By Talos Group Typically, Talos has the luxury of time when conducting research. We can carefully draft a report that clearly lays out the evidence and leads the reader to a clear understanding of our well supported findings. A great deal of time is spent ensuring that the correct words and logical paths are used so that we […]

Source:: Cisco Security Notice

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 28 and August 04. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 28 and August 04. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice

By Talos Group Vulnerabilities discovered by Aleksandar Nikolic and Tyler Bohan of Cisco Talos. Today, Talos is disclosing multiple vulnerabilities that have been identified in the Kakadu JPEG 2000 SDK. The vulnerabilities manifest in a way that could be exploited if a user opens a specifically crafted JPEG 2000 file. Talos has coordinated with Kakadu to ensure relevant […]

Source:: Cisco Security Notice

By Talos Group Vulnerabilities discovered by Aleksandar Nikolic and Tyler Bohan of Cisco Talos. Today, Talos is disclosing multiple vulnerabilities that have been identified in the Kakadu JPEG 2000 SDK. The vulnerabilities manifest in a way that could be exploited if a user opens a specifically crafted JPEG 2000 file. Talos has coordinated with Kakadu to ensure relevant […]

Source:: Cisco Security Notice

By Talos Group This post is authored by Matthew Molyett. Executive Summary In March, Talos reported on the details of Crypt0l0cker based on an extensive analysis I carried out on the sample binaries. Binaries — plural — because, as noted in the original blog, the Crypt0l0cker payload leveraged numerous executable files which shared the same codebase. Those executables had nearly identical […]

Source:: Cisco Security Notice

By Talos Group This post is authored by Matthew Molyett. Executive Summary In March, Talos reported on the details of Crypt0l0cker based on an extensive analysis I carried out on the sample binaries. Binaries — plural — because, as noted in the original blog, the Crypt0l0cker payload leveraged numerous executable files which shared the same codebase. Those executables had nearly identical […]

Source:: Cisco Security Notice

By Joe Malenfant If you’ve been to a security conference in the last year you’ve probably seen more than 20 different vendors all talking about endpoint security. Some might be talking about next generation anti-virus, endpoint detection and response, and even the much lauded machine learning. How do you cut through the clutter and noise to find what […]

Source:: Cisco Security Notice

By Joe Malenfant If you’ve been to a security conference in the last year you’ve probably seen more than 20 different vendors all talking about endpoint security. Some might be talking about next generation anti-virus, endpoint detection and response, and even the much lauded machine learning. How do you cut through the clutter and noise to find what […]

Source:: Cisco Security Notice

Eine der größten Herausforderungen für Unternehmen ist die Auswahl der richtigen IT-Security-Komponenten. Der Markt ist hier quasi unüberschaubar und eine Vielzahl Anbieter buhlen um die Budgets.

Dabei hat jeder Anbieter die beste Lösung im Portfolio und deren Marketingabteilungen produzieren bunte Statistiken und Whitepaper, um den Kunden zu überzeugen. Orientierung in diesem Dickicht bieten unabhängige Tests, die Firewalls unter realen Bedingungen prüfen. So werden dann auch Leistungsdaten offengelegt, die z.B. einen Einbruch des Firewall-Durchsatzes bei kleinen Paketgrößen dokumentieren – was viele Hersteller geflissentlich in ihren Unterlagen nicht aufzeigen.

Einer der bekanntesten unabhängigen Tester sind die NSS-Labs. Hier wird regelmäßig den 10 führenden Next Generation Firewall Herstellern auf den Zahn gefühlt.

Im aktuellen Test schnitten sowohl die Fortigate 600D, als auch die Fortigate 3200D mit dem Ergebnis „NSS Labs recommended NGFW“ ab – bereits zum vierten mal. Getestet wurden neben der Erkennung und dem Blockieren von Exploits und Angriffen auch die Leistung bei der Prüfung von SSL-Traffic (sehr Ressourcen-intensiv) und dem Netzwerkdurchsatz bei allen Paketgrößen. Abgerundet durch ein hervorragendes Preis-Leistungs-Verhältnis (gemessen in USD pro geschütztem MBit/sek Bandbreite) sind die getesteten Fortigates eine NSS-Empfehlung – wie auch viele andere getestete Fortinet-Lösungen im gesamten IT-Security Umfeld.

Mehr zu den Fortinet-Lösungen und einer gestaffelten IT-Security für Ihr Unternehmen gibt es bei uns:

DSC_2012 klein

Dennis Goslar

goslar@oberberg.net

DSC_2022 klein

Bastian Breidenbach

breidenbach@oberberg.net

Dirk Zurawski
02261 9155051
zurawski@oberberg.net