Value of Integrations Highlighted At Fortinet’s Accelerate 18 Conference

Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

Changing the hearts and minds of security teams is no easy task. Everyone has been told for so long how to protect their environment, and more importantly how to buy the various tools needed to enable that protection. Collectively we’ve adopted the unintentional job of assuming all these things cannot work together, and security teams are left with trying to connect solutions never architected to work together.

The world changed around us with the migration to cloud, mobile, remote workers, and distributed applications used by businesses today. A network perimeter ceases to exist today. Instead we find perimeters around various critical assets spread across an interconnected landscape where we may not always control the underlying network.

It was refreshing to hear Fortinet raise this issue in their keynote session at Accelerate 18, and how everything-as-a-service and embedded devices (IoT) are changing what sensitive and business-critical actually means for most enterprises.

Carbon Black saw the shift in risk from corporate enclaves to individual computing platforms many years ago. The loss of any corporate boundary means the endpoints themselves are no longer protected by existing security architectures. In short, endpoints would become the new soft targets attackers choose to go after first. We’ve seen this in almost every attack, breach, or “cyber-event” of the past half-decade.

Simply put, silo-based solutions that rely on point products or point platforms fall short of providing the performance, visibility, and elasticity this new landscape requires.

A change in that gut feeling of what protection feels like to each of us is slowly taking shape across enterprises realizing the old buying cycles just isn’t working to combat today’s threats. Today, we need solutions integrated across the various security stacks where each new addition brings additional functionality to the entire architecture. Each computing platform, cloud-based application, or small remote enclave can be protected by the larger integrated network of solutions. This idea of an OpenAPI allowing for interconnected solutions we call the Carbon Black Integration Network.

Fortinet is more than a partner with Carbon Black. Fortinet sees the same gap in security solutions today and boldly stated at Accelerate 18 that “never before has adaptability, integration, and automation played a role as important as they do when it comes to the network and threat protection.” Fortinet reconfirmed their commitment to the Fortinet Security Fabric where every device interacts with other Fortinet and 3rd party solutions synchronizing security resources anywhere in the network.

I believe in the value multiple solutions working in concert can bring to combat today’s threats.  We all know the value of a team working toward a common goal versus a single individual trying to do the same thing alone. We need to begin mandating teaming within our security solutions. Regardless if we call that teaming the Carbon Black Integration Network or the Fortinet Security Fabric, the point is we are being truthful with ourselves that we need integrated solutions today. We’ll accept nothing less.

The post Value of Integrations Highlighted At Fortinet’s Accelerate 18 Conference appeared first on Carbon Black.

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
About Carbon Black, Inc.
Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 7 million endpoints under management, Carbon Black has more than 2,500 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.
Promoted Content
7 Experts on Moving to a Cloud-Based Endpoint Security Platform
Everyday companies put more of their assets in digital form. Healthcare records, retail purchases and personnel files are just some of the many examples of how our entire lives have moved online. While this makes our interconnected lives more convenient, it also makes them more vulnerable to attack. The monetary benefits of exploiting these vulnerabilities have created an extremely profitable underground economy; one that mimics the same one we all participate in and has led to an increase in the sophistication and frequency of attacks. At the same time, mobility and cloud are changing the security landscape. We’ve moved from a centralized to a decentralized model as end users increasingly work on-the-go and access critical business applications and resources from anywhere. As such there is more emphasis on the endpoint and individual identities - from both the defender and the attacker - than ever before. As endpoints become smarter, new challenges emerge: emerging ransomware and 0-day exploits infect all kinds of systems with ease, while many attackers use no malware at all to accomplish their malicious goals. With all this change, we spoke to 7 leading security experts to identify what’s working and how they’ve influenced their organization to make the necessary changes before becoming the next victim.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?