Intelligent CISO Issue 25 | Page 33

� PREDICTIVE INTELLIGENCE Fortinet unveils new FortiGate 1800F to enable high performance Fortinet has revealed a networking processor with the aim of enabling today’s largest enterprises to achieve true internal segmentation along with unprecedented scale, performance, detection and enforcement capabilities. ortinet, a global F leader in broad, integrated and automated cybersecurity solutions, has unveiled the FortiGate 1800F Next-Generation Firewall (NGFW) powered by NP7, the company’s seventh generation network processor, to enable today’s largest enterprises to achieve true internal segmentation as well as unprecedented scale, performance, detection and enforcement capabilities. John Maddison, EVP of Products and CMO at Fortinet, said: “The FortiGate 1800F powered by NP7 has a Security Compute Rating ranging from 3x to 20x faster than the comparable product from our competition. This allows our customers to deploy FortiGate 1800F as an internal segmentation firewall and effectively strengthen their security posture.” Flat networks fall flat when attacked Digital innovation is disrupting enterprise organisations, creating new services and business opportunities while also causing increased risk across all industries. Explosive adoption of IoT and mobile devices, as well as applications and services from multiple clouds, are pushing the attack surface beyond the traditional network boundaries. An expanding and fragmented attack surface is undermining the ability of network security leaders to maintain network performance, security, reliability and availability. In today’s data centres, many enterprise architectures have been built on a high-performance routing and switching infrastructure without integrating security. To facilitate flexibility and agility in this type of environment, networks have become progressively flatter and more open, which means security implementation within the internal network is, in most cases, basic and limited to Virtual LANs and Layer 4 access lists. Therefore, in the event of a security breach, once beyond the security perimeter, hackers can easily move about and freely gain access to credentials, resources and data. More, the lack of security infrastructure within the internal network also significantly limits the enterprise’s visibility into suspicious traffic behaviours and data flows, which hinders the ability to detect a breach. Many have turned to internal segmentation as a way to regain control over their burgeoning networks and to improve visibility and security. www.intelligentciso.com | Issue 25 33