For Urgent Query : 0347-3782712
Cart total:  0.00
  • No products in the cart.


Fortinet unveils switches to meet return-to-the-office networking and security demands


Hello and greetings! Welcome to IT News, your source for the latest updates in the tech world. In response to the growing bandwidth needs of today’s modern campuses amid the resurgence of the return-to-office (RTO) trend, Fortinet has unveiled its cutting-edge FortiSwitch 600 and 2000 campus switches. This significant development integrates seamlessly with Fortinet’s AI-powered security and networking services.

tech news, Fortinet unveils switches to meet return-to-the-office networking and security demands, Fortinet switch

“The hybrid workforce remains robust, and as we witness more workers returning to the campus, particularly in large organizations, the bandwidth requirements for expansive campuses are surging,” notes Nirav Shah, VP of Products and Solutions at Fortinet.

To meet this escalating demand, Fortinet has introduced the FortiSwitch 600 series, a new multigigabit secure campus access switch, to its comprehensive portfolio. This innovative switch boasts up to 5GE access and 25GE uplinks, ensuring enhanced network performance and accommodating the needs of next-generation wireless access points (APs).

The FortiSwitch 2000, on the other hand, serves as a campus core switch meticulously designed for larger campuses. This versatile switch can be seamlessly integrated with high-performance access switches like the FortiSwitch 600, providing robust support for more extensive and intricate campus environments.

Shah emphasizes the importance of ensuring that the uplink supports multigig performance, especially in scenarios with increased users and higher bandwidth requirements. This capability allows customers to effortlessly connect next-generation APs, facilitating support for additional users and IoT devices.

Now, let’s turn our attention to the latest in tech updates brought to you by IT Networks. In alignment with the fast-paced evolution of technology, IT Networks remains committed to delivering cutting-edge solutions. As part of our expansive product offerings, our firewall products stand out as crucial components in fortifying network security.

In line with this commitment, our firewall product line plays a pivotal role in safeguarding your network against evolving cyber threats. Our advanced firewall technologies ensure unauthorized access is thwarted, providing a robust defense mechanism for your network infrastructure. To explore more about our firewall products and enhance your network’s resilience, visit our product page.

Stay tuned to Tech News for more insightful updates on the technological landscape. As the tech world continues to evolve, IT Networks remains at the forefront, delivering innovative solutions to meet the dynamic needs of the digital era.

Explore the Convergence of LAN, Security, and AIOps with the Latest Offerings from Fortinet

In the ever-evolving landscape of secure connectivity, Fortinet introduces its newest switches as integral components of its advanced platform. These switches seamlessly converge AI-powered security and network operations with Fortinet’s LAN, wireless LAN (WLAN), and 5G offerings, all managed through unified control. This convergence is accelerated by Fortinet’s custom ASIC chips, as highlighted by Shah, the VP of Products and Solutions at Fortinet.

As reported by Gartner in its 2022 Magic Quadrant for Enterprise Wired and Wireless LAN Infrastructure, Fortinet’s integrated architecture is highly acknowledged. The report notes, “Fortinet delivers an architecture in which LAN, WLAN, and security are tightly integrated under a unified operating system (FortiOS) and cloud management platform.” Such recognition underscores the efficacy of Fortinet’s approach in providing a cohesive and unified solution.

For Fortinet switch users, management options abound. The FortiManager serves as a robust management tool, or users can leverage Fortinet’s FortiGate next-generation firewalls as switching controllers to eliminate overlays, according to Shah. He emphasizes that the controller not only manages switches and access points but also extends security from the next-generation firewall to switches and APs.

Traditionally, security has often been an afterthought in networking, but Fortinet challenges this notion. The new switches seamlessly integrate with FortiGuard security services, offering advanced features such as malware protection, intrusion prevention systems (IPS), sandboxing, and web filtering.

Enter the realm of AIOps enhancement with Fortinet’s latest 600 and 2000 campus switches. These switches seamlessly integrate with FortiAIOps, leveraging AI and machine learning (ML) for comprehensive data collection and the identification of network anomalies. Fortinet consolidates data from its diverse network devices, including FortiAPs, FortiSwitches, FortiGates, Secure SD-WAN, and FortiExtender, feeding this dataset into FortiAIOps for insightful event correlation.

Shah elaborates on Fortinet’s innovative approach, stating, “We use the AI and machine learning developed for our security services, where we process billions of data every day, applying the same methodology to network operations.” This holistic integration enables customers to gain profound insights into LAN and wireless LAN issues, facilitating troubleshooting and providing valuable insights.

Stay informed with Fortinet News / Tech News for the latest developments in the tech realm. As part of IT Networks’ commitment to cutting-edge solutions, our firewall products play a pivotal role in fortifying network security. Explore our firewall products to ensure your network remains resilient against evolving cyber threats. Visit our product page for more details on enhancing your network’s security.

Read More
Microsoft Uncovers Attempted Cloud Breach Via SQL Server Instance
06 Oct 2023



Tech News Updates In Karachi

In a recent investigation of Tech News, Microsoft revealed information about a cyber attack campaign in which threat actors attempted—but failed to—infiltrate a cloud environment using a SQL Server instance.


Hello there! Welcome to IT Networks, your go-to source for the latest in tech news. In a recent analysis conducted by security experts Sunders Bruskin, Hagai Ran Kestenberg, and Fady Nasereldeen, it was discovered that the breach in question was initiated through the exploitation of a SQL injection vulnerability within an application present in the target environment. Our company, IT Networks, recognizes the critical importance of fortifying cybersecurity measures to prevent such incidents.

The initial exploit provided the attackers with unauthorized access and elevated permissions on a Microsoft SQL Server instance deployed on an Azure Virtual Machine (VM). This underscores the necessity of robust security measures not only within applications but also across cloud environments.

Despite gaining access to the SQL Server instance, the attackers attempted to move laterally within the cloud resources by exploiting the server’s cloud identity. It’s worth noting that Microsoft has officially confirmed that there is no evidence suggesting the attackers successfully progressed to the cloud resources using this particular technique.

The attack unfolded with an SQL injection against the database server, allowing the adversaries to run queries for information gathering on the host, databases, and network configuration. In this context, it is suspected that the targeted application had elevated permissions, granting the attackers the ability to enable the xp_cmdshell option and execute operating system commands.

As part of their strategy, the attackers engaged in reconnaissance, downloading executables and PowerShell scripts, and establishing persistence through a scheduled task to initiate a backdoor script. To exfiltrate data discreetly, the attackers utilized a publicly accessible tool named webhook[.]site, minimizing the risk of detection by making outgoing traffic to the service appear legitimate.

In a noteworthy development related to cloud security, the attackers attempted to leverage the cloud identity of the SQL Server instance by accessing the instance metadata service and obtaining the cloud identity access key. This identity token, retrieved from the request to the IMDS identity’s endpoint, would have provided the necessary security credentials for the cloud identity.

However, the primary objective of abusing the token to carry out various operations on cloud resources faced an unspecified error, resulting in the operation’s failure. This incident underscores the growing sophistication of cloud-based attack techniques, with threat actors actively seeking out over-privileged processes, accounts, managed identities, and database connections for further malicious activities.

IT Networks emphasizes the importance of securing cloud identities to prevent exposure of SQL Server instances and associated cloud resources to similar risks. Our company is committed to providing comprehensive cybersecurity solutions, including robust measures to safeguard against evolving threats.

In connection to this, firewall implementation is crucial to fortify network defenses. A well-configured firewall, as provided by IT Networks, acts as a crucial barrier against unauthorized access and plays a pivotal role in preventing the exploitation of vulnerabilities. By incorporating advanced firewall technologies, organizations can enhance their resilience against evolving cyber threats and ensure the security of their cloud-based resources.

Read More