{"id":2713,"date":"2025-04-10T13:10:22","date_gmt":"2025-04-10T13:10:22","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=2713"},"modified":"2025-04-10T13:10:22","modified_gmt":"2025-04-10T13:10:22","slug":"fortinet-embeds-ai-capabilities-across-security-fabric-platform","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=2713","title":{"rendered":"Fortinet embeds AI capabilities across Security Fabric platform"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Fortinet has expanded support for AI across its core\u00a0<a href=\"https:\/\/www.networkworld.com\/article\/2077650\/fortinet-grows-integrated-network-security-platform-with-expansive-management-ai-features.html\">cybersecurity platform<\/a>\u00a0to protect enterprise customers from evolving threats and simplify network and security operations.<\/p>\n<p>Specifically, Fortinet has expanded the role its FortiAI technology plays in its Security Fabric platform to offer customers more intelligent automation, proactive defense, and operational efficiencies than the current implementation.\u00a0<\/p>\n<p><a href=\"https:\/\/www.networkworld.com\/article\/3958421\/fortinet-embeds-ai-capabilities-across-security-fabric-platform.html\">Continue reading on Network World<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Fortinet has expanded support for AI across its core\u00a0cybersecurity platform\u00a0to protect enterprise customers from evolving threats and simplify network and security operations. Specifically, Fortinet has expanded the role its FortiAI technology plays in its Security Fabric platform to offer customers more intelligent automation, proactive defense, and operational efficiencies than the current implementation.\u00a0 Continue reading on [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":2714,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2713","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2713"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2713"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2713\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/2714"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2713"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2713"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}