Leveraging Security to Capture the 5G Business Market

Unlike previous mobile generations, 5G is touted as a game changer for both mobile network operators (MNOs) and enterprises in many verticals. 

For MNOs, 5G has the potential to deliver a whole new scope of enterprise-facing, value added services, generating new revenue streams and driving growth.

For medium to large enterprises in different industries and verticals, harnessing 5G technology and capabilities will further help to increase efficiency, automation, safety, sustainability and overall innovation.

This is the promise of 5G and it raises some important question: if 5G is to play such a central and critical role, what is the role of security in 5G’s adoption and penetration in the business market? Does 5G have an acceptable set of built in security capabilities in order to safeguard itself, and the business customers it serves from harm’s way? Or is an additional layer of security is required in order to capture the 5G business market?

At Fortinet, we strongly believe that although 5G delivers inherent security capabilities, these by themselves should not and cannot be considered as the only line of defense against 5G infrastructure and services misuse, cyber threats and risks. An additional layer of security visibility and control is required.

In order to get a larger view from MNOs and the overall 5G ecosystem partners, Fortinet commissioned TelecomTV, in association with ETSI and HardenStance, to perform a survey to better understand their view on the target business market for 5G and the role of 5G security in the industry’s ability to capture the 5G business market. The survey, concluded in May 2020, highlights the following:

  • Use cases tailored to unique vertical industries are key to the success of 5G in the business market.
  • Security plays a central role in 5G’s success with almost 90% of respondents stated that an operator’s security capabilities are either critical or very important. 
  • Implementing 3GPP 5G security features is a key baseline requirement but additional security is required as enterprise 5G use cases will require more security capabilities. 
  • Mobile operators should offer a comprehensive, full-stack, end-to-end security with 5G enterprise use cases.

The survey demonstrates the central role security has to play in an MNO’s ability to successfully deliver 5G to the business market. To be able to deliver, MNOs and the overall 5G ecosystem must ensure that security capabilities that complement 3GPP’s 5G security recommendations are put in place to provide threat visibility, control and mitigation against a growing set of sophisticated cybersecurity risks, such as:

  • Control and user plane security
  • IoT/OT misuse, signaling storm and bots
  • API exposure attacks in the SBA core and the multi-access edge compute (MEC) sites
  • Application-level security for the overall ecosystem and industry use cases’ applications
  • Security and NAT services for packet data networks connectivity    
  • Security for non-public mobile networks, also known as 5G private mobile networks

Fortinet is ideally positioned to provide an end to end security for the 5G ecosystem and use cases in the business market segment. Fortinet’s leading position in providing security for both small to very large enterprises and MNOs provides us with a unique understanding as to the security needs in industry use cases and the ability to deliver the solutions and know how to fulfill them.

FortiGate and FortiWeb provide a common security platform for both MNOs and businesses considering/using 5G in multiple industries and use cases. It enables the MNO to secure its 5G infrastructure and ensure service availability and continuity to its enterprise customers. It also provides the opportunity to deliver revenue-generating managed security services on top of 5G for enterprise use case consumption. And the same platforms can be implemented or co-managed by the enterprise customers when required – in securing 5G private mobile networks for example.

Read more about the Fortinet-commissioned study by TelecomTV about Leveraging Security to Capture the 5G Business Market.

Download the whitepaper to explore considerations and requirements for Securing 5G Private Mobile Networks.

Learn more from this survey in the infographic.

Engage in our Fortinet user community (Fuse). Share ideas and feedback, learn more about our products and technology, or connect with peers.

As Fortinet partners, Net Universe offers all Fortinet devices and subscriptions with worldwide Delivery Services.
Send us an email to
[email protected] for more information or visit https://www.netuniversecorp.com/fortinet.
You can visit our Shop Online

Fortinet Ranks Highest in Two Key Use Cases in 2020 Gartner Critical Capabilities for WAN Edge Infrastructure Report

Digital innovation and increasing cloud application bandwidth demands have led network infrastructure and operations leaders to turn to SD-WAN as a de-facto solution for their WAN transformation and roadmap efforts. In a crowded SD-WAN market of over 80 vendors, it’s more critical than ever for organizations to be able to identify the right solution that best fits their specific use cases. The Gartner September 2020 Critical Capabilities for WAN Edge Infrastructure report offers essential research that we believe helps organizations to differentiate between vendors based on their deployment, operational flexibility, and application performance requirements. 

The Gartner Magic Quadrant and Critical Capabilities Reports

Gartner’s well-known annual Magic Quadrant reports recognizes vendors in a variety of key technical markets based on key factors, like their ability to execute and the completeness of their vision. However, there are additional Gartner reports that may provide further insight for those organizations looking to select and deploy a solution that best suits their specific use case. Gartner’s “Critical Capabilities” reports use proprietary methodologies to score organizations in critical subcategories within each Magic Quadrant area based on more granular criteria. These reports extend the value of the more general Magic Quadrant recognitions by providing deeper insight into providers’ product and service offerings for key market segments.

Fortinet Scores Highest in “Security-Sensitive WAN” (4.26/5) and” Small Footprint Retail WAN” (4.14/5) Use Cases and Scored Third Highest in the “Large Global WAN” (4.09/5) Use Case in Gartner 2020 Critical Capabilities for WAN Edge Infrastructure Report

This September, Fortinet was identified as a Leader in the Gartner 2020 Magic Quadrant for WAN Edge Infrastructure. But just as importantly, Fortinet also received the highest scores in two use cases in the Gartner September 2020 “Critical Capabilities for WAN Edge Infrastructure” report. In that analysis, Fortinet’s SD-WAN solution scored highest in the “Security-Sensitive WAN” (4.26/5) and “Small Footprint Retail WAN” (4.14/5) use cases and scored the third highest for the “Large Global WAN” (4.09/5) use case.

These three use cases are characterized by key requirements, as outlined below:

Security-Sensitive WAN: A security-sensitive WAN typical in some mid- to large-scale organizations from 25 sites and higher that are focused on securing branch offices as the main priority where network and security procurements are increasingly converging.

Small Footprint Retail WAN: This category is a representative of small site/mass deployment needs that are common in such retail markets as convenience stores, quick service restaurants, gas stations, specialty retail, bank ATMs and independent insurance agents.

Large Global WAN: This category looks at the needs of larger multinational organizations with a global WAN requirement for more than 200 sites, and that spans at least two continents.

We believe that, with our Security-Driven Networking approach and custom-built ASICs, Fortinet delivers a scalable, flexible Secure SD-WAN solution that customers can deploy across the home, branch, campus and multi-cloud.

According to Gartner, “SD-WAN product differentiation is primarily based on feature breadth and/or depth, specifically on security, application performance optimization, and cloud features.” In addition, they cite that “simplified and unified security is a main driver for customers as they determine the best architectural approach for the integration of networking and security.” As an industry leader in both security and SD-WAN, we believe Fortinet offers the most comprehensive SD-WAN solution available, enabling customers to achieve best user experience at reduced cost and complexity, while delivering on our strong vision of providing a flexible and secure solution anywhere. 

Recent Recognitions for Fortinet Secure SD-WAN 

We are absolutely thrilled to be positioned as a Leader in the 2020 Gartner WAN Edge Magic Quadrant, to be named as a 2020 Gartner Peer Insights Customers Choice for WAN Edge Infrastructure, and to be recognized in the 2020 Gartner Critical Capabilities for WAN Edge Infrastructure report!

Read the full 2020 Gartner Critical Capabilities for WAN Edge Infrastructure report.

Learn more about Fortinet Secure SD-WAN.

Gartner Critical Capabilities for WAN Edge Infrastructure, Jonathan Forest, Andrew Lerner, Naresh Singh, 30, September 2020.

Gartner, Gartner Peer Insights ‘Voice of the Customer’: WAN Edge Infrastructure, PEERS, Published 13 April 2020

Gartner, Magic Quadrant for WAN Edge InfrastructurePublished 23, September 2020, Jonathan Forest, Andrew Lerner, Naresh Singh

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Fortinet.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advice technology users to select only those vendors with the highest ratings or other designations. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to its research including any warranties of merchantability or fitness for a particular purpose.

Gartner Peer Insights Customers’ Choice constitute the subjective opinions of individual end-user reviews, ratings, and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates.

As Fortinet partners, Net Universe offers all Fortinet devices and subscriptions with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/fortinet.
You can visit our Shop Online

Help teams get back to work safely with Office Readiness

Office Readiness in Zoho People


As you reopen your worksite for your employees, it’s essential to follow the guidelines issued by the government and take steps to improve employee safety. You should ensure that both your employees and worksites are ready for reopening. We at Zoho People are here to help you make this transition safe. We’re introducing Office Readiness, a new feature in Zoho People.

Office Readiness in Zoho People

With the help of three forms, you will be able to assess if your worksites are ready to function and accommodate employees and outside visitors. Here’s how these forms work:

  • Work Premises
    With this form, Zoho People’s Admin will be able to record work location details including the name, premises in charge, maximum capacity, and more.
  • Work from Office
    With this form, your employees can request to work from the office. They will be asked to fill in details including their work location, work premises, requested dates, mode of travel, and more. You can also require employees to fill in their employee health form at least once in the 15 days before the requested start date. Approvals can be configured to send the request to the reporting manager and the premises in charge.
  • Visitor at office
    This form can be filled by your employees to request entry for outside visitors like interview candidates, clients, maintenance personnel, etc.

Read more about how our Office Readiness feature facilitates a safe return to work in our HR Knowledge Hive.

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

Use Smart Fill to help automate data entry in Google Sheets

What’s changing 

We’re launching Smart Fill for Google Sheets, which detects and learns patterns between columns to intelligently autocomplete data entry. 

For example, if you have a column of full names, you may want to split it into a column with first names and a column with last names. As you start typing first names into a column, Sheets will automatically look for patterns. If Sheets detects a pattern, it will generate the corresponding formula, and then autocomplete the rest of the column for you. 

Who’s impacted 

End users 

Why it’s important 

We hope that Smart Fill will make it easier to prepare and use data in Sheets. Similar to how Smart Compose in Gmail helps you write faster with fewer mistakes, Smart Fill makes data entry quicker and less prone to error. 
We also recently launched Sheets Smart Cleanup, which uses similar intelligence to help prepare and analyze data in Sheets. By adding new, intelligent features to help automate data preparation and analysis, we hope to empower all users to harness the power of data and quickly make data-backed decisions. 

Additional details 

In addition to using data that’s in a sheet, Smart Fill can also use data from Google’s Knowledge Graph. For example, it can use public data to autocomplete a list of countries where a list of cities are located. 
For Enterprise Plus customers, it can also use information from your company’s people Directory to autocomplete data. For example, it can use organization-only data to fill in email addresses for company employees. 

Getting started 

Rollout pace 

  • Rapid Release domains: Extended rollout (potentially longer than 15 days for feature visibility) starting on October 15, 2020 
  • Scheduled Release domains: Extended rollout (potentially longer than 15 days for feature visibility) starting on November 5, 2020 

Availability 

  • Smartfill is available to Essentials, Business Starter, Business Standard, Business Plus, Enterprise Essentials, Enterprise Standard, Enterprise Plus, Education, Enterprise for Education, and Nonprofits customers, and users with personal Google Accounts 
  • Smartfill integration with people directory is only available to Enterprise Plus customers. 

Resources 

Roadmap 


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Enhancing Google Workspace Add-ons in Gmail with Compose-time functions

Quick launch summary 

We’re enhancing the way you work with Google Workspace Add-ons in Gmail with the addition of Compose-time functions. Compose-time functions can help modify and format your messages in Gmail faster by: 

  • Adding recipients in the “To”, “CC”, and “BCC” fields. 
  • Inserting content into the subject line and body of the email. 
  • Inserting message templates for a consistent look and feel for your communications, and more. 
Organizations can also create their own compose-time add-ons using Apps Script or alternative runtimes. Use the Google Workspace Developer Guide to learn more about building compose actions. 

Getting started 

Rollout pace 

  • Compose time add-ons are available now in the Google Workspace Marketplace. 

Availability 

  • Available to all Google Workspace customers (when enabled by admins) and users with personal accounts.
     

Resources 


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Changes to Google Chat migration timeline

In June, we introduced the Chat preferred setting in the Admin console to allow any admin to opt in to migrate all end users to Chat. We also made Chat preferred configurable at the organizational unit level.

In 2021, we will start migrating all remaining customers with “Chat and classic Hangouts” and “classic Hangouts only” settings selected to Chat. Here’s what you can expect:

  • Opt-out upgrade (no earlier than Q2 2021): All customers will be migrated to Chat Preferred unless their admins explicitly opt out. Customers who only have enabled Chat, with classic Hangouts completely disabled, will not be impacted.
  • Mandatory upgrade (late 2021): All remaining customers will be migrated to Chat Preferred, and we will fully replace classic Hangouts with Chat. There will be no option to opt out at this stage.

Getting started

  • Admins: No action is needed at this time. Check out the Help Center for more information on transitioning your users to Chat.
  • End users: There is no end-user action for these changes.

Resources


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Use the Count API to estimate Vault API export sizes

Quick launch summary 

We’re adding a Count API to the Vault API. The Count API enables you to see the number of messages, files, or other data items that match a search query. 

You can use the number of items to estimate the size of the export, and then choose to proceed with the export or adjust the query to retrieve fewer items. This can help ensure a successful export by reducing the likelihood of export errors due to size. 

Getting started 

  • Admins: Visit the API documentation to learn more about the Count API and review an example. 
  • End users: No end user impact. 

Rollout pace 

Availability 

  • Available to Business Plus, Enterprise Standard, Enterprise Plus, Enterprise for Education, as well as other customers with the Vault add-on license 
  • Not available to Essentials, Business Starter, Business Standard, Education, and Nonprofits customers  

Resources 

Roadmap 


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Inbox placement through the lens of a marketer

A marketer's gear

When you Google “how do I land my emails in inbox,” you’ll find close to 195,000,000 results.

While this doesn’t come as a surprise considering the longevity of email marketing, it certainly testifies to one thing: Email deliverability (inbox placement) is arguably the most-discussed topic in email marketing. This is because the process equally involves the email marketer, email marketing platform, and the Inbox Service Providers. And the resulting area of intersection is a bit challenging to understand while starting off.

Participants of email marketing process

In our recently concluded webinar, we set out to explain email deliverability in simple terms.

 

Here’s the rundown of the conversations we had during the webinar. For those of you who prefer reading, we decided to summarize the webinar’s key takeaways below.

Key terms 

ESP – Email Service Providers (for example, Zoho Campaigns)

ISP – Inbox Service Providers, aka mailbox providers (for example, Gmail)

Email-sending domain – Your own domain associated with the email marketing platform (for example, zylker.com) 

Lookup site A site that provides crucial information about a domain in an easy-to-understand way

DNS – Domain Name System

User scenario

Alex is a marketer trying to reboot email marketing for his company, Zylker. He’s signed up for an email marketing platform and is going to send his first email campaign as per the user manual.

Your takeaway

Alex’s first email campaign will help you learn three aspects:

  • The role of anti-spam services and Inbox Service Providers in email marketing
  • The whys and hows of configuring your email marketing software
  • The specifics of content creation and mailing list management

In summary, you’ll learn what happens after you hit an email’s send button and how to put the best foot forward to achieve inbox placement.

Step one: Studying the domain’s reputation

Before associating his domain with the email marketing software, Alex wants to ensure that it’s not in the bad books of anti-spam services. To check this, he turns to one of the lookup sites.

Reasoning:

Anti-spam services create and maintain blacklist(s), online registries of domains and IP addresses that were used to send any form of spam. Some of the mailbox providers likely join forces with anti-spam services to strengthen their security system. This way, they accurately prevent an incoming email with blacklisted domains and IPs from reaching the mailboxes.

The image below shows how Spamhaus—one of the prominent anti-spam services—contribute to email security.

Spamhaus and ISPs

Source: Spamhaus

While these services use different under-the-radar techniques to maintain blacklists, the usage of spam traps is widely known.

Step two: Associating the domain

After knowing the domain is in the good books of anti-spam services, Alex creates a subdomain to easily narrow down email-deliverability problems in the future and safeguard the reputation

Difference between domain and subdomain

Reasoning:

When you use your primary (or parent) domain for several purposes, there’s no room for error at all. A non-email-marketing problem hurting your domain’s reputation has a bearing on your email marketing and vice versa. This is where subdomains come into play; they help you identify email-deliverability-based problems with a macroscope instead of a microscope. The best part? It works as a separate domain while still being connected to your primary domain.

Step three: Authenticating the domain

Now Alex has to prove that he’s a safe and authenticated sender in the eyes of mailbox providers (because of rising spam activities). To achieve this, he uses two mechanisms prescribed by his ESP: Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM). He copies the SPF and DKIM records exclusively generated by his ESP and pastes them in the TXT record of his domain’s DNS.

Domain authentication

Reasoning:

Since your emails are always bypassed via the servers of your ESP, their domains and IPs also enter the picture. Therefore, the mail servers of your recipients ask a question to your ESP: “How can we ascertain that this email is actually from the concerned sender?” This is when the SPF and DKIM mechanisms come in handy.

With the SPF record, the ESP will hint the domain and IPs assigned for your account. (They also communicate to the mailbox providers the entire set of domains and IPs used by them.) By publishing the SPF record on your DNS, you validate your email’s point of origin.

SPF flowchart

With the DKIM record, a unique alphanumeric key is assigned to your account. So every time you send an email, an encrypted code along with a special header is added to it by the ESP. The code is then decrypted by your recipients’ mail servers using the key present in your DNS, thereby again validating the email’s point of origin and, most importantly, ruling out any possibilities of foul play in transit.

DKIM flowchart

Step four: Crafting content

With the account set up, Alex is now raring to use the creative freedom that ready-made email templates offer. He heads over to the template editor and customizes the template, ensuring that his email is a combination of plain text, image, and, most importantly, (healthy) URLs.

Reasoning:

The ultimate goal of every email marketer is this: creating content that persuades their audience to complete the end action. The scoring system of mailbox providers—which is used to gauge your email-sending domain’s reputation—is also in line with that.

The way your recipients react to your email generates positive and negative scores. If someone clicks your links (preferably and visibly embedded as CTA buttons or hyperlinks), you garner the highest-possible score. However, if your score declines below the cut-off range, your domain gets blacklisted.

Scoring system of ISPs

Now comes a question: What if you’re using a brand-new domain that has a zero reputation? Simple! Warm up your domain. Start off with low-volume emails, build a positive reputation, and go through the gears.

Step four: Selecting the recipients

Since Alex is resuming email marketing for Zylker after a hiatus, he wants to know how healthy the current mailing lists are. For this, he turns to the analytics of the previous campaigns.

Subsequently, he segments the database into three based on receptiveness: inactive contacts, partly active contacts, and highly active contacts. Finally, he overlooks the inactive contacts and associates the other two segments for this campaign.

Reasoning:

Continuously sending emails to (highly) inactive contacts can affect your domain’s reputation in the long run. Furthermore, if a contact doesn’t access their mailbox for a very long time, the ISPs convert the email address into a spam trap. (This is called recycled spam traps, and the cut-off time before the email address is converted into a spam trap varies from one ISP to another.) If an email is sent to such spam traps, it takes a huge toll on your reputation.

Inactivity period set by ISPs

 

Note: Like anti-spam services, the ISPs also generate pure spam traps (fake email addresses) and disseminate them on the internet, presuming spammers will use or sell them in the dark-web marketplaces. From there, it’s only a matter of time before it reaches email marketers who’re looking to purchase mailing lists. Here’s an extensive guide on spam traps and how to avoid them.

 

Alex is set to push the send button now. And, like most email marketers, he can’t wait to come back and check the analytics so he can sharpen his next campaign.

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

New default video playback option in Google Slides

Quick launch summary 

We’re updating the default way videos play when you present in Google Slides. Now, the video will start playing when you click to advance the presentation. Previously, the presenter had to specifically click on the video to start playing. 

With this launch, there are now three options to control playback: 

  • Play (on click) – Video will play when you advance the slide. (This is the new default option.) 
  • Play (automatically) – Video will play without you clicking to advance. 
  • Play (manual) – Video will play when you click specifically on the embedded video in the slide while presenting. (This was previously the default.) 

The new play on click option works the same way as any other animation or slide transition. When you’re presenting a slide with an embedded video, advance the slide by pressing a key, clicking a mouse, or using a remote clicker, and the video will start playing. You can adjust the sequence the video plays in the animations sidebar, so you can coordinate playback with other animations on the slide. 

Note that this change in default behavior will only apply to videos inserted after the launch takes place. Videos already in presentations will not change playback type automatically, but you can change them manually in the format options. 

The new default will help make presentations flow better and reduce distractions, so presenters can focus on content rather than where they have to click. 

Getting started 

  • Admins: There is no admin control for this feature. 
  • End users: This feature will be ON by default and can be turned off for any video in video format options. Visit the Help Center to learn more about videos in Slides. 

Rollout pace 

Availability 

  • Available to Essentials, Business Starter, Business Standard, Business Plus, Enterprise Essentials, Enterprise Standard, Enterprise Plus, Education, Enterprise for Education, and Nonprofits customers and users with personal accounts 

Resources


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Managed Android devices must upgrade to Android Device Policy by October 26, 2021

What’s changing 

To ensure that devices enrolled by users with advanced management will continue to sync and have access to data, users in your organization must switch to Android Device Policy before October 26, 2021. If users still have Google Device Policy on this date, they won’t be able to sync their devices or access data.

 

Devices enrolled by users with basic management must move to Android 6.0 Marshmallow or later before October 26, 2021 to continue enforcing a screen lock. If a user’s device can’t be upgraded to Android 6.0 or later, their device will continue to sync and retain access to data, however it will not be able to enforce a screen lock. 

Who’s impacted 

Admins and end users 

Why it’s important 

The latest Android devices and operating system (OS) versions provide improved security features. Moving to Android 6.0 (Marshmallow) or newer can help ensure all devices are protected by the latest security features, and can take advantage of improvements in the Android enterprise experience. 

Getting started 

Rollout pace 

Availability 

  • Available to Business Starter, Business Standard, Business Plus, Enterprise Essentials, Enterprise Standard, Enterprise Plus, Education, Enterprise for Education, and Nonprofits customers 
  • Not available to G Suite Essentials 

Resources 


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online