Categories
Azure Firewall Fortinet Microsoft Threats

Fortinet Announces the First Next-Generation Firewall and Secure SD-WAN Integration in Microsoft Azure Virtual WAN

FortiGate-VM Integration Enables the Convergence of Security and Networking in the Cloud

Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, today announced the expansion of its collaboration with Microsoft. The collaboration deliver the industry’s first next-generation firewall (NGFW) and Secure SD-WAN integration with Microsoft Azure Virtual WAN.

Customers can now – for the first time ever from any vendor – apply advanced security policies to virtual WAN traffic and extend Secure SD-WAN into the Azure virtual WAN hub.

The result is the convergence of advanced security and networking capabilities in the cloud for an even more simplified, automated, and secure cloud on-ramp and SD-WAN experience.

The integration also allows enterprises to more effectively interconnect with applications and workloads running Azure with the rest of their hybrid and multi-cloud deployments.

Secure Traffic Into, Out of and Through Azure Virtual WAN with Fortinet

Companies are increasingly looking to utilize Azure Virtual WAN as a global transit network architecture, providing seamless connectivity between endpoints.

While Microsoft has long provided secure access to the Virtual WAN Hub, until now, it has been difficult to provide the same security policies with the same security tools within Azure Virtual WAN and across clouds and data centers.

The integration of FortiGate tools into Azure Virtual WAN empowers organizations to achieve their innovation goals outcomes in the cloud. Specifically, this integration enables IT and security professionals to easily configure networking and security in Microsoft Azure and delivers some benefits:

Benefits

  • Advanced Security for Virtual WAN Traffic: FortiGate-VM allows security policies to extend to traffic within the Azure Virtual WAN hub. That enable better, more secure application experiences for users and branch offices. Support encrypted data transports, granular segmentation and application-layer protection against advanced threats. Allows and seamless overlay network with uniform policies across multi-clouds.
  • One-Click Deployment: Azure Virtual WAN integration provides one-click deployment and easy scalability for FortiGate-VM in Azure. Customers can select, configure and deploy FortiGate virtual machines directly from the Azure Marketplace. That is also possible from within the Azure Virtual WAN interface, allowing security to be part of the workflow for setting up a Virtual WAN in Azure.
  • Securely Interconnect Applications and Workloads Across Clouds:. Azure Virtual WAN provides a global network transit backbone for branch-to-branch connectivity readily interconnecting regions together. Customers looking to deploy hybrid and multi-cloud networks that include Azure can now easily and securely interconnect applications and workloads. That allows extending the benefits across their entire infrastructure to enable consistent policies and centralized visibility. This simplifies security management, enables global visibility into security events and policies, and improves quality of experience (QoE). For users and customers.

“Integrated information security solutions are becoming increasingly important for the success of cybersecurity actions.” says Douglas Bernardini, Cyber Security Specialist and Cloud Computing Expert.

Earlier this month, Fortinet and Microsoft also announced the availability of FortiGate-VM integration with Azure gateway load-balancer. It enables customers to deliver superior experiences for applications and workloads running in Azure.

See also: Fortinet Global Threat Landscape Report

Source: www.globenewswire.com/news-release/2021/11/17/2336468/0/en/Fortinet-Announces-the-First-Next-Generation-Firewall-and-Secure-SD-WAN-Integration-in-Microsoft-Azure-Virtual-WAN.html

Categories
CISA MS-ISAC Ransomware Threats

CISA Issues Guidance on Ransomware Attacks

CISA guidance ransomware attacks.

Recently, the Cybersecurity and Infrastructure Security Agency (CISA) issued a fact sheet offering suggestions to government agencies and private companies on how to prevent and respond to a ransomware attack.

The fact sheet is entitled “Protecting Sensitive and Personal Information from Ransomware-Caused Data Breaches”. It provides organizations with tips to prevent and respond to ransomware. CISA encourages organizations to adopt a heightened state of awareness and implement the recommendations listed in this fact sheet. The goal is to reduce their risk to ransomware and protect sensitive and personal information. Review StopRansomware.gov for additional resources.”

The fact sheet includes tips such as maintaining an offline, encrypted back-up of data, develop an incident response plan, implement auditing, regular scans and software updates, block phishing attempts, and practice “good cyber hygiene.”

“Guidance from internationally respected institutions such as CISA on real and dangerous threats to our companies is of paramount importance.”, says Douglas Bernardini, Cyber Security Specialist and Cloud Computing Expert.

The guidance sets forth some examples of good cyber hygiene, including:

  1. Ensuring antivirus and anti-malware software and signatures are up to date.
  2. Implementing application allowlisting.
  3. Ensuring user and privileged accounts are limited through account use policies, user account control, and privileged account management.
  4. Employing MFA for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
  5. Implementing cybersecurity best practices from CISA’s Cyber Essentials and the CISA-MS-ISAC Joint Ransomware Guide.
    The fact sheet also offers suggestions on the topics “Protecting Sensitive and Personal Information” and “Responding to Ransomware-Caused Data Breaches.”

Finally, it provides additional resources listed on the StopRansomware.gov website. This is a free and valuable roadmap for organizations to read and consider using to prepare for and respond to a ransomware attack.

See also: CISA MS-ISAC Ransonware Guide

Source: https://www.dataprivacyandsecurityinsider.com/2021/08/cisa-issues-guidance-on-ransomware-attacks/