Fortigate

With the development and expansion of science and information technology, the risks that threaten your information assets are also more advanced. One of the solutions for network security is to establish security at the edge or border of your network. This border can be the border between your network and other networks that are not reliable, such as the Internet, or with other networks that have independent management and you are not aware of their status.Anyway, the first step for network security is to control data entry and exit to your network. To achieve security at the network border, security equipment such as firewall and UTM can be used. UTMs are the new generation of security equipment and provide you with features such as firewall, IPS, antivirus, Web filtering integrated on one hardware device. Fortinet company is one of the most famous and powerful companies producing security equipment, including UTM. Fortinet offers its products in five main groups as follows:

1.  Network Security
The products of this group, which are offered under the Fortigate brand, are as follows:
  • High Performance Firewall/VPN
    The products of this group, which have high output power, are specific to very large networks and offer firewall and VPN facilities in an integrated manner.
  • (Next Generation Firewall (NGFW
    The new generation of firewall provided by Fortinet is firewalls with an integrated IPS structure that provides high efficiency in protecting your data against a wide range of attacks. The IPS available on this equipment provides the ability to identify and control the programs running on your network by deep scanning the packets. Also, confirming the user's identity and implementing access policies are other features of this series of equipment.
  • (Advanced Thread Protection (ATP
    Fortinet has added ATP capabilities to its security products by presenting its new OS. These features include the following:
     – Web Filtering – Antivirus Enginel Fortiguard Analytics – FortiGuard Botnet Database
  • Web Filtering
    Web-based threats such as Phishing, Botnets, and Trojan sites are targeting your network users more than ever. Hackers are always thinking of infiltrating through the web, because the web is the only protocol that under any circumstances should provide the needs of users, especially on the Internet.
    To solve this problem, Fortinet has offered Web Filtering technology on some of its products, this technology has a database that is always updated through Fortinet's servers and allows you to only allow access to sites for Allow users who are in the workgroups you want.
  • (Unified Threat Management (UTM
    By providing UTM hardware equipment, this company has provided you with a wide range of security facilities at once and in an integrated manner. The integration of multiple technologies on a security platform has increased the visibility of network administrators towards security issues. Fortinet uses custom FortiASIC ​​processors on its equipment to increase efficiency. The use of these processors, while increasing the accuracy of scanning packages, has also significantly increased the speed and efficiency of the equipment.


2.  Network Access
The products of this group are mostly for the access layer of the network and include the following:
• Wireless (Access Point equipment for users to access wirelessly)
• Switching (Ethernet switches that can be used to connect users as well as data centers)
• Endpoint & Mobility (it is a solution to securely connect users to network security equipment. This software is provided in different versions to support equipment that is usually used by end users, including smart phones.)
• User Identity (provides the possibility of secure authentication of users by Token and authentication servers such as Radius and LDAP. Also, these devices have the ability to integrate with Active Directory servers.)

3.  Infrastructure Security
This group includes equipment for establishing security in the infrastructure layer. The products of this group include the following:
• Application & Content Delivery (These devices, which are called ADC for short, manage network traffic by providing load balancing solutions on servers and software delivery control, and increase network efficiency.)
• DDoS Mitigation (is responsible for protecting the network against distributed DoS attacks.)
Advanced Threat Protection (ATP
• Voice & Video (This group includes surveillance cameras under the network (IP Camera) as well as equipment to provide secure VOIP communications.)

4.  Application Security
This group includes equipment that is responsible for security at the application level.
The equipment in this group includes • Email • Web Application • Database • Web Browsing.

5.  Management
In order to facilitate integrated and centralized management, Fortinet has provided products in this field that fall into the following two categories:
• Report and Analysis
This device is responsible for recording user login events, analysis and security reports of Fortinet equipment, as well as collecting a comprehensive set of reports, it allows the network manager to quickly analyze the system.
• Security Management
این دستگاه امکان مدیریت مرکزی بر روی تجهیزات شرکت Fortinet را فراهم می آورد.