Q: Fortinet released its Security Fabric architecture for enterprises in April. What is it about? What specific challenges is Fortinet helping organizations address with the Security Fabric?
Derek Manky: Networks are currently undergoing dramatic change. Organizations are simultaneously wrestling with issues such as BYOD, IoT, virtualization, SDN, cloud and fog computing, along with the continued proliferation of devices and applications. To do this, networks don't just need to be bigger and faster. They need to be dynamic, fluid, and intuitive. And they are going to become part of a larger, global meshed Internet, where data and intelligence is shared dynamically between traditionally isolated users, devices, and organizations.
Current security strategies and solutions simply can't keep up. Security managers are already monitoring an average of 14 dashboards, and still have to hand-correlate events, alerts, and data. This is simply not sustainable, especially as the attack surface of the network continues to expand, the volume of data needing inspection grows exponentially, and the time to respond to advanced threats gets shorter.
The Fortinet Security Fabric is an integrated architecture designed to enable autonomous communication and centralized orchestration between individual security components that have traditionally operated in their own silos. This allows them to create and share local threat intelligence and consume global threat data in near real-time, and then use that information to collaboratively respond to threat events anywhere across the network.
Q: You recently blogged about the growing use of sophisticated obfuscation tools by cyber criminals. What do your customers need to know about the trend and its implications for them?
Manky: As criminal justice agencies and governments everywhere have doubled-down on investigation, attribution, and prosecution of cybercrimes, cyber criminals have responded with more advanced strategies and ways to hide their activity. We've previously predicted the rise of new obfuscation methods and constantly track existing tools as they expanded their scope to multiple vectors for infection. It will continue to be very difficult to identify, monitor, and protect against these types of threats.
What customers need to understand is that while these threats are difficult to defend against, it's not at all impossible. Continued investments in threat research, the sharing of threat intelligence, and the expanded capability to see deeper into traffic and wider across the distributed network provide the visibility needed to reveal these new methods as they arise. Customers should ensure that they work with security vendors with the global visibility to identify new and existing strategies, and technologies that can coordinate this threat intelligence and collaborate to respond with the appropriate tools as close to the threat as possible.
At Fortinet, the threat intelligence generated by FortiGuard Labs dynamically generates new defensive signatures and protections that are automatically transmitted to the relevant security solutions at every point in the attack chain. We then connect this to our unified Security Fabric approach to truly defend against increasingly advanced threats seen in the wild.
Q: Why is being at Black Hat USA important for Fortinet? What topics do you expect will dominate the conversation at the event this year?
Manky: Black Hat attracts the best and brightest minds in the security industry, providing an indispensable venue for individuals and organizations to connect and drive continued innovation as an industry. Fortinet has long been committed to this sort of industry-wide collaboration and we strongly believe that working together is the best way to stay ahead in the cybersecurity arms race.
I would expect topics like the Internet of Things will continue to dominate many of the conversations at Black Hat this year, and hope to see some new cutting-edge research and demonstrations at the show. I also expect that threat intelligence sharing will be a major topic at the event, and I'm sure there will be many conversations about specific strategies like the impacts of ransomware, and how to defend against these types of threats.