Network Security

Next-Generation Firewall

FortiGate enterprise firewalls offer flexible deployments from the network edge to the core, data center, internal segment, and the Cloud. FortiGate enterprise firewalls leverages purpose-built security processors (SPUs) that delivers scalable performance of advanced security services like Threat Protection, SSL inspection, and ultra-low latency for protecting internal segments and mission critical environments.

FortiGate NGFW provides automated visibility into cloud applications, IoT devices and automatically discovers end to end topology view of the enterprise network. FortiGate is a core part of security fabric and validated security protect the enterprise network from known and unknown attacks.

Secure SD-WAN

FortiGate SD-WAN transforms branches to increase productivity and application performance without compromising on security.  With the help of application steering, business-critical applications are always given priority.  Granular WAN patch information is collected to automatically fail over to the best available WAN link. A centralized controller with a single pane of glass simplifies management and monitoring, allowing enterprises to quickly provision branches and scale easily.  FortiGate SD-WAN has been adopted worldwide in industries as diverse as finance, retail, manufacturing and customer service.

IPS

Zero-day, advanced targeted attacks, ransomware, polymorphic malware and distributed denial-of-service attacks all require sophisticated detection engines not available in traditional standalone IPS or in most firewalls. FortiGate IPS includes multiple inspection engines, threat intelligence feeds and advanced threat protection options to defend against these unknown threats. Packaged in powerful FortiGate platforms (hardware, virtual, cloud) with advanced analytics and workflows through FortiAnalyzer, FortiGate IPS is a cost-effective network security solution to feed incident response needs in your SOC.

Crypto VPNs

Organizations select FortiGate scalable and high-performance Crypto VPNs to protect users from man-in-the-middle attacks and ultimately data from breaches that can occur while high-speed data is in motion. Fortinet VPN technology provides secure communications across the Internet between multiple networks and endpoints, through both IPsec and Secure Socket Layer (SSL) technologies, leveraging FortiASIC hardware acceleration to provide high-performance communications and data privacy.

Secure Web Gateway

Fortinet Secure Web Gateway defends users from internet-borne threats and helps enterprises enforce policy compliance for internet applications.

With FortiGate SWG, you can deploy industry-leading Fortinet Next Generation Firewalls as a proxy.  FortiGate SWG consolidates NGFW and SWG services, helping enterprises manage their network security solution with ease.  It supports all proxy deployment modes, and uses multiple detection techniques such as web filtering, DNS filtering, data loss prevention, antivirus, intrusion prevention and advanced threat protection to protect employees from internet threats.  FortiGate SWG is best suited for enterprises looking to consolidate network security services and optimize the workload of security teams.

Management & Reporting

Fortinet has purpose-built NOC-SOC into central security management products. This NOC-SOC approach simplifies security management and reporting both during initial deployment as well as with ongoing adjustments to keep Fortinet’s Security Fabric tuned to the optimal security posture. Three products – FortiAnalyzer, FortiManager and FortiCloud – are part of NOC-SOC-based central security management and reporting.

Threat Detection & Prevention

Sandbox

Today’s threats are increasingly sophisticated and often bypass traditional malware security by masking their malicious activity. A sandbox augments your security architecture by validating threats in a separate, secure environment. FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. It’s also a key component of our Advanced Threat Protection solution.

FortiSIEM

Security management only gets more complex. Endpoints, IoT, Infrastructure, Security Tools, Applications, VM’s and Cloud – the number of things you need to secure and monitor grows constantly. FortiSIEM – Fortinet’s Multivendor Security Incident and Events Management solution brings it all together. Visibility, Correlation, Automated Response and Remediation in a single, scalable solution. Using a Business Services view, the complexity of managing network and security operations is reduced, freeing resources, improving breach detection. Worldwide 80% of breaches go undetected because of skills shortage and event information ‘noise’. FortiSIEM provides the cross correlation, applies machine learning and UEBA to improve response, to stop breaches before they occur.

Infrastructure Protection

Endpoint Protection

FortiClient is more than advanced endpoint protection. As an integrated agent, FortiClient contains three key modules: Fabric Agent for security Fabric connectivity, the endpoint security modules, and the secure remote access modules. Fabric Agent shares endpoint telemetry with the Security Fabric and delivers broad endpoint visibility, compliance control, and vulnerability management. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. FortiClient also provides secure remote access with built-in VPN, single-sign-on, and two-factor authentication for added security.

Wireless

The challenges associated with enterprise class Wi-Fi security continue to grow.  With BYOD, a highly mobile workforce, and now IoT devices being brought into the enterprise space, it’s critical for IT organizations to manage their access while also dealing with evolving security threats. Fortinet offers a variety of wireless solutions, from management integrated into a FortiGate to dedicated WLAN controllers to ensure every user has the right solution for their network needs.

Switching

Fortinet’s Ethernet switches can be managed standalone or integrate directly into the Fortinet Security Fabric via the FortiLink protocol. FortiLink is a key supporting technology of the FortiSwitch, that enable its ports to become extensions of the FortiGate security appliance. When connected via FortiLink the security polices of the FortiSwitch can mirror the FortiGate making Firewall interfaces and Switch ports equally secure. Centralized management through the FortiGate simplifies deployment and provisioning of FortiSwitch with no touch auto-discovery, one click VLAN and security policy assignment. With an integrated access layer, the FortiGate provides consolidated visibility and reporting easing management and troubleshooting. Lastly, FortiLink enables stacking of up to 300 switches per FortiGate, depending on the model. All of these features are included and have no licensing fee.

Email Security

Fortinet’s Ethernet switches can be managed standalone or integrate directly into the Fortinet Security Fabric via the FortiLink protocol. FortiLink is a key supporting technology of the FortiSwitch, that enable its ports to become extensions of the FortiGate security appliance. When connected via FortiLink the security polices of the FortiSwitch can mirror the FortiGate making Firewall interfaces and Switch ports equally secure. Centralized management through the FortiGate simplifies deployment and provisioning of FortiSwitch with no touch auto-discovery, one click VLAN and security policy assignment. With an integrated access layer, the FortiGate provides consolidated visibility and reporting easing management and troubleshooting. Lastly, FortiLink enables stacking of up to 300 switches per FortiGate, depending on the model. All of these features are included and have no licensing fee.

APPLICATION SECURITY

Vulnerabilities are persistent across the web, and frequently target business-critical web applications.  Further, attackers routinely attempt to utilize email to reach end users, their systems and credentials.  Fortinet’s Application Security Solution consists of a robust and integrated set of products that protects web and email applications from advanced threats. The Fortinet Web Application Security solution defends web-based applications and secures web application traffic using our Web Application firewalls and Application Delivery Controllers.

Securing Web Applications

Ensure comprehensive protection for the most business-critical web applications. In addition, easily simplify compliance and regulation of public-facing regulated applications.

 Securing Email

Organizations can efficiently secure email from advanced threats, in the cloud, and even consolidate email solutions. With top-rated solutions, Fortinet offers robust application security where it matters.

 

ACCESS MANAGEMENT

ACCESS MANAGEMENT

Establishing identity through secure authentication is key in the implementation of an effective security policy. Many of today’s most damaging security breaches have been due to compromised user accounts and passwords exacerbated by users being provided with inappropriate levels of access.

Identity and Access Management Product Details

Identity and Access Management products provide the services necessary to securely confirm the identity of users and devices as they enter the network. Our Authenticator provides centralized authentication services for the Security Fabric including single sign on services, certificate management, and guest management. Token further confirms the identity of users by adding a second factor to the authentication process through physical and mobile application based tokens. The combination of Authenticator and We offers a robust response to the challenges today’s businesses face in the verification of user and device identity.

CLOUD SECURITY

Application Security

The growing number of applications built a variety cloud infrastructures necessitates consistent application security. Advanced application layer security controls offer organizations the confidence to choose cloud platforms based on their business priorities, not security limitations. 

 

As cloud adoption accelerates, organizations are increasingly reliant on cloud-based services and infrastructures. Yet, organizations often end up with a heterogeneous set of technologies in use, with disparate security controls in various cloud environments. Fortinet Multi-Cloud Solutions provide the necessary visibility and control across cloud infrastructures, enabling secure applications and connectivity from data center to cloud.

Visibility and Control

As infrastructures diversify new technologies and tools are added to the network, expanding the attack surface. Organizations need a single pane of glass to gain visibility and define consistent security policies throughout the entire infrastructure to effectively manage risk.

 

Secure Connectivity

Organizations using an array of cloud infrastructures and shifting toward multi-cloud environments require secure connectivity across different locations to abstract physical boundaries while protecting the confidentiality of communications.   

VOICE

The FortiVoice Enterprise IP-PBX voice solutions are built for offices and distributed networks with varying types of phone users. FortiVoice Enterprise systems give you total call control and sophisticated communication features for excellent customer service and efficient employee collaboration. Powerful, affordable and simple, FortiVoice phone systems include everything you need to handle calls professionally, control communication costs and stay connected everywhere.

 

FortiVoice Product Details

FortiVoice Enterprise systems include all the fundamentals of enterprise-class voice communications, with no additional licenses to buy or cards to install. Auto attendants, voice messaging, ring groups, conferencing and much more are built-in. FortiVoice systems are easy to purchase, easy to install and easy to manage, so you save the headaches that come with most enterprise phone systems.

In addition to working with the user-friendly series of FortiFones, the FortiVoice personal web portal lets staff view their call logs, configure and manage their own messaging and access other features. Employees get control over their phones, and IT staff gets a break from having to configure every little change.

integration icon

Multiple Line Types

Support for PRI (T1/E1) digital lines, VoIP and traditional analog lines
connectivity icon

Multi-location Networking

Integrates multiple locations around the block or across the country in one single system
platform support icon

Flexibility

Multiple mode scheduling, flexible number management and caller ID modification

 

monitoring icon

Comprehensive System Monitoring 

Real time call status monitoring, call statistics, call logs, call reports and network traffic captures
simple icon

Ease of Configuration 

Visual auto attendant configuration, built-in DHCP server, auto phone provisioning and web-based management
flexible icon

Rich Call Features 

Line/extension appearance, call queue, call barge, phone profile, ring group, call recording, rule based dial plan, and individual/group voicemail