John Maddison

Sr. Vice President, Products and Solutions at Fortinet

John Maddison has more than 20 years of experience in the telecommunications, IT Infrastructure, and security industries. Previously he held positions as general manager data center division and senior vice president core technology at Trend Micro. Before that John was senior director of product management at Lucent Technologies. He has lived and worked in Europe, Asia, and the United States. John graduated with a bachelor of telecommunications engineering degree from Plymouth University, United Kingdom.

The Value of Third Party Testing
BrandPost Fortinet

The Value of Third Party Testing


Building an Adaptive and Secure SD-WAN Framework to Support Digital Transformation

Building an Adaptive and Secure SD-WAN Framework to Support Digital Transformation

Organizations are facing new business and technological pressures, such as the rise in the number and variety of smart devices, and the growth of an increasingly mobile workforce. Demands for greater performance across a...

Resolving the Challenges of IT-OT Convergence

Resolving the Challenges of IT-OT Convergence

For decades, computer and data networks – known as Information Technology (IT), and industrial control system (ICS) operations and process control groups – often labeled as Operations Technology (OT), have run as isolated and...

Machine Learning Stops Web Application Threats while Reducing False Positives

Machine Learning Stops Web Application Threats while Reducing False Positives

Cybercriminals are increasingly targeting public and internal web applications. Today, nearly half of all data breaches are caused by attacks targeting web application vulnerabilities. To protect your organization from such...

Fireside Chat with Halifax Health: Protecting Patient Data with Firewalls and AI

Fireside Chat with Halifax Health: Protecting Patient Data with Firewalls and AI

Halifax Health, based in Daytona Beach, is the largest healthcare provider in east central Florida, with 678 licensed beds and more than 500 doctors on its staff spread across two hospitals. “We are a hospital system that that...

Security Services Bridge Gaps Caused by Fragmented Network Environments

Security Services Bridge Gaps Caused by Fragmented Network Environments

Nearly everyone can agree that the security challenges enterprises face today require out of the box thinking. Our Quarterly Threat Landscape reports show today’s threats are designed to target multiple attack vectors, expose...

Realizing the Full Potential of Secure SD-WAN

Realizing the Full Potential of Secure SD-WAN

The growing appeal of SD-WAN technologies has caught the attention of the IT world. The benefits of efficient cloud adoption, broad application visibility, and lowered operating costs have combined to create a powerful value...

Your Multi-Cloud Security Checklist: 8 Things CISOs Need to Remember

Your Multi-Cloud Security Checklist: 8 Things CISOs Need to Remember

Cloud computing is an inherently dynamic and rapidly changing space. With the vast majority of organizations now adopting multi-cloud environments, the breadth and depth of the attack surface has expanded rapidly. This has...

Is Converging Your IT and OT Networks Putting Your Organization at Risk?

Is Converging Your IT and OT Networks Putting Your Organization at Risk?

In the new digital economy, data – and what you do with that data – is the key to success. Consumers and employees alike now demand instant access to critical information that allows them to solve problems, make informed...

Are Endpoints Integrated Into Your Network Security Strategy?

Are Endpoints Integrated Into Your Network Security Strategy?

One of the biggest challenges facing organizations today is the need to respond quickly to an increasingly mobile workforce and customer base. Data and services are the lifeline between organizations and consumers as well as...

Bridging the Gap Between Network and Security Operations

Bridging the Gap Between Network and Security Operations

Managing today’s increasingly distributed and complex networks is taxing even the best-funded IT teams. The ongoing requirement to adapt the network to the demands of the new digital marketplace has engineers traditionally focused...

Digital Business Requires Digital Security

Digital Business Requires Digital Security

Adapting to the new digital economy requires organizations to not just retool their networks, but in many cases, core business processes as well. The creation, exchange, and analysis of data – about customers, products, and their...

Load More