{"id":7239,"date":"2026-04-27T15:00:32","date_gmt":"2026-04-27T13:00:32","guid":{"rendered":"https:\/\/7networks.ch\/7news\/fortios-8-0-ai-visibility\/"},"modified":"2026-04-27T15:00:32","modified_gmt":"2026-04-27T13:00:32","slug":"fortios-8-0-ai-visibility","status":"publish","type":"7news","link":"https:\/\/7networks.ch\/en\/7news\/fortios-8-0-ai-visibility\/","title":{"rendered":"FortiOS 8.0: AI Visibility"},"content":{"rendered":"<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Network security is undergoing a profound transformation. With the massive adoption of generative AI and the emergence of the first autonomous AI agents in enterprise environments, the traffic crossing networks is no longer generated only by users: increasingly, it is applications and agents communicating with one another, accessing data, and making decisions without direct human intervention. <\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">In this context, <strong>Fortinet<\/strong> unveiled <strong>FortiOS 8.0<\/strong> at Accelerate 2026 \u2014 the most significant release in years of the operating system that powers the Security Fabric. This is not an incremental update, but a paradigm shift addressing two critical areas: AI-driven security and quantum-safe protection. <\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"text-text-100 mt-2 -mb-1 text-base font-bold\">AI-driven security: knowing what&#8217;s happening on your network<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The starting point speaks for itself: industry estimates suggest that around 98% of GenAI applications used in enterprise environments are not formally authorized by IT teams. This phenomenon \u2014 known as <strong>shadow AI<\/strong> \u2014 represents a rapidly expanding attack surface that traditional security solutions struggle to detect. <\/p>\n<p>&nbsp;<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">FortiOS 8.0 introduces concrete tools to address the issue:<\/p>\n<ul class=\"[li_&amp;]:mb-0 [li_&amp;]:mt-1 [li_&amp;]:gap-1 [&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3\">\n<li class=\"whitespace-normal break-words pl-2\"><strong>FortiView<\/strong> for the AI attack surface and shadow AI: a dedicated dashboard that delivers real-time visibility into how AI applications are being used across the organization, automatically distinguishing between authorized and unauthorized tools. Security teams can quickly identify risky or unknown usage, reduce non-compliance exposure, and enable safe AI adoption without having to react after an incident. <\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>AI-aware Application Control:<\/strong> granular policies that allow the use of approved GenAI tools while blocking risky actions that could expose intellectual property, customer data, or regulated information.<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>MCP and agent-to-agent (A2A) observability<\/strong>: arguably the most relevant innovation for organizations adopting AI agent\u2013based architectures. FortiOS 8.0 detects and classifies traffic generated by the<strong> Model Context Protocol (MCP)<\/strong> and agent-to-agent communications, bringing visibility to interactions that would otherwise remain entirely opaque. <\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>Enhanced DLP with OCR<\/strong>: the Data Loss Prevention system integrated into FortiGuard can now identify sensitive data hidden in images and screenshots, closing an often-overlooked exfiltration vector.<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>FortiAI-Assist for FortiGate:<\/strong> an integrated AI assistant that simplifies firewall diagnostics and troubleshooting through a conversational interface, reducing configuration errors and accelerating response times \u2014 even in SD-WAN environments.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3 class=\"text-text-100 mt-2 -mb-1 text-base font-bold\">Quantum-safe protection: acting today against tomorrow&#8217;s threat<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The quantum threat follows an insidious pattern known as <strong>&#8220;harvest now, decrypt later&#8221;<\/strong>: attackers capture encrypted data today with the intent of decrypting it in the future, once quantum computers become powerful enough. For data with a long lifecycle \u2014 industrial secrets, government information, healthcare records \u2014 the risk is already concrete. <\/p>\n<p>&nbsp;<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">FortiOS 8.0 extends post-quantum cryptography with:<\/p>\n<ul class=\"[li_&amp;]:mb-0 [li_&amp;]:mt-1 [li_&amp;]:gap-1 [&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3\">\n<li class=\"whitespace-normal break-words pl-2\"><strong>Hybrid key exchange compliant with FIPS 204\/205<\/strong>, combining classical cryptography and quantum-resistant algorithms<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>Enhanced SSL deep inspection <\/strong>with post-quantum cryptography, enabling traffic inspection without compromising end-to-end security<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>Protection of critical paths<\/strong>: management access and agentless VPN with quantum-resilient security<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Crypto-agility: the ability to update cryptographic algorithms as standards evolve, without significant re-architecture<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3 class=\"text-text-100 mt-2 -mb-1 text-base font-bold\">Want to learn more?<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Get in touch for a tailored assessment of your environment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network security is undergoing a profound transformation. With the massive adoption of generative AI and the emergence of the first autonomous AI agents in enterprise environments, the traffic crossing networks is no longer generated only by users: increasingly, it is applications and agents communicating with one another, accessing data, and making decisions without direct human [&hellip;]<\/p>\n","protected":false},"featured_media":7238,"template":"","class_list":["post-7239","7news","type-7news","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/7networks.ch\/en\/wp-json\/wp\/v2\/7news\/7239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/7networks.ch\/en\/wp-json\/wp\/v2\/7news"}],"about":[{"href":"https:\/\/7networks.ch\/en\/wp-json\/wp\/v2\/types\/7news"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/7networks.ch\/en\/wp-json\/wp\/v2\/media\/7238"}],"wp:attachment":[{"href":"https:\/\/7networks.ch\/en\/wp-json\/wp\/v2\/media?parent=7239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}