• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Fortinet Reaffirms Its Commitment to Secure Product Development Processes and Responsible Vulnerability Disclosure Policies

by CXO Staff
May 21, 2024
in News

As one of the first cybersecurity vendors to sign CISA’s Secure by Design pledge, Fortinet furthers its dedication to a culture of responsible radical transparency with the safety of customers top of mind

Fortinet Reaffirms Its Commitment to Secure Product Development Processes and Responsible Vulnerability Disclosure Policies

Fortinet announced it is building on the company’s long-standing commitment to responsible radical transparency as an early signer of the Secure by Design pledge developed by the Cybersecurity and Infrastructure Security Agency (CISA). This voluntary industry pledge complements and builds on existing Fortinet software security best practices, including those developed by CISA, NIST, other federal agencies, and international and industry partners. The pledge outlines seven goals, including responsible vulnerability disclosure policies, which are already an integral part of Fortinet’s product security development.

Jim Richberg, Head of Cyber Policy and Global Field CISO at Fortinet said, “At Fortinet, we have a long-standing commitment to being a role model in ethical and responsible product development and vulnerability disclosure. As part of this dedication, Fortinet has proactively aligned to international and industry best practices and upholds the highest security standards in every aspect of our business. We applaud CISA’s continued call to the industry to follow suit and appreciate CISA’s willingness to collaborate with Fortinet on the development of these important goals. We strongly encourage others in the technology community to join this effort to keep organisations secure.”

 

Advancing Fortinet’s Commitment to Secure by Design Principles and Responsible Disclosure Processes

CISA’s latest initiative strongly aligns to Fortinet’s existing product development processes already based on Secure by Design and Secure by Default principles. Fortinet is committed to adhering to robust product security scrutiny at all stages of the product development lifecycle, helping to ensure that security is designed into each product from inception all the way through to end of life, in the following ways:

  • Secure Product Development Lifecycle (SPDLC): Fortinet aligns its processes in accordance with leading standards, including NIST 800-53, NIST 800-161, NIST 800-218, US EO 14028, and UK Telecom Security Act.
  • Robust Security Product Testing: Fortinet leverages tools and techniques such as static application security testing (SAST) and software composition analysis built into its build processes, dynamic application security testing (DAST), vulnerability scanning, and fuzzing prior to each release, as well as penetration testing and manual code audits.
  • Trusted Supplier Program: To ensure rigorous selection and qualification of its major manufacturing partners, Fortinet adheres to NIST 800-161: Cybersecurity Supply Chain Risk Management Practices for Systems and Organisations. Fortinet’s commitment to data privacy and security is embedded in every part of the company’s business and in every phase of the product development, manufacturing, and delivery processes.
  • Information Security Program: The Fortinet Information Security Program is based on and aligned with industry-leading security standards and frameworks including ISO 27001/2, ISO 27017 and 27018, and NIST 800-53, as well as data privacy regulations such as GDPR and CCPA.
  • Third-Party Certifications: Fortinet products are regularly certified to standard and validated through third-party product quality standards, including NIST FIPS 140-2 and NIAP Common Criteria NDcPP / EAL4+.

Additionally, the Fortinet Product Security Incident Response Team (PSIRT) is responsible for maintaining security standards for Fortinet products and operates one of the industry’s most robust PSIRT programs, including proactively and transparently disclosing vulnerabilities. Nearly 80% of Fortinet vulnerabilities discovered in 2023 were identified internally through the company’s rigorous auditing process. This proactive approach enables fixes to be developed and implemented before malicious exploitation can occur. Fortinet works with its customers, independent security researchers, consultants, industry organisations, and other vendors to accomplish the company’s PSIRT mission.

To further advance its dedication to a culture of responsible radical transparency, Fortinet has a long-standing commitment to public and private partnerships that align to its mission, including:

  • As a founding member of the Network Resilience Coalition, Fortinet is helping deliver real-world solutions to protect networks and sensitive data, including addressing the issue of software and hardware updates and patches not being implemented.
  • Through its membership with the Joint Cyber Defense Collaborative (JCDC), which was established by CISA in 2021, Fortinet works with public and private entities to gather, analyse, and share actionable information to more proactively protect and defend against cyberthreats.
  • As a founding member of the Cyber Threat Alliance (CTA), Fortinet shares timely threat intelligence with other cybersecurity practitioners to better protect customers against adversaries.
  • Working with global leaders as a founding member of the World Economic Forum’s Centre for Cybersecurity (C4C), Fortinet is helping to encourage intelligence sharing across the industry to reduce global cyberattacks and disrupt cybercrime.

 

Supporting Quotes

“Over and over, across multiple sectors, we have learned that transparency improves outcomes for consumers and society. The cybersecurity industry is no different. In our sector, transparency includes searching for, mitigating, and disclosing vulnerabilities in an open, responsible manner. Fortinet has already taken steps to embrace such responsible transparency, creating a clear set of principles for handling vulnerability communication and analysis. The company’s leadership in this area is a strong example of how cybersecurity vendors should be communicating with customers and the broader public.” – Michael Daniels, President and CEO of the Cyber Threat Alliance (CTA)

 

“The dedication to a secure-by-design approach to product development is foundational to strong security. We see vendors like Fortinet leading the way in following and applying these principles globally, principles which are also outlined in Australia’s Essential Eight framework, as a significant step forward in enhancing our collective security.” – Peter Jennings, Director, Strategic Analysis Australia and member of Fortinet’s Strategic Advisory Council

 

“Risk identification and assessment are two of the most crucial components of risk management, whether you’re on the battlefield or protecting an IT environment. Fortinet’s approach to transparency, vulnerability disclosure, and threat intelligence sharing is one that the broader cybersecurity industry should emulate.” -General Sir Richard Sheriff, retired NATO General

 

“In today’s dynamic environment, enhanced transparency is vital to making every organisation more secure. It’s encouraging to see Fortinet at the forefront of embracing radical transparency as the company leans forward in sharing information about vulnerabilities and threat information.” – Suzanne Spaulding, former Undersecretary at the U.S. Department of Homeland Security

 

“Collaboration between governments and private sector companies is and will continue to be integral to staying ahead of cyber threats. As a member of the Fortinet Board of Directors, I’ve seen firsthand and applaud how this cyber leader works with public and private organisations to transparently share threat intelligence and support national security efforts.” -Admiral James Stavridis, Former 4-star Admiral and Supreme Allied Commander of NATO

Tags: featured2Fortinet
ShareTweet

Related Posts

Pure Storage introduces the Enterprise Data Cloud
Future

Pure Storage introduces the Enterprise Data Cloud

Pure Storage has introduced the Enterprise Data Cloud (EDC), a bold new standard in data and storage management simplicity that...

June 19, 2025
HCLSoftware targets Middle East growth with XDO Framework launch in Dubai
Future

HCLSoftware targets Middle East growth with XDO Framework launch in Dubai

HCLSoftware, the enterprise software division of HCLTech, kicked off its high-octane Executive Summit at Madinat Jumeirah on June 3. The invitation-only...

June 18, 2025

Discussion about this post

Latest Issue

Pure Storage introduces the Enterprise Data Cloud

Pure Storage introduces the Enterprise Data Cloud

June 19, 2025
HCLSoftware targets Middle East growth with XDO Framework launch in Dubai

HCLSoftware targets Middle East growth with XDO Framework launch in Dubai

June 18, 2025
EQT Completes Acquisition of WSO2

Kiteworks acquire Zivver

June 18, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.