Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Anyone out there using fortinet products

Posted on 2014-09-15
2
Medium Priority
?
457 Views
Last Modified: 2014-09-30
Anyone out there using Fortinet products?  Looking to bring the products in and was wondering what typical config times look like for a small business on average.
0
Comment
Question by:securitylock
2 Comments
 
LVL 13

Expert Comment

by:Sandy
ID: 40324756
What exactly your needs ? IPS/ IDS/ Network Antivirus/ DLP what ?

they are good in all these..

Ty/SA
0
 
LVL 65

Accepted Solution

by:
btan earned 2000 total points
ID: 40325158
Fortinet belongs to the market of the Unified Threat Mgmt (UTM) which is a close "brother" to the Next Gen FW (NGFW). Not to confuse, the whole objective is to make sure traditional FW  approach using port based filter need more deeper content inspection and contextual intelligence hence the two technology becomes more popular.

Fortinet carries a "suite" namely in fortigate (UTM), fortiweb (web app FW), fortiGuard (database)  etc and key is the running of their FortiOS engine in those appliance...Gartner has a MQ 2014 evaluation weighting for Enterprise Network Firewalls features on the selected provider and include Fortinet, good to check out. http://www.bradreese.com/blog/5-29-2014.pdf

But do note that all-in-one or unified threat management (UTM) products are suitable for small or midsize businesses
 (SMBs), but not for the enterprise. Fortinet is most of time competitve in the management of multiple of FW and low pricing but largely customer is still feeling edgy on the aspect of cost effectiveness and value for money..Nonetheless, it is shared to be well-suited to deployments, such as in carriers, data centers, service providers and distributed enterprises (for example, retail and franchises).

Sidenote - Although there is need to further enable these FW in more visibility into the use of application awareness (a form of context awareness) provided as well as deep packet inspection techniques to permit valid (authorized) applications and deny everything else as default, performance should not waver due to scaling up capability and eventually becomes single point of failure...

Some key capabilities that you should seek vendor on how they can achieve below.
■ Real-time detection and application content awareness engine.
■ Signature-based and "Signatureless" techniques for deep inspection and filtering.
■ Careful tuning without depending too much on knowledgeable staff to avoid false positives.
■ Monitor traffic from off-network mobile endpoints.
0

Featured Post

Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, we’ll look at how to deploy ProxySQL.
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question