Fortinet Named a Leader in Gartner 2020 Magic Quadrant for WAN Edge Infrastructure

We’re a Magic Quadrant Leader! In Gartner’s recently published 2020 Magic Quadrant for WAN Edge Infrastructure, Fortinet has now been positioned in the Leader’s quadrant. We believe our commitment to continuous innovation helped Fortinet Secure SD-WAN place higher in ability to execute and further in completeness of vision. 

Our SD-WAN journey began years ago, led with a security-driven networking approach that enabled us to deliver the industry’s first Secure SD-WAN solution. We have continued to innovate since then, delivering the world’s first purpose-built processor designed to accelerate SD-WAN functionality and security, while achieving a fully self-healing SD-WAN solution combined with centralized orchestration to meet the diverse needs of customers worldwide. Going forward we are excited to address additional emerging customer use-cases in the SD-WAN market with cloud-delivered SASE innovations to provide the most flexible secure access solution in the market.

The rapid adoption of cloud services and the current shift to remote workforce has accelerated the need for digital transformation. This has led customers worldwide to recognize the value of SD-WAN as they work to build a more robust WAN Infrastructure. While cost reduction, both in terms of operational overhead and capital expenditures, continues to influence the decision-making process, customers are also highly focused on application performance. Delivering business-critical services and cloud resources in real-time ensures the best possible user experience. When combined with the assurance of secure access from anywhere ­– whether from home or branch offices, or across multi-cloud environments – Fortinet Secure SD-WAN delivers a complete solution worthy of being designated as an industry leader.

Evolving cloud applications poses a significant challenge to steering decisions made by SD-WAN solutions, which can have adverse effects on application performance. By combining the industry’s best performance with advanced remediation techniques, such as dynamic traffic steering, forward error correction, and packet duplication, Fortinet Secure SD-WAN can automatically repair complex WAN issues that can undermine network performance. Combined with Fortinet’s AI/ML-powered application learning, customers can establish advanced visibility and control at every edge to improve performance, expand business agility, and achieve higher levels of productivity to deliver and maintain a better application experience and drive growth and revenue further and faster.

Fortinet also provides one of the widest arrays of Secure SD-WAN solutions, allowing us to achieve an extensive presence across all market segments, from small retail to complex global WAN infrastructures. Part of our advantage is that by converging advanced networking and security into a unified Secure SD-WAN solution, customers are able to eliminate point products at the WAN edge to reduce cost and achieve consolidation, and for industry’s best TCO. Simplification through centralized SD-WAN orchestration also enables organizations to expedite deployment, thereby reducing complexity and associated staff hours spent on management and troubleshooting complex network issues. And its actionable analytics and reports empower IT staff to fine-tune business and security policy at scale, as well as ensure ease of change management because it enables networking and security staff to work as a unified team.

But SD-WAN is about much more than just secure connectivity for branch offices. With applications and workloads moving to cloud-delivered models, businesses need reliable and secure access at the cloud edge as well. Fortinet’s differentiated vision also enables customers to future-proof their digital transformation investments by extending SD-WAN to multi-cloud, providing flexible secure access for their remote workforce anytime and anywhere. In addition, close proximity to applications can also optimize SaaS connectivity and cloud compute. And innovations in Fortinet’s cloud orchestrator help organizations extend end-to-end visibility and control to all edges, whether devices are on or off-premises.

For 20 years, Fortinet – a recognized industry expert – has not only focused on security solutions. We also design and deliver a portfolio of advanced network and access devices that span the entire networking stack. These years of experience in building and delivering advanced routing functionalities are what led to our evolution as the industry’s first Secure SD-WAN vendor, providing robust connectivity and routing functionality combined with a full suite of advanced security. 

Innovations in both security and networking, focused vision on flexible secure access from and to anywhere, and continuous industry recognition from a range of third-party organizations, has fueled our expansion across all business verticals, and we believe this has led to our placement as a Leader in Gartner’s 2020 Magic Quadrant for WAN Edge Infrastructure. We believe our proven track record of providing business agility across all verticals and industries just got much stronger. And it doesn’t stop there. We have several upcoming announcements that will ensure that our Secure SD-WAN solution can address the broadest set of customer deployments – because being a leader never means standing in one place. 

Gartner Magic Quadrant for WAN Edge Infrastructure, Jonathan Forest, Mike Toussaint, Mark Fabbi, September 2020

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Fortinet.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Download the full Gartner Magic Quadrant for WAN Edge Infrastructure report here.

Learn how Fortinet’s Secure SD-WAN Solution uses a security-driven networking approach to improve user experience and simplify operations at the WAN Edge.

As Fortinet partners, Net Universe offers all Fortinet devices and subscriptions with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/fortinet.
You can visit our Shop Online

Filter out disruptive noise in Google Meet, now on mobile

Quick launch summary

Google Meet can now intelligently filter out background noise on Android and iOS. This means Meet will automatically remove distracting from your mobile device’s audio input while still letting your voice through.

Getting started

Admins: There is no admin control for this feature.

Rollout pace

Availability

  • Available to G Suite Enterprise, G Suite Enterprise for Education customers
  • Not available to G Suite Basic, G Suite Business, G Suite for Education, and G Suite for Nonprofits customers
  • Not currently available in some countries (currently including South Africa, the UAE, and surrounding locales). See our Help Center for more availability details.

Resources

Roadmap


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Google Meet attendance reports available now for education meetings

What’s changing 

Organizers of G Suite Enterprise for Education meetings will now receive an attendance report via email once the meeting is over. Attendance reports will be generated for web or mobile meetings with at least five (and no more than 250) participants and will contain the following information for each:

  • Participant’s name 
  • Participant’s email 
  • Length of time a participant was on the call, including when they joined and exited 

Once a meeting is finished, you’ll receive an attendance report via email.

The attendance report contains the names, email addresses, and duration of time participants were in the meeting.

Students who have the ability to create meetings will receive attendance reports as well. 

Who’s impacted 

End users 

Why you’d use it 

We hope attendance reports will help meeting organizers keep track of who attended their meetings and for how long, which can be challenging during larger meetings or while presenting. 

Additional details 

Recording attendance for ejected or dial-in participants 

We’ll record the attendance of any participants who chose to dial in. The obfuscated phone number and name displayed during the meeting will appear in the attendance report. 

If a meeting participant is ejected and re-admitted to the meeting, you’ll see the time they first joined and the time they last left. The total duration of their attendance will be a sum of their sessions. 

Getting started 

  • Admins: At this time, there is no admin control for this feature. We’re planning to introduce this setting later this year; stay tuned to the G Suite Updates blog to learn when it launches. 
  • End users: There is no end user setting for this feature. Attendance reports will automatically be sent to the meeting host. Visit the Help Center to learn more about attendance tracking. 

Rollout pace 

Availability 

  • Available to G Suite Enterprise for Education customers only at this time. 
  • Not available to G Suite Essentials, G Suite Basic, G Suite Business, G Suite for Education, G Suite Enterprise, and G Suite for Nonprofits customers. Stay tuned to the G Suite Updates blog for information when this launches to additional customers. 

Resources 


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

See which apps are Google verified in the Admin console

Quick launch summary 

With this launch, we’ll show whether apps are Google verified in the Admin console on the app details page and the App Access Control summary page. We hope this visibility will make it easier to make informed decisions about access to G Suite data within your organization. 

Apps often require access to G Suite data to help your users get work done. Google works with app developers to make sure that third-party apps comply with Google privacy and security requirements. 

If apps meet certain verification requirements, they are considered “Google verified”. If they don’t complete the verification process, they are considered “unverified” and might be subject to restrictions. You can control which apps can access sensitive G Suite data via App access control, and choose to authorize unverified apps if you want. 

Getting started 

Rollout pace 

Availability 

  • Available to all G Suite and Cloud Identity customers 

Resources 


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Dark theme now available for Docs, Sheets, and Slides on iOS

Quick launch summary 

Dark theme in Google Docs, Slides, and Sheets on iOS. 

You can also preview how your document will look in light theme for collaborators and viewers by selecting the three-dot “More” menu and toggling the “view in light theme” option.
 

Getting started 

Rollout pace 

Availability 

  • Available to all G Suite customers and users with personal Google Accounts 

Resources 


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

How choosing flexible tools fuels collaboration

During a recent early morning jog, I had a minor epiphany about a project. I slowed down, pulled out my phone, tapped the microphone and left myself a voice reminder in the margins of my document. Later in the day—after dishes, diapers and sweeping the radius around the highchair—I used that note to build out a better presentation. From the folding table in my 7-year-old’s bedroom, I shared the update with my team just before our working session. 

As a UX researcher at Google for the past six years, working on teams across four time zones in the U.S. and Europe has given me a front row seat for the increasingly fluid ways that customers and colleagues work remotely. Despite all that experience, I’m impressed at how rapidly we’ve adapted to change this year. Here are a few things I’ve learned about flexible ways of working and why it’s likely to become even more important for many organizations in the future. 

The trend toward choice

First, it’s important to understand just how much remote work increased before the pandemic. Regularly working from home grew 173 percent between 2005 and 2018. Today, 40 percent more U.S. employers offer flexible options than five years ago. In the wake of COVID-19, that number increased even faster.

Having choices about when and where to work was seen as increasingly important to attract and retain talent even before it became essential to keep businesses running. More employee autonomy may even mean higher job satisfaction and performance, another reason why flexible working is likely to outlast COVID.

Demand for app diversity has also grown dramatically, giving professionals an “à la carte” mix of apps to choose from. Companies now use an average of 88 apps, a 21 percent increase from three years ago. If anything, the new challenge may be managing these choices effectively. It’s something we think about a lot, and it’s a big part of the way we’ve designed G Suite.

How flexibility helps my team

Today, tools like G Suite make remote teamwork accessible with video calling and content collaboration.

But what flexibility do these trends and tools actually enable? Here’s a typical collaborative workflow on my team: A few days before a meeting, I circulate a doc or slides. Everyone starts to review, raising questions, adding comments to specific snippets of content and tagging teammates who can add relevant context.

Tagging saves time in a few ways. First, it keeps the meeting smaller. Instead of meeting with 20-something people, we collect input before the discussion—getting everyone’s  latest thinking in one place without cluttering calendars (and saving everyone from yet another video call).  

Second, the asynchronous conversation before the meeting gives us a streamlined agenda for our live discussion. Instead of a lengthy meeting to reach consensus on every detail, we prep for 20 minutes and spend 30 minutes talking through a shorter list of topics to clarify. 

Smaller meetings have the added benefit of allowing for more dynamic discussion—a big deal because conversation dynamics are a significant factor in how well groups solve problems and make decisions.

As we get down to business, I send my doc out to everyone on the call chat thread. That way, no one has to hunt for the document and we can dive in quicker. Instead of presenting my whole screen, I show a single Chrome tab. This gives me the flexibility to show the content that helps us get on the same page, while taking messy notes in another document.

This review process emerged organically and allows the whole team to contribute regardless of where they sit. It shows respect for time and attention. It uses our flexible tools for virtual conversation to streamline conversations and speed up decision-making. Attention matters more working from home. Time crunched, my well-intentioned efforts to stay present are tested hourly. I don’t want to be the harried parent at work that you can’t rely on, but I don’t want to reply to emails during toddler bath time either. Teams, and the tools they choose, can help protect attention when you need to focus on work or on home.  

The future is the choices we make today

The pandemic put meetings and remote collaboration under a microscope and gave us an inspiring and instructive silver lining to learn from. Working from home has raised awareness of persistent problems like information overload, reminding us that we can make choices that enable flexible ways of working, protect our attention and streamline collaboration. 

As we look into the future, we can all make deliberate choices that bridge the virtual distance, no matter where your team members are working from.

[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Managed Detection and Response (MDR) Buyers Guide – Sophos News

Download the free MDR Services Buyers Guide today!

Few organizations have the resources in house to effectively manage their security programs while proactively defending against new and emerging threats.

As a result, organizations are looking to managed detection and response (MDR) services to run their security operations programs.

However, the security services marketplace is relatively new it’s and filled with false claims and confusing jargon.

Our MDR Buyers Guide is available as a PDF or in audio format and provides clarity by walking you through the key considerations when choosing an MDR service. It also enables you to see how MDR providers stack up against one another.

Evaluating MDR providers: 12 questions to ask

When evaluating an MDR provider, we recommending asking the following:

  1. How many customers does the MDR service have?

The current customer count will give you an idea of how many other organizations trust the service provider, and how well-versed they are at responding to suspicious activity.

  1. What is the scope of the service? Is threat response included?

Most vendors focus on threat identification and notification, leaving response and remediation to the customer. Effective MDR services go far beyond this. Ask for clarity on what is offered.

  1. Is the service 24/7/365? If an issue arises at 2AM on a Sunday, who will respond?

Ensure the MDR service truly monitors your environment and is able to respond any time, day or night.

  1. Which technologies does the service utilize? Are they included in the price?

Ask if the technology used by the operators is included in the price of the service or if you must purchase your own tools separately.

  1. Is the service being provided proactive or reactive?

MDR is a proactive discipline. Ensure you’re not being offered digital forensics and incident response services, typically used to deal with an existing crisis.

  1. How will you interact with the MDR team?

Is there direct call-in support? Can you communicate via email? Speak directly with SOC analysts, or through an intermediary?

  1. What is the security operations threat detection and response (TDR) methodology?

MDR providers should have a well-defined TDR methodology. If not, they’ll likely struggle to scale as their business grows and will be more likely to miss important indicators of suspicious activity.

  1. How fast is the service?

In security, seconds matter. MDR providers should be able to estimate the average times to detect, respond, and resolve.

  1. What types of remediation actions can the MDR operators take? Can they take active response for you?

Find out what happens when the service detects suspicious activity. Many will simply monitor and notify you. They should be able to act on your behalf and provide response.

  1. Is threat hunting lead-driven (responding to alerts), lead-less (looking for new indicators of attack without alerts), or both?

Some vendors refer to automated alert generation as threat hunting (it’s not). Understand if the MDR operators will proactively hunt to detect adversaries in your environment regardless of whether or not they’ve detected a strong indicator of activity or compromise.

  1. What data sources are used to provide visibility? Is the service just “managed EDR”?

While endpoint data is critical for a security operation program, some MDR providers don’t have any additional visibility beyond the endpoint. These are not true MDR providers but rather “managed EDR” services.

  1. Does the MDR provider have access to threat intelligence and threat researchers?

MDR providers should have a level of expertise that goes beyond what most organizations can build independently: skilled security analysts, access to proprietary threat intelligence, and collaboration with threat researchers when something novel is detected.

These questions and a comprehensive vendor comparison are covered in our MDR Buyers Guide – available as a PDF or in audio format.

Give your organization the best protection with Sophos Managed Threat Response (MTR)

Sophos MTR provides 24/7 threat hunting, detection, and response capabilities delivered by an expert team as a fully-managed service. Beyond simply notifying you of attacks or suspicious behaviors, the Sophos MTR team takes targeted actions on your behalf to neutralize even the most sophisticated and complex threats.

The Sophos MTR team of threat hunters and response experts:

  • Proactively hunt for and validate potential threats and incidents
  • Use all available information to determine the scope and severity of threats
  • Apply the appropriate business context for valid threats
  • Initiate actions to remotely disrupt, contain, and neutralize threats
  • Provide actionable advice for addressing the root cause of recurring incidents

Visit Sophos.com/MTR today to learn more.

DOWNLOAD: ‘MDR Buyers Guide’ full report

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

XG Firewall is Nutanix AHV and Nutanix Flow Ready – Sophos News

Sophos XG Firewall has joined the robust and growing Nutanix ecosystem that is enabling global enterprises to converge and virtualize their IT infrastructure.

XG Firewall is now Nutanix AHV and Nutanix Flow ready to provide protection for networked applications and traffic in Nutanix virtualized environments. XG Firewall delivers the same kind of easy deployment, management and performance that Nutanix AHV is known for.

Nutanix is the industry leader in hyperconverged infrastructure (HCI) that makes the underlying datacenter and cloud infrastructure invisible, abstracting and elevating it to enable businesses to focus on their applications and services. The Nutanix AHV hypervisor converges private, public, and distributed clouds, bringing simplicity and agility to infrastructure management.

XG Firewall v18 with the new Xstream Architecture running on Nutanix AHV provides deeper visibility into applications, network activity, and threats – able to stop even previously unseen attacks.

Nutanix Flow is a software defined network policy engine built into AHV that provides easy and granular policy-driven application micro-segmentation.

XG Firewall has been validated to provide two modes of operation within Nutanix AHV infrastructure:

  1. XG firewall can provide standard NGFW protection on Nutanix AHV similar to any other physical, virtual, cloud, or hybrid network.
  2. In addition, non-IP bridge mode in XG can be used within the network as part of Nutanix Flow’s micro-segmentation to transparently redirect VM traffic through a virtual XG Firewall running in bridge mode on every AHV host to protect east-west traffic.

XG Firewall can protect traffic entering and leaving the Nutanix AHV infrastructure while also securing traffic moving within the Nutanix Flow software defined network, taking advantage of the granular redirection capabilities of Nutanix Flow micro-segmentation that ensures security protection policies are optimized for individual applications.

XG Firewall’s full suite of protection capabilities will help secure Nutanix applications and network traffic flows, including TLS inspection, intrusion prevention, application control, web protection and filtering, and zero-day threat protection with sandboxing and threat intelligence.

Visit Sophos.com/Firewall to learn more about XG Firewall products.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Now live: Zoho Recruit’s integration with HackerEarth

Hiring candidates is not only tedious but also very time-consuming, especially when you’re hiring programmers. From sourcing a pipeline of potential candidates and shortlisting the right ones to conducting numerous rounds of interviews, this process can take a substantial amount of time and effort. 

Even after jumping through so many hoops, there is no guarantee that you have hired the right candidate. So how can you minimize your risk and consistently hire better talent?

Presenting HackerEarth: The suite of assessment products that helps you reduce the time and effort involved with hiring and ensure that you hire only the best developers for your organization.

Here’s why recruiters should start using HackerEarth for Zoho Recruit:

Increase productivity and functional efficiency

HackerEarth is always innovating to help recruiters hire more efficiently while maintaining the highest quality standards. Recruiters can accelerate their hiring by applying preliminary assessment rules through the platform. Companies can save time and money with advanced screening features, which helps prevent unnecessary screenings for candidates that recruiters disqualify early in the screening process.

Mitigate risk and maintain compliance

HackerEarth’s platform supports a high standard of compliance to ensure data is  reportable, accurate, and not reliant on manual processes. This makes hiring processes more consistent and leaves less opportunity for human bias and error, so hiring teams can maintain compliance while saving time.

Improve candidate experience and conversion

Today’s candidates expect accessibility, visibility, and speed. HackerEarth and Zoho Recruit are continually innovating to help you meet those expectations. Mobile-friendly candidate portals accelerate the assessment process with easy-to-use forms while also providing candidates with all the resources they need.

Expand and optimize your candidate pool

With HackerEarth’s advanced analytics, recruiters can now make better hiring decisions and employ more effective recruitment strategies. Based on this data, recruiters can use HackerEarth’s platform tools to optimize preliminary assessment rules and make their pool of qualified candidates both more inclusive and more targeted to their needs.

Differentiate your brand to attract candidates

Diversity and inclusiveness in hiring are both high-profile issues for companies, and fair chance hiring practices can draw new customers, talent, and partners. Join a thousand other companies that align with HackerEarth’s inclusiveness mission to help attract diverse talent and raise your brand profile.


Shravan


Product Marketer at Zoho Recruit.

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

Sophos to be included in the 2020 MITRE Engenuity ATT&CK®️ Evaluations for Enterprise – Sophos News

We are pleased to announce that Sophos is participating in the 2020 MITRE Engenuity ATT&CK Evaluations for Enterprise Carbanak and FIN7 evaluation with Sophos Intercept X.

The evaluation tests the detection capabilities of endpoint protection and endpoint detection and response (EDR) solutions. The 2020 test utilizes techniques common to the Carbanak and FIN7 threat groups.

MITRE Engenuity states:

These groups carry a firm reputation of utilizing innovative tradecraft. Efficient espionage and stealth are at the forefront of their strategy, as they often rely heavily on scripting, obfuscation, “hiding in plain sight,” and fully exploiting the users behind the machine while pillaging an environment. They also leverage a unique spectrum of operational utilities, spanning both sophisticated malware as well as legitimate administration tools capable of interacting with various platforms (Windows and Linux, including point-of-sale specific technologies).

Carbanak is known for targeting banks, and FIN7 is known for targeting the U.S. retail, restaurant, and hospitality sectors.

This year an optional Protections scenario is also available as part of testing, which Sophos has also chosen to participate in. MITRE Engenuity expects the results and methodology to be available early in 2021.

For more information on the 2020 MITRE Engenuity ATT&CK Evaluations for Enterprise Carbanak and FIN7 evaluation, read MITRE Engenuity’s blog and testing overview.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.