access point detection, guest access and bandwidth management

· Built-in Wi-Fi for secure LAN deployments on certain FortiGate models reduces the need for a separate wireless access point

· Mobile VPN clients and interoperable soft-tokens for two-factor authentication

The Scope of the BYOD Security Challenge

In a recent global survey of Gen-Y BYOD users conducted by Fortinet in fifteen countries – including the U.S., Western Europe, the Middle East and Asia – 42% of respondents believe potential data loss and exposure to malicious IT threats are the dominant risks posed by BYOD to their organization. Despite these concerns, more than a third of respondents admitted they have or would contravene a corporate policy banning the use of personally owned devices for work purposes.

Traditional Approaches Falling Short

While the security challenges associated with mobile devices are not necessarily new, the increase in BYOD environments makes it difficult for organizations to enforce corporate security policies.The broad scope of Fortinet's security solution, including application control, next generation firewall, intrusion prevention, antimalware, antispam and data leak prevention helps organizations ensure that information flowing to and from mobile devices is protected on both the LAN and WAN.

Fortinet's Approach to the BYOD Security Challenge

As a network-based solution, Fortinet supports a variety of approaches to smartphone and tablet security. This includes support for Mobile Device Management (MDM), Virtual Desktop and third party VPN clients.

"While mobile devices have tremendous potential for enhancing productivity, the challenge for organizations today is to provide the same level of security regardless of the device or location of the user," said Kevin Flynn, senior product manager at Fortinet. "We're helping organizations of all sizes – from SMBs to large enterprises – deploy a robust BYOD security infrastructure that uniquely combines integrated wireless functions, embedded security technologies and simple, cost-effective licensing."

Availability

The free FortiClient applications for iOS and Android platforms are available for download now. IPSec functionality on the Android client is expected to be available on Monday, September 3.

Follow Fortinet Online: Subscribe to threat landscape reports: http://blog.fortinet.com/feed/; Twitter at: www.twitter.com/fortinet; Facebook at: www.facebook.com/fortinet; YouTube at: http://www.youtube.com/user/SecureNetworks

About Fortinet (www.fortinet.com)

Fortinet (NASDAQ: FTNT) is a worldwide provider of network security appliances and the market leader in unified threat management (UTM). Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2011 Fortune Global 100. Fortinet's flagship FortiGate product delivers ASIC-accelerated performance and integrates multiple layers of security designed to help protect against application and network threats. Fortinet's broad product line goes beyond UTM to help secure the extended enterprise - from endpoints, to the perimeter and the core, including databases and applications. Fortinet is headquartered in Sunnyvale, Calif., with offices around the world.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
The Data-Centric Path to Zero Trust
Altaz Valani, Director of Insights Research, Security Compass,  1/13/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).