More organizations than ever are conducting business online. An expanding digital footprint and increasingly sophisticated cyber attacks have created a growing urgency to secure that data and the resources organizations are deploying.
Ken Xie
Ninety percent of cyber security companies begin in the detection stage. The issue is there are so many applications and alarming messages it is difficult for the user or the administrator to manage.
Cyber security is a dynamic space. The user faces different challenges every year because there are always new applications and data.
Cisco presents our biggest challenge in the firewall market for the fact that they have such a large percentage of market share. Displacement of an entrenched incumbent is always a challenge.
When you start off with your first company, you are learning as part of the process and you make mistakes. The important thing is to recover quickly and learn from the experience.
The reality is that there are simply not enough skilled humans available to properly plan, manage, integrate, and optimize security devices, strategies, and protocols.
All the new data, applications, and e-commerce that are created have to be managed and protected. Additionally, when there is a new application, the old application is still there, and has to be protected.
The threat landscape continues to expand, while cyber threats are continually becoming more sophisticated. This has convinced organizations to expand their security policies and deploy more security solutions.
Fortinet was founded in 2000 with the goal of making an impactful change in the network security space.
You no longer can say that inside a company everything is trusted because you could bring in a contaminated device. And it's the same thing with data, because so much is no longer stored inside a company.
As for the endpoint market, vendors such as McAfee and Symantec hold tremendous brand equity due to their consumer products. This of course translates to brand awareness in the enterprise, too.
Even beginning to teach cybersecurity awareness at an early age can pique the interest of future researchers, engineers, and administrators.
From the beginning, we have fostered a culture that embraces our entrepreneurial spirit and values innovation that puts our customers first.
Actually, we got paid because the name Fortinet is so close to Fortnite, so I'm fine with their name being close to ours.
My parents, who were both professors at Tsinghua University, hoped that I would follow in their footsteps and become a professor.
Becoming an effective security professional requires more than knowing how to deploy and configure technology. It requires combining security theory with practical, hands-on experience.
We talk a lot in Silicon Valley about product pipelines and sales pipelines, but what about talent pipelines? It is, after all, talent - people - who give us products to sell.
With security, in the early days, we would just have firewalls and you'd check who could come into the network and who could not.
We recognize that our employees are instrumental to our success, which is why we look for the best and the brightest in the industry. We consider ourselves not only a technology company, but also a learning company.
If you knew the user, you'd let them in. But, the content could contain a lot of dangerous stuff, even if you know the person using that content, you have to check what's inside there. That's where Fortinet started, trying to go deep inside of content, or inside an application to make sure those were secure.
Working with higher education institutions can also help to aid cybersecurity professionals who are already in the workforce. Programs like these can help to move the industry forward by building rigorous and universally accepted certifications and changing expectations of what a security expert can and should be.
The cloud presents a variety of new opportunities for Fortinet, ranging from how we leverage our own cloud-based technologies to make networks more secure, to actually developing the solutions that help secure the cloud infrastructure.
Our view is that if the network is involved, then we are there to protect it. Based on that, future developments will revolve around ensuring data, networks and applications are protected.
Although a number of network security programs are already emerging in colleges and universities, security is a field that benefits from hands-on experience in real-world situations.