Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
SUNNYVALE, CA -- (Marketwired) -- 06/10/13 -- Fortinet® (NASDAQ: FTNT) -- a world leader in high-performance network security -- today answered the question, "What's next in next-generation enterprise firewalls?" with new features within its FortiOS 5 operating system, which serves as the foundation for the company's award-winning FortiGate network security platform. The new update includes:
Eric Ahlm, research director at Gartner, commented: "Security buyers may seek a combination of firewall options, such as NGFW, unified threat management (UTM), virtual and stateful firewalls, to meet a wide range of typical enterprise needs, such as data center, small offices or highly distributed enterprises, as cost-effectively as possible."(1)
"In order to increase protection, simplify management and reduce costs, enterprises today are migrating away from multi-vendor firewall environments in favor of a single-vendor model," said John Maddison, vice president of marketing for Fortinet. "For example, an enterprise may have high-performance firewalls for its datacenters, NGFWs for their campus perimeters and UTMs for their distributed offices. With its singular focus on innovating security and security-focused R&D, only Fortinet provides a true Network Security Platform with a wide array of robust security functionality for datacenters, campus perimeter and distributed offices."
Fortinet Network Security: Providing Choice for Specific Enterprise Requirements
With Fortinet Feature Select, enterprises can quickly and easily configure their FortiGate appliances based on their unique business and security requirements. These preset configurations can be done with a single button click at the time of system setup or at any time during the system's deployment. Configuration options include high-performance Firewall (includes VPN), NGFW (includes Firewall, intrusion prevention and application control); ATP (includes advanced threat protection and endpoint control); WF (includes Web filtering and explicit proxy); NGFW + ATA (includes NGFW and ATP features) and UTM (includes all previously mentioned features plus email filtering, data loss prevention, vulnerability scanning).
Better Protection with Better Visibility
The new Contextual Visibility feature in FortiOS 5 gives administrators deeper insights into historic or real-time network activities using detailed analytics. The types of data that can be extracted include IP and Port, geographical IP, session type, user names, network usage, network coverage and the types of applications and devices that are connecting to the network. With this, administrators can use correlated data to identify top clients associated with particular threats and further isolate suspicious Websites and IP addresses. This is available through the client reputation function.
Protection Against Advanced Targeted Attacks (ATA)
ATAs, also referred to as Advanced Persistent Threats (APTs), target specific organizations, infiltrate from multiple vectors and can remain stealthy for an undetermined amount of time before exfiltrating data. The new FortiGuard Advanced Threat Protection Service offers a multi-pronged approach to security that helps protect against attacks that could arrive via zero day vulnerability, undiscovered malware, phishing emails and/or password hacks. The features within the ATP service include botnet blacklisting, antimalware signatures and cloud-based sandboxing.
Certified Performance Powered by Custom ASICs
Today's announcement further exemplifies why FortiOS is the world's most advanced network security operating system. When coupled with FortiGate appliances, which feature high performance, purpose-built network, content and SoC processors that have been certified by industry-leading test and measurement labs, such as NSS Labs, ICSA Labs, Common Criteria, Virus Bulletin and FIPS, network administrators have the power to detect malicious content at Gigabit speeds. Other security technologies cannot protect against today's wide range of content- and connection-based threats because they rely on general-purpose CPUs, causing a dangerous performance gap. FortiASIC processors help to ensure the network security in place does not become the network bottleneck.
Availability
The FortiOS 5 update is available now from https://support.fortinet.com.
Free Webinar
To learn more about how Fortinet is changing the industry by redefining the next-generation firewall, please register here for a free Webinar: https://fortinet.webex.com/fortinet/onstage/g.php?t=a&d=572789137
(1) (Competitive Landscape: Next-Generation Firewall Appliance Market, Worldwide, 2013 by Eric Ahlm, published 3 April 2013)
About Fortinet (www.fortinet.com)
Fortinet (NASDAQ: FTNT) is a worldwide provider of network security appliances and a market leader in unified threat management (UTM). Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2012 Fortune Global 100. Fortinet's flagship FortiGate product delivers ASIC-accelerated performance and integrates multiple layers of security designed to help protect against application and network threats. Fortinet's broad product line goes beyond UTM to help secure the extended enterprise - from endpoints, to the perimeter and the core, including databases and applications. Fortinet is headquartered in Sunnyvale, Calif., with offices around the world.
Copyright © 2013 Fortinet, Inc. All rights reserved. The symbols ® and denote respectively federally registered trademarks and unregistered trademarks of Fortinet, Inc., its subsidiaries and affiliates. Fortinet's trademarks include, but are not limited to, the following: Fortinet, FortiGate, FortiGuard, FortiManager, FortiMail, FortiClient, FortiCare, FortiAnalyzer, FortiReporter, FortiOS, FortiASIC, FortiWiFi, FortiSwitch, FortiVoIP, FortiBIOS, FortiLog, FortiResponse, FortiCarrier, FortiScan, FortiAP, FortiDB, FortiVoice and FortiWeb. Other trademarks belong to their respective owners. Fortinet has not independently verified statements or certifications herein attributed to third parties, and Fortinet does not independently endorse such statements. Notwithstanding anything to the contrary herein, nothing herein constitutes a warranty, guarantee, binding specification or other binding commitment by Fortinet, and performance and other specification information herein may be unique to certain environments. This news release may contain forward-looking statements that involve uncertainties and assumptions. Changes of circumstances, product release delays, or other risks as stated in our filings with the Securities and Exchange Commission, located at www.sec.gov, may cause results to differ materially from those expressed or implied in this press release. If the uncertainties materialize or the assumptions prove incorrect, results may differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements. Fortinet assumes no obligation to update any forward-looking statements, and expressly disclaims any obligation to update these forward-looking statements.
Add to Digg Bookmark with del.icio.us Add to Newsvine
Media Contact:
Rick Popko
Fortinet, Inc.
408-486-7853
rpopko@fortinet.com
Investor Contact:
Michelle Spolver
Fortinet, Inc.
408-486-7837
mspolver@fortinet.com
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs