Thursday, February 17, 2011

Fortinet Launches Powerful Operating System Upgrades That Extend Wireless Networking and Integrated Security for Wired and Wireless Networks

SUNNYVALE, CA, Feb 14, 2011 (MARKETWIRE via COMTEX) --
Fortinet(R) (FTNT) -- a leading network security provider
and the worldwide leader of unified threat management (UTM) solutions
-- today announced a new release of its FortiOS(TM) 4.0 operating
system for the FortiGate product family, including today's newly
introduced FortiGate-3140B multi-threat security appliance. Fortinet
will showcase these and other products at the RSA Conference in Booth
#923 at the Moscone Center in San Francisco from February 14-18.
(editors note:Please see today's announcement regarding Fortinet's
launch of the FortiGate-3140B security appliance.)



The broad advancements offered in the FortiOS 4.0 MR3 operating
system introduce wireless controller extensions that support
automatic provisioning of wireless access points, detection and
suppression of rogue access points, multiple authentication methods
and strengthened unified management of both wired and wireless
networks from a single FortiGate platform. The upgrade also
introduces active profiling and flow-based threat inspection
enhancements to the robust OS that already integrates firewall,
virtual private network (VPN), intrusion prevention (IPS), antivirus,
application control and many other security technologies.


Expanded Wireless Options
With the release of FortiOS 4.0 MR3,
powerful new security features and performance enhancements are now
available for FortiGate consolidated security appliances. The
advanced FortiOS operating system expands the wireless controller
capabilities of any FortiGate running FortiOS 4.0 MR3. These
capabilities improve security by enabling role-based access control
to limit access to regulated, proprietary, or confidential data based
upon a user's role, as well as allowing customers to meet wireless
PCI DSS compliance with improved rogue AP on-wire detection and
suppression and integrated management and reporting for both wireless
connectivity and security.


As a complement to this firmware feature, Fortinet is also
introducing the FortiAP-222B outdoor wireless access point (AP),
which completes the FortiAP family of access points and allows
enterprise-wide wifi coverage across the campus with seamless
roaming. The FortiAP-222B is a high power dual-radio outdoor thin AP
that provides wireless client access or air monitor in a ruggedized
weather-resistant enclosure. This device will benefit enterprises
looking to extend their wireless network to challenging
non-temperature controlled environments, or beyond the physical
footprint of a building or campus. The simple-to-manage-and-deploy
FortiAP-222B uses an industry leading high gain 27dB transmit output
and highly sensitive receiver which permits coverage to a vast area.


FortiOS Inspection Enhancements
The advanced FortiOS operating
system features active profiling that provides the ability to use a
form of behavioral analysis to create and actively enforce policies
based on deviations from corporate, group or individual baseline
profiles. A range of policy enforcement options is available for
suspicious behavior, including monitoring, quarantining and/or
outright blocking.

Exchange Server in a Box?

The continued success of the Apple iPad at eating into the laptop market has had me thinking about appliances—not the kind you find in your kitchen, but the kind that vendors such as Barracuda Networks and Azaleos sell. These appliances (for those of you who have been locked in a concrete bunker for the past few years) are essentially single-purpose servers that you install to provide a specific function on your network. The function, and hardware configuration, varies from vendor to vendor, but the basic idea is to deliver a service that requires a minimum of effort from the system administrator. The vast majority of appliances sold into the market are highly specialized. For example, if you're using a conventional hardware firewall, that's an appliance. So is the wireless router you have at home. So is your TiVo.


The whole idea of appliances seems like it would conflict with the direction that Microsoft Exchange Server (and now Lync) have taken: increasingly flexible, and complex, roles that can be combined or split onto separate machines. The idea behind appliances is to increase simplicity by clever packaging and configuration, and sometimes by adding vendor-specific utilities or customizations. For example, Barracuda's line of messaging-related products is based on open-source tools that Barracuda has extended and customized; Barracuda has added value to tools you could get for free by making them easier to configure and use, and by adding unique features.


Exchange Server has been largely immune to the appliance trend. Some functional areas, such as antispam and antivirus, have been successfully appliance-ized (a word I just made up) but Exchange itself hasn't. There are a number of reasons for this. The biggest reason is probably the simple fact that Exchange is designed to integrate with Active Directory (AD), Microsoft Outlook, SharePoint, and Office Communications Server (OCS)/Lync. This integration means you can't just stick a self-contained Exchange server into a rack and call it good—and as soon as you have to start integrating something with AD and other infrastructure components, you lose many of the theoretical time- and cost-savings that appliances offer.


Another reason is that Exchange designs aren't one-size-fits-all. For example, I have a customer with about 500 mailboxes that are geographically distributed between London and New York. This company has invested heavily in high availability. I have another customer of similar size whose users are all located in one building; their investments have been very different. Exchange works well for both customers—and many more besides—because of its flexibility. To some extent, flexibility is antithetical to the idea of a single-function appliance that does one thing easily and well.


Of course, another reason we haven't seen Exchange appliances is the advent of cloud-based services. Microsoft has invested heavily in designing Exchange 2010 so that the same code could run both locally and in the cloud, and cloud-based services—at least in theory—offer many of the same potential advantages as appliances: ease of installation, ease of use, and reduced maintenance costs.


Against this background, the recent announcement by HP of its new E5000 line of packaged Exchange solutions is particularly interesting. HP will be announcing more details of its new solutions soon, and I'll have more to say about them when that happens.

Global Unified Threat Management 2008-2012 - a new market research

(live-PR.com) - Reportlinker.com announces that a new market research report related to the Security Systems industry is available in its catalogue.

More information regarding this report:Global Unified Threat Management 2008-2012

http://www.reportlinker.com/p0240410/Global-Unified-Threat-Management-2008-2012.html#utm_source=LivePR&utm_medium=pr&utm_campaign=LivePR




Unified Threat

 



Management (UTM) appliance integrates devices such as firewall, Virtual Private Network (VPN), intrusion detection and prevention, and gateway into a single platform for threat management. UTM is a single system, handling duties of multiple systems such as guarding against intrusion, filtering content & spam, and performing anti-virus duties. Also, these appliances include security management or policy management.

Many enterprises are adopting UTM appliances to consolidate their network security, reduce cost and improve security management. Moreover, UTM appliances are increasingly preferred as these can add new capabilities with single hardware upgrade; thus, accommodating future scalability.

The UTM market is expected to grow across enterprises with increasing demand for addition of new features such as content security (Web and messaging). These UTM Appliances provide different security applications through dedicated appliances. The UTM Appliance vendors are focusing on the threat mitigation features and design hardware which includes anti-virus, anti-malware, content filtering, and traffic analysis.

The report by TechNavio Insights forecasts the size of the UTM market over the period 2008-2012. Further, it discusses the key market trends, drivers and challenges of UTM market, and profiles some of the key vendors of this market.

(rlk1-2011-02-16) plp



1. Introduction


2. Global UTM Appliance Market

3. Market Segmentation by Geography

3.1 UTM Market in Americas

3.2 UTM Market in EMEA

3.3 UTM Market in APAC

4. Market Trends

5. Sales Drivers

6. Challenges

7. Major Vendor Profiles


7.1 Checkpoint

7.2 Crossbeam

7.3 Fortinet

7.4 Juniper Networks

7.5 SonicWALL

Other Reports in this Series



List of Exhibits

Exhibit 2.1: Global UTM Market in USD millions (2008-2012)


Exhibit 3.1: Market Segmentation of UTM by Geography (2008)

Exhibit 3.2: UTM in Americas - Market Size and Forecast 2008-2012 (in $ billion)

Exhibit 3.3: UTM in EMEA - Market Size and Forecast 2008-2012 (in $ billion)

Exhibit 3.4: UTM in APAC - Market Size and Forecast 2008-2012 (in $ million)















Disclaimer: (c) 2011 Reportlinker. All of the reports and press releases contained herein are protected by copyright and other applicable laws, treaties and conventions. Information contained in the releases is furnished by Reportlinker's, who warrant that they are solely responsible for the content, accuracy and originality of the information contained therein. All reproduction, other than for an individual user's personal reference, is prohibited without prior written permission.


Roaring Penguin Adds Granularity to the CanIt Reputation List

Roaring Penguin Software upgrades their CanIt IP Reputation list. The CanIt IP Reputation list is a key component of the CanIt family of anti-spam solutions for ISPs, Web Hosts, Universities, and Managed Services Providers.


Ottawa, ON -- (SBWIRE) -- 02/09/2011 -- Roaring Penguin Software's CanIt Reputation List collects IP reputation data on e-mail servers fr1om a worldwide network of sensors. Roaring Penguin currently aggregates this data into four DNS-based block lists:




Spam Source: A list of IP addresses that have sent mostly spam and very little non-spam.



Dictionary Attackers: A list of IP addresses that have sent to many nonexistent recipients and very few valid recipients.



Greylist Stumblers: A list of IP addresses that have been thwarted by greylisting. Such machines are typically compromised personal computers.



Good: A list of IP addresses that have passed greylisting, have sent to very few nonexistent recipients, and have sent mostly non-spam. These machines are very likely legitimate mail servers.



To these block lists Roaring Penguin has added a new list called "Mixed" for hosts that send a mixture of spam and non-spam.



Roaring Penguin found that the old "SpamSource" list would often list outbound mail servers for large e?mail providers. These servers tend to send a lot of spam, but they also send a lot of non-spam e-mail.




The change to Roaring Penguin's Reputation Lists means that about 5600 machines formerly listed on the "SpamSource" list are now listed on "Mixed". This still leaves almost 1.9 million machines listed on the "SpamSource" e-mail reputation list.



CanIt 8.0 is available as:



CanIt-PRO, an anti-spam / anti-virus appliance or a soft appliance.

CanIt-Domain-PRO, spam filtering software that allows service providers such as MSPs to host anti-spam for their customers.

Hosted CanIt, a fully outsourced anti-spam solution.



About Roaring Penguin

Founded in 1999, Roaring Penguin Software Inc., specializes in developing spam email blockers The company focuses on fighting spam at the mail server, with the acclaimed CanIt and MIMEDefang product lines. Today, Roaring Penguin develops, deploys and supports its spam- and virus-fighting software for customers that include enterprises, ISPs, campuses, web hosts, and government offices. For more information, visit http://www.roaringpenguin.com.













This press release was listed using SBWire's free press release listing service. SBWire offers both press release listing and press release distribution services starting at $24.95 per press release. SBWire also offers many additional services such as Hosted News Room, SBWire CRM, SBWire Connect and more.

mikado soft GmbH präsentiert sich auf der CeBIT 2011

NAC-Software macmon jetzt auch mit WLAN-Unterstützung







Berlin
(pts/01.02.2011/12:47) -

Der Berliner Netzwerk-Security Experte mikado soft wird sich auf der diesjährigen CeBIT vom 01. bis 05. März im Rahmen der Security Plaza in Halle 11, Stand 16 mit der neuesten Version seines Netzwerksicherheitssystems macmon präsentieren. Zudem berichtet das Unternehmen in Vorträgen im Rahmen der Heise CeBIT Security Plaza über sein Engagement in IF-MAP Forschungsprojekten.



macmon 3.3. mit neuen Funktionen

macmon 3.3. enthält eine Reihe von neuen Funktionen. Hierzu gehört insbesondere ein dezidierter WLAN-Support, der es Unternehmen oder Institutionen ermöglicht, Gästen mit Smart-Devices und anderen mobilen Rechnern einen kontrollierten Zugriff auf das Unternehmensnetz zu gewähren. Die Appliance wurde überarbeitet und die grafische Benutzeroberfläche erweitert, um die Konfiguration auch in komplexen Netzwerken zu vereinfachen. Durch die Integration verschiedener Dienste werden die Administrationsprozesse rationalisiert und weitere Sicherheitsfunktionen (Antivirus, IDS-Systeme, etc,) integriert.



mikado soft wird sich auf der CeBIT gemeinsam mit seinen Partnern Bücker EDV, P&W Netzwerk, alcera Kommunikationstechnik und DMN Solutions präsentieren, die Lösungen rund um das System macmon vorstellen werden.




NAC-Lösung macmon

macmon ist eine Hersteller unabhängige Network-Access-Control (NAC) Software, die IT-Prozesse sichert und das LAN vor unautorisierten, nicht sicheren Geräten und internen Angriffen schützt.



Als modulares System für unterschiedliche Sicherheitsanforderungen schafft macmon umfassende Transparenz im Netzwerk und bietet einen nachweisbaren Return-On-Investment durch leichte Integrierbarkeit, einen geringen Installations- und Betriebsaufwand, die Optimierung der Netzwerk-Administration sowie messbare Energie-Einsparungen. IT-Manager erlangen mit macmon zudem eine deutliche Arbeitsentlastung, da das Sicherheitsmanagement an einer zentralen GUI über das gesamte Unternehmensnetzwerk hinweg organisiert und überwacht werden kann.



Vorträge zum Engagement in IF-MAP Forschungsprojekten auf der CeBIT

mikado soft beteiligt sich an Forschungsprojekten zu neuen Sicherheits-Standards. Aktuell arbeitet das Unternehmen gemeinsam mit Partnern aus dem Forschungsbereich und der Industrie an der Weiterentwicklung des Standards "IF-MAP" der Trusted Computing Group und wird im zweiten Halbjahr 2011 eine Lösung anbieten. IF-MAP erlaubt den Austausch von Informationen zwischen verschiedenen Sicherheitssystemen, um durch eine Bewertung aller verfügbaren Daten die Sicherheitssituation deutlich zu erhöhen. Informationen stellt mikado in Vorträgen auf der Heise CeBIT Security Plaza vor.



mikado soft gmbh

Die deutsche mikado soft gmbh ist auf die Entwicklung, Pflege und den Vertrieb von Lösungen für die Netzwerk-Sicherheit spezialisiert. Die eigen entwickelte, Hersteller unabhängige und modulare NAC-Software macmon schützt das LAN vor unautorisierten, nicht sicheren Geräten und internen Angriffen.



mikado soft ist das jüngste Mitglied der mikado-Gruppe, angeführt von der mikado ag. Gegründet vor 25 Jahren in Berlin, ist die mikado ag als Beratungs- und Serviceunternehmen darauf spezialisiert, die Verfügbarkeit von IT-Prozessen in Unternehmen sicherzustellen. Die mikado Gruppe beschäftigt etwa 50 Mitarbeiter in Deutschland. Von den Security-Dienstleistungen und -Produkten profitieren europaweit Unternehmen unterschiedlicher Branchen. Zum Kundenstamm gehören u. a. Bundesministerien, Volkswagen, Müller Milch, Total, ZF, SWR, Vivantes, KfW Kreditanstalt für Wiederaufbau, Sparkassen und Volksbanken.

Firmensitz der mikado soft gmbh ist Berlin.



mikado ist Mitglied bei BITKOM, SIBB und der Trusted Computing Group.

(Ende)











Aussender: TC Communications


Ansprechpartner:


Thilo Christ

email: thilo.christ@tc-communications.de

Tel. +49(0)8081 954617


Websense unveils solution to protect data over email, social web



Websense unveils solution to protect data over email, social web
Announcement / Corporate February 04, 2011, 13:42 IST

Customer-proven TRITON solution now enabled with next-generation email security, hybrid deployment, and data loss prevention all from a single management console, single appliance and single vendor - Websense


Websense, Inc.(NASDAQ: WBSN) – In an age of borderless organizations, social media, cloud applications, WikiLeaks, tablets and smartphones – modern, blended security threats from Aurora to Zeus are slipping past standard security products unchecked. With no network perimeter or standard endpoint to secure, only Websense can secure the content itself by identifying, classifying and understanding content in all of its forms and wherever it travels so that it can be protected from attack, theft and misuse. Through this innovative approach, the Websense® TRITON™ solution is unique in its ability to remove threats and risks while enabling organizations to take advantage of rich internet applications, SaaS, social media and mobility.



The Websense TRITON solution stands in marked contrast to traditional firewall UTMs, which do not scale to solve today’s security threats, and other legacy controls like antivirus and URL filters that look only at the file and website. The TRITON solution is the first, and only, content UTM delivering uncompromising security in a consolidated appliance solution. And with the innovation delivered in this release, Websense TRITON marks the beginning of the era of the content-secure enterprise.

The new flagship offering, Websense TRITON Security Gateway Anywhere, combines Websense Web and Email Security Gateway technology, including hybrid deployment and data loss prevention (DLP), into the world’s first unified content security gateway. The TRITON gateway consolidates on-premises email and Web security on a single Websense V-Series™ appliance, complemented by cloud-based SaaS components, for ultimate efficiency and effectiveness, and DLP to prevent the loss of confidential information and aid in compliance.


The TRITON architecture is a modular system, so customers can easily and efficiently expand coverage and services as their needs grow. Included in this release, for example, and ideal for existing Websense Web Filter customers, is support for Websense Web Security on the V-Series appliance. This provides Web Filter customers with enhanced security, consolidation and expandability to other TRITON services. Modular design like this helps organizations build and adapt their TRITON solution, and delivers a platform for the future, supporting soon-to-be announced Websense Mobile DLP™ and Cloud DLP™ services.


The innovative, first of its kind TRITON gateway unites the next generation of email security into the TRITON solution. Based on more than 10 years of proven email security expertise, this revolutionary new email security incorporates enterprise-class DLP, advanced encryption and archiving for email. Unlike “lite” DLP offered by other companies, Websense TruEmail DLP™ uses Websense market-leading DLP technology to accurately identify confidential data, virtually eliminating false positives and negatives and delivering full workflow and reporting. It also benefits from TruHybrid™ deployment capabilities so that spam is filtered in the cloud before it hits customer’s networks and confidential data can be secured on premises before it leaves the network.


“Websense already leads the content security software market,” said John McCormack, president, Websense. “Everybody else is providing a portfolio of point products. Only Websense made a four-year investment to build a platform that truly unifies and consolidates Web security, email security and DLP in a way that is greater than the sum of its parts AND reduces costs.”



The unique way that the TRITON architecture unifies and consolidates security eliminates bloated duplication of systems, saving customers capex and opex. The unified elements also share intelligence with each other for the most effective protection against blended data-stealing attacks and internal threats. Through this unification, Websense TRITON dramatically lowers the total cost of ownership by 45 percent over competitive offerings.


Sharing more than 10 years of real-time intelligence gathered by the Websense ThreatSeeker™ Network and the Websense Advanced Classification Engine (ACE), the TRITON solutions are more effective at battling blended threats that have rendered traditional defenses obsolete. For example, Websense doesn’t just block Web threats in browsers, the malicious links can also be stripped from incoming emails. Also, the Websense Web solution is data aware to stop important documents from being leaked or stolen. ACE combines multiple content analysis services to identify security threats and inappropriate content that bypass traditional security technologies and it does it all in real time.


“Websense hybrid deployments give us the confidence we need as a leading pan-European operator with thousands of remote workers,” said David Rigby, IT Network Manager, P&O Ferrymasters (A Dubai World Company). “It’s all about the right access to the right data for the right people, whether on-premises or off. As a shipping and logistics company, we always have employees at customer sites, and they are entering and communicating confidential data like manifests and invoices. With Websense TRITON-based products, like their Web Security Gateway and email security, we feel confident that our systems stay clean of malware and the integrated DLP helps make sure that sensitive data stays where it should, without fear of data loss.”


“There is no question that the threat landscape is evolving at a rapid pace,” stated Michael Suby, VP of Research at Stratecast (a Division of Frost & Sullivan). “Furthermore, cyber perpetrators will readily pounce on exploitable gaps in legacy security products. What Websense is accomplishing with its TRITON architecture is providing businesses with an extensible and adaptable mechanism to fight fire with fire.”


For more information, watch this Websense TRITON video. Learn more at websense.com.

En un futuro cercano, el spyware será la pesadilla de la industria móvil

Publicidad




Fortinet, empresas centrada en la fabricación de appliances de seguridad de red, está observando desde hace algún tiempo cómo está cambiando la seguridad en el entorno móvil. Hablamos con Luis Miguel Cañete, Director de Canal de Fortinet Iberia, sobre la oferta de la compañía, la dificultad que entraña securizar los terminales móviles o la actitud de los usuarios antes los posibles problemas de seguridad que pueden generar los móviles.


¿Cuál la oferta de seguridad para móviles de su empresa?



En Fortinet contamos con una solución específica para telefonía móvil, FortiClient Mobile. Esta solución ofrece una gran variedad de funcionalidades de seguridad diseñadas para proteger smartphones basados en plataformas Windows Mobile o Symbian. Entre sus características cabe destacar: el escaneado antivirus, firewall, protección de la agenda de direcciones del Outlook, VPN IPsec, filtrado y antispam de SMS, seguridad del móvil, y filtrado de llamadas. Asimismo dispone de actualizaciones automáticas a través del servicio de suscripción FortiGuard o del appliance FortiManager para asegurarse frente a las últimas amenazas,, a la vez que el FortiManager ofrece un control centralizado.  Además, contamos con una solución VPN SSL para Apple iPhone e iPod touch (a través de una aplicación descargable de  iTunes App StoreSM).


Al incorporar la solución FortiMobile a una red con seguridad Fortinet dotamos de protección adicional a los usuarios móviles que acceden a los recursos de la red a través de dispositivos que se encuentran fuera del perímetro.  Así, al desplegar agentes FortiMobile, nos aseguramos que estos usuarios no solo protegen sus móviles y los datos que almacenan sino que tampoco se convierten en una puerta de entrada a amenazas móviles que puedan afectar a la infraestructura corporativa.



A la hora de proteger un smartphone, ¿qué es lo más complicado, la cantidad de plataformas, que estén siempre conectados, rendimiento limitado…?


En los smartphones confluyen una serie de características que les convierten en dispositivos especialmente propensos a sufrir ataques. Las redes 3G al ofrecer un mayor ancho de banda y permiten acceder a una amplia gama de servicios avanzados. Esto representa una gran vía de entrada de malware ya que los usuarios no sólo utilizan las aplicaciones instaladas de fábrica. Además, la usabilidad de estos dispositivos está favoreciendo el uso de los smartphones tanto para uso personal como profesional lo que entraña otros peligros que afectan ya no sólo al usuario del dispositivo móvil sino también a la propia corporación.


El mercado de telefonía móvil presenta una posición única en términos de malware en comparación con el mercado del PC. Las plataformas disponibles en PC son limitadas mientras que el número de plataformas móviles continúa creciendo: Google Android, SymbianOS, Windows Mobile, Palm. Esta amplia variedad de plataformas complica a los fabricantes a la hora de desarrollar soluciones de seguridad para ellas.



Actualmente existen una amplia variedad de plataformas móviles, ¿se crearán soluciones de seguridad para todas? ¿cree que el hecho de no contar con productos de seguridad específicos afectarán al éxito de la plataforma afectada?


El no contar con una solución de seguridad en nuestro móvil puede suponer un grave perjuicio para el usuario, y como indicábamos anteriormente, también para la empresa si éste lo utiliza como instrumento para acceder a la red corporativa.


Es probable que el propio mercado se encargue de reducir el número de plataformas que existen en la actualidad. En este punto, el usuario valorará positivamente que su móvil se encuentre protegido por lo que es probable que opten por plataformas que cuenten con soluciones de seguridad específicas. Los fabricantes iremos adaptando nuestra oferta a las plataformas más demandadas.


¿Cree que los usuarios son conscientes de que sus móviles son una tentación para los hackers?


El malware en móviles es un fenómeno todavía desconocido. La mayoría de la gente ni siquiera es consciente de su existencia y los que conocen el problema lo consideran un mal menor porque “hay muy pocos”. Sin embargo se está convirtiendo en un problema real en el que la clave reside no tanto en la cantidad como en su capacidad de propagación y el daño que provocan. Un solo virus puede infectar a cientos de miles de móviles como el caso de los gusanos CommWarrior y Yxes para Symbian.


En Fortinet creemos que el uso creciente de los teléfonos inteligentes y otros dispositivos inalámbricos y los nuevos modelos de negocio que permiten,  se convertirá en la mayor amenaza para la seguridad de la empresa en un futuro próximo.



Los usuarios de móviles ¿cree que está dispuestos a pagar por tener seguridad en sus terminales?


Es cuestión de tiempo. En el momento en que el usuario sea consciente del problema que le supone sufrir ataques de phising a través de su móvil, sea objeto de spam a través de SMS, le roben los datos personales de su agenda de contactos, etc. estará dispuesto a invertir en su propia seguridad.


¿Qué consejos daría a los usuarios de smartphones para estás más protegidos?


Hay unos sencillos consejos fáciles de seguir: no abra un SMS o MMs procedente de un desconocido, no se descargue una aplicación desconocida, instale un antivirus en su móvil, no conecte su móvil a otro dispositivo que pueda estar infectado y alerte a su operador si sufre un ataque.


¿Cómo cree que evolucionará la seguridad en los móviles en los próximos años? ¿Veremos soluciones de seguridad en las tiendas con más de una licencia?


En un futuro cercano, el spyware será la pesadilla de la industria móvil. Fortinet detectó un fuerte incremento de spyware para teléfonos móviles que afecta a todas las plataformas: iPhone, Symbian o Windows Mobile. Nuestro equipo de detección, FortiGuard, ha detectado una importante cantidad y variedad de malware para móviles. Y va en aumento, sobre todo con el desarrollo y la comercialización de suites dirigidas a crear spyware para móviles, productos que son vendidos por cientos o miles de dólares.