�
PREDICTIVE
INTELLIGENCE
Fortinet unveils new
FortiGate
1800F
to enable high performance
Fortinet has revealed a networking processor with the
aim of enabling today’s largest enterprises to achieve
true internal segmentation along with unprecedented scale,
performance, detection and enforcement capabilities.
ortinet, a global
F
leader in broad,
integrated and
automated
cybersecurity
solutions, has
unveiled the
FortiGate 1800F Next-Generation
Firewall (NGFW) powered by NP7, the
company’s seventh generation network
processor, to enable today’s largest
enterprises to achieve true internal
segmentation as well as unprecedented
scale, performance, detection and
enforcement capabilities.
John Maddison, EVP of Products
and CMO at Fortinet, said: “The
FortiGate 1800F powered by NP7 has a
Security Compute Rating ranging from
3x to 20x faster than the comparable
product from our competition. This
allows our customers to deploy
FortiGate 1800F as an internal
segmentation firewall and effectively
strengthen their security posture.”
Flat networks fall flat
when attacked
Digital innovation is disrupting enterprise
organisations, creating new services
and business opportunities while also
causing increased risk across all
industries. Explosive adoption of IoT and
mobile devices, as well as applications
and services from multiple clouds, are
pushing the attack surface beyond
the traditional network boundaries.
An expanding and fragmented attack
surface is undermining the ability of
network security leaders to maintain
network performance, security, reliability
and availability.
In today’s data centres, many enterprise
architectures have been built on a
high-performance routing and switching
infrastructure without integrating
security. To facilitate flexibility and
agility in this type of environment,
networks have become progressively
flatter and more open, which means
security implementation within the
internal network is, in most cases,
basic and limited to Virtual LANs and
Layer 4 access lists. Therefore, in
the event of a security breach, once
beyond the security perimeter, hackers
can easily move about and freely
gain access to credentials, resources
and data. More, the lack of security
infrastructure within the internal
network also significantly limits the
enterprise’s visibility into suspicious
traffic behaviours and data flows, which
hinders the ability to detect a breach.
Many have turned to internal
segmentation as a way to regain control
over their burgeoning networks and to
improve visibility and security.
www.intelligentciso.com | Issue 25
33