fortigate


FortiGate 7060E – Delivering Layer 7 Security without Performance Compromises In today’s cloud scale data centers, security is front and center. The changing threat landscape, more and increasingly diverse threats, and much larger attack surfaces have made security top of mind for CIOs and IT teams worldwide. Networks are undergoing a radical transformation. With over 35B IoT devices attaching to networks, and a global cloud revolution fueled by a hyper-connected digital economy and driven by data, by 2020 almost all traffic entering... [Read More]
by RSS Rajoo Nagar  |  Apr 10, 2017  |  Filed in: Industry Trends & News
Organizations are undergoing dramatic change, driven by their transformation to a digital business model and the resulting exponential increase in data, devices, users, applications, and transactions flooding their networks through the cloud. Managing, processing, and servicing this information is business critical, and it is putting a huge strain on budgets and IT resources. Of course, changes like this also exponentially expand the attack surface that needs to be protected. There are more targets than ever, and cybercriminals are developing... [Read More]
by RSS Bill McGee  |  Apr 25, 2016  |  Filed in: Industry Trends & News
When it comes to security, healthcare is in the middle of a perfect storm. On the one hand, access to data distributed across devices and locations is paramount – diverse providers and connected organizations need that data to flow freely in order to do their jobs. While on the other hand, securing sensitive patient records has never been more important or difficult, since electronic protected health information (ePHI) is extremely valuable to hackers and scammers – 10 times more valuable than credit card data, in fact. The solution... [Read More]
by RSS Susan Biddle  |  Apr 04, 2016  |  Filed in: Industry Trends & News
Firewall deployments can be characterised by episodes of intense activity interspersed with long periods of “I assume it’s working ok”. However, between the cutover and Business as Usual (BAU) transition the long term feed and watering some aspects of Firewall maintenance are often overlooked. Nailing down your FortiGate fleet’s interaction with the FortiGuard Distribution Network (FDN) is such a task. Enabling your FortiGate estate to dial home to the FDN is an important, but simple step towards firewall deployment finalization.... [Read More]
by RSS Glen Kemp  |  Mar 09, 2016  |  Filed in: Security 101
This is part two of our look at the User layer, which focuses on user authentication. If you missed it, make sure to read part 1 to find about how you can protect your network from your users’ own actions. Also, you can catch up on the entire Layered Security series by either reading my past blog posts or checking out the PDF version, which will be updated to include the User Layer soon. The User Layer: Part 2 Last time we talked about user education, as well as a range of FortiOS security features that you can use to protect... [Read More]
by RSS Victoria Martin  |  Aug 24, 2015  |  Filed in: Security Q & A
[Editor’s Note: While this post is primarily concerned with Fortinet firewalls, particularly the FortiGate 3700D, it also serves as useful background for anyone considering different deployment scenarios for data center firewalls.] Nestling somewhere near the top of the Fortinet product portfolio is the FortiGate 3700D. Whilst it is generally pitched as a data centre firewall, it is a good deal more flexible than your average big dumb packet pusher. It may be deployed in ultra-low latency, very high capacity, and dedicated Unified Threat... [Read More]
by RSS Glen Kemp  |  May 26, 2015  |  Filed in: Industry Trends & News
We've now reached the User layer in our Layered Security series. This article is part one of two, because there's a lot going on with this layer. If you haven’t been following this series, you can catch up by using the link above or by checking out the PDF version, which contains all previous articles.   The User Layer (Part 1) We’ve finally reached the user layer, which in many ways is the most important and also the most difficult. As mentioned before, 80-90% of the threats to your network can come... [Read More]
by RSS Victoria Martin  |  Apr 18, 2015  |  Filed in: Security Q & A
Modern data centers are pushing the limits of network performance to keep up with growing demand; their security solutions can’t be bottlenecks. It was only a few short years ago that Gigabit LAN and WAN connections were the standard for speed and performance. In 2013, however, as the SaaS, IaaS, and PaaS markets began to explode, shipments of 100G equipment quadrupled. 1G and 10G still dominated the market then, but we began to see a substantial shift towards much faster core network speeds. As the chart below from Crehan Research shows,... [Read More]
by RSS Chris Dawson  |  Mar 24, 2015  |  Filed in: Industry Trends & News
Next up in the Layered Security series is the Device layer. If you haven’t been following this series, you can catch up by either reading my other blog posts (using the link above), or by checking out the PDF version, which contains all articles that have been written up to this point. The Device Layer While wired networks certainly have their own challenges (many of the precautions here are applicable to wired devices), it is wireless that really changed this layer’s landscape. The biggest change that came with wireless... [Read More]
by RSS Victoria Martin  |  Jan 28, 2015  |  Filed in: Security Q & A
The FortiGate Cookbook website, found at cookbook.fortinet.com, was launched at the end of 2014. You can now enjoy the Cookbook, and all its step-by-step recipes for using a FortiGate, in a whole new way. If you want to jump right to the website, go right ahead and use the link above. But if you'd like to learn more first, check out the following video website walkthrough:   As you can see in the video, the Cookbook website offers a number of great features to help you accomplish your networking goals, such as: Videos... [Read More]
by RSS Victoria Martin  |  Jan 28, 2015  |  Filed in: Security 101