June 11, 2013
SUNNYVALE, Calif., June 10, 2013 - Fortinet® (NASDAQ: FTNT) - a world leader in high-performance network security – today answered the question, "What's next in next-generation enterprise firewalls?" with new features within its FortiOS 5 operating system, which serves as the foundation for the company's award-winning FortiGate&trade network security platform. The new update includes:
· Feature Select: With one-click, customers can choose from a variety of security configuration options, including: High Speed Firewall, NGFW, ATP, Web Filtering, UTM and others
· Contextual Visibility: Gives organizations real-time and historical insight on network use based on application, user and device
· Advanced Threat Protection (ATP): Enhanced security tools combat multi-vector persistent attacks
Eric Ahlm, research director at Gartner, commented: "Security buyers may seek a combination of firewall options, such as NGFW, unified threat management (UTM), virtual and stateful firewalls, to meet a wide range of typical enterprise needs, such as data center, small offices or highly distributed enterprises, as cost-effectively as possible."¹
"In order to increase protection, simplify management and reduce costs, enterprises today are migrating away from multi-vendor firewall environments in favor of a single-vendor model," said John Maddison, vice president of marketing for Fortinet. "For example, an enterprise may have high-performance firewalls for its datacenters, NGFWs for their campus perimeters and UTMs for their distributed offices. With its singular focus on innovating security and security-focused R&D, only Fortinet provides a true Network Security Platform with a wide array of robust security functionality for datacenters, campus perimeter and distributed offices."
Fortinet Network Security: Providing Choice for Specific Enterprise Requirements
With Fortinet Feature Select, enterprises can quickly and easily configure their FortiGate appliances based on their unique business and security requirements. These preset configurations can be done with a single button click at the time of system setup or at any time during the system's deployment. Configuration options include high-performance Firewall (includes VPN), NGFW (includes Firewall, intrusion prevention and application control); ATP (includes advanced threat protection and endpoint control); WF (includes Web filtering and explicit proxy); NGFW + ATA (includes NGFW and ATP features) and UTM (includes all previously mentioned features plus email filtering, data loss prevention, vulnerability scanning).
Better Protection with Better Visibility
The new Contextual Visibility feature in FortiOS 5 gives administrators deeper insights into historic or real-time network activities using detailed analytics. The types of data that can be extracted include IP and Port, geographical IP, session type, user names, network usage, network coverage and the types of applications and devices that are connecting to the network. With this, administrators can use correlated data to identify top clients associated with particular threats and further isolate suspicious Websites and IP addresses. This is available through the client reputation function.
Protection Against Advanced Targeted Attacks (ATA)
ATAs, also referred to as Advanced Persistent Threats (APTs), target specific organizations, infiltrate from multiple vectors and can remain stealthy for an undetermined amount of time before exfiltrating data. The new FortiGuard Advanced Threat Protection Service offers a multi-pronged approach to security that helps protect against attacks that could arrive via zero day vulnerability, undiscovered malware, phishing emails and/or password hacks. The features within the ATP service include botnet blacklisting, antimalware signatures and cloud-based sandboxing.
Certified Performance Powered by Custom ASICs
Today's announcement further exemplifies why FortiOS is the world's most advanced network security operating system. When coupled with FortiGate appliances, which feature high performance, purpose-built network, content and SoC processors that have been certified by industry-leading test and measurement labs, such as NSS Labs, ICSA Labs, Common Criteria, Virus Bulletin and FIPS, network administrators have the power to detect malicious content at Gigabit speeds. Other security technologies cannot protect against today's wide range of content- and connection-based threats because they rely on general-purpose CPUs, causing a dangerous performance gap. FortiASIC&trade processors help to ensure the network security in place does not become the network bottleneck.
The FortiOS 5 update is available now from https://support.fortinet.com.
To learn more about how Fortinet is changing the industry by redefining the next-generation firewall, please register here for a free Webinar: https://fortinet.webex.com/fortinet/onstage/g.php?t=a&d=572789137
¹ (Competitive Landscape: Next-Generation Firewall Appliance Market, Worldwide, 2013 by Eric Ahlm, published 3 April 2013)
About Fortinet (www.fortinet.com)
Fortinet (NASDAQ: FTNT) is a worldwide provider of network security appliances and a market leader in unified threat management (UTM). Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2012 Fortune Global 100. Fortinet's flagship FortiGate product delivers ASIC-accelerated performance and integrates multiple layers of security designed to help protect against application and network threats. Fortinet's broad product line goes beyond UTM to help secure the extended enterprise - from endpoints, to the perimeter and the core, including databases and applications. Fortinet is headquartered in Sunnyvale, Calif., with offices around the world.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks