
What I'm seeing is fairly frequent "drops" in connection over the tunnel after it's been established. I'm hoping someone here has run into similar issues before and been able to find a fix for the problem We unfortunately do not (currently) have a support contract that includes in-depth technical support on the FortiClient side and I've been through the channels on the FortiGate side on everything that's available for them to tell me. They also steal intellectual property, which many times makes its way into the hands of Chinese competitors, hurting the hacked companies for years to come in ways many didn't expect.I'm looking for some help with getting our Fortinet SSL VPN using FortiClient into a stable and workable state. Nonetheless, not all customers have heeded the company's advice, and these organizations might end up paying a steeper price later down the road.Ĭhinese APTs (advanced threat groups) don't just breach into foreign targets (companies, government organizations, universities) for the purpose of intelligence gathering or political cyber-espionage. Gordon said that these efforts have been fruitful, as the majority of the company's customers had successfully applied the patch by late August.

"Customers that still need assistance should contact Pulse Secure support using the contact information on the following URL: " "We also offered assistance to customers to apply the patch fix for these vulnerabilities even if they were not under an active maintenance contract," Gordon said. "In addition, Pulse Secure support engineers have been available 24x7, including weekends and holidays, to help customers who need assistance to apply the patch fix. "Our customer success managers have also been directly contacting and working with customers," he added.


"We not only issued a public Security Advisory - SA44101, but commencing that day in April, we actively informed our customers, partners and service providers of the availability and need for the patch via email, in-product alerts, on our community site, within our partner portal, and our customer support web site," Scott Gordon, Chief Marketing Officer at Pulse Secure, told ZDNet in an email, describing the company's efforts to notify customers. A second scan performed last week found that the number barely went down, reaching 10,500.īut the blame here doesn't seem to be on Pulse Secure. On the other hand, Pulse Secure was a lot more active in notifying customers, but that didn't mean clients heeded the company's advice.Ī scan in mid-August found that almost 14,500 of the 42,000 Pulse Secure SSL VPN servers were still running a vulnerable version. Pulse Secure warned and contacted customers
