Solved

Anyone out there using fortinet products

Posted on 2014-09-15
2
443 Views
Last Modified: 2014-09-30
Anyone out there using Fortinet products?  Looking to bring the products in and was wondering what typical config times look like for a small business on average.
0
Comment
Question by:securitylock
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 13

Expert Comment

by:Sandy
ID: 40324756
What exactly your needs ? IPS/ IDS/ Network Antivirus/ DLP what ?

they are good in all these..

Ty/SA
0
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 40325158
Fortinet belongs to the market of the Unified Threat Mgmt (UTM) which is a close "brother" to the Next Gen FW (NGFW). Not to confuse, the whole objective is to make sure traditional FW  approach using port based filter need more deeper content inspection and contextual intelligence hence the two technology becomes more popular.

Fortinet carries a "suite" namely in fortigate (UTM), fortiweb (web app FW), fortiGuard (database)  etc and key is the running of their FortiOS engine in those appliance...Gartner has a MQ 2014 evaluation weighting for Enterprise Network Firewalls features on the selected provider and include Fortinet, good to check out. http://www.bradreese.com/blog/5-29-2014.pdf

But do note that all-in-one or unified threat management (UTM) products are suitable for small or midsize businesses
 (SMBs), but not for the enterprise. Fortinet is most of time competitve in the management of multiple of FW and low pricing but largely customer is still feeling edgy on the aspect of cost effectiveness and value for money..Nonetheless, it is shared to be well-suited to deployments, such as in carriers, data centers, service providers and distributed enterprises (for example, retail and franchises).

Sidenote - Although there is need to further enable these FW in more visibility into the use of application awareness (a form of context awareness) provided as well as deep packet inspection techniques to permit valid (authorized) applications and deny everything else as default, performance should not waver due to scaling up capability and eventually becomes single point of failure...

Some key capabilities that you should seek vendor on how they can achieve below.
■ Real-time detection and application content awareness engine.
■ Signature-based and "Signatureless" techniques for deep inspection and filtering.
■ Careful tuning without depending too much on knowledgeable staff to avoid false positives.
■ Monitor traffic from off-network mobile endpoints.
0

Featured Post

MIM Survival Guide for Service Desk Managers

Major incidents can send mastered service desk processes into disorder. Systems and tools produce the data needed to resolve these incidents, but your challenge is getting that information to the right people fast. Check out the Survival Guide and begin bringing order to chaos.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
In a recent question (https://www.experts-exchange.com/questions/29004105/Run-AutoHotkey-script-directly-from-Notepad.html) here at Experts Exchange, a member asked how to run an AutoHotkey script (.AHK) directly from Notepad++ (aka NPP). This video…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question