Fortinet Announces Response Plan to 'Solar Winds Hacking Case'


Fortinet Korea (www.fortinet.com/kr) announced a three-step countermeasure to the recent 'SolarWinds hacking incident'. This hacking incident is affecting not only US government agencies but also private companies around the world. 

Fortinet announced that it is proceeding with ▲intrusion detection stage ▲protection/report/response against malicious code 'SUNBURST' distributed through SolarWinds software ▲monitoring and incident response solutions.

When Fortinet's FortiResponder Incident Response Team detects a breach, it creates a free tool for any organization that may be vulnerable to a backdoor breach, and requests access to each local Fortinet office. Fortinet's Fortinet EDR solution immediately blocks the attack of the malicious code'Sunburst' distributed with SolarWinds software. Fortinet's security research institute FortiGuard Labs provides updates to detect the malicious code and responds to attacks by deploying FortiClient and FortiAnalyzer.

Fortinet monitors and responds to incidents through its recently acquired Panopta. Panopta provides full-stack visibility for hybrid environments, diagnoses, and treats.

Fortinet Korea's CEO Won-gyun Cho said, “Fortinet continues to analyze all published data on SolarWinds' Sunburst/UNC2452.” “Fortinet scans its cloud data lake and ) Function to block it.”

Post a Comment

0 Comments