Solved

Anyone out there using fortinet products

Posted on 2014-09-15
2
437 Views
Last Modified: 2014-09-30
Anyone out there using Fortinet products?  Looking to bring the products in and was wondering what typical config times look like for a small business on average.
0
Comment
Question by:securitylock
2 Comments
 
LVL 13

Expert Comment

by:Sandy
ID: 40324756
What exactly your needs ? IPS/ IDS/ Network Antivirus/ DLP what ?

they are good in all these..

Ty/SA
0
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 40325158
Fortinet belongs to the market of the Unified Threat Mgmt (UTM) which is a close "brother" to the Next Gen FW (NGFW). Not to confuse, the whole objective is to make sure traditional FW  approach using port based filter need more deeper content inspection and contextual intelligence hence the two technology becomes more popular.

Fortinet carries a "suite" namely in fortigate (UTM), fortiweb (web app FW), fortiGuard (database)  etc and key is the running of their FortiOS engine in those appliance...Gartner has a MQ 2014 evaluation weighting for Enterprise Network Firewalls features on the selected provider and include Fortinet, good to check out. http://www.bradreese.com/blog/5-29-2014.pdf

But do note that all-in-one or unified threat management (UTM) products are suitable for small or midsize businesses
 (SMBs), but not for the enterprise. Fortinet is most of time competitve in the management of multiple of FW and low pricing but largely customer is still feeling edgy on the aspect of cost effectiveness and value for money..Nonetheless, it is shared to be well-suited to deployments, such as in carriers, data centers, service providers and distributed enterprises (for example, retail and franchises).

Sidenote - Although there is need to further enable these FW in more visibility into the use of application awareness (a form of context awareness) provided as well as deep packet inspection techniques to permit valid (authorized) applications and deny everything else as default, performance should not waver due to scaling up capability and eventually becomes single point of failure...

Some key capabilities that you should seek vendor on how they can achieve below.
■ Real-time detection and application content awareness engine.
■ Signature-based and "Signatureless" techniques for deep inspection and filtering.
■ Careful tuning without depending too much on knowledgeable staff to avoid false positives.
■ Monitor traffic from off-network mobile endpoints.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now