Fortinet enables intent-based segmentation | Sunday Observer

Fortinet enables intent-based segmentation

Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, unveiled its new high-performance FortiGate Next-Generation Firewalls (NGFWs), comprising FortiGate 3600E, FortiGate 3400E, FortiGate 600E and FortiGate 400E Series, enabling organisations to implement Intent-based Segmentation into their security architecture.

Regional Vice President, India and SAARC, Fortinet, Rajesh Maurya said, “Segmentation is becoming as fundamental as patching vulnerable systems. Intent-based Segmentation aligns business goals with infrastructure changes and ultimately, dynamically separates infrastructure to protect users, data and systems.

“A fundamental element of Intent-based Segmentation is the high-performance NGFW. The new FortiGate 3400E and 3600E Series provide industry-leading threat protection and SSL inspection performance allowing customers to implement a holistic end-to-end architecture,” he said.

The combination of business growth, workloads migrating to multiple clouds and increasing cyber attacks makes it difficult for organisations to maintain a robust security architecture that implements consistent security policy across all network environments.

Having flat networks with a single enforcement point compounds this problem by making it easier for cyber criminals to get inside the network and become part of the trusted zone, allowing them to quickly spread threats laterally. It’s hard to detect and contain these cyber criminals as they move deeper into the network, resulting in cascading risks and exfilteration of valuable data.

As security strategies are failing to keep pace with a complex security landscape, organisations are seeking adaptive and predictive protection that prevents the spread of threats throughout the network. With Intent-based Segmentation, organisations achieve adaptive security by intelligently segmenting IT assets in accordance with the business intent, such as addressing compliance, by having multiple enforcement points.

Adaptive protection is achieved by implementing granular access control based on varying trust levels and high-performance advanced security. 

Comments