Aruba ESP Unifies IoT, IT, and OT Networks to Dynamically Adapt to Changing Environments and User Requirements

First Fully Programmable Platform to Unify IT, IoT and OT Networks with Zero Trust Security and AIOps Enables Organizations to Automate and Optimize Safety, Security, Reliability and Productivity

Aruba, a Hewlett Packard Enterprise company (NYSE: HPE), today announced significant enhancements to Aruba ESP (Edge Services Platform) that unifies IoT, IT, and Operational Technology (OT) networks to enable customers to quickly adapt to changing environments and user requirements. Aruba ESP is the first fully programmable platform to generate contextual information – about identity, location, security posture, and applications in use – to power efficient decision making and AIOps. Built to integrate with devices and applications from Aruba’s technology partners, customers can now become hyper-aware of their operating environment so they can quickly adapt to evolving business, visitor, and employee demands.

Today, “connected facilities” only provide device connectivity for subsets of control services, whereas hyper-aware facilities can leverage Aruba ESP-generated contextual data to dynamically adapt a facility to its occupants and operating environment. Unifying these IoT, IT, and OT networks under the Aruba ESP platform, and capturing rich context, enables hyper-aware facilities that are safer, more adaptive, and enhance productivity. That represents a quantum leap forward over what can be achieved by basic connectivity and machine learning-based monitoring.

These enhancements to the Aruba ESP cloud-native, AI-powered platform are integral to sensing, analyzing, and reacting to device data and contextual information. Aruba access points and switches now serve as multi-protocol IoT/OT platforms that interface with Aruba’s expanded technology partner ecosystem. Virtually every subsystem spanning machine inputs and outputs (I/O) on a manufacturing floor through multimedia devices in the CEO suite can be accommodated – from social distance monitors to gunshot detectors, rotating equipment monitors to guest wayfinding – with solutions tailored for education, enterprise, healthcare, hospitality, industrial, manufacturing, retail, transportation, and government applications.

Use cases with Aruba ESP-based hyper-awareness include smart buildings, industrial/manufacturing facilities and the broader Intelligent Edge:

Hyper-aware Smart Buildings for Enterprises, Education, Healthcare, Hospitality, Retail, and Government

  • Building Control and Digital Twin enablement – Using native AI capabilities to create real-time simulation models that change and learn in lock-step with the building, Aruba and technology partners like Microsoft with its Microsoft Azure IoT platform can create digital twins or software models to identify sub-optimized processes, recommend operational enhancements, and monitor the trajectory of energy usage needed for proactive interventions.
  • Context-aware, Real-time Integrated Emergency Response and Notification – During an incident, building occupants need real-time safety information pushed to their mobile devices and first responders need to continuously communicate with those in possible danger. Aruba ESP, with integrated solutions from technology partners like Critical Arc and Patrocinium, can actively communicate with tenants, visitors, and staff, and use unique 4D graphics for first responders to quickly see where people are situated within buildings.
  • Seamless Extension of the 5G Footprint with Wi-Fi – Aruba ESP allows mobile operators to extend their 5G footprint into the building and seamlessly power Wi-Fi calling while delivering gigabit-class guaranteed performance using Aruba Air Slice technology. This provides a seamless user experience and non-stop connectivity without the need for costly and complex distributed antenna systems.

For more context on these use cases, read the Designing hyper-aware smart buildings whitepaper.

Hyper-Aware Industrial Facilities

  • Migrating from Break/Fix to Proactive Maintenance – Proactively addressing maintenance issues minimizes downtime, and maximizes the utilization and performance of assets, reducing maintenance costs by up to 40%. Through deep integration with technology partner devices like ABB’s Ability Smart Sensor, Aruba ESP enables machinery sensors to monitor equipment like motor drives, valves, and pumps for abnormal behavior, to identify points of failure before they happen, improving productivity, reliability, and efficiency.          
  • Reducing Mean Time to Repair with Location Services – Navigating large industrial sites can be challenging, resulting in inefficiencies and safety issues. Native innovations from Aruba Meridian and Aruba ESP provides site occupants with turn-by-turn navigation to their destination without human assistance.    
  • Monitoring Personnel and Asset Safety – For environments with potentially explosive conditions, location-based safety systems are often mandated to safeguard employees and visitors. Aruba ESP, together with technology partner Mobilaris, can deliver real-time 3D situational awareness by tracking the location of people and assets, and can integrate with automated ventilation, geofencing, and vehicular navigation systems.                                

For more context on these use cases, read the Designing hyper-aware industrial facilities whitepaper.

To enable the automation needed to deliver these use cases at scale, Aruba AIOps uses AI and big data to continuously optimize, detect, isolate, and remediate network issues that impact reliability. As sources of IoT, IT, and OT data expand, it becomes increasingly difficult to isolate the source of problems or optimize the infrastructure. Aruba’s Cloud AI already combines telemetry data from over 65,000 customers and one million network devices, supplemented with 18 years of domain expertise to inform supervised learning. Aruba ESP produces AI-powered insights with greater than 95% accuracy to automatically improve communications and visibility across and among IoT, IT, and OT networks. Embedded within Aruba ESP’s unified infrastructure and zero trust security framework allows Aruba AIOps to transcend basic connectivity and simplistic machine learning-based monitoring. Aruba AIOps is a game changer for improved uptime and shortened repair times.

In addition to Unified Infrastructure and AIOps, ESP generates contextual data that make networks situationally aware for enterprise security. The Zero Trust Security framework ensures no user or IoT device is granted entry or ongoing access unless trustworthy. This framework uses AI and exchanges security and policy with more than 130 security technology vendors to obtain a deep understanding of each device and its role, allowing hyper-aware facilities to fold security activities into situational awareness.

“Machines, applications, and interfaces are typically tailored to each IoT, IT and OT vertical application, driving complexity in network management,” said Will Townsend, Senior Analyst, Moor Insights & Strategy. “I have analyzed Aruba ESP and believe its architectural platform based on a unified infrastructure, zero-trust security, and AIOps has the potential to reduce complexity and accelerate smart facility and hyper-awareness use cases both on-prem and in the cloud.”  

Additional information on Aruba’s technology partners can be found at https://www.arubanetworks.com/partners/programs/.

Fortinet’s Security Academy Program Increases Global Impact through Workforce Development

Security Academy Program Provides Academic Institutions and Nonprofits with Fortinet’s Network Security Expert (NSE) Training and Certification Curriculum to Bridge Gap Between Learning and Careers

Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, today announced more than 20 new academic institutions and nonprofits worldwide have recently joined Fortinet’s Security Academy Program to provide students, veterans and veteran families with advanced cybersecurity training and certifications. The expansion builds on the program’s momentum, which is available in more than 80 countries and is comprised of over 300 Authorized Security Academies.

“The cyber skills gap affects organizations worldwide and ultimately impacts the digital economy,” said Sandra Wheatley, SVP, Customer Marketing, Threat Intelligence and Influencer Communications at Fortinet.“This is why Fortinet heavily invests in training and education through our Corporate Social Responsibility efforts, including our NSE Training Institute programs. Through these programs we aim to create more cybersecurity career pathways and a diverse pipeline of security professionals.”

Closing the Skills Gap through Global Collaborations and NSE Training Institute

One way Fortinet is creating new opportunities in the digital economy is through global collaborations across sectors. Through its involvement as a founding member of the World Economic Forum’s (WEF) Centre for Cybersecurity and the Cyber Threat Alliance, Fortinet partners with global leaders, like Salesforce – the global leader in Customer Relationship Management (CRM), to further innovate and develop impactful global solutions for challenges such as the talent shortage.

The Fortinet Network Security Expert (NSE) Training Institute was established in 2015 to advance Fortinet’s Corporate Social Responsibility (CSR) initiatives to close the cybersecurity skills gap and make it easier for anyone to start a career in cybersecurity regardless of their previous access to education, background or life experiences. The NSE Training Institute is made up of the Security Academy Program, Certification Program and Veterans Program. Fortinet continues to grow the NSE Training Institute’s programs with recent milestones including:

  • The NSE Certification Program has issued more than 450,000 certifications worldwide, with more than 200,000 of certifications achieved in 2020.
  • In April 2020, Fortinet opened its entire catalogue of NSE self-paced security training courses, including pre-recorded labs, free of charge to the general public. The courses cover a range of topics – such as cloud security and secure SD-WAN – and total more than 350 hours of free training.
  • Fortinet was recognized by Military Times in its “Best for Vets: Employers” rankings for 2020 through the Veterans Program work. The Veterans Program connects military veterans and their spouses with potential employers.

Continued Learning Through the Security Academy Program

The Security Academy Program focuses on creating a diverse, equitable and inclusive pipeline of security professionals. The program does this by partnering with academic institutions and nonprofits worldwide. Through the Security Academy Program, institutions around the world have incorporated Fortinet’s NSE training and certification content into their students’ curriculum.

Military veteran-focused nonprofits joining the Security Academy Program provide their constituents with access to Fortinet’s NSE training and certifications, while the Veterans Program helps Veterans transfer relevant experiences to a career in cybersecurity.

Below are testimonials from academic institutions and nonprofits focused on serving veterans and their families that have recently joined the Security Academy Program.  

“The partnership with Fortinet has been remarkable and will provide a pathway for students to gain the knowledge and skills needed to compete in a rapidly growing global marketplace. Kennedy-King College has undertaken an equity and workforce-focused IT expansion initiative, with a goal to reduce the digital divide currently separating underserved and underrepresented populations from careers in the IT industry. After meeting with the Fortinet team and learning about the Security Academy Program, we knew the partnership would position us to better address this important equity imperative. We are both enthused and confident that Fortinet’s Security Academy Program will serve our students well and ultimately prepare them for high-skill, high-demand work in the IT sector.

-Eddie Phillips, Ed.D., Vice President of Academic and Student Affairs at City Colleges of Chicago, Kennedy-King College

“We were looking to add to our existing robust cybersecurity training curriculum. We joined the Security Academy Program right as the world started to shift to online learning due to the pandemic, so access to the NSE training’s established online curriculum that is instructor led or self-paced was especially beneficial. The path to NSE certifications is also helpful in providing students further validation to employers of their expertise that they can immediately use in the work place.”

– Steve Morrill, Director of Technology & Cyber Science at Loyola Blakefield

“In the face of mounting cybercriminal activity and increasingly sophisticated forms of attacks, companies are looking for cybersecurity professionals to defend against threats. Through the Fortinet Security Academy Program, students can expand and up their skill levels for a career in cybersecurity. This collaboration will help Seacom Skills University to assist in the global cause of creating a more educated workforce by helping our graduates to fill the skill gap in the industry.”

Anish Chakraborty, Chairman, Seacom Skills University

“Networks are a fundamental component of any modern organization’s information systems. The advancement of technology and digital innovations also implies an increase in threats and vulnerabilities. This is why at CIISA we feel that it is crucial to prepare our students to be capable of developing an advanced security posture for their future employers. Joining Fortinet’s Security Academy Program will further allow us to provide high-level training in the ICT area in Chile.”

– Sebastián Otazo Muñoz, Director of Networks, Telecommunications and Cybersecurity Area at CIISA

“The Autonomous University of Guerrero State in Mexico is committed to developing highly qualified IT professionals. We joined the Security Academy Program because it offers a great opportunity to train students on relevant skills for a career in cybersecurity, which is one of the most in-demand areas in IT. Students will have the opportunity to develop hand-on practices through virtual labs to acquire cybersecurity skills that will make them more confident and stand out.”

-Felix Angel, Engineering Faculty at Universidad de Autonoma Guerrero 

“Companies of all sizes and from both private and public sectors need cybersecurity professionals. The need for security professionals will continue to grow and we want to make sure our students acquire the knowledge they need to be successful in their future careers. Fortinet’s Security Academy Program will further help us build our cybersecurity curriculum to set our students up for success to enter the work force.”

– Diego Bolatti, Director of Information Labs at UTN Regional Faculty Resistencia

“Cybersecurity training is more important than ever as the skill gap has become a critical issue for many organizations. Bennett University has signed up with Fortinet Security Academy program to help build and augment skill sets, as well as help develop the next generation of security professionals. By providing this industry recognized certification as part of our curriculum we will ensure that our students gain the required expertise to become part of an elite group of skilled security professionals for whom we are witnessing a great demand.”

– Dr. Deepak Garg, Professor and Head, Department of Computer Science Engineering CSE at Bennett University

“We have noted an increase in employers seeking to hire employees with relevant cybersecurity qualifications. As such, the collaboration with Fortinet will further assist us in equipping our students with in-demand cybersecurity skills employers seek. We look forward to numerous students benefiting annually from the Security Academy Program training resources, leading to them joining the workforce and filling critical cybersecurity roles in Kenya.”

-Dr. Joseph Sevilla, Director of the @iLabAfrica Research Centre at Strathmore University

“Seneca College strives to prepare our students for the workforce and the Security Academy Program was a great way to teach them key competencies associated with network security. Fortinet is at the forefront of this field and our students will benefit immensely from training in this space. We have deployed virtual firewalls and created a robust virtual lab curriculum that integrates many aspects of the Security Academy Program in tandem with other security concepts tied to the Security+ certification. It is our hope that students will continue their learning and get certified in both of these areas after they graduate. Students will gain a broad understanding of security awareness and be able to configure and maintain the Fortinet brand of firewalls, which will prepare them for work in the IT security field.”

– Peter Moscone, Program Coordinator at Seneca College of Applied Arts & Technology

“Through our partnership with Fortinet as part of the Security Academy Program, O2O will further be able to expand O2O’s resources for those looking to enter the cybersecurity industry. Access to Fortinet’s Network Security Expert (NSE) training courses and certifications is an exciting and important step forward in equipping our students with even more resources to succeed in growing and in-demand careers. We are proud to work with Fortinet to advance employment opportunities for veterans, service members and their families.”

– Michael Bianchi, IVMF Senior Director for Education & Career Training at Onward to Opportunity

“With a growing global demand for qualified cybersecurity professionals, our partnership with Fortinet provides innovative new pathways for veterans and their families to gain new skills. The collaboration between Soldier On and Fortinet will enable over 3,000 veterans and family members currently supported by the Soldier On Pathways Program to be connected with new digital learning opportunities in high-demand areas like cybersecurity, giving them more avenues into employment.”

Ivan Slavich, Chief Executive Officer at Soldier On

“Fortinet’s Security Academy Program grants access to the NSE training and certifications, providing military spouses with an opportunity to obtain valuable skills in a high-demand career field. Blue Star Families ensures that wherever American military families go, they can always feel connected, supported and empowered to thrive.  Within a month of launching our new partnership with Fortinet, over 60 Blue Star Families military spouses have expressed interest in pursuing the Fortinet cybersecurity training and we anticipate many more will take advantage of the program as they look for careers in the field.”

Denise Hollywood, Chief Community & Programs Officer at Blue Star Families

Pershing goes from strength to strength with the delivery of the second Pershing 140 unit

The perfect combination of innovation, unique style and forward thinking, the brand flagship continues its growing commercial success

Powerful and spectacular, the uniquely electrifying cruising experience offered by Pershing continues to captivate enthusiasts with an amazing blend of design and technology. Last July saw the delivery of the second Pershing 140 unit, the brand’s first all-aluminium flagship and a milestone that ushers in a new era for yacht construction. 

A product of collaboration between naval architect Fulvio De Simoni, the Ferretti Group Product Strategy Committee led by Piero Ferrari and the Group’s Engineering Department, Pershing 140 is the brand’s first model built at Ferretti’s Ancona Super Yacht Yard, which specialises in the construction of steel and aluminium super and mega yachts over 40 meters in length.

The design of the exteriors, laid out over two decks and a spacious sun deck, confirms the sleek lines that are emblematic of the brand’s sporty and competitive character, combining design innovations with some of the brand’s most iconic details, such as the two lateral wings integrated into the superstructure and then connected at the start of the walkways to the gunwale. Other standout features include the raised cockpit with direct access to the sun deck, the private owner’s area on the main deck, and a beach area that can be extended by opening the three fold-out sides.

Unlike the first unit, which was fitted out at the owner’s request with an entertainment room, this unit has a full-beam private master suite with double bed, entered through the owner’s studio and small lounge. The layout is completed by a roomy walk-in wardrobe and a big bathroom.

The interior design can be fully customised with the support of the designers at Studio Fulvio De Simoni and the Project Architects on hand at the Ferretti Group Super Yacht Yard. The yacht also features the finest materials and furniture produced by top luxury designers, including longtime Pershing partner Poltrona Frau, Minotti, Artemide, Roche Bobois, Molteni and Fontana Arte. 

The second Pershing 140 unit will be on show at the Ferretti Group Private Preview, the exclusive annual event held at the Monaco Yacht Club from September 3 to 6 this year, where a group of selected guests and customers will have the chance to admire firsthand an engineering masterpiece that is arousing growing interest among owners around the world. Underscoring the model’s success, the third unit is now under construction at the Ancona Super Yacht Yard and will be launched next year.

Pushing Boundaries – BERING 145

Edited by Shereen Shabnam

Recently I had a few yacht enthusiasts from Fiji and New Zealand asking me about custom built yachts from different parts of the world and while sending them a few options, I came across Bering Yachts after hearing about them briefly some years ago at the Istanbul Boat Show.

As yacht builders, the team at Bering cover all phases of the building process, from concept, design, engineering, and construction. They recently announced the sale of a Bering 145 for delivery in January 2022. The Bering 145 is a full-custom 45-meter superyacht designed by Bering Yachts’ in-house team of naval architects and engineers.

Now under construction, this transoceanic model combines elegance, speed, and the latest technology and represents Bering Yachts’ largest build to-date. It has a full displacement steel hull of 514 metric tons.

Alexey Mikhailov, President and Chairman of Bering Yachts mentions that Bering 145is the culmination of their customer’s many years of yacht-owning experience combined with Bering Yachts’ technical know-how.

“This extraordinary yacht is really pushing boundaries of latest propulsion technologies and is offering a phenomenally economic and up-scaleable solution to long-range global cruising. We are immensely proud to have the Bering 145 as a ground breaking new flagship for Bering Yachts,” he adds.

The Bering 145’s hybrid propulsion system drives the propellers with electric motors charged by a bank of batteries. The battery banks are recharged by high-efficiency, variable speed DC generators. Docking and mooring is possible in electric mode.

Capable of taking on the most extreme cruising itinerary the range in hybrid mode is more than 12,000 miles at a cruising speed of 9 knots. And with her enormous 95,600 liters (25,265 gallons) fuel capacityshe can travel more than 4,500 nautical miles under conventional power at a minimum cruising speed of 8 knots. The maximum speed of the vessel is 15 knots.

The Bering 145 features an extremely functional six-stateroom layout on a 9.7-meter (31 foot) beam. The master stateroom is located on the main deck toward the bow with glass windows measuring more than 9.5 square meters. The five guest staterooms are located on the lower deck. 

Accommodation is provided for a total crew capacity of 12 with the Captain’s cabin behind the wheelhouse. The main deck houses a huge saloon with a dining area for 12 and a light, enlarged-window, full-beam lounge area. A second dining area is on the upper deck sky lounge. 

A key feature for the Owner was Bering 145’s vast deck spaces with a spacious beach club aft providing 40 square meters of outdoor relaxing and entertainment space. On the flybridge is a SPA zone, bar, and gas grill, among several luxurious amenities.

The lower deck provides generous storage for water toys with tenders placed on the upper deck. Bering 145 is clearly designed with an emphasis on both serious cruising capability and owner and guest enjoyment, relaxation, and entertainment.

Batelco Partners with SonicWall to Launch Integrated Security Solutions for SMEs

Batelco, the leading digital solutions provider in the Kingdom of Bahrain, has announced its exclusive service provider partnership with SonicWall to provide SMEs (Small and Medium Enterprises) with comprehensive security solutions to enhance cyber-security for their customer base. The strategic partnership with SonicWall is in line with Batelco’s on-going commitment to provide its SMEs with the latest tools and technologies designed to secure their businesses and enhance their performance.

Partnering with SonicWall, a trusted security partner protecting more than 1 million networks worldwide, allows Batelco to provide a full range of network security solutions to its SME customers, including next generation firewalls, secure switching, secure wireless, endpoint protection and cloud security and a number of integrated and innovative digital solutions to boost cyber-security among its small and medium enterprise clientele base.

Commenting on the partnership, Batelco General Manager Abderrahmane Mounir said, “It is our great pleasure to partner with SonicWall, a globally recognized leader in providing integrated security solutions to small and medium enterprises. Security is a critical component in the success of this segment, and we pride ourselves on being able to provide our customers with an affordable and comprehensive, one-stop solution comprised of the latest technological tools that would facilitate and simplify the processes and procedures required to boost SME performance.”

“We recognized the need for digital security solutions for this segment and noted how much this need had increased recently as SMEs have become more dependent on digital solutions. Having access to reliable security solutions is considered crucial for business continuity, therefore we were very keen to partner with a trusted global security provider such as SonicWall to deliver solutions to our valued clients,” he added.

SonicWall Vice President, Global MSSP & Carrier Sales, Luca Taglioretti said, “There is no organization that is too small for the wandering eye and determination of cybercriminals. It’s imperative to work closely with security providers to gain a clear and real-time picture of security risks and the impact they could potentially pose to their organization.”

“As a result of our partnership, Batelco’s customers will be armed with enterprise-grade SonicWall TZ Series next-generation firewalls with installation and managed security services,” he added.

Supported by Batelco’s managed security services, customers are fully supported by a skilled team of certified security professionals capable of delivering operational protection to the customers’ network and infrastructure around the clock.

Additionally, as part of the exclusive partnership with SonicWall, Batelco will host a number of digital webinars over the upcoming months to familiarize users with the different offerings of SonicWall’s integrated network security solutions, designed to reduce the operational risks faced by SMBs in Bahrain. To get further details of this service, contact your account manager or email ecc@btc.com.bh or call 17881144.

R&M Launches PRIME Ribbon Solution to Enable 40% More Fibers in Data Center Racks

R&M puts ribbon fiber cables in main distribution frames for carriers and data centers

R&M, the global Swiss developer and provider of connectivity systems for high-quality, high-performance network infrastructures, today launched its new PRIME Ribbon distribution module in the Middle East. The slide-in module for the fiber optic distributor rack PRIME connects ribbon fiber cables with the flexible and proven PRIME program. With this type of cable, the number of optical fibers in a rack can be increased by 30% to 40%.

In comparison to single fiber cables, ribbon fiber cables offer several advantages. They enable a higher number of fibers with the same cable diameter as well as the splicing of 8 or 12 fibers in one working step. With this technology, three to four times more fibers can be laid in a conduit or rack than usual.

The PRIME ribbon distribution modules from R&M occupy a 3/4 height unit in a 19″ rack. Their capacity is 96 fibers. In addition to the splice patch variant with LC duplex or SC couplings, R&M offers a pure splice variant for 288 splices.

The PRIME ribbon distribution modules are suitable for fiber to the home projects in combination with the PRIME racks. They are used for network expansion in central offices, POPs and street cabinets. Data centers use them to consolidate the fiber optic cabling of meet-me rooms and zone distributors. Campus networks and backbones in large buildings are also among the areas of application.

Fly safe with Keyvan Aviation’s Antibacterial Uniform for Airlines Crew

As borders slowly open and airlines start to fly and take to the skies once again, it is important that crew members feel reassured and confident about their health when flying and performing their duty onboard an aircraft.

By using Hazmat suits or medical gowns on top of the uniforms, Airlines will hide their culture and the colors; and they will spend plenty of money which will be wasted and thrown out at the end of the day. Thinking about sustainability and keeping cost under control as well as having a nice and elegant look for flight crew is a big advantage of the Keyvan design and final product.

Keyvan Aviation offers Airlines Crew Antibacterial Uniform to all Flight and Ground crew which will bring higher level of the safety against bacteria and viruses and keep the Airlines beauty and cultures together while saving the operational cost for Airlines.

Having skin friendly, comfort advantages, and using natural material and recyscable as well as using antibacterial and antiviral finishing on the product made it a useful costume to keep crew member safer. Ability to wash and use during a reasonable life cycle of a normal uniform is a big cost effective benefit for airlines.

Using a silver ion technology enables Keyvan Aviation offers a better protection for body against electromagnetic shielding effect during their duty, as well. They use a new technology and combine them with fashion ideas to keep Airlines crew safe and offer a pleasant flight to passengers by maintaining the highest levels of safety in their product.

Global Report: More than 90% of Business Leaders Say Cloud is a Business Priority in the COVID-19 Shutdown

1,077 respondents across 9 countries are relying more on cloud technologies and seeing more cybersecurity attacks, according to Zogby Analytics Research    

Infoblox Inc., the leader in Secure Cloud-Managed Network Services, and Zogby Analytics unveil research into the ongoing IT challenges posed by the COVID-19 shutdown. Half a year into the shutdown, companies are still playing catch up to optimize their remote work experience. Based on 1,077 responses from the US, the UK, Germany, the Netherlands, Spain, China, Japan, Australia, and Singapore, key survey findings show that: 

  • The borderless enterprise is here to stay. More than 90% of decision-makers consider digital transformation and cloud-managed services a priority. The percentage of companies with a majority of employees working remotely more than tripled from 21% before the shutdown to 70% after. 40% of companies, twice the pre-COVID-19 rate, are permanently keeping a majority of workers remote.
  • Organizations are still building out their IT infrastructure and security controls to optimize remote work. Organizations say distributing sanctioned devices (35%), building network infrastructure (35%), and securing the network (29%) are top IT challenges when transitioning to remote work. 
  • Threat mitigation and network visibility remain the top security concerns for the remote work environment. 68% say better threat detection and or mitigation technologies would enable more remote work for their organizations. Specifically, respondents are looking for better visibility into devices on the corporate network (65%), cloud applications workers are using (61%), and compromised devices (46%). 
  • Security incidents are rising. Half of the surveyed businesses are seeing more cyber-attacks—with the biggest jumps in China and Australia—while just a quarter are seeing fewer.
  • Companies are reversing policies to allow the use of personal applications to foster collaboration. 63% of companies are allowing workers to connect with each other using applications like WhatsApp, Zoom, and Houseparty. 
  • Companies are using cloud security tools, particularly from the DDI family (DNS, DHCP, IP Address Management), to secure the borderless enterprise. 59% of companies plan on making additional investments in DNS to secure their expanded networks.

“When the COVID-19 shutdown started, organizations rushed to enable remote work overnight,” said Kanaiya Vasani, Executive Vice President, Products and Corporate Development at Infoblox. “Their top priority was making sure workers could connect to enterprise applications from their homes—sometimes through unsecured personal devices.”

“While most organizations can now accommodate the basics of remote work, this report highlights the need for more security controls,” Vasani added. “To meet that need, a majority of surveyed companies are turning to DNS to rapidly stand up a foundational layer of security for employees working from home. “Using a hybrid DNS security solution like BloxOne Threat Defense, enterprises can create a ubiquitous layer of visibility and security across their expanded infrastructure.”

Fortinet Research Demonstrates Enterprises Must Adapt to Address Telework Security Challenges Long-term

“The COVID-19 pandemic will have lasting effects on how organizations invest in cybersecurity. In fact, over 90% of enterprises plan to invest more to secure telework over the next two years. Given a dramatically expanded digital attack surface, thewaves of cyber threats targeting remote workers, and the ongoing cyber skills gap, organizations need to carefully consider what technologies and approaches are needed to secure their telework strategies long-term,” said John Maddison, EVP of Products and CMO at Fortinet. “They have an opportunity to maximize their investments with cybersecurity platforms designed to provide comprehensive visibility and protection across the entire digital infrastructure, including networked, application, multi-cloud, and mobile environments. This ongoing shift to remote work will also require more than just technology; cybersecurity training and awareness should also remain key priorities.”

The Sudden Shift to Telework Was Challenging for Most Organizations

  • As the COVID-19 pandemic spread rapidly in the first half of 2020, many organizations were required to shift to telework practically overnight as teams around the globe were asked to stay home. Nearly two-thirds of the firms surveyed had to rapidly transition over half of their workforce to telework. In addition, most respondents said the rapid change presented a challenge to their organization, with 83% citing it as moderately, very, or extremely challenging. Only 3% were not at all challenged.
  • In addition, the evolving remote work environment, increased reliance on personal device usage, and overall influx of workers outside the corporate network opened an opportunity for unprecedented cyber threat activity. From opportunistic phishers to scheming nation-state actors, cyber adversaries found multiple ways to exploit the global pandemic for their benefit at enormous scale as evidenced by a recent FortiGuard Labs Global Threat Landscape Report. Threats included phishing and business email compromise schemes, nation-state backed campaigns, and ransomware attacks. In fact, 60% of organizations revealed an increase in cybersecurity breach attempts during the transition to remote work, while 34% reported actual breaches in their networks.
  • With a spike in employees remotely connecting to the corporate network, an increase in breach attempts and overall cyber attacks, organizations cited the most challenging aspects of this transition as ensuring secure connections, business continuity, and access to business-critical applications.
  • At the time of the survey enterprises had already invested in key technologies as a result of the pandemic. Nearly half of organizations invested further in VPN and cloud security, while nearly 40% invested further in skilled IT professionals or network access control (NAC).

There is Still Room for Improvement: Almost All Enterprises Will Invest More in Secure Telework

Given the number of attempted breaches and overall waves of cyber threats targeting remote workers, organizations need to carefully consider what technologies and approaches are needed to secure telework moving forward. Defense strategies need to be adjusted to fully account for the extension of the network perimeter into the home.

  • As of June this year, a long-term shift to telework is anticipated, with nearly 30% of organizations expecting more than half of their employees to continue working remotely full time after the pandemic.
  • Almost all organizations expect to invest more to secure telework long-term, with nearly 60% of enterprises spending more than $250,000 in secure telework investments in the next 24 months.
  • Moving forward, the majority of enterprises surveyed intend to make unplanned upgrades to their existing systems to secure telework. Many also plan to add new technologies not previously in place.
  • Only 40% of organizations had a business continuity plan in place prior to the pandemic. Yet, as a result of the pandemic and the rapid shift to remote work, 32% invested further in this area.

While organizations have made improvements in securing their remote workforces since the beginning of the pandemic, survey data reveals several areas that could be considered opportunities for improving secure remote connectivity. These areas include:

  • Multi-factor Authentication (MFA) – The survey revealed that 65% of organizations had VPN solutions in place pre-pandemic, but only 37% of organizations had multi-factor authentication (MFA). While VPNs play an important role in ensuring secure connectivity, they are simply one part of securing access. Therefore, if not already in place, it is recommended that organizations consider integrating MFA into their remote security plans.

  • Endpoint Security and Network Access Control (NAC) – 76% and 72% of organizations plan to either upgrade or adopt NAC or endpoint detection and response (EDR) solutions respectively. As employees work remotely, organizations face challenges to control the influx of non-trusted devices on their networks to enable remote work, creating new security challenges overnight. By adopting NAC solutions, IT teams get increased visibility and control over the users and devices on their network. EDR solutions deliver advanced, real-time threat protection for endpoints both pre- and post-infection.
  • Software-defined Wide-area Networking (SD-WAN) for the Home: 64% of organizations plan to either upgrade or adopt SD-WAN, but specifically for the home office. The critical advantage of extending secure SD-WAN functionality to individual teleworkers, especially super users, is that they can enjoy on-demand remote access as well as dynamically scalable performance regardless of their local network availability.

  • Secure Access Service Edge (SASE) – 17% of organizations made investments in SASE prior to the pandemic, and 16% invested in SASE as a result of the pandemic. Still, 58% plan to invest in SASE to some degree going forward. Although SASE is an emerging enterprise strategy, it is increasingly seen as an opportunity to combine network and security functions with WAN capabilities to support the dynamic, secure access needs of today’s organizations.
  • Skilled Security Professionals – At the start of the pandemic, only 55% of organizations had enough skilled IT workers in place to support the shift to remote work. And while 73% of organizations stated their intention to invest further in skilled IT workers in the next 24 months, the historical lack of skilled IT security professionals could present a challenge.

FortiGuard Labs Reports Cyber Adversaries Are Exploiting the Global Pandemic at Enormous Scale

“The first six months of 2020 witnessed an unprecedented cyber threat landscape. The dramatic scale and rapid evolution of attack methods demonstrate the nimbleness of adversaries to quickly shift their strategies to maximize the current events centered around the COVID-19 pandemic across the globe,” says Derek Manky, Chief, Security Insights & Global Threat Alliances, FortiGuard Labs. There has never been a clearer picture than now, of why organizations need to adjust their defense strategies going forward to fully take into account the network perimeter extending into the home. It is critical for organizations to take measures to protect their remote workers and help them secure their devices and home networks for the long term. It is also wise to consider adopting the same strategy for cyber viruses that we are adopting in the real world. Cyber social distancing is all about recognizing risks and keeping our distance.”

Seizing the Opportunity in Global Events: Attackers have used subjects in the news as social engineering lures before, but this moved to the next level in the first half of 2020. From opportunistic phishers to scheming nation-state actors, cyber adversaries found multiple ways to exploit the global pandemic for their benefit at enormous scale. This included phishing and business email compromise schemes, nation-state-backed campaigns and ransomware attacks. They worked to maximize the global nature of a pandemic that affected everyone around the world combined with an immediately expanded digital attack surface. These trends were seen with other newsworthy items and demonstrate how quickly attackers can move to take advantage of major developments with broad social impact at a global level.

The Perimeter Gets More Personal: The increase in remote work created a dramatic inverse of corporate networks almost overnight, which cyber adversaries immediately started to leverage as an opportunity. In the first half of 2020, exploit attempts against several consumer-grade routers and IoT devices were at the top of the list for IPS detections. In addition, Mirai and Gh0st dominated the most prevalent botnet detections, driven by an apparent growing interest of attackers targeting old and new vulnerabilities in IoT products. These trends are noteworthy because it demonstrates how the network perimeter has extended to the home with cybercriminals seeking to gain a foothold in enterprise networks by exploiting devices that remote workers might use to connect to their organizations’ networks.

Browsers Are Targets Too: For attackers the shift to remote work was an unprecedented opportunity to target unsuspecting individuals in multiple ways. For example, web-based malware used in phishing campaigns and other scams outranked the more traditional email delivery vector earlier this year. In fact, a malware family that includes all variants of web-based phishing lures and scams ranked at the top for malware in January and February and only dropped out of the top five in June. This may demonstrate the attempt of cybercriminals to target their attacks when individuals are the most vulnerable and gullible—browsing the web at home. Web browsers, not just devices, are also prime targets for cybercriminals, perhaps more than usual, as cybercriminals continue to target remote workers.

Ransomware Not Running Away: Well-known threats such as ransomware have not diminished during the last six months. COVID-19-themed messages and attachments were used as lures in a number of different ransomware campaigns. Other ransomware was discovered rewriting the computer’s master boot record (MBR) before encrypting the data. In addition, there was an increase in ransomware incidents where adversaries not only locked a victim organization’s data but stole it as well and used the threat of widescale release as additional leverage to try and extort a ransom payment. The trend significantly heightens the risks of organizations losing invaluable information or other sensitive data in future ransomware attacks. Globally, no industry was spared from ransomware activity and data shows that the five most heavily targeted sectors for ransomware attacks are telco, MSSPs, education, government, and technology. Unfortunately, the rise of ransomware being sold as a service (RaaS) and the evolution of certain variants indicates that the situation with ransomware is not going away.

OT Threats After Stuxnet: June marked the 10th anniversary of Stuxnet, which was instrumental in the evolution of threats to, and security of, operational technology. Now, many years later, OT networks remain a target for cyber adversaries. The EKANS ransomware from earlier this year shows how adversaries continue to broaden the focus of ransomware attacks to include OT environments. Also, the Ramsay espionage framework, designed for the collection and exfiltration of sensitive files within air-gapped or highly restricted networks, is an example of threat actors looking for fresh ways to infiltrate these types of networks. The prevalence of threats targeting supervisory control and data acquisition (SCADA) systems and other types of industrial control systems (ICS) is less in volume than those affecting IT, but that does not diminish the importance of this trend.

Mapping Exploitation Trends: A review of the CVE List shows the number of published vulnerabilities added has risen over the last few years, sparking discussion over the prioritization of patching. Even though 2020 looks to be on pace to break the number of published vulnerabilities in a single year, vulnerabilities from this year also have the lowest rate of exploitation ever recorded in the 20-year history of the CVE List. Meanwhile, vulnerabilities from 2018 claimed the highest exploitation prevalence at 65%, and more than a quarter of organizations registered attempts to exploit 15-year-old CVEs. For cyber adversaries, exploit development at scale and distribution via legitimate and malicious hacking tools continues to take time.

The Urgency to Secure the Network Perimeter Extending Into the Home

With the increase in connectivity, devices, and ongoing need for remote work, the digital attack surface is expanding. With the corporate network perimeter extending to the home, attackers are looking for the weakest link and fresh attack opportunities. Organizations need to prepare by taking concrete steps to protect their users, devices and information in ways similar to the corporate network. Threat intelligence and research organizations can help by providing broad insight as the threat landscape evolves as well as in-depth analysis of attack methods, actors, and new tactics to help supplement the cyber knowledge of organizations. The need for secure teleworker solutions to enable secure access to critical resources while scaling to meet the demands of the entire workforce has never been greater. Only a cybersecurity platform designed to provide comprehensive visibility and protection across the entire digital attack surface–including networked, application, multi-cloud, or mobile environments–is able to secure today’s rapidly evolving networks.

Report Overview
This latest Global Threat Threat Landscape Report is a view representing the collective intelligence of FortiGuard Labs, drawn from Fortinet’s vast array of sensors collecting billions of threat events observed around the world during the first half of 2020. It covers global and regional perspectives as well as research into three central and complementary aspects of that landscape: exploits, malware, and botnets.