EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response

Total Page:16

File Type:pdf, Size:1020Kb

EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response The more data sources you have in your security incident and event management (SIEM), the better equipped you are to detect attacks. And the more security orchestration and automation response (SOAR) connections you have between your SIEM and your IT and security systems the quicker LIMITLESS SCALE WITH FLAT, PREDICTABLE PRICING you can respond. Every log and every security event matters. Not retaining your log data can create security blinds spots that prevent Exabeam Security Management Platform (SMP) has compliance or leave your organization vulnerable to attack. approximately 350 integrations with IT and security products Exabeam is designed to scale without penalizing you for the to help your analysts work smarter - providing inbound amount of data you ingest. Our flat pricing model is based integrations with data sources from vendors to easily on the number of users and devices in your environment, allow you to ingest as much data as possible; and SOAR not data volume. integrations with 3rd party vendors to help you automate and orchestrate your security response. CENTRALIZED SECURITY AUTOMATION AND ORCHESTRATION WITH 3RD PARTY INTEGRATIONS EXTENSIVE DATA SOURCES Exabeam Incident Responder integrates with approximately Exabeam ingests data from approximately 300 different 70 third party IT and security products. These integrations IT and security products to provide security analysts with help your analysts to gather evidence and attach them as the full scope of events. Exabeam Data Lake, Exabeam artifacts to incidents or quarantine affected users and assets Advanced Analytics and Exabeam Entity Analytics ingest logs until incidents are mitigated. from various sources, including VPN, endpoint, network, web, database, CASB, and cloud solutions. After ingesting the raw logs, Exabeam then parses and enriches them with contextual information to provide security analysts with the information they need to detect and investigate incidents. List of Integrations as of March 2020 INBOUND DATA SOURCES FOR LOG INGESTION • Authentication and Access Management • Network Access, Analysis and Monitoring • Business Applications Security • Physical Access and Monitoring • Cloud Access Security Broker (CASB) • Priveleged Access Management (PAM) • Cloud Security and Infrastructure • Security Analytics • Data Loss Prevention (DLP) • Security Information and Event Management (SIEM) • Database Activity Monitoring (DAM) • Threat Intelligence Platform • Email Security and Management • Utilities/Others • Endpoint Security (EPP/EDR) • VPN / Zero Trust Network Access • Firewalls • Vulnerability Management (VM) • Forensics and Malware Analysis • Web Security and Monitoring • Information Technology Service Management (ITSM) INBOUND DATA SOURCES FOR LOG INGESTION TYPE OF LOG DATA SOURCES AUTHENTICATION AND ACCESS • Adaxes • Namespace rDirectory MANAGEMENT • Brivo • NetIQ • Centrify • Novell eDirectory • Cisco Identity Service Engine (ISE) • Okta • Dell EMC RSA Authentication • OneLogin Manager • Ping Identity • Dell Quest TPAM • RSA Authentication Manager • Duo Security (Cisco) • Sailpoint SecurityIQ • Fortinet FortiAuthenticator • Secure Computing • Gemalto MFA • SecureAuth • IBM Lotus Mobile Connect • Shibboleth IDP • IBM RACF • SiteMinder • Microsoft Active Directory • SteathBits • Microsoft Azure AD • Symantec VIP • Microsoft Azure MFA • VMWare Horizon BUSINESS APPLICATIONS • Onapsis SECURITY CLOUD ACCESS SECURITY • Bitglass • McAfee SkyHigh Security Cloud BROKER (CASB) • Forcepoint CASB • Netskope • Imperva Skyfence • Symantec CloudSOC CLOUD SECURITY AND • AWS CloudTrail • Kemp INFRASTRUCTURE • AWS CloudWatch • Microsoft Azure • AWS GuardDuty • Palo Alto Networks Prisma • AWS Inspector • Pulse Secure • AWS RedShift • Qualys • AWS Shield • Salesforce Sales Cloud • Box • SkyFormation (Exabeam) • Citrix ShareFile • Symantec Data Center Security (DCS) • Dropbox Business • Thales Vormetric • Google Cloud Platform (GCP) • Verdasys Digital • Google G-Suite • WorkDay • Guardian • Xceedium • ZScaler Web Security 2 Exabeam Security Management Platform Integrations TYPE OF LOG DATA SOURCES DATA LOSS PREVENTION (DLP) • Accellion • Postfix • Code42 • Ricoh • Codegreen • RSA DLP • Digital Guardian • Safend Data Protection Suite • Forcepoint • Skysea • Forcepoint DLP • Symantec Brightmail • Fortinet UTM • Symantec Data Loss Protection • HP SafeCom • Trap-X • Imperva Counterbreach • Trend Micro OfficeScan • IMSS • Tripwire Enterprise • InfoWatch • Varonis • Lexmark • Websense DLP • Lumension • Websense ESG • Nasuni • xsuite • Palo Alto Networks Aperture • Zscaler Cloud DLP • Pharos DATABASE ACTIVITY MONITORING • IBM Guardium • Microsoft SQL Server (DAM) • IBM Infosphere Guardium • Oracle • Imperva • Ranger Audit • McAfee MDAM • Sybase EMAIL SECURITY AND • Cisco Ironport ESA • Minecast • Clearswift SEG • Postfix MANAGEMENT • Codegreen • Proofpoint Email Protection • EdgeWave • Symantec Email Security • FireEye Email Threat Prevention • Symantec Messaging Gateway (ETP) • Trend Micro Email Inspector • Microsoft Exchange • Trend Micro IMSVA • Microsoft Office 365 • Websense ESG • Mimecast ENDPOINT SECURITY (EPP/EDR) • AppSense Application Manager • Kaspersky • Avecto • MalwareBytes • Bit9 • McAfee EPO • CarbonBlack (VMWare) • McAfee MVISION • Cisco AMP for Endpoints • Microsoft Forefront/SCEP • Cisco Threat Grid • Microsoft Windows Native Logs • Crowdstrike Falcon • ProtectWise • Cylance • Red Canary • Defendpoint • RSA Ecat • Dtex • Safend • Ensilo • Secureworks • ESET Endpoint Security • SentinelOne • F-Secure • SkySea ClientView • Fidelis XPS • Sophos • FireEye Endpoint Security (Helix) • Symantec EndPoint Protection • Forcepoint • Tanium • Fortigate • Trend Micro Apex One • IBM Trusteer • VMWare CB Defense • Invincea • Ziften FIREWALLS • Airlock Web Application Firewall • Palo Alto Networks Firewall • CheckPoint Firewall • Sangfor NGAF • Cisco FirePower • Zscaler Cloud Firewall FORENSICS AND MALWARE • FireEye IPS • Symantec Advanced Threat Protection ANALYSIS • IXIA ThreatArmor INFORMATION TECHNOLOGY • ServiceNow SERVICE MANAGEMENT (ITSM) 3 Exabeam Security Management Platform Integrations TYPE OF LOG DATA SOURCES NETWORK ACCESS, ANALYSIS • Arbor • IBM QRadar Network Security AND MONITORING • BCN • Infoblox • Cisco Meraki • Lastline • Cisco Systems • McAfee IDPS • Comware • Morphisec Nokia VitalQIP • Corelight Sensors • Palo Alto Networks WildFire • Cyphort • Quest InTrust • Darktrace • Radius • F5 Application Security Manager • RSA • Failsafe • Ruckus • FireEye Network Security (NX) • Snort • ForeScout • StealthWatch (Cisco) • Forescout CounterACT • Symantec Damballa Failsafe • Fortinet Enterprise Firewall • Tipping Point • Google Cloud Platform VPC • Vectra • Zscaler Internet Access (ZIA) PHYSICAL ACCESS AND • AMAG Symmetry Access Control • PicturePerfect MONITORING • Badgepoint • ProWatch • CCURE • RedCloud • DataWatch • RS2 Technologies • Galaxy • Sensormatik • Honeywell • Siemens • ICPAM • Swipes • KABA EXOS • TimeLox • Lenel • Vanderbilt • OnGuard • Viscount PRIVELEGED ACCESS • BeyondTrust • Password Manager Pro MANAGEMENT (PAM) • CyberArk • Securelink • Liebsoft • Thycotic • Osirium SECURITY ANALYTICS • Alert Logic • ObserveIT (Proofpoint) • FireEye Endpoint Security (Helix) • Palo Alto Networks Cortex XDR SECURITY INFORMATION AND • ArcSight (Micro Focus) • McAfee ESM EVENT MANAGEMENT (SIEM) • Exabeam • Nitro Security • IBM QRadar • RSA Security (Dell) • LogRhythm • Splunk THREAT INTELLIGENCE PLATFORM • Anomali ThreatStream • Cisco Umbrella UTILITIES/OTHERS • Absolute SIEM Connector • oVirt • Accelion Kiteworks • Perforce • BIND • Ricoh (printer) • Egnyte • SafeSend • Github • Slack Enterprise Grid • iManage DMS • SSH • IPSwitch MOVEit (Progress) • Sudo • LastPass Enterprise • TitanFTP • LogBinder • Webmail OWA • Microsoft RRA VPN / • Avaya • Fortinet VPN ZERO TRUST NETWORK • Checkpoint • NetMotion Wireless ACCESS • Cisco ASA • Nortel Contivity • Citrix Netscaler • Palo Alto Prisma Access • Cognitas CrossLink • Pulse Secure • Dell • SecureNet • F5 Networks • SonicWall Aventail • Zscaler ZPA 4 Exabeam Security Management Platform Integrations TYPE OF LOG DATA SOURCES VULNERABILITY MANAGEMENT • Rapid7 InsightVM • Tenable (VM) WEB SECURITY AND MONITORING • Bro Network Security • Symantec Fireglass • Cisco Ironport WSA • Symantec Secure Web Gateway • Cloudflare • Symantec Secure Web Gateway • Digital Arts (ProxySG) • Forcepoint Web Security • Symantec Web Security Service (WSS) • InfoWatch • Symantec WebFilter • McAfee Web Gateway • TMG • Microsoft Windows • Trend Micro InterScan Web Security Defender • Watchguard • Palo Alto Networks • Zscaler ZIA SERVICE INTEGRATIONS FOR INCIDENT RESPONDER • Authentication and Access Management • Information Technology Service Management (ITSM) • Cloud Secuirty and Infrastructure • Security Analytics • Email Security and Management • Security Information and Event Management (SIEM) • Endpoint Security (EPP/EDR) • Threat Intelligence Platform • Firewalls • Utilities/Others • Forensics and Malware Analysis • Web Security and Monitoring SERVICE INTEGRATIONS FOR INCIDENT RESPONDER PRODUCT AREA PRODUCT ACTIONS AUTHENTICATION AND ACCESS Active Directory • Disable User Account MANAGEMENT • Enable User Account • Get User Infomation • List User Groups • Reset Password • Set New Password Duo • Disable User Account • Enable User Account • Get User Information • Send 2FA Push Okta • Add User To Group •
Recommended publications
  • Mcafee Epolicy Orchestrator DATA SHEET
    DATA SHEET McAfee ePolicy Orchestrator Centrally get, visualize, share, and act on security insights Security management requires cumbersome juggling between tools and data. This puts the adversary at an advantage by offering more time to exploit the gap not seen between the tools and do damage. In addition, the cybersecurity workforce is limited and needs to be empowered to manage cybersecurity complexity. The McAfee® ePolicy Orchestrator® (McAfee ePO™) management platform removes the time-consuming and potential human error effort and inspires those responsible to manage security quicker and with higher efficacy. Fundamental Security Proven Advanced Security Management Start with the fundamentals. Core to any security More than 30,000 businesses and organizations trust architecture is the ability to monitor and control the the McAfee ePO console to manage security, streamline health of endpoints and systems. Industry standards and automate compliance processes, and increase such as Center for Internet Security (CIS) Controls and overall visibility across endpoint, network, and security National Institute of Standards Technology (NIST) SP operations. Big companies rely on the McAfee ePO 800 153 security and privacy controls call this out as console’s highly scalable architecture, allowing large a must. The McAfee ePO console allows you to gain enterprises to manage hundreds and thousands of critical visibility and set and automatically enforce nodes from a single console. The McAfee ePO console policies to ensure a healthy security posture across provides an enterprise security administrator with the your enterprise. Policy management and enforcement opportunity to simplify policy maintenance, pull in third- across security products for your entire enterprise party threat intelligence leveraging Data Exchange Layer is accomplished from a single console, removing the (DXL), and integrate policies bi-directionally with an array complexity of managing multiple products.
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Secureworks Corp. (Exact Name of Registrant As Specified in Its Charter)
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 FORM 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES þ EXCHANGE ACT OF 1934 For the fiscal year ended February 3, 2017 or TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES o EXCHANGE ACT OF 1934 For the transition period from to Commission file number: 001-37748 SecureWorks Corp. (Exact name of registrant as specified in its charter) Delaware 56-2015395 (State or other jurisdiction of (I.R.S. Employer incorporation or organization) Identification No.) One Concourse Parkway NE Suite 500, Atlanta, Georgia 30328 (Address of principal executive offices) (Zip Code) Registrant’s telephone number, including area code: (404)327-6339 Securities registered pursuant to Section 12(b) of the Act: Title of each class Name of each exchange on which registered Class A Common Stock, par value $0.01 per share The NASDAQ Stock Market LLC (NASDAQ Global Select Market) Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes o No R Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes o No R Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.
    [Show full text]
  • Q3 Consumer Endpoint Protection Jul-Sep 2020
    HOME ANTI- MALWARE PROTECTION JUL - SEP 2020 selabs.uk [email protected] @SELabsUK www.facebook.com/selabsuk blog.selabs.uk SE Labs tested a variety of anti-malware (aka ‘anti-virus’; aka ‘endpoint security’) products from a range of well-known vendors in an effort to judge which were the most effective. Each product was exposed to the same threats, which were a mixture of targeted attacks using well-established techniques and public email and web-based threats that were found to be live on the internet at the time of the test. The results indicate how effectively the products were at detecting and/or protecting against those threats in real time. 2 Home Anti-Malware Protection July - September 2020 MANAGEMENT Chief Executive Officer Simon Edwards CONTENTS Chief Operations Officer Marc Briggs Chief Human Resources Officer Magdalena Jurenko Chief Technical Officer Stefan Dumitrascu Introduction 04 TEstING TEAM Executive Summary 05 Nikki Albesa Zaynab Bawa 1. Total Accuracy Ratings 06 Thomas Bean Solandra Brewster Home Anti-Malware Protection Awards 07 Liam Fisher Gia Gorbold Joseph Pike 2. Threat Responses 08 Dave Togneri Jake Warren 3. Protection Ratings 10 Stephen Withey 4. Protection Scores 12 IT SUPPORT Danny King-Smith 5. Protection Details 13 Chris Short 6. Legitimate Software Ratings 14 PUBLICatION Sara Claridge 6.1 Interaction Ratings 15 Colin Mackleworth 6.2 Prevalence Ratings 16 Website selabs.uk Twitter @SELabsUK 6.3 Accuracy Ratings 16 Email [email protected] Facebook www.facebook.com/selabsuk 6.4 Distribution of Impact Categories 17 Blog blog.selabs.uk Phone +44 (0)203 875 5000 7.
    [Show full text]
  • Consumer Security Products Performance Benchmarks (Edition 2) Antivirus & Internet Security Windows 10
    Consumer Security Products Performance Benchmarks (Edition 2) Antivirus & Internet Security Windows 10 January 2020 Document: Consumer Security Products Performance Benchmarks (Edition 2) Authors: J. Han, D. Wren Company: PassMark Software Date: 13 January 2020 Edition: 2 File: Consumer_Security_Products_Performance_Benchmarks_2020_Ed_2.docx Consumer Security Performance Benchmarks 2019 PassMark Software Table of Contents TABLE OF CONTENTS ......................................................................................................................................... 2 REVISION HISTORY ............................................................................................................................................ 3 REFERENCES ...................................................................................................................................................... 3 EXECUTIVE SUMMARY ...................................................................................................................................... 4 OVERALL SCORE ................................................................................................................................................ 5 PRODUCTS AND VERSIONS ............................................................................................................................... 6 PERFORMANCE METRICS SUMMARY ................................................................................................................ 7 TEST RESULTS ................................................................................................................................................
    [Show full text]
  • Ten Strategies of a World-Class Cybersecurity Operations Center Conveys MITRE’S Expertise on Accumulated Expertise on Enterprise-Grade Computer Network Defense
    Bleed rule--remove from file Bleed rule--remove from file MITRE’s accumulated Ten Strategies of a World-Class Cybersecurity Operations Center conveys MITRE’s expertise on accumulated expertise on enterprise-grade computer network defense. It covers ten key qualities enterprise- grade of leading Cybersecurity Operations Centers (CSOCs), ranging from their structure and organization, computer MITRE network to processes that best enable effective and efficient operations, to approaches that extract maximum defense Ten Strategies of a World-Class value from CSOC technology investments. This book offers perspective and context for key decision Cybersecurity Operations Center points in structuring a CSOC and shows how to: • Find the right size and structure for the CSOC team Cybersecurity Operations Center a World-Class of Strategies Ten The MITRE Corporation is • Achieve effective placement within a larger organization that a not-for-profit organization enables CSOC operations that operates federally funded • Attract, retain, and grow the right staff and skills research and development • Prepare the CSOC team, technologies, and processes for agile, centers (FFRDCs). FFRDCs threat-based response are unique organizations that • Architect for large-scale data collection and analysis with a assist the U.S. government with limited budget scientific research and analysis, • Prioritize sensor placement and data feed choices across development and acquisition, enteprise systems, enclaves, networks, and perimeters and systems engineering and integration. We’re proud to have If you manage, work in, or are standing up a CSOC, this book is for you. served the public interest for It is also available on MITRE’s website, www.mitre.org. more than 50 years.
    [Show full text]
  • Fortios 6.2 Data Sheet
    DATA SHEET FortiOS™ 6.2 Fortinet’s Security Operating System FortiOS enables the Fortinet Security Fabric, allowing organizations to readily achieve a security-driven network with one intuitive operating system. FortiOS 6.2, the latest version of Fortinet’s security operating system, powers the entire Security Fabric, helping customers reduce and manage the attack surface, prevent advanced threats, and reduce complexity from Internet of Things (IoT) devices to the cloud. Broad Visibility Highlights — What’s New Achieve full visibility across multi-cloud and branch § Spilt-task VDOM environments with SD-WAN, native cloud and virtual connectors, and intent-based segmentation. § Expanding product Integration with Security Fabric § New SDN and Threat Feed Connectors Integrated AI-driven Breach Prevention § SD-WAN Rule Definition and VPN Stop threats quickly and detect active intrusions and Setup Enhancements bad actors across the entire Security Fabric with § Extending Public Cloud Support integrated AI-driven intelligence capabilities combined § Additional Triggers and Actions with advanced, leading-edge technologies. § Flow-based security profile Improvements § MAC Address Objects § Consolidated risk View on Automated Operations, Orchestration, Topology Map and Response § FortiSandbox Cloud Region Reduce complexity and costs with rapid orchestrated Selection threat response, automated workflows, and § Policy Setup and Visibility automated auditing and compliance. Upgrades DATA SHEET | FortiOS™ 6.2 Overview Introducing FortiOS 6.2 increasing digital connectedness of organizations is driving the requirement for a security transformation, where security is integrated into applications, devices, and cloud networks to protect business data spread across these complex environments. FortiOS™ 6.2 delivers hundreds of new features and capabilities that were designed to provide the broad visibility, integrated threat intelligence, and automated response required for digital business.
    [Show full text]
  • Release Notes
    ESAP 2.6.2 Release Notes SDK Version: Mac and Windows 3.6.9026.2 (V2 Unified + V3) Noteworthy changes: Starting ESAP 2.6.1, each release contains additional files in preparation of new features that will be enabled in the next major release of SA and IC. ESAP 2.6.2 and Junos Pulse Secure Access/Access Control Service Compatibility Chart: This ESAP package can be installed on the following Junos Pulse Secure Access/Access Control Service software versions. o SA 8.0Rx o SA 7.4Rx o SA 7.3Rx o SA 7.2Rx o SA 7.1Rx o SA 7.0Rx o SA 6.5Rx o UAC 5.0Rx o UAC 4.4Rx o UAC 4.3Rx o UAC 4.2Rx o UAC 4.1Rx o UAC 4.0Rx o UAC 3.1Rx Note: The ESAP package may install and function without any errors on older releases however as the install has not been tested, we recommend that it be used only on the above versions of software releases. Support has been added for the following products in ESAP2.6.2 Windows OS Antivirus Products [Comodo Group] COMODO Antivirus (7.x) [McAfee, Inc.] McAfee Endpoint Security Threat Prevention (10.x) [Trend Micro, Inc.] Trend Micro Worry Free Business Security Agent (19.x) Antispyware Products [Comodo Group] COMODO Antivirus (7.x) [McAfee, Inc.] McAfee Endpoint Security Threat Prevention (10.x) [Trend Micro, Inc.] Trend Micro Worry Free Business Security Agent (19.x) Firewall Products [Comodo Group] COMODO Firewall (7.x) [McAfee, Inc.] McAfee Endpoint Security Firewall (10.x) [Trend Micro, Inc.] Trend Micro Worry Free Business Security Agent (19.x) Mac OS Antivirus Products [F-Secure Corp.] F-Secure Anti-Virus for Mac (0.x) Support has been removed for the following products in ESAP2.6.2 Mac OS Antivirus Products [SPAMfighter] VIRUSfighter (7.x) Issues Fixed in ESAP2.6.2 OPSWAT issues fixed: 1.
    [Show full text]
  • Fortigate 100F Series Data Sheet
    DATA SHEET ® FortiGate 100F Series Next Generation Firewall Secure SD-WAN FG-100F and FG-101F Secure Web Gateway The FortiGate 100F series provides an application-centric, scalable, and secure SD-WAN solution with Next Generation Firewall (NGFW) capabilities for mid-sized to large enterprises deployed at the campus or branch level. Protects against cyber threats with system-on-a-chip acceleration and industry-leading secure SD-WAN in a simple, affordable, and easy to deploy solution. Fortinet’s Security-Driven Networking approach provides tight integration of the network to the new generation of security. Security Networking n Identifies thousands of applications inside network traffic n Delivers advanced networking capabilities that seamlessly for deep inspection and granular policy enforcement integrate with advanced layer 7 security and virtual n Protects against malware, exploits, and malicious domains (VDOMs) to offer extensive deployment websites in both encrypted and non-encrypted traffic flexibility, multi-tenancy and effective utilization of resources n Prevent and detect against known and unknown attacks using continuous threat intelligence from AI-powered n Delivers high-density, flexible combination of various FortiGuard Labs security services high-speed interfaces to enable best TCO for customers for data center and WAN deployments Performance n Delivers industry’s best threat protection performance and Management ultra-low latency using purpose-built security processor n Includes a management console that is effective, simple
    [Show full text]
  • FORTINET, INC. (Exact Name of Registrant As Specified in Its Charter)
    Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-Q (Mark One) [x] QUARTERLY REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the quarterly period ended March 31, 2011 Or [ ] TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission file number: 001-34511 FORTINET, INC. (Exact name of registrant as specified in its charter) Delaware 77-0560389 (State or other jurisdiction of (I.R.S. Employer incorporation or organization) Identification No.) 1090 Kifer Road Sunnyvale, California 94086 (Address principal executive offices) (Zip Code) (408) 235-7700 (Registrant's telephone number, including area code) Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes [x] No [ ] Indicate by check mark whether the registrant has submitted electronically and posted on its corporate Web site, if any, every Interactive Data File required to be submitted and posted pursuant to Rule 405 of Regulation S-T (§232.405 of this chapter) during the preceding 12 months (or for such shorter period that the registrant was required to submit and post such files). Yes [ ] No [ ] Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, or a smaller reporting company.
    [Show full text]
  • Mcafee Virusscan Enterprise Protect Your Desktops and File Servers from Malicious Threats
    DATA SHEET McAfee VirusScan Enterprise Protect your desktops and file servers from malicious threats Keeping networks free from a wide range of threats—viruses, worms, rootkits, and Trojans— Key Advantages is more challenging than ever. Whether your organization is a global enterprise with full-time security staff or a small or medium-size business, McAfee® VirusScan® Enterprise software Unbeatable malware detection and removal ensures that your endpoint servers, desktops, and laptops remain free from malware. Protect your files from viruses, worms, rootkits, Trojans, and other threats. McAfee VirusScan Enterprise software combines techniques. With port blocking, file-name blocking, antivirus, antispyware, firewall, and intrusion prevention folder/directory lockdown, file share lockdown, and Proactive protection from zero- technologies to proactively detect and remove malware. infection trace and block, you can stop many new and day attacks Proactive protection against new It reduces the cost of managing outbreak responses, unknown malware files cold. and unknown buffer-overflow stops zero-day threats, and mitigates the window of Proactive Protection from Attacks exploits that target vulnerabilities in vulnerability—the time between the discovery of a Microsoft applications vulnerability and when fixes are deployed. Plus, with McAfee VirusScan Enterprise software is the industry’s first anti-malware software to offer patented intrusion Leverage McAfee GTI McAfee VirusScan Enterprise software, you have The worldwide presence of McAfee prevention with application-specific buffer-overflow the flexibility to detect and block malware based on Labs enables McAfee VirusScan your business needs: on access, on demand, or on a technology. Now, you can protect your users Enterprise software to leverage schedule.
    [Show full text]
  • Fortiweb 5.0 Patch 3 Administration Guide December 1, 2013 3Rd Edition Copyright© 2013 Fortinet, Inc
    WEB APPLICATION FIREWALL FortiWeb™ 5.0 Patch 3 Administration Guide Courtney Schwartz Contributors: George Csaba Martin Duijm Patricia Siertsema Idan Soen Shiji Li Qin Lu Atsunobu Shiiya Hao Xu Shiqiang Xu Forrest Zhang FortiWeb 5.0 Patch 3 Administration Guide December 1, 2013 3rd Edition Copyright© 2013 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, and FortiGuard® are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance metrics contained herein were attained in internal lab tests under ideal conditions, and performance may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to the performance metrics herein. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any guarantees. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Technical Documentation http://help.fortinet.com Knowledge Base http://kb.fortinet.com Forums https://support.fortinet.com/forum Customer Service & Support https://support.fortinet.com Training http://training.fortinet.com FortiGuard Threat Research & Response http://www.fortiguard.com License http://www.fortinet.com/doc/legal/EULA.pdf Document Feedback Email: [email protected] Table of contents Introduction....................................................................................................
    [Show full text]