An Insight on FortiOS 5

FortiOS 5 is an advanced Firewall Security System providing three times “MORE”: security, control and intelligence. Designed to fight the latest threats the firewall has to face, it is an on-device heuristic engine based on the behavior analysis of each network’s client device. The information provided is specific, enabling the identification of systems that are compromised or subject to latent attacks.

The AV cloud-based services that FortiOS provides come with a sandbox for operating systems and with a database for botnet IP search. The AV database signatures are recommended by a superior industry, making the firewall’s latest malware search unbeatable.

Build as a top-class operating system, the 5th generation’s target is to completely secure devices, providing last-minute performance and protection. Its cooperating services are meant to see attacks before they happen and to improve the mitigation and visibility of the latest threats.

The FortiASIC incorporated processors increase the FortiOS 5’s performance, accelerating the hardware’s response for the multi-threat low-latency security. It is known that this firewall’s protection and performance is unmatched.

Furthermore, the Security Firewall reduces the costs with protection and the workloads of the IT staff. While underplaying the challenges of configuration and development and choosing new virtual or physical appliances for FortiGate, the system enforces a unique policy of security in order to match the environment and simplify the entire process.

Some of the specific features of the FortiOS products are:

  • the Analysis of the Client Reputation;
  • the incorporated sandbox;
  • the personalized policies for the security of each device;
  • the inspection of the traffic encrypted with SSL;
  • the prevention of data loss (DLP);
  • the web filtering;
  • the control of the network’s endpoint access (NAC);
  • management from a central device;
  • higher availability;
  • numerous updates;
  • secure access for the guest account,
  • antivirus;
  • antispam;
  • management of the vulnerability;
  • optimization of WAN;
  • security for VoIP and virtual domains.

With over 150 features added, the new FortiOS 5 is the solution all enterprises can adopt in order to be well equipped and to defeat the latest threats, to protect their network against the large amount of potentially harmful applications.

Thanks to its three “MORE” ingredients, the firewall offers higher security and defeats more threats. The feature analyzing the client’s reputation provides specific information on any device that can contribute to the system’s defeat. It also has more control over any BYOD environment and mobile device, having specific security and accessing profiles based on device type, group, usage or location.

Last but not least, the FortiOS 5 is more intelligent, applying automatic policy acceptance based on role for guests or users following the location point, the data or the profile of the application. Enhanced analysis and reports provide another intelligent feature, allowing the network’s administrator to closely inspect every user, device, application or threat.

Announced along with three other features, FortiAnalyzer 5.0, FortiClient 5.0 and FortiManager 5.0, FortiOS 5 addresses enterprises searching for a high management solution for their network infrastructure and devices, avoiding threats, breaches, dead-points, all without considerable efforts and without a large amount of time spent.

For more information on how you can get Fortinet Products or Services, please call Dolomite Technology toll-free at 1-855-365-6648.

Is Security Better in Windows 8?

Microsoft is receiving wide praise for the security features it has built in the upcoming Windows 8 OS.  Here are some of the major ones.

Windows Defender

Windows Defender has been improved as an antivirus software, replacing and incorporating the best features of Microsoft Security Essentials. Although Microsoft will continue to update the latter for versions of the OS, it will update Defender as well.

Defender will function as a standalone antivirus package, comfortable to the other major antivirus packages and able to protect computers against, viruses, spyware and malware. Users may use other antivirus software that OEMs have installed and will be given short time to do so or activate the powerful  Windows Defender.

BitLocker

Microsoft’s encryption software has proven to be essential for businesses by allowing protection of data from main drives to portable devices. Introduced in Vista, Windows 8 offers several improvements in BitLocker for the user and better and faster deployment in client and server scenarios.

Administrators can now pre-provision BitLocker encryption in drive volumes before the operating system is installed. This saves time from the previously required full-scale application of the program.

The software also has a new feature that allows encryption of only the used part of the drive’s volume. This procedure is especially fitting for new drives. Additionally, a user can now change passwords or initial PINs reducing administrative time. This can also be limited at the Group Policy level.

Secure Boot

In the late 1990s, Intel began working on a programmable shell that could code system protection procedures in the system processor as trusted platform modules (TPM). TPMs mechanisms create digital signing keys that could be fed into the BIOS firmware and recognize only legitimate executables and drivers to run, effectively keeping rootkits outside the booting process.

Intel soon joined an industry consortium that included AMD, ARM and Microsoft to produce Unified Extensible Firmware Interface (UEFI). Essentially, the kernel of the Windows 8 operating system protects and authenticates itself from instructions written in the CPU. The Secure Boot process in this way becomes a Trusted Boot process.

Under Microsoft’s UEFI, each component in the BIOS is digitally signed by the company and verified by a TPM key in the BIOS, allowing the main bus and peripherals to boot up and open the OS. This procedure is nearly ironclad in protecting the booting process from rootkits. As one industry pundit puts it, like Apple, Microsoft has practically married its operating system to its hardware.

UEFI also denies boot entrance of other operating systems such as the various varieties of Linux. These vendors must get digital signature keys, functioning basically as code certificates,that can be mapped in the firmware and authenticated as be part of the secure boot system. Several Linux vendors are in discussion with Microsoft regarding Windows 8 while several antivirus vendors are also adapting their platforms.

Other Features

There are many other features of the full Windows 8 security package.  Metro apps run in low-privilege AppContainers that don’t have deep access to the rest of the machine. This feature is also built in the Internet Explorer 10 browser as the SmartScreen filter improved from Internet Explorer 9. Each tab of the browser runs in a sandbox configuration that doesn’t affect the other tabs. SmartScreen has been proven to outperform other browsers in its ability to block malware.

If Windows 8 becomes corrupt, it can easily restore itself in two ways. Under the Refresh option, factory defaults of the operating system are restored and the user’s personal data are retained. The Reset option, erases all data and Windows 8 is effectively restored. Security is definitely stronger and better in Windows 8.

Technology Challenges for Small Businesses

Technology’s ever changing ways can be confusing and overwhelming, especially when trying to manage a small business. Whether it be a health clinic, a law firm, an accounting firm, or human resources center; the technology problems are somewhat the same, and can be fairly easily and affordably resolved.

In the Health Care field, the introduction of Electronic Medical Records (EMRs) to replace the old ways of paper file and record keeping has prompted many larger healthcare clinics to make the switch to a paper-free system (60%), but the smaller (one to two person) practices had, for the most part, not followed suit. Part of this is to do with expense; it can be spendy to try and build a HIPAA/HITECH compliant data center, especially for a smaller practice, but there are providers (like Dolomite Technology) who offer off-site HIPAA compliant data center services that ensure compliance with the HIPAA restrictions, which saves small businesses a lot of money and headache.

Another technological scare for small Healthcare clinics can be deciding on a server. Most EMR Medical Billing Software systems are client/server based. The server is one main computer for the office that can be accessed by multiple “client” computers. So when picking a server one should keep in mind reliability and performance because the rest of the system will be counting on that one computer to keep it up and running. The next choice to be made is between using a system of Wireless Tablet PCs or Workstations. While workstations are more traditional and typically easier to get the hang of, they tend to be less accessible and more time consuming and expensive than Wireless Tablet PCs which allow physicians to go room to room documenting electronically as they visit each patient. However, there is a much greater learning curve for someone trying to get acquainted with the functions of the tablet as well as the EMR system as opposed to someone who needs only figure out the EMR system.

For law firms, it is necessary to store a large amount of private information, which brings things like encrypted external hard drives into play. What that also brings into play, though, is Case and Practice Management software, which is helpful for a smaller practice because it lessens the workload and, when properly organized and structures gives attorneys easy and immediate access to the information they need to keep track of a case and make informed decisions. It also allows attorneys to conveniently manage client and case information, including contacts, calendars, and documents. Many Programs also link to PDAs so that calendars and schedules are always on hand. The American Bar Association website has a chart comparing the different types of software available.

In terms of hardware, attorneys should look into lightweight laptops with a good battery life and wireless capabilities. Tablets can be useful for reading emails, briefs, or interrogatories on the go, the iPad, Samsung Galaxy Tab, and Sony Tablet S each have large screens, good battery lives, and easy to use keyboards; but the Wacom Bamboo Tablet allows one to hook it up to their desktop and allow them to easily annotate and diagram briefs and interrogatories.

In the world of Finance and Accounting, things are a little different. There are less complex hardware and software systems to worry about. Management Accounting challenges usually involve collection, recording, and reporting financial information from several divisions or departments. An easy way for a small business owner to simplify things would be installing Business Technology Software as part of the management accounting process. A comprehensive list of accounting software options can be found here. Accounting software allows a business owner to create financial reports so that the software automatically creates a financial report electronically. This saves a lot of time, but does require that accountants look over the reports to ensure complete accuracy. Generally the only thing a small accounting business has to worry about in terms of hardware is keeping their computer up to date, backing up their information, and possibly investing in a Cash Counter to increase efficiency and eradicate error in terms of counting money.

For Human Resources, most technological challenges center around the newfound surge of telecommuting and telework. Remote reporting relationships have become standard in the human resources industry, and while working from home can be appealing, it requires a lot of motivation and focus. With new technological advancements, however, human resource managers are able to track applicants and manage the recruitment process more effectively by using specialized software.

Hosted Software and Cloud Services free a company up from investing in hardware and upkeep because all of the information is handled by a separate third party. However, some businesses prefer to keep an in-house system so that they are able to maintain direct control. This option does require some hardware and upkeep, though. An example of in-house software would be SimpleHR software, which has both a single and multi-user version. The single use version is intended for fifty or fewer employees (making it perfect for a smaller business) and hooks up to a single PC. Hosted HR software won’t require any kind of extensive hardware and the main concern for business owners will be backing up information and keeping the computer up to date.

For all types of business, backing up information through the use of an offsite managed backup services is a good idea; as is keeping all computer systems up to date. Mostly, it is important to keep in mind that there is no strict set of things that will work for every single group, and things can be altered and tailored to fit the specific needs of any business.

5 Simple Ways To Avoid Getting An Avalanche Of Spam

In the past Dolomite, and many other companies, have discussed ways of getting off SPAM list as well as other ways to get your Inbox back. These discussions are usually core concepts in our Email Solutions discussions. Many years ago we released a white-paper that talked about some of the core tips to implement as part of any email solutions plan. With the constant changes in technology, we felt now is a good time to update that document and re-release it to the public. As you read through this, please keep in mind that if you have any questions, we at Dolomite are here to help.

In the mean time, here you go …


As you probably already know from firsthand experience, once you’re on a spammer’s list, it’s next to impossible to get off. And changing your e-mail address can be a major inconvenience especially if you rely on it to stay in touch with important business and personal contacts.

To reduce the chances of your e-mail address getting spammed, here are 5 simple preventative measures you can take that will go a long way in keeping not-so-delicious spam out of your in-box.

1. Use a disposable e-mail address or email alias.

If you buy products online or occasionally subscribe to websites that interest you, chances are you’re going to get spammed.

To avoid your main e-mail address from ending up on their broadcast list, set up a free Internet e-mail address or alias with Gmail or other email providers and use it when buying or opting in to online newsletters. You can also use a throwaway e-mail address when making purchases or subscribing to newsletters (see #4 below).

If you do not like having to check multiple email address then have it forward all email through to your main email.

That’s all there is too it. Every once in a while, especially if you see yourself beginning to see a lot of SPAM, simply delete your email alias and begin again. All that SPAM with the disposable email will now have no where to go, freeing up your email Inbox.

2. Pay attention to check boxes that automatically opt you in.

Whenever you subscribe to a website or make a purchase online, be very watchful of small, pre-checked boxes that say, “Yes! I want to receive offers from third party companies.”

If you do not un-check the box to opt-out, your e-mail address can (and will) be sold to every online advertiser.  To avoid this from happening, simply take a closer look at every online form you fill out.

3. Don’t use your main e-mail address on your website, web forums, or newsgroups.

Spammers have special programs that can glean e-mail addresses from websites without your permission. If you are posting to a web forum or newsgroup, use your disposable e-mail address instead of your main e-mail address.

If you want to post an e-mail address on your home page, use “info@” and have all replies forwarded to a folder in your in-box that won’t interfere with your main address. If you have access to the HTML editor for your webpage, you can replace the “@” symbol with the HTML characters “@”. This will not stop all website scrapers and programs from harvesting your email address, but it will cause errors for quite a few helping to reduce potential SPAM a bit more.

4. Create throwaway e-mail accounts.

If you own a web domain, all mail going to an address at your domain is probably set up to come directly to you by default.  For example, an e-mail addressed to anything@yourdomain.com will be delivered to your in-box.

This is a great way to fight spam without missing out on important e-mails you want to get. The next time you sign up for a newsletter, use the title of the website in your e-mail address. For example, if the website is titled “technologysecrets.com”, enter “technologysecrets@yourdomain.com” as your e-mail address. If you get spammed, look at what address the spam was sent to.

If technologysecrets@yourdomain.com shows up as the original recipient, you know the source since that e-mail address was unique to that web site. Now you can easily stop the spam by making any e-mail sent to that address bounce back to the sender.

5. Don’t open, reply to or try to opt-out of obvious spam e-mails.

Opening, replying to, or even clicking a bogus opt-out link in an obvious spam e-mail signals that your e-mail address is active, and more spam will follow.

The only time it is safe to click on the opt-out link or reply to the e-mail is when the message was sent from a company you know or do business with (for example, a company that you purchase from or a newsletter you subscribed to).


Finally! A Way To Stop Spam, Spyware, And Pop-Ups From Taking Over Your Computer

If you are absolutely fed up with the number of spam e-mails you get every day, the annoying pop-ups being shoved in your face when you surf the net, and advertisers installing spyware on your computer to monitor your every move and serve up unwanted ads, then please read on.

We’re Waging War Against Spam, Spyware, and Pop-Ups!

Dolomite Technology has been working with customers for years to help stop SPAM from getting to their mailbox. For years, this has been the largest complaint we heard from people who later become our customers. In addition, we scan their email to help prevent viruses from getting through the mail filters as well, the second biggest concern for many people .

Needless to say, our customer no longer worry about SPAM, Viruses, Malware, or Spyware. Why? Because Dolomite Technology has a program that not only guarantees 100% email process, but will filter SPAM, Viruses, Malware, Spyware and other harmful items from your email.

If you are suffering from an email problem, or just want some help managing your email, check out our Email Solutions page.