Gamified virtual conference with network security training of network security products

    公开(公告)号:US11412016B2

    公开(公告)日:2022-08-09

    申请号:US16915727

    申请日:2020-06-29

    申请人: Fortinet, Inc.

    摘要: Systems and methods for demonstrating network security products in a virtual conference and providing training to attendees of a network security training session in the virtual conference through the use of gamification are provided. A server generates a dedicated virtual environment for a particular attendee. A three-dimensional (3D) user interface for the virtual conference is presented on a display of the particular attendee, which represents a simulated conference environment with each network security product being demonstrated as a virtual booth represented in the conference environment. A game client causes the particular attendee to navigate in the 3D user interface to a first virtual booth to access a first learning objective relating to demonstration of a first network security product corresponding to the first booth. A progress report, which is maintained by the server, is used to notify regarding other learning objectives that are of potential interest to the particular attendee.

    Building a cooperative security fabric of hierarchically interconnected network security devices

    公开(公告)号:US11019029B2

    公开(公告)日:2021-05-25

    申请号:US16834064

    申请日:2020-03-30

    申请人: Fortinet, Inc.

    摘要: Systems and methods for implementing a cooperative security fabric (CSF) protocol are provided. According to one embodiment, an NSD of multiple NSDs participates in the dynamic construction of a CSF interconnecting the NSDs in a form of a tree, having multiple nodes each representing one of the NSDs, based on hierarchical interconnections between the NSD and directly connected upstream and downstream NSDs. A communication channel is established by a backend daemon of the NSD with a directly connected upstream node of the NSD within the CSF through which queries and replies are communicated and through which periodic keep-alive messages and responses are exchanged between the upstream node and the NSD. A CSF protocol is enforced by a forward daemon of the NSD that limits issuance of query messages to those originated by a source NSD representing an upstream node and directed to a destination NSD representing a downstream node.

    Detecting access points located within proximity of a computing device for troubleshooting of a network

    公开(公告)号:US11588699B2

    公开(公告)日:2023-02-21

    申请号:US16824556

    申请日:2020-03-19

    申请人: Fortinet, Inc.

    摘要: Systems and methods for detecting access points proximate to a mobile computing device to facilitate wireless network troubleshooting and management of the access points are provided. According to an embodiment, a mobile application, running on a mobile device that is operating within a physical environment, discovers a subset of wireless access points (APs) of various managed APs of a private network that are proximate to the mobile device by receiving short-range beacons originated by the subset of APs. The mobile application presents a list of the subset of APs within a user interface of the mobile application and bridges the physical environment and a network environment containing information regarding the private network. The mobile application facilitates management of a particular AP of the subset of APs by presenting configuration information or operating information for the particular AP within the user interface.

    Remote monitoring of a security operations center (SOC)

    公开(公告)号:US11477240B2

    公开(公告)日:2022-10-18

    申请号:US16452667

    申请日:2019-06-26

    申请人: Fortinet, Inc.

    IPC分类号: H04L9/00 H04L9/40

    摘要: Systems and methods for remote monitoring of a Security Operations Center (SOC) via a mobile application are provided. According to one embodiment, a management service retrieves information regarding multiple network elements that are associated with an enterprise network and extracts parameters of the monitored network elements from the retrieved information. The management service prioritizes the monitored network elements by determining a severity level associated with security-related issues of the network elements and generates various monitoring views that summarize in real time various categories of potential security-related issues detected by the SOC. Further, the management service assigns a priority to each monitoring view and displays a video on the display device that cycles through monitoring views in accordance with their respective assigned priorities.

    Gamified network security training using dedicated virtual environments simulating a deployed network topology of network security products

    公开(公告)号:US11475790B2

    公开(公告)日:2022-10-18

    申请号:US16457556

    申请日:2019-06-28

    申请人: Fortinet, Inc.

    IPC分类号: G06F3/14 G09B19/00 H04L67/10

    摘要: Systems and methods are described for providing training to attendees of a network security training session through use of gamification. A virtual environment is created containing a network topology simulating a deployed network of network security devices for which teams of the attendees are to receive training. A 3D game interface is presented on a display of a computer system of an attendee. Based on a leaderboard server's game state, a problem-solving objective for the training session is presented on the display. The virtual environment facilitates interactions by the attendee with the network security devices via real web interfaces of corresponding full-feature virtual network security appliances in connection with attempts by the attendee to complete the objectives. Upon completion of an objective, the leaderboard server's game state is updated. Based on the game state of a group of objectives a second group of problem-solving objectives is presented to the attendee.

    DETECTING ACCESS POINTS LOCATED WITHIN PROXIMITY OF A COMPUTING DEVICE FOR TROUBLESHOOTING OF A NETWORK

    公开(公告)号:US20210297317A1

    公开(公告)日:2021-09-23

    申请号:US16824556

    申请日:2020-03-19

    申请人: Fortinet, Inc.

    IPC分类号: H04L12/24 H04W4/80 H04B17/27

    摘要: Systems and methods for detecting access points proximate to a mobile computing device to facilitate wireless network troubleshooting and management of the access points are provided. According to an embodiment, a mobile application, running on a mobile device that is operating within a physical environment, discovers a subset of wireless access points (APs) of various managed APs of a private network that are proximate to the mobile device by receiving short-range beacons originated by the subset of APs. The mobile application presents a list of the subset of APs within a user interface of the mobile application and bridges the physical environment and a network environment containing information regarding the private network. The mobile application facilitates management of a particular AP of the subset of APs by presenting configuration information or operating information for the particular AP within the user interface.

    BUILDING A COOPERATIVE SECURITY FABRIC OF HIERARCHICALLY INTERCONNECTED NETWORK SECURITY DEVICES

    公开(公告)号:US20200236144A1

    公开(公告)日:2020-07-23

    申请号:US16834064

    申请日:2020-03-30

    申请人: Fortinet, Inc.

    IPC分类号: H04L29/06 H04W24/02 H04L12/24

    摘要: Systems and methods for implementing a cooperative security fabric (CSF) protocol are provided. According to one embodiment, an NSD of multiple NSDs participates in the dynamic construction of a CSF interconnecting the NSDs in a form of a tree, having multiple nodes each representing one of the NSDs, based on hierarchical interconnections between the NSD and directly connected upstream and downstream NSDs. A communication channel is established by a backend daemon of the NSD with a directly connected upstream node of the NSD within the CSF through which queries and replies are communicated and through which periodic keep-alive messages and responses are exchanged between the upstream node and the NSD. A CSF protocol is enforced by a forward daemon of the NSD that limits issuance of query messages to those originated by a source NSD representing an upstream node and directed to a destination NSD representing a downstream node.

    Building a cooperative security fabric of hierarchically interconnected network security devices

    公开(公告)号:US10686839B2

    公开(公告)日:2020-06-16

    申请号:US15855230

    申请日:2017-12-27

    申请人: Fortinet, Inc.

    IPC分类号: H04L29/06 H04L12/24 H04W24/02

    摘要: Systems and methods for implementing a cooperative security fabric (CSF) protocol are provided. According to one embodiment, a CSF of multiple network security devices (NSDs) deployed within a protected network is constructed in a form of a tree, having a root node, one or more intermediate nodes and one or more leaf nodes, based on hierarchical interconnections among the NSDs by determining a relative upstream or downstream relationship among each NSD. Backend daemons of the NSDs establish and maintain a bi-directional tunnel between each parent node within the CSF and its respective child nodes through which queries and replies are communicated and through which periodic keep-alive messages and responses are exchanged. Forward daemons of the NSDs enforce a CSF protocol that limits the issuance of query messages to those originated by an upstream node within the CSF and directed to a downstream node within the CSF.

    BUILDING A COOPERATIVE SECURITY FABRIC OF HIERARCHICALLY INTERCONNECTED NETWORK SECURITY DEVICES

    公开(公告)号:US20180324217A1

    公开(公告)日:2018-11-08

    申请号:US15855230

    申请日:2017-12-27

    申请人: Fortinet, Inc.

    IPC分类号: H04L29/06

    摘要: Systems and methods for implementing a cooperative security fabric (CSF) protocol are provided. According to one embodiment, a CSF of multiple network security devices (NSDs) deployed within a protected network is constructed in a form of a tree, having a root node, one or more intermediate nodes and one or more leaf nodes, based on hierarchical interconnections among the NSDs by determining a relative upstream or downstream relationship among each NSD. Backend daemons of the NSDs establish and maintain a bi-directional tunnel between each parent node within the CSF and its respective child nodes through which queries and replies are communicated and through which periodic keep-alive messages and responses are exchanged. Forward daemons of the NSDs enforce a CSF protocol that limits the issuance of query messages to those originated by an upstream node within the CSF and directed to a downstream node within the CSF.