Blog

Need Answers Fast?

Call 858-715-3837 or email us for immediate assistance.

Get Support Now

G2 News

July 03 2013

Fortinet to Announce Second Quarter 2013 Financial Results

Fortinet to Announce Second Quarter 2013 Financial Results …read more Via: Shareholder

July 02 2013

Nine HIPAA Network Considerations

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Omnibus Final Rule, released January 2013, introduced some significant changes […] …read more Via: Cisco Security Blog

July 01 2013

Chip Shot: Intel® System Studio Extended to Linux* Embedded App Developers

Intel is expanding its Intel

Industry News

May 28 2015

New Email Security Release Adds Graymail Protection, Performance Monitoring Enhancements, and More

Each day more than 100 billion corporate email messages are exchanged1. Who doesn’t need to do a little housekeeping and eliminate unwanted emails? But you need to think twice before you click on “unsubscribe.” As you likely read in the 2015  Cisco Annual Security Report , attackers are using applications users inherently trust or view as benign, like web browser add-ons, to distribute malware. One of the latest phishing techniques is graymail – directing the “unsubscribe” link at the bottom of a seemingly innocuous […]

May 27 2015

Chip Shot: Technology Tops Graduation Gift Wish Lists in ‘Her Campus’ Poll

With graduation season underway, Intel and Her Campus Media teamed up to survey more than 500 college women in an informal online poll to explore where technology ranks in their hearts. Technology devices (such as a laptop, tablet or smartphone) proved to be trusted companions, with nearly two-thirds (64 percent) of respondents stating that they are independent women and rely more on their tech than any best friend, boyfriend or super smart lab partner. Furthermore, 68 percent would rather forgo their daily dose of caffeine than accidentally leave their tech at home when heading to class. And one in five has new technology at the top of their graduation gift wish list, over a plane ticket or cash. Check out Intel’s Spring Product Guide for some of the best devices for the 2015 graduating class

May 27 2015

Understanding Logjam and Future-Proofing Your Infrastructure

On May 19th, 2015 a team of researchers (Henninger et. al) published a paper with the title “Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice”. The paper can be divided in two sections: 1) discrete logs on a 512-bit Diffie-Hellman (DH) group, and 2) a new attack against the Transport Layer Security (TLS) protocol. We’ll review both sections. The discrete logs on a 512-bit Diffie-Hellman group The researchers implemented a practical attack against the Diffie-Hellman protocol, when used with a key size of 512-bit. They also theorized on the complexity (time and […]

May 27 2015

Fortinet Unveils New FortiGuard Mobile Security Subscription Service to Protect Mobile Devices Across the Enterprise

Fortinet Unveils New FortiGuard Mobile Security Subscription Service to Protect Mobile Devices Across the Enterprise

May 27 2015

Fortinet Announces Agreement to Acquire Meru Networks

Fortinet Announces Agreement to Acquire Meru Networks