John Maddison

CMO and Executive Vice President, Products at Fortinet

John Maddison has more than 20 years of experience in the telecommunications, IT Infrastructure, and security industries. Previously he held positions as general manager data center division and senior vice president core technology at Trend Micro. Before that John was senior director of product management at Lucent Technologies. He has lived and worked in Europe, Asia, and the United States. John graduated with a bachelor of telecommunications engineering degree from Plymouth University, United Kingdom.

The Problem with Too Many Security Options

The Problem with Too Many Security Options

For organizations looking to expand or upgrade their security, there is literally too much information to consume.

Securing Today’s Distributed Enterprise Requires an Open Security Ecosystem

Securing Today’s Distributed Enterprise Requires an Open Security Ecosystem

A security architecture built around a framework of open standards not only ensures interoperability, but also increases performance.

A Comprehensive Solution to Ensure Network Availability, Performance, and Security at the Youth Olympic Games

A Comprehensive Solution to Ensure Network Availability, Performance, and Security at the Youth Olympic Games

The Youth Olympic Games, one of the largest sporting events in the world, required a security solution that could protect a large-scale IT infrastructure and keep the event running smoothly.

Bolstering Endpoint Security

Bolstering Endpoint Security

While organizations are able to ensure that endpoint clients are installed on company-owned assets, security becomes more challenging when workers use their personal devices for work-related activities.

Leveraging UEBA to Address Insider Threats

Leveraging UEBA to Address Insider Threats

The real challenge lies in discovering any attack in its very earliest stages, long before any damaging compromise can happen

Addressing Today’s Risks Requires Reliable Threat Intelligence

Addressing Today’s Risks Requires Reliable Threat Intelligence

Having a sense of urgency but not knowing where the threat is coming from is the equivalent of frantically wading around through flood water carrying a fire extinguisher.

Addressing New Security Challenges with 5G

Addressing New Security Challenges with 5G

Organizations cannot afford to wait to build their strategies, they need to begin planning now to ensure they have the technical and human resources in place to support and secure their 5G opportunity.

How Fortinet Helps Bridgeway Senior Healthcare Protect PHI and Provide Top-Notch Care

How Fortinet Helps Bridgeway Senior Healthcare Protect PHI and Provide Top-Notch Care

Bridgeway Senior Healthcare's first priority is patient care. In order to protect patient health information and provide top-notch senior living care, the team turned to the Fortinet Security Fabric and FortiVoice solution to maintain...

Enabling Robust Security with Intent-based Segmentation

Enabling Robust Security with Intent-based Segmentation

Supporting and securing business intent enables CIOs to fullfill their fiduciary duty to digitally transform and tear down those walls that inhibit business growth, while protecting all critical data, network resources, and...

Unidentified Devices Leave Networks Vulnerable

Unidentified Devices Leave Networks Vulnerable

As organizations embrace digital transformation to improve operational efficiency, IoT devices—including industrial and medical IoT—are being deployed at an unprecedented rate. This rapid adoption of IoT is one of the primary...

Fireside Chat with School District of Philadelphia: Securing Virtual Servers,  Chromebooks, and Student Data

Fireside Chat with School District of Philadelphia: Securing Virtual Servers, Chromebooks, and Student Data

The School District of Philadelphia is the eighth-largest public school district in the United States, with more than 134,000 students and more than 18,000 staff. “Although we’re large, we are an inner-city district,” Keith Busby,...

Addressing the Cyber Skills Gap with Great Talent

Addressing the Cyber Skills Gap with Great Talent

One of the most pressing concerns of today’s CSO is filling positions in their security teams with qualified, trained, and motivated security professionals. The few applicants trickling out of universities may have deep...

The Value of Third Party Testing

The Value of Third Party Testing

We all wrestle with the challenges of security in today's digital marketplace. The security landscape and potential attack surfaces continue to expand, and malware and exploits continue to become more sophisticated. However, one...

Building an Adaptive and Secure SD-WAN Framework to Support Digital Transformation

Building an Adaptive and Secure SD-WAN Framework to Support Digital Transformation

Organizations are facing new business and technological pressures, such as the rise in the number and variety of smart devices, and the growth of an increasingly mobile workforce. Demands for greater performance across a...

Resolving the Challenges of IT-OT Convergence

Resolving the Challenges of IT-OT Convergence

For decades, computer and data networks – known as Information Technology (IT), and industrial control system (ICS) operations and process control groups – often labeled as Operations Technology (OT), have run as isolated and...

Machine Learning Stops Web Application Threats while Reducing False Positives

Machine Learning Stops Web Application Threats while Reducing False Positives

Cybercriminals are increasingly targeting public and internal web applications. Today, nearly half of all data breaches are caused by attacks targeting web application vulnerabilities. To protect your organization from such...

Fireside Chat with Halifax Health: Protecting Patient Data with Firewalls and AI

Fireside Chat with Halifax Health: Protecting Patient Data with Firewalls and AI

Halifax Health, based in Daytona Beach, is the largest healthcare provider in east central Florida, with 678 licensed beds and more than 500 doctors on its staff spread across two hospitals. “We are a hospital system that that...

Security Services Bridge Gaps Caused by Fragmented Network Environments

Security Services Bridge Gaps Caused by Fragmented Network Environments

Nearly everyone can agree that the security challenges enterprises face today require out of the box thinking. Our Quarterly Threat Landscape reports show today’s threats are designed to target multiple attack vectors, expose...

Realizing the Full Potential of Secure SD-WAN

Realizing the Full Potential of Secure SD-WAN

The growing appeal of SD-WAN technologies has caught the attention of the IT world. The benefits of efficient cloud adoption, broad application visibility, and lowered operating costs have combined to create a powerful value...

Your Multi-Cloud Security Checklist: 8 Things CISOs Need to Remember

Your Multi-Cloud Security Checklist: 8 Things CISOs Need to Remember

Cloud computing is an inherently dynamic and rapidly changing space. With the vast majority of organizations now adopting multi-cloud environments, the breadth and depth of the attack surface has expanded rapidly. This has...

Load More