Your IP : 3.145.156.17


Current Path : /home/ncdcgo/mail/cur/
Upload File :
Current File : /home/ncdcgo/mail/cur/1592338819.M299455P8638.wh1.nita.go.ug,S=39935,W=40738:2,T

Return-Path: <ichaudhrey@fortinet.com>
Delivered-To: ncdcgo@wh1.nita.go.ug
Received: from wh1.nita.go.ug
	by wh1.nita.go.ug with LMTP
	id yAKcEYMp6V6+IQAAATiUCw
	(envelope-from <ichaudhrey@fortinet.com>)
	for <ncdcgo@wh1.nita.go.ug>; Tue, 16 Jun 2020 23:20:19 +0300
Return-path: <ichaudhrey@fortinet.com>
Envelope-to: gilbert.siima@ncdc.go.ug
Delivery-date: Tue, 16 Jun 2020 23:20:19 +0300
Received: from smtp.fortinet.com ([208.91.113.81]:39816)
	by wh1.nita.go.ug with esmtps  (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
	(Exim 4.93)
	(envelope-from <ichaudhrey@fortinet.com>)
	id 1jlI40-00048U-MN
	for gilbert.siima@ncdc.go.ug; Tue, 16 Jun 2020 23:20:19 +0300
Received: from mail.fortinet.com ([192.168.221.134])
	by smtp.fortinet.com  with ESMTP id 05GK5Asb026501-05GK5Asd026501
	(version=TLSv1.2 cipher=AES256-SHA256 bits=256 verify=FAIL);
	Tue, 16 Jun 2020 13:05:10 -0700
Received: from FGT-EXCH-MBX131.fortinet-us.com (192.168.221.131) by
 FGT-EXCH-MBX134.fortinet-us.com (192.168.221.134) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.1979.3; Tue, 16 Jun 2020 13:05:09 -0700
Received: from FGT-EXCH-MBX131.fortinet-us.com ([fe80::34cd:65fd:1993:4c41])
 by FGT-EXCH-MBX131.fortinet-us.com ([fe80::34cd:65fd:1993:4c41%8]) with mapi
 id 15.01.1979.003; Tue, 16 Jun 2020 13:05:09 -0700
From: Imran Chaudhrey <ichaudhrey@fortinet.com>
To: Imran Chaudhrey <ichaudhrey@fortinet.com>
Subject: Industry Trends - Securing Connections in the Cloud and Across All
 Your IoT Devices
Thread-Topic: Industry Trends - Securing Connections in the Cloud and Across
 All Your IoT Devices
Thread-Index: AdZBiCQ/iJ9HnPcyTcmnA3CfNrw//gCkUOuw
Date: Tue, 16 Jun 2020 20:05:09 +0000
Message-ID: <86a8fe6962a74a00bc53dcd4b30a8153@fortinet.com>
References: <a95806ad708242c5b0085a600ff044d4@fortinet.com>
In-Reply-To: <a95806ad708242c5b0085a600ff044d4@fortinet.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [41.90.145.253]
Content-Type: multipart/alternative;
	boundary="_000_86a8fe6962a74a00bc53dcd4b30a8153fortinetcom_"
MIME-Version: 1.0
X-FE-Policy-ID-smtp.fortinet.com: 392:1:4:SYSTEM
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; d=fortinet.com; s=dkim; c=relaxed/relaxed;
 h=from:to:subject:date:message-id:references:content-type:mime-version;
 bh=jYC5Uca+f3GMPcCNGj8MtJdN0os60s6A4VB7lnVA7Go=;
 b=Q3zJWi1c2V1Ak5w+9NXnQ6S83Sf7tbQrZWK9L6fZfjjU++wM9ey+xnjTR8OSfShy2H2mNPZmd0L7
	P3uK9E6WOwEnDnnKnCJ/FFps4VvNUgeNJrXdafph7xh8XEKa0a1dzKDzDhuPs0+4wBe0MQ6uI1Lr
	RCkNkWTYeUWLwGEyl6BXw5NtA71RV3j+wecw+yfM6faq4RZBK8v3+GklmGi0MFHt9InQRy3zALR/
	mO3EvEf5i//enEHCDtXgc1g1h+JHH5a9GzQtL6CuKXjyL1p0p8h4Od5+KJaEHOyR2TrtLtOr7qsN
	PYhzoeS3bJqIxfdx+cAWqwbfrMYghSND77jWBw==
X-Spam-Status: No, score=-2.1
X-Spam-Score: -20
X-Spam-Bar: --
X-Ham-Report: Spam detection software, running on the system "wh1.nita.go.ug",
 has NOT identified this incoming email as spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 Content preview:  Dear All - Welcome Back. The hyper-connected, global marketplace
    of the 21st century has shifted the landscape for networking and security.
    Two prevalent trends in this area-cloud adoption and the rise of the Internet
    of Thin [...] 
 Content analysis details:   (-2.1 points, 5.0 required)
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
 -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%
                             [score: 0.0000]
  0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was
                             blocked.  See
                             http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [URIs: fortinet.com]
  0.0 RCVD_IN_DNSWL_BLOCKED  RBL: ADMINISTRATOR NOTICE: The query to
                             DNSWL was blocked.  See
                             http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [208.91.113.81 listed in list.dnswl.org]
  0.0 RCVD_IN_MSPIKE_H3      RBL: Good reputation (+3)
                             [208.91.113.81 listed in wl.mailspike.net]
 -0.0 SPF_PASS               SPF: sender matches SPF record
 -0.0 SPF_HELO_PASS          SPF: HELO matches SPF record
  0.0 HTML_MESSAGE           BODY: HTML included in message
 -0.1 DKIM_VALID             Message has at least one valid DKIM or DK signature
  0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily
                             valid
 -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from
                             author's domain
 -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from
                             envelope-from domain
  0.0 RCVD_IN_MSPIKE_WL      Mailspike good senders
  0.0 T_REMOTE_IMAGE         Message contains an external image
X-Spam-Flag: NO

--_000_86a8fe6962a74a00bc53dcd4b30a8153fortinetcom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Dear All - Welcome Back.

The hyper-connected, global marketplace of the 21st century has shifted the=
 landscape for networking and security. Two prevalent trends in this area-c=
loud adoption and the rise of the Internet of Things<https://www.fortinet.c=
om/resources/cyberglossary/iot-security?utm_source=3Dblog&utm_campaign=3D20=
20-q2-iot-security> (IoT)-are seemingly two different components of digital=
 transformation, with separate purposes and scope. However, they actually w=
ork together, fueling one another in the digital ecosystem. This symbiotic =
relationship has important implications when it comes to deploying, using, =
and securing cloud services and the IoT.

As the number of IoT devices grows, so does the amount of data that they ge=
nerate. This is in addition to the massive stores of data that are already =
being amassed by businesses, governments, and even individuals - data that =
must be collected, processed, mined, and stored. Take, for example, the use=
 of sensors in warehouses where inventory can be tracked. This technology p=
rovides managers with essential data on purchasing trends so they are bette=
r equipped to manage inventory, especially on fast-selling items. Similar d=
evices in retail locations provide information not just about inventory, bu=
t everything from temperatures in refrigeration units to customer purchasin=
g trends.

IoT sensors installed on manufacturing equipment provide production manager=
s with critical information. Environmental data from these sensors signal e=
vidence of wear and tear on expensive equipment, alerting managers about ma=
intenance before that equipment fails and costs the organization millions o=
f dollars in lost productivity.

As a result of these and other use cases, organizations are finding that in=
 order to keep up with the massive amounts of data they are amassing, they =
need to act fast and build out their data management resources. For many, t=
his comes in the form of a standard, two-pronged solution: easily scalable =
cloud data centers and high-performing infrastructures developed to support=
 data mining for critical information.

An Increased Digital Footprint Results in Increased Risk

One of the top challenges associated with IoT adoption is security. Botnets=
 are the most common IoT cyber threat, causing Distributed Denial of Servic=
e (DDoS) attacks like the notorious Mirai, which infected tens of thousands=
 of IoT devices before causing massive disruption.

When compromised, IoT devices may do the following:

  1.  Intercept data being transmitted
  2.  Act as a vehicle for malware
  3.  Fall under control of a botnet to carry out a specific, disruptive ta=
sk such as DDoS

According to research<https://www.fortinet.com/fortiguard/threat-intelligen=
ce/threat-research.html?utm_source=3Dblog&utm_campaign=3D2019-q3-threat-res=
earch> conducted by the team at FortiGuard Labs, IoT devices were involved =
in half of the top 12 exploits last year. This is due primarily to the fact=
 that most IoT devices are designed with fault code, no built-in security m=
easures, and an inability to be updated even when network managers identify=
 a vulnerability.

IoT and the Cloud: A Uniquely Challenging Combination

Every IoT device is potentially another cloud connection, and every connect=
ion to the network represents yet another security vulnerability. So, what =
does this mean for your organization? As you develop new IoT assets and mov=
e to the cloud, your security strategies for both need to be in sync with o=
ne another. When an IoT device is compromised, your public and private clou=
ds are at risk, and this can eventually affect your core network and even y=
our customers.

How to Secure IoT and Cloud Connections

There are six key considerations when it comes to securing IoT and cloud en=
vironments:

  1.  Robust vulnerability management. Understanding what is on your networ=
k and the potential threats they pose is critical. Keeping track of your Io=
T devices ensures they can be updated with security patches (where possible=
), properly segmented and isolated, or protected using effective proximity =
controls that can offer defense in the case of an attack.
  2.  Compensating controls. By implementing proper controls, security team=
s can mitigate risks posed by those devices that can't be updated. Proximit=
y devices, including firewall and IPS systems, should be leveraged to ensur=
e the inspection of data moving between IoT devices and the cloud. Addition=
ally, behavior-based detection can be used to identify traffic discrepancie=
s, such as the communication between botnet command and control centers.
  3.  Encryption. This practice should be leveraged where possible to ensur=
e the confidentiality and integrity of data.
  4.  Hardened security at the cloud edge. Not all IoT environments are sec=
ure, so hardening the cloud network is essential. In addition to other miti=
gation efforts, avoiding DDoS attacks and malware is also a matter of inspe=
cting traffic at the cloud edge.
  5.  Integration and automation. The policies that govern security tools a=
nd the collection of security event data need to exist within the same mana=
gement platform. This will ensure event correlation, consistent functionali=
ties, reliable configuration delivery, and the orchestration and enforcemen=
t of policies all through a single pane of glass.
  6.  Security plus performance. Security platforms must be consistently re=
liable, no matter the environment in which they are deployed. Regardless of=
 whether they are deployed as a virtual instance or a physical appliance, t=
hey must be able to process large amounts of data without slowing down the =
collection and processing of critical data.

Final Thoughts

To maximize the benefits of digital transformation, organizations must empl=
oy effective security strategies for IoT devices and the cloud. A unified s=
trategy that addresses both the cloud and IoT using advanced threat intelli=
gence and automation is vital. This will secure critical connections moving=
 forward and set your organization up for success in the modern marketplace=
.

Learn how Fortinet's dynamic cloud security solutions<https://www.fortinet.=
com/solutions/enterprise-midsize-business/cloud-security.html?utm_source=3D=
blog&utm_campaign=3D2019-q2-multi-cloud> provide increased visibility and c=
ontrol across cloud infrastructures, enabling secure applications and conne=
ctivity from data center to cloud.
I look forward to hearing from you.

KR,
Imran

Imran Chaudhrey

Country Manager - East Africa

[FortinetLogosig1550861636.png]<http://www.fortinet.com/?utm_source=3Demail=
-signature&utm_medium=3Dsigstr&utm_campaign=3Dfortinet-logo>



E: ichaudhrey@fortinet.com<mailto:ichaudhrey@fortinet.com>
T: +254 (0)20 5137018
M: +254 (0)722 721110
Skype: imran.chaudhrey
13th Floor Delta Corner Tower 2
Nairobi, Kenya



www.fortinet.com<https://www.fortinet.com/?utm_source=3Demail-signature&utm=
_medium=3Dsigstr-company-url&utm_campaign=3Dsd-wan>    [Fortinetsocialtwitt=
ernew1550866064.png] <https://twitter.com/fortinet?utm_source=3Demail-signa=
ture&utm_medium=3Dsigstr&utm_campaign=3Dsocial-twitter>    [Fortinetsociall=
inkedinnew1550866125.png] <http://www.linkedin.com/company/fortinet?utm_sou=
rce=3Demail-signature&utm_medium=3Dsigstr&utm_campaign=3Dsocial-linkedin>  =
 [Fortinetsocialfbnew1550866196.png] <http://www.facebook.com/fortinet?utm_=
source=3Demail-signature&utm_medium=3Dsigstr&utm_campaign=3Dsocial-facebook=
>   [Fortinetsocialinstagramnew1550866291.png] <https://www.instagram.com/b=
ehindthefirewall/?utm_source=3Demail-signature&utm_medium=3Dsigstr&utm_camp=
aign=3Dsocial-instagram>    [Fortinetsocialblognew1550866342.png] <https://=
www.fortinet.com/blog?utm_source=3Demail-signature&utm_medium=3Dsigstr&utm_=
campaign=3Dsocial-blog>


[Get Started Today...]
<http://signatures.fortinet.com/uc/5dca8cb61a99af5ddb7ad2bf/c_5ec24d2c7d4d4=
f00eb9ef23d/b_5ec24e32f519450096f3137c>

--_000_86a8fe6962a74a00bc53dcd4b30a8153fortinetcom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
h2
	{mso-style-priority:9;
	mso-style-link:"Heading 2 Char";
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:18.0pt;
	font-family:"Times New Roman",serif;
	font-weight:bold;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p
	{mso-style-priority:99;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
span.Heading2Char
	{mso-style-name:"Heading 2 Char";
	mso-style-priority:9;
	mso-style-link:"Heading 2";
	font-family:"Times New Roman",serif;
	font-weight:bold;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-style-priority:99;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:387191640;
	mso-list-template-ids:-1831966576;}
@list l1
	{mso-list-id:806821000;
	mso-list-template-ids:-1525773290;}
@list l1:level1
	{mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level2
	{mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level3
	{mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level4
	{mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level5
	{mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level6
	{mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level7
	{mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level8
	{mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level9
	{mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2
	{mso-list-id:1012688876;
	mso-list-template-ids:739914298;}
@list l2:level1
	{mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2:level2
	{mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2:level3
	{mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2:level4
	{mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2:level5
	{mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2:level6
	{mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2:level7
	{mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2:level8
	{mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2:level9
	{mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l3
	{mso-list-id:1183587246;
	mso-list-template-ids:591046902;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Dear All &#8211; Welcome Back.<o:p></o:p></p>
<p><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-ser=
if;color:#211F22">The hyper-connected, global marketplace of the 21<sup>st<=
/sup>&nbsp;century has shifted the landscape for networking and security. T=
wo prevalent trends in this area&#8212;cloud adoption and
 the rise of the&nbsp;<a href=3D"https://www.fortinet.com/resources/cybergl=
ossary/iot-security?utm_source=3Dblog&amp;utm_campaign=3D2020-q2-iot-securi=
ty"><span style=3D"color:#DC291E">Internet of Things</span></a>&nbsp;(IoT)&=
#8212;are seemingly two different components of digital transformation,
 with separate purposes and scope. However, they actually work together, fu=
eling one another in the digital ecosystem. This symbiotic relationship has=
 important implications when it comes to deploying, using, and securing clo=
ud services and the IoT.&nbsp; &nbsp;<o:p></o:p></span></p>
<p style=3D"box-sizing: inherit;margin:2rem 0px 0px;font-variant-ligatures:=
 normal;font-variant-caps: normal;orphans: 2;text-align:start;widows: 2;-we=
bkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-=
color: initial;word-spacing:0px">
<span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;=
color:#211F22">As the number of IoT devices grows, so does the amount of da=
ta that they generate. This is in addition to the massive stores of data th=
at are already being amassed by businesses,
 governments, and even individuals &#8211; data that must be collected, pro=
cessed, mined, and stored. Take, for example, the use of sensors in warehou=
ses where inventory can be tracked. This technology provides managers with =
essential data on purchasing trends so
 they are better equipped to manage inventory, especially on fast-selling i=
tems. Similar devices in retail locations provide information not just abou=
t inventory, but everything from temperatures in refrigeration units to cus=
tomer purchasing trends.<o:p></o:p></span></p>
<p style=3D"box-sizing: inherit;margin:2rem 0px 0px;font-variant-ligatures:=
 normal;font-variant-caps: normal;orphans: 2;text-align:start;widows: 2;-we=
bkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-=
color: initial;word-spacing:0px">
<span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;=
color:#211F22">IoT sensors installed on manufacturing equipment provide pro=
duction managers with critical information. Environmental data from these s=
ensors signal evidence of wear and tear on expensive
 equipment, alerting managers about maintenance before that equipment fails=
 and costs the organization millions of dollars in lost productivity.&nbsp;=
<o:p></o:p></span></p>
<p style=3D"box-sizing: inherit;margin:2rem 0px 0px;font-variant-ligatures:=
 normal;font-variant-caps: normal;orphans: 2;text-align:start;widows: 2;-we=
bkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-=
color: initial;word-spacing:0px">
<span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;=
color:#211F22">As a result of these and other use cases, organizations are =
finding that in order to keep up with the massive amounts of data they are =
amassing, they need to act fast and build out
 their data management resources. For many, this comes in the form of a sta=
ndard, two-pronged solution: easily scalable cloud data centers and high-pe=
rforming infrastructures developed to support data mining for critical info=
rmation.&nbsp;<o:p></o:p></span></p>
<h2 style=3D"box-sizing: inherit;letter-spacing:0.1rem;font-size:3rem;margi=
n:3rem 0px 0px;font-variant-ligatures: normal;font-variant-caps: normal;orp=
hans: 2;text-align:start;widows: 2;-webkit-text-stroke-width: 0px;text-deco=
ration-style: initial;text-decoration-color: initial;word-spacing:0px">
<span style=3D"font-size:14.0pt;font-family:&quot;Calibri&quot;,sans-serif;=
color:#211F22;font-weight:normal">An Increased Digital Footprint Results in=
 Increased Risk<o:p></o:p></span></h2>
<p style=3D"box-sizing: inherit;margin:2rem 0px 0px;font-variant-ligatures:=
 normal;font-variant-caps: normal;orphans: 2;text-align:start;widows: 2;-we=
bkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-=
color: initial;word-spacing:0px">
<span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;=
color:#211F22">One of the top challenges associated with IoT adoption is se=
curity. Botnets are the most common IoT cyber threat, causing Distributed D=
enial of Service (DDoS) attacks like the notorious
 Mirai, which infected tens of thousands of IoT devices before causing mass=
ive disruption.&nbsp;<o:p></o:p></span></p>
<p style=3D"box-sizing: inherit;margin:2rem 0px 0px;font-variant-ligatures:=
 normal;font-variant-caps: normal;orphans: 2;text-align:start;widows: 2;-we=
bkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-=
color: initial;word-spacing:0px">
<span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;=
color:#211F22">When compromised, IoT devices may do the following:&nbsp;&nb=
sp;<o:p></o:p></span></p>
<ol start=3D"1" type=3D"1">
<li class=3D"MsoNormal" style=3D"color:#211F22;mso-margin-top-alt:auto;mso-=
margin-bottom-alt:auto;mso-list:l2 level1 lfo3;box-sizing: inherit">
Intercept data being transmitted &nbsp;<o:p></o:p></li><li class=3D"MsoNorm=
al" style=3D"color:#211F22;mso-margin-top-alt:auto;mso-margin-bottom-alt:au=
to;mso-list:l2 level1 lfo3;box-sizing: inherit">
Act as a vehicle for malware<o:p></o:p></li><li class=3D"MsoNormal" style=
=3D"color:#211F22;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-li=
st:l2 level1 lfo3;box-sizing: inherit">
Fall under control of a botnet to carry out a specific, disruptive task suc=
h as DDoS<o:p></o:p></li></ol>
<p style=3D"box-sizing: inherit;margin:2rem 0px 0px;font-variant-ligatures:=
 normal;font-variant-caps: normal;orphans: 2;text-align:start;widows: 2;-we=
bkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-=
color: initial;word-spacing:0px">
<span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;=
color:#211F22">According to&nbsp;<a href=3D"https://www.fortinet.com/fortig=
uard/threat-intelligence/threat-research.html?utm_source=3Dblog&amp;utm_cam=
paign=3D2019-q3-threat-research"><span style=3D"color:#DC291E">research</sp=
an></a>&nbsp;conducted
 by the team at FortiGuard Labs, IoT devices were involved in half of the t=
op 12 exploits last year. This is due primarily to the fact that most IoT d=
evices are designed with fault code, no built-in security measures, and an =
inability to be updated even when
 network managers identify a vulnerability.&nbsp;<o:p></o:p></span></p>
<h2 style=3D"box-sizing: inherit;letter-spacing:0.1rem;font-size:3rem;margi=
n:3rem 0px 0px;font-variant-ligatures: normal;font-variant-caps: normal;orp=
hans: 2;text-align:start;widows: 2;-webkit-text-stroke-width: 0px;text-deco=
ration-style: initial;text-decoration-color: initial;word-spacing:0px">
<span style=3D"font-size:14.0pt;font-family:&quot;Calibri&quot;,sans-serif;=
color:#211F22;font-weight:normal">IoT and the Cloud: A Uniquely Challenging=
 Combination<o:p></o:p></span></h2>
<p style=3D"box-sizing: inherit;margin:2rem 0px 0px;font-variant-ligatures:=
 normal;font-variant-caps: normal;orphans: 2;text-align:start;widows: 2;-we=
bkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-=
color: initial;word-spacing:0px">
<span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;=
color:#211F22">Every IoT device is potentially another cloud connection, an=
d every connection to the network represents yet another security vulnerabi=
lity. So, what does this mean for your organization?
 As you develop new IoT assets and move to the cloud, your security strateg=
ies for both need to be in sync with one another. When an IoT device is com=
promised, your public and private clouds are at risk, and this can eventual=
ly affect your core network and
 even your customers.&nbsp;<o:p></o:p></span></p>
<h2 style=3D"box-sizing: inherit;letter-spacing:0.1rem;font-size:3rem;margi=
n:3rem 0px 0px;font-variant-ligatures: normal;font-variant-caps: normal;orp=
hans: 2;text-align:start;widows: 2;-webkit-text-stroke-width: 0px;text-deco=
ration-style: initial;text-decoration-color: initial;word-spacing:0px">
<span style=3D"font-size:14.0pt;font-family:&quot;Calibri&quot;,sans-serif;=
color:#211F22;font-weight:normal">How to Secure IoT and Cloud Connections<o=
:p></o:p></span></h2>
<p style=3D"box-sizing: inherit;margin:2rem 0px 0px;font-variant-ligatures:=
 normal;font-variant-caps: normal;orphans: 2;text-align:start;widows: 2;-we=
bkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-=
color: initial;word-spacing:0px">
<span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;=
color:#211F22">There are six key considerations when it comes to securing I=
oT and cloud environments:<o:p></o:p></span></p>
<ol start=3D"1" type=3D"1">
<li class=3D"MsoNormal" style=3D"color:#211F22;mso-margin-top-alt:auto;mso-=
margin-bottom-alt:auto;mso-list:l1 level1 lfo6;box-sizing: inherit">
<b>Robust vulnerability management.</b>&nbsp;Understanding what is on your =
network and the potential threats they pose is critical. Keeping track of y=
our IoT devices ensures they can be updated with security patches (where po=
ssible), properly segmented and isolated,
 or protected using effective proximity controls that can offer defense in =
the case of an attack.&nbsp;<o:p></o:p></li><li class=3D"MsoNormal" style=
=3D"color:#211F22;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-li=
st:l1 level1 lfo6;box-sizing: inherit">
<b>Compensating controls.</b>&nbsp;By implementing proper controls, securit=
y teams can mitigate risks posed by those devices that can&#8217;t be updat=
ed. Proximity devices, including firewall and IPS systems, should be levera=
ged to ensure the inspection of data moving
 between IoT devices and the cloud. Additionally, behavior-based detection =
can be used to identify traffic discrepancies, such as the communication be=
tween botnet command and control centers.<o:p></o:p></li><li class=3D"MsoNo=
rmal" style=3D"color:#211F22;mso-margin-top-alt:auto;mso-margin-bottom-alt:=
auto;mso-list:l1 level1 lfo6;box-sizing: inherit">
<b>Encryption.</b>&nbsp;This practice should be leveraged where possible to=
 ensure the confidentiality and integrity of data.&nbsp;<o:p></o:p></li><li=
 class=3D"MsoNormal" style=3D"color:#211F22;mso-margin-top-alt:auto;mso-mar=
gin-bottom-alt:auto;mso-list:l1 level1 lfo6;box-sizing: inherit">
<b>Hardened security at the cloud edge.</b>&nbsp;Not all IoT environments a=
re secure, so hardening the cloud network is essential. In addition to othe=
r mitigation efforts, avoiding DDoS attacks and malware is also a matter of=
 inspecting traffic at the cloud edge.<o:p></o:p></li><li class=3D"MsoNorma=
l" style=3D"color:#211F22;mso-margin-top-alt:auto;mso-margin-bottom-alt:aut=
o;mso-list:l1 level1 lfo6;box-sizing: inherit">
<b>Integration and automation.</b>&nbsp;The policies that govern security t=
ools and the collection of security event data need to exist within the sam=
e management platform. This will ensure event correlation, consistent funct=
ionalities, reliable configuration delivery,
 and the orchestration and enforcement of policies all through a single pan=
e of glass.<o:p></o:p></li><li class=3D"MsoNormal" style=3D"color:#211F22;m=
so-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l1 level1 lfo6;b=
ox-sizing: inherit">
<b>Security plus performance.</b>&nbsp;Security platforms must be consisten=
tly reliable, no matter the environment in which they are deployed. Regardl=
ess of whether they are deployed as a virtual instance or a physical applia=
nce, they must be able to process large
 amounts of data without slowing down the collection and processing of crit=
ical data.<o:p></o:p></li></ol>
<h2 style=3D"box-sizing: inherit;letter-spacing:0.1rem;font-size:3rem;margi=
n:3rem 0px 0px;font-variant-ligatures: normal;font-variant-caps: normal;orp=
hans: 2;text-align:start;widows: 2;-webkit-text-stroke-width: 0px;text-deco=
ration-style: initial;text-decoration-color: initial;word-spacing:0px">
<span style=3D"font-size:14.0pt;font-family:&quot;Calibri&quot;,sans-serif;=
color:#211F22;font-weight:normal">Final Thoughts<o:p></o:p></span></h2>
<p style=3D"box-sizing: inherit;margin:2rem 0px 0px;font-variant-ligatures:=
 normal;font-variant-caps: normal;orphans: 2;text-align:start;widows: 2;-we=
bkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-=
color: initial;word-spacing:0px">
<span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;=
color:#211F22">To maximize the benefits of digital transformation, organiza=
tions must employ effective security strategies for IoT devices and the clo=
ud. A unified strategy that addresses both the
 cloud and IoT using advanced threat intelligence and automation is vital. =
This will secure critical connections moving forward and set your organizat=
ion up for success in the modern marketplace.&nbsp;<o:p></o:p></span></p>
<p style=3D"box-sizing: inherit;margin:2rem 0px 0px;font-variant-ligatures:=
 normal;font-variant-caps: normal;orphans: 2;text-align:start;widows: 2;-we=
bkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-=
color: initial;word-spacing:0px">
<i><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-ser=
if;color:#211F22">Learn how&nbsp;<a href=3D"https://www.fortinet.com/soluti=
ons/enterprise-midsize-business/cloud-security.html?utm_source=3Dblog&amp;u=
tm_campaign=3D2019-q2-multi-cloud"><span style=3D"color:#DC291E">Fortinet&#=
8217;s
 dynamic cloud security solutions</span></a>&nbsp;provide increased visibil=
ity and control across cloud infrastructures, enabling secure applications =
and connectivity from data center to cloud.</span></i><span style=3D"font-s=
ize:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:#211F22"><o:p><=
/o:p></span></p>
<p class=3D"MsoNormal">I look forward to hearing from you.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">KR,<o:p></o:p></p>
<p class=3D"MsoNormal">Imran<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<table class=3D"MsoNormalTable" border=3D"0" cellspacing=3D"3" cellpadding=
=3D"0">
<tbody>
<tr>
<td style=3D"padding:.75pt .75pt .75pt .75pt">
<table class=3D"MsoNormalTable" border=3D"0" cellspacing=3D"3" cellpadding=
=3D"0">
<tbody>
<tr>
<td style=3D"padding:.75pt .75pt .75pt .75pt">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.5pt;font-family:&quot=
;Arial&quot;,sans-serif">Imran&nbsp;Chaudhrey</span></b><span style=3D"font=
-size:12.0pt;font-family:&quot;Times New Roman&quot;,serif"><o:p></o:p></sp=
an></p>
</td>
</tr>
<tr>
<td style=3D"padding:.75pt .75pt .75pt .75pt">
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span style=3D"font-s=
ize:10.5pt;font-family:&quot;Arial&quot;,sans-serif">Country Manager - East=
 Africa
</span><span style=3D"font-size:12.0pt;font-family:&quot;Times New Roman&qu=
ot;,serif"><o:p></o:p></span></p>
</td>
</tr>
<tr>
<td width=3D"404" style=3D"width:300.0pt;border:none;border-bottom:solid #5=
A646C 1.0pt;padding:.75pt .75pt .75pt .75pt">
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><a href=3D"http://www=
.fortinet.com/?utm_source=3Demail-signature&amp;utm_medium=3Dsigstr&amp;utm=
_campaign=3Dfortinet-logo"><span style=3D"font-size:12.0pt;font-family:&quo=
t;Times New Roman&quot;,serif;color:blue;text-decoration:none"><img border=
=3D"0" width=3D"155" height=3D"18" style=3D"width:1.6111in;height:.1875in" =
id=3D"_x0000_i1025" src=3D"http://signatures.fortinet.com/cf/signature_fiel=
ds/5c6474a55c44e5525b8c88cb/FortinetLogosig1550861636.png" alt=3D"FortinetL=
ogosig1550861636.png"></span></a><span style=3D"font-size:12.0pt;font-famil=
y:&quot;Times New Roman&quot;,serif"><o:p></o:p></span></p>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td style=3D"padding:.75pt .75pt .75pt .75pt">
<table class=3D"MsoNormalTable" border=3D"0" cellspacing=3D"3" cellpadding=
=3D"0">
<tbody>
<tr>
<td width=3D"404" style=3D"width:300.0pt;border:none;border-bottom:solid #5=
A646C 1.0pt;padding:.75pt .75pt .75pt .75pt">
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span style=3D"font-s=
ize:10.5pt;font-family:&quot;Arial&quot;,sans-serif"><br>
<span style=3D"color:#848484">E:&nbsp;<a href=3D"mailto:ichaudhrey@fortinet=
.com">ichaudhrey@fortinet.com</a><br>
T:&nbsp;&#43;254 (0)20 5137018 <br>
M:&nbsp;&#43;254 (0)722 721110 <br>
Skype:&nbsp;imran.chaudhrey<br>
13th Floor Delta Corner Tower 2 <br>
Nairobi, Kenya </span></span><span style=3D"font-size:12.0pt;font-family:&q=
uot;Times New Roman&quot;,serif"><o:p></o:p></span></p>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td style=3D"padding:.75pt .75pt .75pt .75pt">
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ar=
ial&quot;,sans-serif;color:red">&nbsp;<br>
</span><a href=3D"https://www.fortinet.com/?utm_source=3Demail-signature&am=
p;utm_medium=3Dsigstr-company-url&amp;utm_campaign=3Dsd-wan"><span style=3D=
"font-size:10.5pt;font-family:&quot;Arial&quot;,sans-serif;color:red">www.f=
ortinet.com</span></a><span style=3D"font-size:10.5pt;font-family:&quot;Ari=
al&quot;,sans-serif;color:red">&nbsp;
 &nbsp; </span><a href=3D"https://twitter.com/fortinet?utm_source=3Demail-s=
ignature&amp;utm_medium=3Dsigstr&amp;utm_campaign=3Dsocial-twitter"><span s=
tyle=3D"font-size:10.5pt;font-family:&quot;Arial&quot;,sans-serif;color:red=
;text-decoration:none"><img border=3D"0" width=3D"16" height=3D"16" style=
=3D"width:.1666in;height:.1666in" id=3D"_x0000_i1026" src=3D"http://signatu=
res.fortinet.com/cf/signature_fields/5c6474a55c44e5525b8c88cb/Fortinetsocia=
ltwitternew1550866064.png" alt=3D"Fortinetsocialtwitternew1550866064.png"><=
/span></a><span style=3D"font-size:10.5pt;font-family:&quot;Arial&quot;,san=
s-serif;color:red">&nbsp;
 &nbsp;</span><a href=3D"http://www.linkedin.com/company/fortinet?utm_sourc=
e=3Demail-signature&amp;utm_medium=3Dsigstr&amp;utm_campaign=3Dsocial-linke=
din"><span style=3D"font-size:10.5pt;font-family:&quot;Arial&quot;,sans-ser=
if;color:red;text-decoration:none"><img border=3D"0" width=3D"16" height=3D=
"16" style=3D"width:.1666in;height:.1666in" id=3D"_x0000_i1027" src=3D"http=
://signatures.fortinet.com/cf/signature_fields/5c6474a55c44e5525b8c88cb/For=
tinetsociallinkedinnew1550866125.png" alt=3D"Fortinetsociallinkedinnew15508=
66125.png"></span></a><span style=3D"font-size:10.5pt;font-family:&quot;Ari=
al&quot;,sans-serif;color:red">&nbsp;
</span><a href=3D"http://www.facebook.com/fortinet?utm_source=3Demail-signa=
ture&amp;utm_medium=3Dsigstr&amp;utm_campaign=3Dsocial-facebook"><span styl=
e=3D"font-size:10.5pt;font-family:&quot;Arial&quot;,sans-serif;color:red;te=
xt-decoration:none"><img border=3D"0" width=3D"16" height=3D"16" style=3D"w=
idth:.1666in;height:.1666in" id=3D"_x0000_i1028" src=3D"http://signatures.f=
ortinet.com/cf/signature_fields/5c6474a55c44e5525b8c88cb/Fortinetsocialfbne=
w1550866196.png" alt=3D"Fortinetsocialfbnew1550866196.png"></span></a><span=
 style=3D"font-size:10.5pt;font-family:&quot;Arial&quot;,sans-serif;color:r=
ed">&nbsp;
</span><a href=3D"https://www.instagram.com/behindthefirewall/?utm_source=
=3Demail-signature&amp;utm_medium=3Dsigstr&amp;utm_campaign=3Dsocial-instag=
ram"><span style=3D"font-size:10.5pt;font-family:&quot;Arial&quot;,sans-ser=
if;color:red;text-decoration:none"><img border=3D"0" width=3D"16" height=3D=
"16" style=3D"width:.1666in;height:.1666in" id=3D"_x0000_i1029" src=3D"http=
://signatures.fortinet.com/cf/signature_fields/5c6474a55c44e5525b8c88cb/For=
tinetsocialinstagramnew1550866291.png" alt=3D"Fortinetsocialinstagramnew155=
0866291.png"></span></a><span style=3D"font-size:10.5pt;font-family:&quot;A=
rial&quot;,sans-serif;color:red">&nbsp;
 &nbsp;</span><a href=3D"https://www.fortinet.com/blog?utm_source=3Demail-s=
ignature&amp;utm_medium=3Dsigstr&amp;utm_campaign=3Dsocial-blog"><span styl=
e=3D"font-size:10.5pt;font-family:&quot;Arial&quot;,sans-serif;color:red;te=
xt-decoration:none"><img border=3D"0" width=3D"16" height=3D"16" style=3D"w=
idth:.1666in;height:.1666in" id=3D"_x0000_i1030" src=3D"http://signatures.f=
ortinet.com/cf/signature_fields/5c6474a55c44e5525b8c88cb/Fortinetsocialblog=
new1550866342.png" alt=3D"Fortinetsocialblognew1550866342.png"></span></a><=
span style=3D"font-size:12.0pt;font-family:&quot;Times New Roman&quot;,seri=
f"><o:p></o:p></span></p>
</td>
</tr>
</tbody>
</table>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ti=
mes New Roman&quot;,serif"><br>
</span><a href=3D"http://signatures.fortinet.com/uc/5dca8cb61a99af5ddb7ad2b=
f/c_5ec24d2c7d4d4f00eb9ef23d/b_5ec24e32f519450096f3137c"><span style=3D"fon=
t-size:12.0pt;font-family:&quot;Times New Roman&quot;,serif;color:blue;text=
-decoration:none"><img border=3D"0" width=3D"450" height=3D"120" style=3D"w=
idth:4.6875in;height:1.25in" id=3D"_x0000_i1031" src=3D"http://signatures.f=
ortinet.com/uc/5dca8cb61a99af5ddb7ad2bf/c_5ec24d2c7d4d4f00eb9ef23d/b_5ec24e=
32f519450096f3137c/img" alt=3D"Get Started Today..."><br>
</span></a><o:p></o:p></p>
</div>
</body>
</html>

--_000_86a8fe6962a74a00bc53dcd4b30a8153fortinetcom_--