Cloud
3/28/2014
11:45 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Fortinet delivers FortiGate-VM on Amazon Web Services (AWS)

FortiGate-VM on AWS to Help Customers Extend Enterprise Security Into Their Public Cloud Deployments

SUNNYVALE, Calif., March 26, 2014 - Fortinet® (NASDAQ: FTNT) – a world leader in high-performance network security – today announced that the company’s flagship award-winning FortiGate® security platform is now available on Amazon Web Services (AWS), a division of Amazon.com, Inc., in the AWS Marketplace. The company will be demonstrating the FortiGate-VM at the AWS Summit 2014 (Booth # 120), taking place on March 26 in San Francisco, California. 

FortiGate-VM is strategically designed to help customers better mitigate potential blind spots by implementing critical network security controls including bi-directional stateful firewalling, intrusion prevention and VPN within their virtual private cloud (VPC). Today’s announcement marks the fourth Fortinet security solution available on AWS.

Last year, the company announced the availability of FortiManager-VM and FortiAnalyzer-VM on AWS, which enable customers to deploy security management and reporting to all FortiGate and FortiGate-VM security technologies running at the edge, in internal networks, at remote offices, within core data centers or deployed in the cloud. And they’re able to do it from a single, centralized management platform. In 2012, the company released FortiWeb-VM for Web application security, which helps secure Web applications and meet compliance requirements.

“Our unique and innovative business model delivers a secure and reliable payment model that helps prevent fraud for our customers and their loved ones,” said James Burns, director of security for True Link Financial. “Since we had already invested in Fortinet security solutions for our corporate network, when it came to processing credit card and other financial transactions securely in our data center, we were confident we could rely on FortiGate-VM on AWS to provide protection, performance and encrypted communications for our mission-critical services.”

“We are pleased to see Fortinet continuing to expand its offerings on AWS through AWS Marketplace with their FortiGate platform,” said Brian Matsubara, Head of Global Technology Alliances, Amazon Web Services, Inc. “By bringing their security platform to AWS, Fortinet is providing scalable network security controls to customers around the world.”

Fortinet Virtual Appliance Advantage

FortiGate virtual appliances and virtual domains enable the deployment of consolidated network security to protect virtual infrastructure and increase visibility and control over communications within virtualized and multi-tenant cloud environments, particularly in scenarios where it is not feasible to deploy dedicated hardware. 

Flexible and Scalable

Fortinet virtual appliances can scale quickly to meet demand and protect intra-virtual machine communications by implementing critical security controls. 

FortiGate security appliances have won numerous awards and recognition, including multiple NSS Labs’ Recommended ratings and SC Magazine Awards for Best Network Security Solution and Best Integrated Security Solution. FortiGate-VM virtual appliances feature all of the security and networking services common to traditional hardware-based FortiGate appliances, including government certifications. In September 2013, Fortinet announced FortiGate-VM earned Common Criteria EAL 4+ Certification for FortiOS 4.3-VM. The Common Criteria certification process is a third-party evaluation service for determining the trustworthiness of information technology security products, which is fundamentally important to the company’s enterprise and government customers.

Users can deploy a mix of hardware and virtual appliances in clouds and virtualized internal data centers, operating together and managed from a common centralized management platform. With increasing support for AWS environments, users deploying AWS instances into Amazon EC2 or Amazon VPC can maintain corporate standards for security and compliance in the cloud.

“AWS is a global leader in IT infrastructure services with many enterprise and government agencies utilizing its services. As such, it is essential that Fortinet provides the same enterprise class network security on the AWS cloud as we do for core and edge networks,” said John Maddison, vice president of marketing for Fortinet. “We have a number of customers who have requested we port FortiGate-VM onto AWS, and we’re happy report that the technology is ready today.”

Availability

FortiGate-VM is currently available in the AWS Marketplace: https://aws.amazon.com/marketplace/search/results/ref=gtw_navgno_search_box?page=1&searchTerms=Fortinet.

About Fortinet

Fortinet (NASDAQ: FTNT) helps protect networks, users and data from continually evolving threats.  As a global leader in high-performance network security, we enable businesses and governments to consolidate and integrate stand-alone technologies without suffering performance penalties. Unlike costly, inflexible and low-performance alternatives, Fortinet solutions empower customers to embrace new technologies and business opportunities while protecting essential systems and content. Learn more at www.fortinet.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7298
Published: 2014-10-24
adsetgroups in Centrify Server Suite 2008 through 2014.1 and Centrify DirectControl 3.x through 4.2.0 on Linux and UNIX allows local users to read arbitrary files with root privileges by leveraging improperly protected setuid functionality.

CVE-2014-8346
Published: 2014-10-24
The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic.

CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.