Fortinet is the world’s leading provider of high-performance IT security solutions that enable its customers to protect and control their IT infrastructure. Its specially developed, integrated security technologies, along with FortiGuard threat-based services, provide customers with extremely effective content protection to keep up with the constantly evolving threats.
Fortinet products integrate many security features: firewall, antivirus, VPN SSL and IPSec, intrusion detection, spam and spyware protection, and traffic management. With ASIC technology, they offer not only the protection of the network of all sizes, but also its management and reporting.
Fortinet’s solutions are used by more than 225,000 customers worldwide, including most of the Global 1000 companies, service providers, and government agencies. They allow them to enhance security, simplify network infrastructure, and reduce total cost of ownership.
Source: netcomplex.pl
Fortinet protects constantly evolving networks in all industries and regions – from endpoints and mobile devices, to the periphery and core of the network, including databases, communication systems, and web applications.
As a partner of Fortinet we offer solutions in the following areas:
- Network Security – FortiGate,
- Web Application Security – FortiWeb,
- Mail system security – FortiMail,
- Wireless Access Points – FortiAp,
- Event logging and reporting devices – FortiAnalyzer,
- Detection of the most dangerous and advanced DDoS attacks and their protection – FortiDDoS,
- Two-factor Authentication Solution – FortiToken.
FortiGate – a multifunctional security platform that delivers unrivaled performance and protection while simplifying networking. We have a wide selection of models to suit all deployment requirements – from small offices to very large companies, service providers and network operators. FortiGate platforms combine the FortiOS operating system with FortiASIC processors and next-generation processors to provide comprehensive, effective network protection. All FortiGate solutions include the richest set of network security features on the market, including:
- Network firewall, VPN and traffic shaping
- Intrusion Prevention System (IPS)
- Anti-virus, anti-spyware, antimalware,
- Integrated wireless controller
- Support for IPv6,
- Application control and customer reputation analysis,
- Protection against advanced threats,
- Data Loss Prevention (DLP),
- Management of susceptibility
- Categorizing and filtering websites,
antispam, - VoIP protection,
- Routing in Layer 2/3,
- Efficient routing protocol support,
- Optimizing WAN and saving cached Internet objects.
FortiGate appliances provide protection from network and application level threats. FortiGuard subscriptions provide automatic updates to the protection against new threats in real time. The FortiGate platform also includes advanced networking features such as high availability (active / active or active / passive) for maximum network availability, and virtual domain (VDOM) to separate networks that require different security considerations – Other policies, separate management, etc.
FortiWeb is a device that secures Web applications (Web Application Firewall – WAF). The platform provides web application security and XML firewall to protect, maintain, balance and accelerate web applications, databases and exchange information between them. FortiWeb is designed for medium and large enterprises, web application providers and SaaS providers. It can significantly shorten the deployment time and the complexity of introducing network applications. FortiWeb is associated with Fortinet’s focus on threat studies for network application protection, improved security of confidential information, and assistance in the legislative and PCI compliance process. FortiWeb goes beyond traditional firewalls to protect web applications, XML security, application acceleration, and server load balancing.
Advantages of FortiWeb
- Web application protection through the application firewall consists of: signature and pattern analysis, validation of passed parameters, definition of limits based on maximum values, session management, flow control, and other techniques to protect vulnerable web applications from attacks.
- The XML firewall enforces the appropriate form and encoding of pages using XML IPS, schema validation, WSDL validation, XML expressions control, and other security technologies developed by Fortinet.
- It guarantees the security of web applications and protects sensitive database content by blocking such threats as cross-site scripting, SQL injection, buffer overflows, file inclusion, denial of service, cookie poisoning, schema poisoning, and countless other attacks.
- It helps in compliance with PCI DSS 6.6 by protecting against vulnerabilities defined by the OWASP top 10 list and blocking web attacks using application firewall technology.
- It simplifies the deployment and management process by protecting all web applications regardless of code changes or add-ons.
- By processing encoded data streams within Web sessions (SSL) and XML, minimizing transaction time, taking over data encryption and accelerating SSL reduces the server’s computing power requirements.
- Server-based load and client-based routing increases application speed, reduces server workload, and improves application stability.
- Working in the HA cluster is a complete synchronization of the configuration to ensure continuity in the availability of the application
FortiMail family of appliances provides robust and effective protection for email systems for organizations of all sizes, from small businesses to service providers and large enterprises. Designed and implemented to meet the high requirements of message processing environments, FortiMail appliances benefit from Fortinet’s long-standing experience in protecting the network against spam, malware, and other email-borne threats.
With FortiMail you can protect your email system from becoming a source of unwanted and dangerous content. The inbound mail filtering mechanism eliminates spam and malware before they reach the internal network and become a threat to users. The Outbound Scan feature blocks spam and viruses from being sent to external users, protecting the addresses of your business from being blacklisted, and as a result, prevent legitimate mail from being sent.
Three modes of operation offer maximum flexibility when deploying: transparent mode requiring no changes to the network and the mail system, gateway mode in which the device operates as a mail server gateway, and full mail server mode.
Advantages of FortiMail
- Sophisticated inspection mechanisms eliminate mail dangers before they reach end users
- Three modes of operation (Transparent, Gateway, Server) give full freedom when deploying the protection system
- Lack of licensing on the number of users eliminates the need to exchange or extend licenses when protected users arrive.
- The ability to encrypt messages based on the identity of the sender or recipient without additional hardware, software, or licenses
- Sophisticated archiving, quarantine, and mail forwarding capabilities help you meet regulatory requirements.
- Wide variety of devices with different bandwidths, disk space and physical form allows you to find a model that fits the needs of each customer
- FortiGuard subscriptions provide dynamic updates to antispam and anti-virus engines developed by a dedicated team of Fortinet experts.
- Easy deployment, integrated management, logging and reporting, and fully automated security updates reduce the IT workload and maintenance costs.
- Eliminate spam before it spreads on the network, consuming resources and reducing overall system performance
- Quick launch by using the built-in wizard and intuitive GUI management make it much easier to deploy and manage later.
FortiAP is a centrally managed wireless access point that complements FortiGate’s comprehensive security solutions. Each FortiAP Access Point tunnels all client traffic to a wireless controller running within the FortiGate platform, allowing administrators to manage all network traffic, including wireless, from one console. It benefits from better network transparency, consistent enforcement of security rules, and simplification of the network environment.
FortiAP access points use 802.11n technology to provide high bandwidth wireless capability, enable multiple virtual APs on a single radio module, and monitor ambient and external access points. They work in conjunction with FortiGate-rich controllers to deliver robust wireless coverage for complete traffic protection. FortiGate controllers centrally manage the operation of radio modules, channel assignment, power transmission and other functions, which significantly simplifies deployment and maintenance.
The FortiAP Series utilizes the industry’s leading integrated chip technology to deliver performance up to 450 Mbps and over twice the range of older 802.11a / b / g standards. Powering FortiAP over PoE eliminates the need for external power supplies.
FortiAP – benefits
- 802.11n technology delivers 300Mbps throughput per radio module and up to twice the 802.11a / b / g range.
- Reduce costs and simplify your network with the integration of a wireless controller with a unified security platform – FortiGate
- Strong authentication methods using WPA2 enterprise and built-in Captive Portal for guests
- Power Over Ethernet (POE) support eliminates the need for an external power supply
- Increased visibility and control of users and applications with FortiGate for complete content protection and identity and threat prevention
- Possibility of prioritizing wireless traffic for critical applications
- User-based identity policies in conjunction with third-party access point detection and reporting, granular endpoint control, audit trail templates provide compliance with regulatory requirements for access and data protection.
- Flexible deployment options combined with the FortiGate management console and the absence of additional licensing fees simplify network maintenance and lower maintenance costs.
The FortiAnalyzer event logging and reporting family is a solution that securely collects and analyzes data from various Fortinet devices and other SYSLOG compatible tools. The system provides network administrators with a comprehensive view of network usage and information security across the enterprise, minimizing the effort involved in monitoring and maintaining resource usage policies, identifying attacks, impacting attackers, and enforcing privacy and security of sensitive data.
FortiAnalyzer appliances capture and process a full range of traffic, events, viruses, attacks, web and e-mail filtering, and advanced security management features such as quarantine archiving, event correlation, vulnerability assessment, traffic analysis, archiving. content.
The device allows you to create a wide range of reports that clearly illustrate the work of our network. Each administrator can also build his own schedules.
Advantages of FortiAnalyzer:
- Secure data gathering from multiple FortiGate and FortiMail platforms guarantees network transparency
- Over 300 custom-tailored reports help monitor policy usage, identify attack patterns, and adhere to data protection and security breach protections.
- Information about network performance and usage allows administrators to more efficiently plan and manage resources
- Fully integrated with FortiManager platforms for point-based management, control, analysis and reporting.
- FortiGuard subscriptions provide dynamic updates for vulnerability management functionality through data collected by Fortinet’s global threat research team.
- The capacity of up to 6 TB and the ability to select RAID levels allow administrators to tailor performance to the requirements of the organization.
FortiDDoS solutions are designed to detect and protect the most dangerous and advanced DDoS attacks. The devices are equipped with an innovative, fully-featured behavioral analysis mechanism for DDoS attacks. With the new dedicated ASIC processor that identifies DDoS attacks and mitigates them, FortiDDoS detects more types of attacks ten times faster than competing devices of this type.
Innovative mechanism for detecting attacks and limiting their effects
FortiDDoS appliances are equipped with a new, behavioral analysis based on neutralizing attacks. This allows you to identify current and future threats and limit their effects based on their patterns and content. FortiDDoS products do not require signature updates to provide better protection against zero-day attacks by dynamically monitoring traffic characteristics. Very short response and blocking times, thanks to the use of advanced ASIC processors, allow for on-the-spot re-evaluation of attacks. This reduces the negative impact of false alarms when network traffic returns to normal. Competitive devices need much more time to detect attacks and need more time to block them, increasing the number of false positives.
Fortinet is the only company that uses fully dedicated ASIC processors in its DDoS attack products. This approach eliminates the overheads of systems based on ordinary processors or hybrid systems. The second generation of FortiASIC-TP2 network processors enables DDoS attacks to be detected and mitigated by a single processor supporting any kind of traffic in Layer 3, Layer 4 and Layer 7 OSI / ISO layers. Competitive solutions use different combinations of processors. For such solutions, some of the traffic is attributed to the ASIC processor, and some to the regular processor, while some standard processors support the whole traffic. This leads to bottlenecks and lower overall system performance.
FortiDDoS creates a pattern of normal application behavior and then monitors network traffic against such pattern. In the event of an attack, FortiDDoS will treat it like an anomaly and take immediate action to reduce its impact. Users are protected against known attacks and unknown zero-day attacks because FortiDDoS does not need to wait for signature updates.
In addition, FortiDDoS uses a different approach to disposing of DDoS attacks than any other device of this type. FortiDDoS uses a two-pronged approach that monitors outbound and outbound traffic and then determines, using a reputation rating system, which IP addresses are trusted and which may pose a threat. Trusted IP addresses are approved, and those that may pose a threat are temporarily blocked. If after re-evaluation, these addresses represent a real threat, they will be blocked for much longer time.
Key features:
- Visibility and behavioral analysis
- Mitigation of hazards
- Finding the source
- Policies to protect services by segregating customers or networks
- Protection against hidden activities
- Stopping threats
- Easy to install
Protective functions:
- Service protection profiles
- Geolocation protection
- Filtering fake addresses, access lists
- Flooding of packages, verification of protocols
- State packet inspection, fusing incompatible packets
- Detailed filtering of network, transport and application value
- Application layer filtering, Get flood protection, and resource consumption
- Algorithmic filtering
- Heuristic filtering
FortiToken-200 allows you to implement a two-factor authentication solution. This is an easy-to-use hardware token that generates one-time passwords (OTPs) that reduce the risk of security breaches that only single-component authentication, such as static access passwords, can cause.
FortiToken enables administrators to improve the security of both remote and corporate users. FortiToken appliances are part of Fortinet’s Multi-Component Authentication Strategy to help you drive business, protect your data, reduce IT costs, and increase employee productivity. FortiToken guarantees that only authorized users will have access to sensitive data in the organization.
Use existing FortiGate network platforms
Every security appliance – FortiGate – is able to work as an authentication server. Combining these authentication capabilities with FortiToken eliminates the need to run an external server, typically required when deploying multi-component authentication.
The one-time passwords generated by the token enable the strong user authentication mechanism for IPSEC and SSL VPN access, network logon through Captive Portal, and administrative access to the FortiGate device. The Token remains synchronized with the FortiGate controller at all times.
Write us today and see what we can offer for your business.