Categories
Uncategorized

RSAC 2026: What to Expect from Bitdefender

RSAC 2026: What to Expect from Bitdefender

RSAC 2026: What to Expect from Bitdefender

Security solutions have become so complex that many small and lean security teams aren’t looking for another dashboard or additional source of alerts—even when they’re at RSA. Instead, they’re exploring ways to simplify security operations without reducing effectiveness.

If this cybersecurity ideal aligns with what your organization needs now, make sure to visit Bitdefender at RSA 2026. In fact, you can start your day with us at our coffee station in Moscone South #1243.

Here’s a look at everything to expect from Bitdefender at RSAC.

Bitdefender at RSA: 3 Ways to Reduce Security Complexity

At RSA 2026, visit the Bitdefender booth to explore three options to simplify your security operations.

1. Explore the Unified Security Platform Approach: You’ll see firsthand how unified security provides coordinated defense workflows instead of disconnected alerts, along with clear operational visibility instead of siloed tools. This approach also enables faster, more confident decisions during incidents. Our experts will help you explore how Bitdefender GravityZone unifies prevention, protection, detection, and response into a single platform.

2. Understand the MDR Approach: Why are so many mid-market organizations turning to MDR (managed detection and response) to simplify 24×7 security for their organizations? Ask our MDR experts what you can expect from Bitdefender MDR and how it reduces the burden on your team and streamlines security operations, so you can spend more time focused on strategy and key IT and security priorities.

3. Experience the Dynamic Attack Surface Reduction Approach: Preemptively shrinking your attack surface removes attacker pathways and slows down lateral movement to reduce the likelihood of a breach. Last year, Bitdefender launched GravityZone PHASR at RSA; this year, PHASR is better than ever and available as a standalone option. Ask our experts to show you how dynamically reducing your attack surface can be both rapid and automatic.

Engineer Your Own Capture the Flag Challenge

Bitdefender is joining forces with Netgear to bring hands-on IoT security engineering to the IoT Village at RSAC 2026.

In this interactive experience, you will use an open-source framework to build your own Matter IoT Capture The Flag challenges from the ground up. Instead of just solving puzzles, you will design them. Using fully emulated Matter devices – from smart bulbs to dishwashers – you will explore real-world attack vectors, understand exploitation techniques, and see how IoT security controls hold up under pressure.

If you work with connected products, embedded systems, or IoT security architecture, this gives you direct exposure to Matter protocol attack surfaces and the mechanics behind secure device development.

The IoT Village is located in Room 204, Moscone South, second floor.

Must-See Agenda Sessions at RSAC

Bitdefender experts are also bringing field-tested knowledge to the RSAC agenda. These talks cut straight to the threats you’re facing — and how to disrupt them. 

Malware-Free Attacks: Notes from the Field
Wednesday, March 25, 2:00 PM — Sean NikkelTeam Lead, Bitdefender MDR Cyber Intelligence Fusion Cell
Attackers increasingly operate without traditional malware, instead abusing legitimate system tools to evade detection and expand their reach. This session breaks down what this means for your defenses — and how defenders can push back effectively.

EggStreme Malware: Unpacking a New APT Framework
Thursday, March 26 at 1:30 PM— Bogdan ZavadovschiBitdefender Security Researcher
Advanced persistent threats continue to evolve with sophisticated frameworks. This session takes you inside a newly observed APT — covering tactics, persistence techniques, and detection challenges you need to know. 
Reserve Your Seat for This Session

Visit Bitdefender at RSAC 2026

Here’s a final note about Bitdefender at RSA. The Bitdefender booth is more than a demo station — it’s a frontline briefing venue for defenders seeking practical intelligence and tangible outcomes. Hourly talks provide insights shaped by hundreds of thousands of real security incidents and the latest threat research.

These booth sessions are engineered for professionals who need intelligence they can operationalize immediately. They also include some great Bitdefender swag that is new for 2026.

By Bruce Sussman 

 

Copyright © 2023 eLinks sarl. All rights reserved.

Categories
Uncategorized

Fortinet Wins 2026 Google Cloud Partner of the Year Award for Workload Security​

Fortinet Wins 2026 Google Cloud Partner of the Year Award for Workload Security

Fortinet®(NASDAQ: FTNT), the global cybersecurity leader driving the convergence of networking and security, today announced it has received the 2026 Google Cloud Partner of the Year Award for Workload Security. Fortinet is being recognized for its achievements in the Google Cloud ecosystem, helping joint customers secure modern workloads with the Fortinet cloud-native application protection platform (CNAPP) across hybrid and multi-cloud environments while promoting the safe adoption of cloud-native technologies.

 

The Google Cloud Partner Awards honor the strategic innovation and measurable value our partners bring to customers. We are proud to name Fortinet a 2026 Google Cloud Partner Award winner, celebrating its role in driving customer success over the last year.

– Kevin Ichhpurani, President, Global Partner Ecosystem and Channels, Google Cloud

FortiCNAPP plays a key role in this recognition. By integrating cloud security posture management (CSPM), workload protection, and runtime threat detection, Fortinet helps organizations enforce consistent security policies across diverse environments and proactively reduce risk. Deep integration with Google Cloud and the Fortinet Security Fabric offers centralized visibility, automated responses, and coordinated security operations throughout the application lifecycle. 

Fortinet takes CNAPP one step further by recently announcing integrations with FortiGate VM, its leading cloud firewall solution, making FortiCNAPP the only solution today that offers network visibility and context to help organizations find threats faster and address risks easier. FortiCNAPP also now offers a unified risk workflow that provides a single prioritized list of cloud risks, assigns owners, and tracks remediation to reduce noise and improve mean time to response (MTTR).

“We’re honored to be recognized by Google Cloud as a 2026 Partner of the Year for Workload Security,” said Vince Hwang, VP, Cloud Security at Fortinet. “This award reflects the strength of our platform approach and our continued collaboration with Google Cloud to help organizations secure workloads, reduce complexity, and scale their cloud environments with confidence.”

Fortinet’s partnership with Google Cloud continues to grow through joint solution development, field enablement, and co-selling efforts. Together, the companies have produced reference architectures, hands-on workshops, and industry-specific security blueprints that help customers speed up cloud adoption while keeping security controls strong.

These efforts have helped customers succeed across industries, including retail, financial services, and the public sector, while also boosting measurable growth in Google Cloud usage.

This recognition reinforces Fortinet’s commitment to delivering integrated, enterprise-grade security solutions that align with how modern applications are built, deployed, and operated in the cloud.

 

Additional Resources

Copyright © 2023 eLinks sarl. All rights reserved.

Categories
Uncategorized

Heap-based buffer overflow in cw_acd daemon

Heap-based buffer overflow in cw_acd daemon

Summary

A heap-based buffer overflow vulnerability [CWE-122] in FortiOS and FortiSwitchManager cw_acd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.

VersionAffectedSolution
FortiOS 7.67.6.0 through 7.6.3Upgrade to 7.6.4 or above
FortiOS 7.47.4.0 through 7.4.8Upgrade to 7.4.9 or above
FortiOS 7.27.2.0 through 7.2.11Upgrade to 7.2.12 or above
FortiOS 7.07.0.0 through 7.0.17Upgrade to 7.0.18 or above
FortiOS 6.46.4.0 through 6.4.16Upgrade to upcoming 6.4.17 or above
FortiSwitchManager 7.27.2.0 through 7.2.6Upgrade to 7.2.7 or above
FortiSwitchManager 7.07.0.0 through 7.0.5Upgrade to 7.0.6 or above
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Workarrounds :

For each interface, remove “fabric” access. For example change :
config system interface
edit “port1”
set allowaccess fabric ssh https
next
end

to :
config system interface
edit “port1”
set allowaccess ssh https
next
end

or disallow access to the capwap daemon :

For each interface with the “fabric” service, block CAPWAP-CONTROL access to port 5246 to 5249 through a local-in policy.
config firewall service custom
edit “CAPWAP-CONTROL”
set udp-portrange 5246-5249
next
end
config firewall addrgrp
edit “CAPWAP_DEVICES_IPs”
set member “my_allowed_addresses”
end
config firewall local-in-policy
edit 1 (allow from trusted devices)
set intf “port1” (where fabric is enabled)
set srcaddr “CAPWAP_DEVICES_IPs”
set dstaddr “all”
set service “CAPWAP-CONTROL”
set schedule “always”
set action accept
next
edit 2 (block everyone else)
set intf “port1” (where fabric is enabled)
set srcaddr “all’
set dstaddr “all”
set service “CAPWAP-CONTROL”
set schedule “always”
set action deny
next
end

Acknowledgement

Internally discovered and reported by Gwendal Guégniaud of Fortinet Product Security Team.

Timeline

2026-01-13: Initial publication

Copyright © 2023 eLinks sarl. All rights reserved.

Categories
Uncategorized

CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal

CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal

Exploit Maturity POC
Response Effort MODERATE
Recovery USER
Value Density DIFFUSE
Attack Vector NETWORK
Attack Complexity LOW
Attack Requirements NONE
Automatable YES
User Interaction NONE
Product Confidentiality NONE
Product Integrity NONE
Product Availability HIGH
Privileges Required NONE
Subsequent Confidentiality NONE
Subsequent Integrity NONE
Subsequent Availability NONE

Description

A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode.

Product Status

VersionsAffectedUnaffected
Cloud NGFWNoneAll
PAN-OS 12.1< 12.1.3-h3
< 12.1.4
>= 12.1.3-h3
>= 12.1.4
PAN-OS 11.2< 11.2.4-h15
< 11.2.7-h8
< 11.2.10-h2
>= 11.2.4-h15 (ETA: 1/14/2026)
>= 11.2.7-h8
>= 11.2.10-h2
PAN-OS 11.1< 11.1.4-h27
< 11.1.6-h23
< 11.1.10-h9
< 11.1.13
>= 11.1.4-h27
>= 11.1.6-h23
>= 11.1.10-h9
>= 11.1.13
PAN-OS 10.2< 10.2.7-h32
< 10.2.10-h30
< 10.2.13-h18
< 10.2.16-h6
< 10.2.18-h1
>= 10.2.7-h32
>= 10.2.10-h30
>= 10.2.13-h18
>= 10.2.16-h6
>= 10.2.18-h1
PAN-OS 10.1< 10.1.14-h20>= 10.1.14-h20
Prisma Access 11.2< 11.2.7-h8*>= 11.2.7-h8*
Prisma Access 10.2< 10.2.10-h29*>= 10.2.10-h29*

* We have successfully completed the Prisma Access upgrade for most of the customers, with the exception of few in progress due to conflicting upgrade schedules. Remaining customers are being promptly scheduled for an upgrade through our standard upgrade process.

Required Configuration for Exposure

This issue is applicable only to PAN-OS NGFW or Prisma Access configurations with an enabled GlobalProtect gateway or portal.

Severity: HIGH, Suggested Urgency: MODERATE

CVSS-BT: 7.7 / CVSS-B: 8.7 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/AU:Y/R:U/V:D/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-754 Improper Check for Unusual or Exceptional Conditions

CAPEC-210 Abuse Existing Functionality

Solution

VersionMinor VersionSuggested Solution
Cloud NGFW All No action needed.
PAN-OS 12.112.1.0 through 12.1.3Upgrade to 12.1.4 or later.
PAN-OS 11.211.2.8 through 11.2.10Upgrade to 11.2.10-h2 or later.
 11.2.5 through 11.2.7Upgrade to 11.2.7-h8 or 11.2.10-h2 or later.
 11.2.0 through 11.2.4Upgrade to 11.2.4-h15 or 11.2.10-h2 or later.
PAN-OS 11.111.1.11 through 11.1.12Upgrade to 11.1.13 or later.
 11.1.7 through 11.1.10Upgrade to 11.1.10-h9 or 11.1.13 later.
 11.1.5 through 11.1.6Upgrade to 11.1.6-h23 or 11.1.13 or later.
 11.1.0 through 11.1.4Upgrade to 11.1.4-h27 or 11.1.13 or later.
PAN-OS 10.210.2.17 through 10.2.18Upgrade to 10.2.18-h1 or later.
 10.2.14 through 10.2.16Upgrade to 10.2.16-h6 or 10.2.18-h1 or later.
 10.2.11 through 10.2.13Upgrade to 10.2.13-h18 or 10.2.18-h1 or later.
 10.2.8 through 10.2.10Upgrade to 10.2.10-h30 or 10.2.18-h1 or later.
 10.2.0 through 10.2.7Upgrade to 10.2.7-h32 or 10.2.18-h1 or later.
All older
unsupported
PAN-OS versions
 Upgrade to a supported fixed version.
Prisma Access 11.211.2 throughUpgrade to 11.2.7-h8 or later.*
Prisma Access 10.210.2 throughUpgrade to 10.2.10-h29 or later.*

* See the note under Product Status for information regarding Prisma Access upgrades.

Workarounds and Mitigations

No known workarounds exist for this issue.

Acknowledgments

 
Palo Alto Networks thanks an external reporter for discovering and reporting this issue.

CPEs

cpe:2.3:o:palo_alto_networks:pan-os:12.1.3:h1:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:12.1.3:-:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:12.1.2:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h1:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:-:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:11.2.9:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:11.2.8:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h7:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h4:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h3:*:*:*:*:*:*

CPE Applicability

    • cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)12.1.0 and up to (excluding)12.1.4
    • ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)12.1.3 and up to (excluding)12.1.3-h3
    • ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)11.2.8 and up to (excluding)11.2.10-h2
    • ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)11.2.5 and up to (excluding)11.2.7-h8
    • ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)11.2.0 and up to (excluding)11.2.4-h15
    • ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)11.1.0 and up to (excluding)11.1.13
    • ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)11.1.10 and up to (excluding)11.1.10-h9
    • ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)11.1.6 and up to (excluding)11.1.6-h23
    • ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)11.1.4 and up to (excluding)11.1.4-h27
    • ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)10.2.17 and up to (excluding)10.2.18-h1
    • ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)10.2.14 and up to (excluding)10.2.16-h6
    • ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)10.2.11 and up to (excluding)10.2.13-h18
    • ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)10.2.8 and up to (excluding)10.2.10-h30
    • ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)10.2.0 and up to (excluding)10.2.7-h32
    • ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)10.1.0 and up to (excluding)10.1.14-h20
  • or
    • cpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:*:*:* is vulnerable from (including)11.2.7 and up to (excluding)11.2.7-h8
    • ORcpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:*:*:* is vulnerable from (including)10.2.10 and up to (excluding)10.2.10-h29

Timeline

Changed recommended fix version from 11.2.4-h14 to 11.2.4-h15.
Initial Publication

Copyright © 2023 eLinks sarl. All rights reserved.

Categories
Uncategorized

Fortinet Joins SASE ‘Leaders’ Palo Alto Networks, Netskope, Cato: Gartner Magic Quadrant

Fortinet Joins SASE ‘Leaders’ Palo Alto Networks, Netskope, Cato: Gartner Magic Quadrant

Fortinet ascended into the “leaders” category for Gartner’s 2025 SASE Magic Quadrant, joining Palo Alto Networks, Netskope and Cato Networks in gaining the sought-after top ranking.

Meanwhile, three major cybersecurity vendors — Zscaler, Check Point Software Technologies and SonicWall — were added to Gartner’s annual SASE (secure access service edge) ranking for the first time as part of the latest Magic Quadrant report.

Gartner’s 2025 Magic Quadrant for SASE Platforms recognized a total of 11 vendors.

The research firm’s ranking continues to focus on providers of “single-vendor” SASE, which deliver SSE (security service edge) capabilities tightly integrated with SD-WAN to offer secure connectivity for users and devices to applications.

In last year’s SASE Magic Quadrant ranking, Fortinet had appeared in the “challengers” quadrant. Gartner analysts wrote in the new report that Fortinet’s Unified SASE platform is now poised to gain market share thanks to competitive pricing and “strong SD-WAN/branch firewall incumbency.”

“Fortinet’s overall viability is above average in the SASE platform market compared with other vendors in this research, based primarily on its corporate financial health,” the Gartner analysts wrote.

In May, Fortinet disclosed that its SASE business had seen annual recurring revenue jump nearly 26 percent from a year earlier to reach $1.15 billion as of the end of March.

For Gartner’s 2025 SASE Magic Quadrant ranking, Palo Alto Networks was once again named a “leader” — a ranking held by the cybersecurity giant during all three editions of the report. Netskope and Cato Networks, meanwhile, were each ranked as SASE “leaders” for the second year in a row by Gartner.

For the “challengers” quadrant in this year’s SASE Magic Quadrant ranking, two vendors, Cisco and Versa Networks, were selected by Gartner analysts.

Zscaler made its debut on the SASE Magic Quadrant in the “visionaries” quadrant, joining Cloudflare, which moved up from its prior ranking as a “niche player” in the category.

Check Point and SonicWall debuted on the SASE Magic Quadrant in the “niche players” category, joining Hewlett Packard Enterprise.

One vendor, Forcepoint, was dropped from the Magic Quadrant as a result of exiting the SASE platforms market, Gartner analysts said in the report.

Honorable mentions were awarded by Gartner to five companies — Aryaka, Barracuda, Ericsson, Huawei and iboss — which offer “relevant technology” for SASE but didn’t meet the criteria for inclusion by the report’s cutoff date of April 1, 2025, the firm said.

Gartner noted that the 2025 edition of the report, entitled Magic Quadrant for SASE Platforms, has been adjusted from the title of prior years that emphasized the delivery of a “single-vendor” SASE offering. The update more accurately reflects current market terminology, the firm said.

Copyright © 2023 eLinks sarl. All rights reserved.

Categories
Uncategorized

Palo Alto systems warning issued among huge surge in scanning attacks – but it says everything is fine

Palo Alto systems warning issued among huge surge in scanning attacks - but it says everything is fine

Experts have warned it seems that someone is trying to sniff out a vulnerability in Palo Alto Networks login portals.

 

Security researchers from GreyNoise said they had observed a 500% increase in IP addresses scanning for Palo Alto Networks GlobalProtect and PAN-OS profiles.

On an average Friday, around 200 IP addresses scan for different profiles across the web, but on October 3, the researchers saw more than 1,280.

Palo Alto remains secure

Spikes such as this one are not unusual, but they’re often a sign that a threat actor discovered a vulnerability and is now mapping out potential victims.

GreyNoise also said that of the IP addresses it saw, 7% are confirmed to be malicious, and 91% “suspicious”.

Most of these IP addresses came from the US, with notable minorities coming in from the UK, Netherlands, Canada, and Russia. Targets are mostly located in the US and Pakistan.

“Nearly all activity was directed at GreyNoise’s emulated Palo Alto profiles (Palo Alto GlobalProtect, Palo Alto PAN-OS), suggesting the activity is targeted in nature, likely derived from public (e.g., Shodan, Censys) or attacker-originated scans fingerprinting Palo Alto devices,” GreyNoise said in its report.

At the same time, Palo Alto remains confident that its systems can withstand almost any onslaught. In a statement shared with BleepingComputer, the company said it investigated the reports and “found no evidence” of a compromise:

“Palo Alto Networks is protected by our own Cortex XSIAM platform, which stops 1.5 million new attacks daily and autonomously reduces 36 billion security events into the most critical threats to ensure our infrastructure remains secure. We remain confident in our robust security posture and our ability to protect our network,” the spokesperson told the publication.

Scans like this can be used to hunt for n-day vulnerabilities, but also for zero-days.

Copyright © 2023 eLinks sarl. All rights reserved.

Categories
Uncategorized

Cisco Introduces Agentic Capabilities for Next-Generation Collaboration

Cisco Introduces Agentic Capabilities for Next-Generation Collaboration

News Summary

  • Cisco launches new agents that make human-AI collaboration a reality.
  • New operating system for Collaboration Devices with RoomOS 26, powered by NVIDIA, to deliver new agentic capabilities for users and IT.
  • Microsoft Device Ecosystem Platform (MDEP) provides robust security on Cisco Devices running the Microsoft Teams Rooms experience.
  • Webex Suite integrations include Amazon Q index, Microsoft 365 Copilot, and Salesforce for agentic workflow automation.

SAN JOSE, Calif.Sept. 30, 2025 /PRNewswire/ — Today at WebexOne 2025, Cisco (NASDAQ: CSCO) unveiled solutions to foster dynamic collaboration between people and AI agents in the workplace. This includes new agentic capabilities in Cisco AI Assistant, RoomOS 26 for Cisco Devices, and purpose-built integrations across Cisco devices and the Webex Suite to help organizations easily manage and work seamlessly with digital agents.

 

As AI adoption accelerates, the future of collaboration will reshape how people work with each other, how they work alongside new AI teammates, and how AI systems interact with each other to automate tasks and workflows. This new approach to collaboration is called Connected Intelligence—where blended teams of humans and agents connect and collaborate, with every connection remaining secure and resilient on Cisco’s trusted platforms.

“With Connected Intelligence, we’re weaving AI agents into Webex to supercharge teams and power new breakthroughs in how people and AI collaborate to get things done-this is the future of work coming to life,” said Jeetu Patel, President and Chief Product Officer, Cisco. “We’re building AI agents into Webex today that will amplify our collective productivity and fundamentally improve how people connect with each other, how they interact with AI, and how AI agents themselves collaborate.”

Enhancing Collaboration with AI Support

Employees can benefit from AI agents that minimize distractions and automate routine tasks, allowing them to focus on their most important work. Cisco AI Assistant innovations elevate this experience, offering new ways for AI agents to proactively support employees with capabilities such as:

  • Task agent: An AI agent proactively generates action items from meeting transcripts, reducing manual follow-up. Generally available Q1 CY26.
  • Notetaker agent: An AI agent can transcribe and summarize in-person meetings in real time to capture the value of impromptu huddles and brainstorms. This agent is available across Webex App and Cisco Collaboration Devices running RoomOS 26. Generally available Q1 CY26.
  • Polling agent: An AI agent proactively recommends live polls throughout meetings to spark engagement and capture real-time input from participants. Generally available Q1 CY26.
  • Meeting scheduler: When meetings need to be scheduled, this AI agent automatically identifies the need for follow-up, finds common availability, and proposes scheduling. Generally available Q4 CY25.
  • AI receptionist for Webex Calling: An always-on, virtual receptionist powered by Webex AI Agent can automate routine queries, respond to customer questions, and complete tasks like transferring calls or scheduling appointments. Controlled availability Q1 CY26.
  • Open ecosystem approach: General availability planned for Q4 CY25, Cisco AI Assistant now integrates with leading enterprise knowledge applications, including:
    • Amazon Q index: Provides secure, scalable access to enterprise data with advanced semantic search and real-time indexing. It delivers precise, context-rich answers, enabling customers to get faster, smarter insights and boost productivity across their teams.
    • Microsoft 365 Copilot: Webex users can now search across Microsoft Copilot from Cisco AI Assistant and easily access files and information from Microsoft SharePoint and OneDrive, without leaving Webex. Also, a reciprocal integration gives Microsoft Copilot users the ability to search and access Webex AI meetings and conversation summaries directly in Copilot.
    • Jira and Salesforce: AI agents can perform tasks in third-party applications —such as creating or updating tickets or generating new leads on behalf of users—via the Cisco AI Assistant in the Webex App. Generally available Q1 CY26.

Empowering Employees with AI Agents for Seamless Collaboration

Today’s organizations need workspaces that facilitate real collaboration and connection among people and AI agents. RoomOS 26—the latest evolution of Cisco’s intelligent device operating system—utilizes AI in new ways to deliver enhanced collaboration experiences. Cisco Collaboration Devices, powered by NVIDIA, bring intelligence directly to the room with new RoomOS 26 features planned for generally availability starting Q4 CY25:

  • Notetaker agent: An AI agent can transcribe and summarize local meetings in real time to capture the value of impromptu huddles and brainstorms. This agent is also available in Webex Suite.
  • Director agent: AI can anticipate and adapt to meeting flow, autonomously delivering engaging, cinematic views.
  • Audio zones: IT teams can quickly define digital boundaries in meeting spaces in a matter of seconds, ensuring the AI-powered Ceiling Mic Pro picks up sound only within the defined boundaries.
  • Workspace Advisor agent: Workspace Advisor leverages the advanced cameras and NVIDIA chipsets on Collaboration Devices to create a ‘digital twin’ of physical spaces. This 3D representation is then brought into Control Hub using the familiar experience available in Workspace Designer to give IT teams insight to optimize the configuration of the meeting space.

Cisco is empowering employees to achieve new levels of innovation, efficiency, and human connection in an open collaboration ecosystem. To accelerate adoption and maximize the benefits of our intelligent hardware and software, Cisco is bringing the Microsoft Device Ecosystem Platform (MDEP) to its NVIDIA-powered devices running RoomOS 26. Cisco’s unique architecture allows customers using Microsoft Teams Rooms on Cisco Collaboration Devices to leverage the latest Microsoft security features and innovations, while benefiting from the rich capabilities of Cisco Collaboration. Additionally, Zoom for Cisco Rooms significantly improves the experience of joining Zoom Meetings from Cisco devices, furthering customer flexibility and choice.

Enabling AgenticOps and Secure Collaboration

Operations teams are also increasingly benefiting from AI agents, and Cisco is leading the evolution with AgenticOps— where AI agents and humans work collaboratively together to manage and optimize IT infrastructure. In Webex Control Hub, a new integration with Cisco AI Canvas will soon introduce multi-player, multi-domain troubleshooting through a generative UI and natural-language interface, powered by Cisco’s domain-specific Deep Network Model. This empowers IT admins to proactively diagnose and resolve network, video, and call-quality issues—all within a unified, collaborative platform.

To keep digital collaboration safe, Cisco is partnering with GetReal and Pindrop to equip Webex with advanced threat detection—identifying deepfakes and synthetic media in real time and empowering meeting hosts to respond instantly. General availability planned by Q1 CY26.

About Cisco 

Cisco (NASDAQ: CSCO) is the worldwide technology leader that is revolutionizing the way organizations connect and protect in the AI era. For more than 40 years, Cisco has securely connected the world. With its industry leading AI-powered solutions and services, Cisco enables its customers, partners and communities to unlock innovation, enhance productivity and strengthen digital resilience. With purpose at its core, Cisco remains committed to creating a more connected and inclusive future for all. Discover more on The Newsroom and follow us on X at @Cisco.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. A listing of Cisco’s trademarks can be found at http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word ‘partner’ does not imply a partnership relationship between Cisco and any other company.

About Webex by Cisco  

Webex is a leading provider of cloud-based collaboration solutions which includes video meetings, calling, messaging, events, customer experience solutions like contact center and purpose-built collaboration devices. At Webex, we start with people and their experiences first. This focus on delivering inclusive collaboration experiences fuels our innovation, which leverages AI and Machine Learning, to remove the barriers of geography, language, personality, and familiarity with technology. Our solutions are underpinned with security and privacy by design. We work with the world’s leading business and productivity apps – delivered through a single application and interface. Learn more at webex.com.

View original content to download multimedia:https://www.prnewswire.com/news-releases/cisco-introduces-agentic-capabilities-for-next-generation-collaboration-302571083.html

SOURCE Cisco Systems, Inc.

Copyright © 2023 eLinks sarl. All rights reserved.

Categories
Uncategorized

Introducing the BarracudaONE™ AI-Powered Cybersecurity Platform

Introducing the BarracudaONE™ AI-Powered Cybersecurity Platform

CAMPBELL, Calif., June 2, 2025 — Barracuda Networks, Inc., a leading cybersecurity company providing complete protection against complex threats for all sized businesses, today unveiled the BarracudaONE AI-powered cybersecurity platform. BarracudaONE maximizes threat protection and cyber resilience by unifying layered security defenses and providing deep, intelligent threat detection and response for managed service providers (MSPs), other channel partners and end users.

Barracuda today also announced the findings of a global survey highlighting the growing risk posed by security tool sprawl. According to the study conducted by Vanson Bourne, 65% of IT and security professionals say their organizations are juggling too many security tools. More than half (53%) of respondents also say their security tools cannot be integrated – creating fragmented environments that are difficult to manage and secure. Based on responses from 2,000 senior security decision-makers, 80% of respondents report that this lack of integration increases the time required to manage security, while 81% cited higher overall costs. Additionally, it significantly weakens threat defense capabilities, with 77% saying it hinders detection and 78% citing challenges in threat mitigation. Only a minority (32%) of respondents are fully confident their tools are properly configured, leaving organizations vulnerable to breaches caused by hidden misconfigurations.

“This research serves as a stark wake-up call for organizations still relying on disconnected, siloed security tools,” said Neal Bradbury, chief product officer at Barracuda. “Managing a patchwork of solutions drives up costs and complexity while creating blind spots that attackers are quick to exploit. Security teams simply cannot afford to waste time switching between systems while critical threats go undetected. The path forward is clear: consolidation and integration are essential for cyber resilience. That is exactly why we built BarracudaONE – to improve security operations, reduce risk and enable teams to secure their environments faster and more effectively. We are cutting through the complexity, closing critical gaps and empowering organizations with the confidence and control they need to stay ahead of evolving threats.”

BarracudaONE simplifies and strengthens security operations by unifying Barracuda’s comprehensive portfolio of solutions into a single, integrated platform. It delivers layered threat protection, managed through a centralized dashboard, reducing operational complexity and improving visibility. By consolidating key security functions, BarracudaONE minimizes the administrative burden and enhances overall cyber resilience.

Advanced, battle-tested AI – integrated across Barracuda’s solutions and fine-tuned over years of real-world application – enables precise threat detection, rapid response and intelligence automation. At the core of this AI-driven platform are robust reporting capabilities that deliver clear, actionable insights. These reports help security teams and channel partners demonstrate the effectiveness of the AI threat layer in identifying and neutralizing attacks, while also highlighting ROI and operational impact. By making threat data easy to interpret and communicate, the platform empowers organizations to validate their cybersecurity posture and make informed decisions with confidence.

“BarracudaONE is a shields-up force multiplier that helps us safeguard critical municipal services – including our police dispatcher center, police and fire departments, as well as wastewater, finance and other essential operations,” said William Mann, chief information security officer (CISO) at the Borough of West Chester, Pennsylvania. “The ability to manage multiple security modules through a single, centralized dashboard is transformational. Barracuda Email Protection’s incident response capabilities are mission-critical, and with BarracudaONE, they’re more accessible, faster and easier to manage. The streamlined experience of having fewer clicks and faster insights enables us to prioritize threats and respond with the speed and precision our first responders, government teams and community depend on.”

“As an MSP, BarracudaONE isn’t just another tool – it’s a strategic differentiator for our business,” said Tyler Bracken, director of network operations at OpX Networks. “We’re already using BarracudaONE as a powerful sales asset to clearly demonstrate the value we deliver and make ROI tangible for our customers. Cybersecurity can sometimes be a challenging sell, clouded by misconceptions around complexity and cost. BarracudaONE helps shift that narrative. Its rich telemetry and real-time insights enable us to show exactly what threats we’re neutralizing and the protection we’re providing. That level of transparency builds trust with our customers and gives us a strong advantage in a crowded market.”

“BarracudaONE brings all our Barracuda solutions into a unified, powerful platform – delivering centralized visibility, real-time alerts and actionable reporting,” said Adam Butler, principal cyber solutions architect at ARO. “It represents a major step forward for our customers, and an even greater advantage for us as an MSP overseeing thousands of customer environments. With BarracudaONE, we can pinpoint security gaps faster, prioritize alerts with greater accuracy and generate high-value reports in seconds.”

 

Availability

BarracudaONE is now available at no additional cost to MSPs, other channel partners and customers already using Barracuda Email ProtectionBarracuda Cloud-to-Cloud Backup and Barracuda Data Inspector. The platform provides a centralized interface for MSPs and partners to easily manage solutions and licenses.

MSPs, partners and end users can further strengthen their security posture with Barracuda Managed XDR, a 24/7 service that delivers expert threat detection and response backed by Barracuda’s award-winning security operations center (SOC).

About Barracuda   

Barracuda is a leading global cybersecurity company providing complete protection against complex threats for all sized businesses. Our AI-powered platform secures email, data, applications, and networks with innovative solutions, managed XDR and a centralized dashboard to maximize protection and strengthen cyber resilience. Trusted by hundreds of thousands of IT professionals and managed service providers worldwide, Barracuda delivers powerful defenses that are easy to buy, deploy and use.

Copyright © 2023 eLinks sarl. All rights reserved.

Categories
Uncategorized

Fortinet Named a Challenger in the 2025 Gartner® Magic Quadrant® for Security Service Edge

Fortinet Named a Challenger in the 2025 Gartner® Magic Quadrant® for Security Service Edge

Fortinet® (NASDAQ: FTNT), the global cybersecurity leader driving the convergence of networking and security, today announced it has been recognized as a Challenger in the Gartner® Magic Quadrant™ for Security Service Edge (SSE). This recognition follows Fortinet’s recent placement as a Leader and the highest in ability to execute in the 2024 Gartner® Magic Quadrant™ for SD-WAN for the fourth consecutive year — we believe this further validates Fortinet’s vision and execution in delivering a unified SASE platform.

 

We continue to demonstrate strong momentum, innovation, and growth in the SSE market. We believe Fortinet’s placement in the Challengers quadrant is a testament to our growing adoption, positive customer feedback, aggressive roadmap execution with monthly releases, and ever-expanding market share. Our focus is on delivering real outcomes through flexible deployment models, seamless integration with existing infrastructure, and consistent AI-powered security wherever users connect.

– Nirav Shah, Senior Vice President, Products and Solutions at Fortinet

A Differentiated SSE Experience

With FortiSASE, Fortinet delivers the most unified, flexible, and intelligent solution on the market today, enabling secure access from anywhere while reducing complexity, enhancing user experience, and strengthening security across hybrid environments. Key differentiators include:

  • Unified solution: Unlike many fragmented offerings, FortiSASE is built on a single operating system, FortiOS, a unified management console, endpoint agent, and centralized data lake. This cohesive architecture ensures consistent security policy enforcement and streamlined operations across all environments from on-premises to the cloud. The integration of Fortinet Secure SD-WAN with cloud-delivered SSE, and digital experience monitoring (DEM) under one platform provides comprehensive visibility and control, reducing complexity and potential security gaps. 
  • Flexible connectivity: FortiSASE offers unparalleled flexibility to accommodate a wide range of organizational needs by supporting BYOD, contractors, agent-based, and agentless devices, as well as third-party SD-WAN solutions, facilitating seamless integration into existing infrastructures. Fortinet is also investing in building its own global cloud infrastructure, further enhancing performance, scalability, and control across its SASE services. Fortinet Sovereign SASE gives organizations flexibility and control over their data, especially in regulated sectors like finance and healthcare. Organizations can also integrate FortiSASE with Fortinet’s WLAN/LAN portfolio to secure thin edge locations without the need for additional appliances or agents, ensuring comprehensive protection even in resource-constrained environments. 
  • Intelligent innovation: FortiSASE, powered by FortiGuard AI-Powered Security Services, delivers broad protection through integrated capabilities like secure web gateway (SWG), universal zero-trust network access (ZTNA), cloud access security broker (CASB), Firewall-as-a-Service (FWaaS), and remote browser isolation (RBI), all managed from a single unified console. Security teams can enforce zero-trust policies to manage access and data flows to generative AI (GenAI) apps, gaining visibility into usage patterns, destinations, and enabling enterprise-wide AI governance.

What Customers Are Saying About FortiSASE

In addition to this latest Gartner acknowledgement, Fortinet was the only vendor to be recognized with the Gartner® Peer Insights™ Customers’ Choice Recognition two years in a row for Security Service Edge. In the 2025 Gartner® Peer Insights™ Voice of the Customer, security service edge (SSE), FortiSASE customers had this to say:

“Elevating user experience with FortiSASE: perfect features and functionality”

We use SIA (secured internet access) and SPA (secured private access) functionality of FortiSASE and the overall experience is exceptionally great.

“Reliable SSE with ZTNA solution with breadth of design options”

Secure and reliable internet access for all hybrid users. Secure users regardless of their access location. Our overall experience with the solution is great and users are happy from the day we deployed this endpoint on their machines.

“Best of the breed cloud delivered security solution to secure hybrid workforce”

This solution allows us to accommodate growing user count without compromising performance. The solution provides robust security features, which include web filtering to provide protection against web-based threats. The Solution provides secure access to users irrespective of their location, Users are allowed to access the internet or servers post compliance checks. Our overall experience is highly positive.

Copyright © 2023 eLinks sarl. All rights reserved.

Categories
Uncategorized

Perfect Time to Switch DLP: Why Companies Choose Forcepoint

Perfect Time to Switch DLP: Why Companies Choose Forcepoint

In today’s rapidly-evolving digital landscape, businesses face the challenge of protecting their most valuable asset—data. With remote work, cloud-based applications, and AI-driven innovations like GenAI becoming more widespread, legacy DLP solutions are falling behind. They struggle to adapt to new business models, leaving organizations vulnerable to data breaches, evolving compliance issues, and inefficiencies.

With so many vendors entering and exiting the market, it’s the right time to take a closer look at what new data security solutions can offer. Forcepoint, with a data-first approach and decades of expertise, provides comprehensive and future-ready data security needed to meet today’s challenges. Read on to explore why businesses are making the switch to Forcepoint DLP.

Why Switch Now?

The simple answer: Because legacy DLP solutions aren’t keeping up. Whether it’s because of complex administration, difficulty extending policies to additional channels like cloud apps and web, or the high cost of maintenance, traditional DLP solutions can end up hindering your business more than helping it. In fact, many enterprises find themselves overwhelmed by fragmented systems that don’t communicate with each other, creating security gaps and inefficiencies.

  • Legacy DLP Solutions Are Falling Behind: Traditional systems struggle to keep up with modern business needs.
  • Complex Administration: Managing outdated DLP solutions can be time-consuming and difficult.
  • Limited Cloud Capabilities: Limited support for cloud management options restricts business agility, reduces security flexibility, and introduces potential security gaps.
  • Fragmented Systems Cause Inefficiencies: Disconnected tools result in inefficiencies and increased risk.

Forcepoint addresses these challenges by offering a unified, full-lifecycle approach to data security. This approach, which we call Data Security Everywhere, not only protects your data across different access channels but also future proofs your business against emerging threats.

The Forcepoint Advantage: Why Companies Are Switching

  1. Proven Legacy Replacement: Forcepoint seamlessly replaces outdated DLP solutions with minimal disruption, ensuring a smooth transition without compromising security.
  2. Trusted Industry Leader: With decades of experience and a customer-focused approach, Forcepoint is an award-winning recognized leader in data security trusted by thousands of organizations.
  3. AI-Powered and Future-Ready: Forcepoint data security solutions are enhanced by AI and ML to increase security efficacy and the ability to easily extend across new channels when you need it, providing continuous, robust protection—even when offline—to secure how people work today.
  4. Simplified, Unified Policies: No more managing multiple DLP solutions. Forcepoint provides unified policies across endpoints, SaaS apps, web, and email in one intuitive console, reducing complexity and saving time.
  5. Flexible Deployment Options: Forcepoint stands out as a vendor that offers flexible deployment models to fit your business needs — on-premises, cloud, or hybrid—allowing seamless integration and agility as your organization evolves.


Trusted Approach by CISOs Worldwide

91% of CISOs in a global IDC survey believe having unified DLP policies across cloud, web, and endpoint would enhance overall data security. Respondents estimate a 31% cost savings due to simplified management, increased staff productivity, and streamlined reporting.

IDC study, ‘The Quest for a Single Set of Unified DLP Policies’

Ready to see it in action?

Don’t let legacy systems hold you back. It’s time to upgrade to a data security solution that aligns with today’s needs. Get a free demo today and see how Forcepoint can transform your approach to data security.

Copyright © 2023 eLinks sarl. All rights reserved.