DEPLOYMENT GUIDE. FortiAP-S Series Deployment Guide. Secure Cloud-managed Wireless LAN Solution
|
|
|
- Stanley Williams
- 10 years ago
- Views:
Transcription
1 DEPLOYMENT GUIDE FortiAP-S Series Deployment Guide Secure Cloud-managed Wireless LAN Solution
2 Overview Distributed enterprises, dissatisfied with the cost and complexity of traditional controller-based enterprise WLAN solutions, are turning to cloud-managed Wi-Fi as a more practical alternative. But most Cloud Wi-Fi solutions fall short on content and application security, leaving businesses vulnerable to cyber-threats. Fortinet s secure cloud-managed Wi-Fi addresses this shortcoming completely. Cloud Wi-Fi Evolution Distributed enterprises such as retail, hospitality, health clinics and managed care facilities have historically been poorly served by enterprise WLAN vendors. Traditional controller-based solutions are generally too complex and too expensive for small businesses or those with multiple sites requiring only a few APs each. Secure Cloud Wi-Fi Fortinet s secure cloud-managed WLAN solution is unlike any other Cloud Wi-Fi offering. It offers the same network security capabilities found in Fortinet s controller-managed enterprise WLAN solution with the convenience and low CAPEX of cloud-based management. To address this growing market, enterprise WLAN vendors have ported their management and controllers to the cloud, simplifying management and reducing CAPEX. With a cloud-managed Wi-Fi architecture customers now only need to buy and configure APs, not controllers or management servers. But, the apparent simplicity of cloud-management has not come without a price. Security beyond standard Wi-Fi access control is invariably lacking. In large enterprises, content and application security is normally provided through specialized security appliances for IPS, webfiltering, anti-virus and so on. But in Cloud-Wi-Fi these functions are absent. The result is cloudmanaged Wi-Fi solutions are inherently not as secure as controller-managed WLANs. 2
3 Beyond Wi-Fi Security How important is security beyond WLAN access control? Today s Wi-Fi authentication and encryption standards (WPA2, 802.1X etc.) are generally accepted as robust Wi-Fi access control mechanisms. Why does anyone need more security than that? Well, the threat landscape has moved up the stack, and it is constantly evolving. Our growing dependence on the Internet and cloud services, along with BYOD has resulted in exponential growth in potential threat vectors and targets. Threats enter your network through common applications like , web browsers and social networking tools, as well as seemingly innocent apps and games on the mobile devices belonging to your staff, or customers. Worms and virus on an infected mobile device can infect other Wi-Fi attached devices, even without either of them accessing the Internet. Securing business communications, personal information, financial transactions, and the mobile devices of your users, involves much more than Wi-Fi access control. It requires scanning for malware, preventing access to malicious websites, and controlling application usage. But typical Cloud Wi-Fi solutions do not cater to these requirements. Fortinet has a novel approach which completely addresses this shortcoming in all existing Cloud Wi-Fi offerings. Fortinet Secure Cloud-managed Wi-Fi Fortinet s Cloud Wi-Fi solution is unlike any other Cloud Wi-Fi offering. Based on the FortiCloud provisioning and management service, and a new class of access points the - the FortiAP-S series - it offers the same network security capabilities typically found only in controller-managed enterprise WLAN solutions combined with supplementary security services. Normally, if you want to apply comprehensive security for all types of traffic from access points in remote offices, you need to tunnel traffic through centralized security devices on the corporate LAN, and often hairpin it back to where it came from. All this adds latency and burns the capacity of your network links, forcing premature costly upgrades. Doing this is not only complicated, it also masks your visibility of client and user behavior, as it requires entire VLANs, not unique sessions to be mapped from one security appliance to the next, to process security in multiple passes through different devices. It is highly inefficient. Distributed enterprises in hospitality, retail and healthcare which have large numbers of guests would rather not be tunneling video, gaming and other high-bandwidth traffic from their guests through the corporate network. But if they want to control application usage, such as preventing a guest from watching inappropriate content in their coffee shop, or if they want to fully protect devices from cyber-threats they ve had no alternative, until now. Many vendor s controller-managed WLAN solutions, including Fortinet s solution, allow split routing at remote offices whereby corporate traffic is tunneled over the WAN to undergo security processing at the head office or data center, while Internet traffic goes directly to the Internet. But this Internet traffic is no longer protected by corporate IPS, antivirus, and web filtering appliances. Alternatively, all traffic from authenticated corporate users may be tunneled through the WAN, while only guest traffic goes directly to the Internet. In this case only guest traffic is unprotected and uncontrolled. Still, neither approach is ideal. With the FortiAP-S series all traffic from any type of user can be protected and controlled regardless whether it is corporate or Internet traffic, without tunneling everything through the corporate WAN. Not only is this efficient and cost-effective, it is also the most secure and least complex of all options. 3
4 What makes the FortiAP-S series access points so special is they contain advanced security functions embedded in the AP hardware. This new class of AP is equipped with extra memory and twice the processing power of typical thin APs, which enables them to perform realtime security processing at the network access edge, not in the cloud or on the corporate LAN. Processing L2-L7 security at the AP in one pass is efficient. Plus it allows exceptionally granular user and device policies and preserves complete visibility of session level behavior. Traditional Cloud Solution Connection Credential Lookup Authentication Gap in Security Protection Continue to Wire Fortinet Cloud Solution Connection Credential Lookup Authentication IPS, AV, Botnet URL Filter, App Control Continue to Wire Fig 1. Fortinet Approach to WLAN and Application Security Enforcement. 4
5 FortiCloud Provisioning and Management FortiCloud is a cloud-based provisioning, configuration management and analytics service for FortiGate, FortiWiFi, FortiAP and FortiAP-S series product lines. It lets you quickly initialize and then maintain centralized control and visibility of your wireless network all from the cloud, avoiding the cost of WLAN controller and management gear. Hosted by Fortinet, the FortiCloud service is provided free of charge. It gives businesses a single dashboard for managing the infrastructure and security for the entire network, and offers unlimited network scalability with all the benefits of centralized management. Fig 2: Secure Remote Offices with FortiAP-S series FortiCloud simplifies provisioning of access points and other Fortinet security devices at remote sites where there is no on-site IT expertise. FortiAP-S series access points include FortiCloud registration functionality in their firmware, which enables zero-touch provisioning. When installed, the APs will discover and connect to FortiCloud and provision themselves, automatically. From Rogue AP detection to guest access management to application usage reporting and threat analysis, FortiCloud gives you everything you need to manage the Wi-Fi access points and the complete security landscape at any remote location, while maintaining full visibility of wireless health and the quality of experience for clients. 5
6 FortiCloud Highlights Fast Centralized Provisioning: You can deploy new APs remotely with no on-site expertise, anywhere in the world. Single and bulk configuration options in FortiCloud let you identify the serial number of APs that belong to your business. As each AP powers-on for the first time, it registers with FortiCloud and automatically downloads the latest firmware and default profiles for your network. Within minutes the AP reboots and is fully operational. Once it is activated, easy-to-use provisioning wizards let you assign custom profiles to any AP, or push common profiles to multiple APs simultaneously. Robust Authentication: FortiCloud supports authentication using i with either pre-shared keys or 802.1X. When 802.1X is enabled, users can be authenticated against the user database hosted in FortiCloud, or against a RADIUS server on the corporate network. Role / Identity-based Access: Role-based access control lets IT staff configure separate access profiles for different groups within an organization (e.g. faculty, students and guests or medical staff, admin and patients) using separate SSIDs. Different polices can be assigned to different groups, allowing you to segment users or client devices based on unique business and compliance needs. With identity-based security it is possible to place multiple groups of users on a single SSID/VLAN, while still maintaining separate access privileges for each functional group or user. This policy driven access control also simplifies configuring access for lesssecure legacy devices (e.g. bar code scanners, medical devices etc.), without compromising regulatory compliance requirements such as PCI DSS and HIPAA requirements. Health and Utilization Analytics: The FortiCloud dashboard provides visibility and control of the health of the wireless network. FortiAP-S series APs may be positioned on a global map, with the ability to drill down to AP status, performance information and connected client statistics. FortiCloud also provides complete layer-7 application visibility, with detailed information on the applications being used and by whom, bandwidth consumption by AP, client or application, and much more. FortiCloud analytics includes granular drill-down and filtering functionality to instantly determine how applications, websites, users and threats are impacting your network. To aid you in management and compliance reporting, detailed pre-configured and custom reports are available, including specialized PCI-DSS compliance reports. They can be run on-demand or scheduled for certain times and distributed by to interested parties. Granular Application Controls: Any application can be allowed, restricted or blocked. Unlike other vendor s Cloud Wi-Fi solutions, which can only classify up to a few hundred applications at best, FortiCloud has application signatures for over 3,300 distinct applications, allowing fine grained bandwidth guarantees and prioritization of critical applications. It can distinguish between Netflix, Vimeo, YouTube, YouTube HD etc., and between Skype, SIP, H.323 etc. The application control settings are configured in the cloud, and then downloaded to FortiAP-S series access points for real-time local enforcement. Guest Access Captive Portal: Many distributed enterprises need to provide secure Internet access for guests and visitors. FortiCloud allows businesses to associate any number of SSIDs with a fully customized captive portal, and to operate multiple branded captive portals simultaneously if needed. Guests connect to a seemingly open SSID, but the AP responds to the client s first HTTP request with a web page requesting user name and password. Fig 3: Category-based Application Control with Granular Configuration 6
7 FortiAP-S Series Access Points The FortiAP-S series provides secure indoor wireless access with a range of single and dual-radio 3x3 MIMO ac APs. Some models are equipped with internal antennas, while others support external antennas to provide flexible directional and long-range coverage for both indoors, and outdoors. Fig 4. FortiAP-S series indoor models. As with other Fortinet AP product lines, zero-touch deployment enables rapid provisioning. While all enterprise features such as roaming, bridging support, guest access, WIDS and Rogue AP suppression, Air Monitor, WMM and QoS and WAN failure survivability are supported as standard, without additional feature licenses. Where FortiAP-S series APs differ from other Fortinet AP product lines, and conventional thin APs from other WLAN vendors, is how they handle real-time content and application security. Once configured and operational, they download the latest threat, exploit and application signatures from FortiGuard Labs to memory on the AP hardware itself, and can immediately enforce web filtering and application controls and offer protection against network intrusions, viruses and a host of other cyber-threats. The added processing capacity at the AP ensures deep security processing can take place, without impacting throughput or latency. By enforcing network security at the network access edge, rather than in the cloud, FortiAP-S series APs can instantaneously thwart threats originating on infected client devices, such as botnets, worms and other malicious activities from zombie computers, before they even reach the Internet. This not only conserves precious Internet bandwidth for real work, it eliminates any risk of your IP address getting blacklisted, and protects all the other devices in your network. 7
8 FortiAP-S Series Highlights Zero-touch Provisioning: When powered-on for the first time, FortiAP-S series APs use a robust discovery mechanism based on serial numbers which results in them being automatically assigned to your account. Once connected, they download the latest firmware and their assigned radio profiles, then automatically select the best channel and power settings for the prevailing RF conditions. WAN Failure Survivability: In the event of a WAN outage, the FortiAP-S series continues to provide connectivity and threat protection for all authenticated clients, even for clients roaming back to an AP after temporarily being connected to another AP. Each AP already has user state information and threat signatures etc. stored in memory, so it has everything it needs to continue performing IPS, application control and anti-virus scanning. Air Monitor: All FortiAP-S series models can perform channel scanning as an air monitor. In PCI compliance applications, dual radio APs can be used to provide both client access and monitoring simultaneously. WIDS and Rogue AP suppression: FortiAP-S series APs can provide continuous monitoring for Rogue APs and possible wireless intrusion events, and report suspicious behavior to FortiCloud which generates appropriate alerting and reports for network managers. The Rogue AP list shows MAC address, manufacturer, security profile, speed, and last seen time, enabling administrators to rapidly classify trusted or untrusted APs, and take corrective action to locate and remove rogues. Easy Policy Assignment: Each configured SSID is treated like a virtual network interface which can undergo IPS checks, A/V scanning, web filtering and application control as needed. This allows security policies to be applied easily, whether a single set of policies applies to all SSIDs or unique policy is applied separately to each SSID. IPS: Fortinet Intrusion Prevention System (IPS), technology embedded in the FortiAP-S series APs protects the network from both known and unknown threats, blocking attacks that take advantage of device and network vulnerabilities, and unpatched systems. IPS protects client devices, local servers and critical business applications in the cloud from attacks. Antimalware: Exploiting its powerful processor for layer-7 deep packet inspection, the FortiAP-S series AP provides real-time protection against viruses, botnets, web exploits, Trojans and other malicious software variants. While regular updates from FortiGuard Labs ensure immediate protection against newly discovered zeroday vulnerabilities. Web URL Filtering: The AP can block access to any known harmful websites that may contain phishing/pharming attacks or malware. Beyond reducing exposure to malware, this can also be used to control access to age-appropriate content in schools, or to prevent viewing of potentially objectionable content in public areas in hospitality, retail and healthcare settings. It can also be used to limit time-wasting personal use of devices in the workplace. Application Control: With signatures for over 3,300 applications FortiAP-S series APs offers unrivalled control over application priority and bandwidth management. They can distinguish unique applications and treat each one differently. This goes far beyond the scope of crude Wi-Fi priority classes. When bandwidth is scarce, you can ensure mission-critical applications prevail, while lower priority applications are throttled. 8
9 Complete Security with Exceptional Value Aside from simplified deployment and management, one of the value propositions of Cloud Wi-Fi is the shift from CAPEX to OPEX. While this might seem attractive, some vendors are gouging 15%- 20% of the AP hardware price as an annual cloud-management subscription fee for each managed AP. That s a high premium to pay for management services that don t change substantially from year to year. In contrast, cloud-management through FortiCloud is free. There are no per AP subscription fees at for management at all. Fortinet only charges per AP subscriptions for the real-time application security capabilities provided through regular updates from FortiGuard Labs a capability that no other vendor offers. So, for roughly the same overall OPEX you get world-class security, without any CAPEX investment in security appliances, no latency penalties, and no WAN upgrade costs. No matter what happens out there in cyber-space, or to guest and employee owned devices connected to your network, you have up-to-date protection against the very latest cyber-threats. No other vendor delivers this value. FortiCloud / FortiAP-S Series Deployment Fortinet s secure cloud-managed Wi-Fi is suitable for single office SMBs all the way to large distributed enterprises with thousands of locations, and it is especially attractive in small locations, where oftentimes there simply is no physical space for additional local security appliances, regardless whether such an option would be economically viable. With Wi-Fi access and security combined in the footprint of a single AP, secure wireless has never been more compact. Here are some common deployment scenarios and use cases for some of the FortiAP-S series security capabilities in different industries. Hospitality: Hoteliers want to monetize Wi-Fi and other high margin services while ensuring their patrons have an all-round pleasant experience on or off the Internet! In order to maximize revenue from video entertainment in rooms, they can use Web Filtering or Application Control features on FortiAP-S series APs to block access to OTT video services such as Netflix, and preserve capacity on their Internet connection for vital applications such as for business guests. Similarly they can restrict Internet access in the lobby, to drive Internet access sign-up in rooms, and to prevent age-inappropriate content being viewed in public areas, while permitting it in the privacy of one s room. In recent years, hotels have endured backlash against blocking of personal Wi-Fi hotspots, which resulted in the 2014 FCC ruling and January 2015 advisory that Wi-Fi blocking is prohibited. This leaves hospitality with a fine line to tread between FCC compliance and protection from Rogue APs and malicious use. Fortinet s Secure Cloud Wi-Fi solution provides the Rogue AP information, threat protection and threat analysis, to enable establishments to instantly thwart malicious use, while remaining FCC compliant, and auditable. K-12 Education: School districts continually struggle with insufficient funds and a shortage of IT resources. Computers are few. Internet pipes are small, and network infrastructure is limited. One way to alleviate the funding dilemma is to spend less on computers and more on infrastructure by encouraging BYOD. Yet this is a double-edged sword, as it increases the security risks, and opportunity for network abuse by students. Furthermore, they have a moral if not legal obligation to protect students from ageinappropriate content. Fortinet secure Cloud Wi-Fi provides an elegant solution to meet all of these requirements in one fell swoop: It frees up capital expense from security appliances, WLAN controllers and management for more APs. It allows blocking of inappropriate or malicious sites, neutralizes infected devices and protects the network from all cyber-threats. All while conserving precious Internet bandwidth and even more precious IT staff resources through centralized management. 9
10 Retail, Restaurants and QSR: Stores and restaurants don t want to discourage patrons from using their mobile devices. In fact, they want to encourage it so they can collect consumer analytics and opt-ins which they can use for online and offline marketing. All vendors provide a branded captive portal to enable secure access and keeps guests segregated from mobile point of sale (mpos), store operations and back office traffic, while also capturing visitor opt-ins. However, a captive portal alone does not provide the required protection for PCI DSS compliance, and it offers no bandwidth protection for mission-critical POS transactions. Fortinet s secure cloud-managed WLAN solution goes far beyond captive-portals and minimum PCI DSS compliance requirements such as scanning for and mitigating Rogue APs. It provides complete protection from any type of virus or cyberthreat which could potentially compromise mpos terminals, and Wi-Fi enabled barcode readers, while providing complete control over the bandwidth allocated to business applications. User behavior can also be controlled, by blocking or throttling highbandwidth applications such as video, so every patron has a good Internet experience. Retailers could even block access to the websites of direct online competitors in order to curb showrooming. Healthcare: Health clinics and managed care facilities increasingly need to offer guest access services to guests and patients. Yet they must ensure that caregivers and life-critical medical devices get the security protection and priority service they require. More and more, medical staff are bringing their own devices to work and using them in the provision of patient care dealing with highly sensitive patient information through those devices. To ensure HIPAA compliance, those devices should be properly screened before they access patient data and should be protected from cyber-threats from the Internet or other wireless devices. VoIP phones, RFID/barcode scanners and many Wi-Fi enabled medical devices such as heart monitors, I/V pumps are based on Linux or even Windows operating systems. Such headless devices often suffer from long lapses in firmware updates which leave them vulnerable to worms and other viruses which can quickly render your fleet of devices useless, potentially putting patients well-being, if not their lives, at risk. With built-in IPS, web-filtering, antivirus protection and application control, Fortinet s secure Cloud-Wi-Fi provides complete protection for medical devices, and the smartphones and tablets of caregivers. Guest and patient devices can be isolated from business and medical traffic, while enjoying the same threat protection. And all medial applications can be assured prioritized service and bandwidth protection while guest bandwidth consumption and application use is kept in check. Transportation: At a large passenger terminal, transportation providers may already have the Wi-Fi and security infrastructure they need to offer secure Wi-Fi Hotpots for passengers. But at suburban and rural bus or rail stations it is a different matter, the cost of Wi-Fi deployment is often prohibitive. However, passengers want Internet access wherever they are. Using FortiAP-S series APs and branded captive portals, transportation services operators can cost-effectively offer free or pay-per-use secure Wi-Fi Hotspots that redirect users to a landing page with up-to-date timetables, service status and loyalty programs. In addition, operators can offset the cost and perhaps even turn a profit, by offering tiered Wi-Fi access services to retail tenants at the same premises which is an obvious win-win. MSP managed Wi-Fi: The unique security capabilities of the FortiAP-S series together with FortiPrivateCloud (see below) make it practical and profitable for Managed Service Providers to target the massive SMB and distributed enterprise opportunity. It is no longer necessary to deploy a full security appliance and APs on premises. Just one or a handful of cloud-managed FortiAP-S series APs now provides an equivalent level of security, at a fraction of the cost. This dramatically impacts the economics of managing secure Wi-Fi access as a service, making it more attractive to businesses and more profitable for Managed Services Providers. Overlay hotspots: As mentioned earlier, if you want to control or secure guest traffic, it must tunneled through the corporate WAN. Using the FortiAP-S series as an overlay to an existing network lets businesses control and protect guest traffic and devices, while bringing relief to the corporate network. One of the most compelling aspects of the various uses case described above, is that Fortinet s Secure Cloud Wi-Fi makes it possible for distributed enterprises to implement world-class wireless security at remote sites without altering their corporate security framework, and without burdening the corporate network in any way. 10
11 Related Products and Services FortiGuard FortiGate is Secured by FortiGuard, meaning that it receives continual exploit, virus and application signature updates, ensuring immediate protection from zero-day cyber threats. FortiGuard Labs is a global team of over 200 threat researchers who continually research the latest attacks, and figure out how to neutralize them. Their work results in regular security updates which are downloaded to Fortinet products as a FortiGuard subscription service, to provide your network with the latest protection against new and emerging threats. FortiPrivateCloud FortiPrivateCloud is a feature-rich VM software platform similar to FortiCloud, which is designed specifically for MSPs to enable them to deploy Cloud Wi-Fi and security management solutions as a managed service upon their own hosted services infrastructure. Its multi-tier, multi-tenant capabilities allow MSPs to manage all their customers networks through one console, while also extending management access to their customers, and enabling different privileges for different users. Secure Cloud-managed WLAN Summary Fortinet s cloud-managed WLAN solution is truly unique. While other vendors require additional security appliances for antivirus, web-filtering and intrusion protection, Fortinet provides this functionality as standard from the cloud. This is enforced directly on FortiAP-S series APs where it can provide immediate protection at the session level, and avoids complicated traffic flow mapping to external security appliances. With regular security updates from FortiGuard Labs, a Fortinet cloud-managed WLAN is assured instant protection against the very latest cyber-threat with no administrative effort involved. No matter how the cyber-threat landscape evolves, specialized business-centric mobile devices, and those of your guests and employees connecting to your network are protected, or rendered harmless. This unique distributed security model reduces costs and eliminates the complexity of providing wireless LAN security for distributed enterprise locations. With FortiCloud providing a single dashboard to unify infrastructure and security management, businesses can enjoy unlimited scalability and the convenience of centralized cloud management, without sacrificing enterprise-class security. GLOBAL HEADQUARTERS Fortinet Inc. 899 Kifer Road Sunnyvale, CA United States Tel: EMEA SALES OFFICE 120 rue Albert Caquot 06560, Sophia Antipolis, France Tel: APAC SALES OFFICE 300 Beach Road The Concourse Singapore Tel: LATIN AMERICA SALES OFFICE Paseo de la Reforma 412 piso 16 Col. Juarez C.P México D.F. Tel: (55) Copyright 2015 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare and FortiGuard, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. July 6, 2015
SOLUTIONS GUIDE. Secure Wireless LAN Solutions Guide. Complete Wi-Fi Security for Any Network Topology
SOLUTIONS GUIDE Secure Wireless LAN Solutions Guide Complete Wi-Fi Security for Any Network Topology Overview The Fortinet Secure WLAN portfolio comprises three separate Wi-Fi product lines. They are designed
Transforming Your WiFi Network Into A Secure Wireless LAN A FORTINET WHITE PAPER. Fortinet White Paper
Transforming Your WiFi Network Into A Secure Wireless LAN A FORTINET WHITE PAPER Introduction There have been a number of moments in the IT and network industry that can be considered as a Paradigm Shift.
Secure Access Architecture
SOLUTION GUIDE Secure Access Architecture Complete Security for Network Access Introduction Technology and market trends are rapidly changing the way enterprise organizations deploy local area networks,
Fortinet FortiGate App for Splunk
SOLUTION BRIEF Fortinet FortiGate App for Splunk Threat Investigation Made Easy The FortiGate App for Splunk combines the best security information and event management (SIEM) and threat prevention by
Improving Profitability for MSSPs Targeting SMBs
Improving Profitability for MSSPs Targeting SMBs Using a Multi-tenant Virtual Domain (VDOM) Model to Deliver Cost-Effective Security Services Introduction In recent years the adoption of cloud services,
WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)
WHITE PAPER Protecting Your Network From the Inside-Out Internal Segmentation Firewall (ISFW) Protecting Your Network From the Inside-Out Internal Segmentation Firewall (ISFW) Table of Contents Summary
WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)
WHITE PAPER Protecting Your Network From the Inside-Out Internal Segmentation Firewall (ISFW) Protecting Your Network From the Inside-Out Internal Segmentation Firewall (ISFW) Table of Contents Summary
How To Secure Your Store Data With Fortinet
Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the
Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com
Wireless Services The Top Questions to Help You Choose the Right Wireless Solution for Your Business Get Started Now: 877.611.6342 to learn more. www.megapath.com Why Go Wireless? Today, it seems that
The Fortinet Advanced Threat Protection Framework
WHITE PAPER The Fortinet Advanced Threat Protection Framework A Cohesive Approach to Addressing Advanced Targeted Attacks The Fortinet Advanced Threat Protection Framework Table of Contents Introduction
5 ½ Things That Make a Firewall Next Gen WHITE PAPER
5 ½ Things That Make a Firewall Next Gen WHITE PAPER 5 ½ Things That Make a Firewall Next Gen Table of Contents Introduction 3 #1: Application Awareness and Control 3 #2: User Identity Awareness and Control
MSSP Advanced Threat Protection Service
SOLUTION BRIEF SOLUTION BRIEF: MSSP ADVANCED THREAT PROTECTION SERVICE MSSP Advanced Threat Protection Service Fortinet Empowers MSSP Delivery of Complete ATP Managed Security Service The Need For ATP
Fortinet Secure Wireless LAN
Fortinet Secure Wireless LAN A FORTINET SOLUTION GUIDE www.fortinet.com Introduction to Wireless Security Broad adoption of IEEE 802.11n has created a complex wireless landscape with proliferating mobile
Managed WiFi. Choosing the Right Managed WiFi Solution for your Organization. www.megapath.com. Get Started Now: 877.611.6342 to learn more.
Managed WiFi Choosing the Right Managed WiFi Solution for your Organization Get Started Now: 877.611.6342 to learn more. www.megapath.com Everyone is going Wireless Today, it seems that everywhere you
Keeping the Store Open: Fighting the Cyber Criminal in the Retail World
SOLUTION BRIEF Keeping the Store Open: Fighting the Cyber Criminal in the Retail World Pain Points of the Typical Retail Network CONNECTIVITY Introduction As the most recent wave of attacks have confirmed,
WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)
WHITE PAPER Protecting Your Network From the Inside-Out Internal Segmentation Firewall (ISFW) Table of Contents Summary...2 Advanced Threats Take Advantage of the Flat Internal Network...3 The Answer is
FortiVoice Enterprise
DATA SHEET FortiVoice Enterprise Phone systems FVE-100E, 300E-T-T/E, 500E-T2-T/E, 1000E, 1000E-T, 2000E-T2, 3000E and VM Phone systems The IP PBX voice solutions give you total call control and sophisticated
Securing the Data Center
WHITE PAPER Securing the Data Center Advanced Threats Require Advanced Security Bigger Breaches, Higher Stakes In the wake of recent headline-grabbing data breaches, FBI Director James Comey s oft-quoted
SDN Security for VMware Data Center Environments
SOLUTION BRIEF SDN SECURITY FOR VMWARE DATA CENTER ENVIRONMENTS Purpose-built virtual security appliances will be increasingly used alongside hardware appliances to secure enterprise data centers, which
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
The Enterprise Cloud Rush
WHITE PAPER The Enterprise Cloud Rush Microsoft/Azure The Enterprise Cloud Rush Microsoft/Azure Prepared By: John Jacobs VP, Enterprise Systems Engineering, Fortinet Praveen Lokesh Principal Engineer,
Use FortiWeb to Publish Applications
Tech Brief Use FortiWeb to Publish Applications Replacing Microsoft TMG with a FortiWeb Web Application Firewall Version 0.2, 27 June 2014 FortiWeb Release 5.2.0 Introduction This document is intended
FortiGate/FortiWiFi -60C Series Integrated Threat Management for Small Networks
FortiGate/FortiWiFi -60C Series Integrated Threat Management for Small Networks The FortiGate/FortiWiFi-60C Series are compact, all-in-one security appliances that deliver Fortinet s Connected UTM. Ideal
Cisco Meraki solution overview. 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Meraki solution overview 2010 Cisco and/or its affiliates. All rights reserved. Cisco Meraki: a complete cloud-managed networking solution - Wireless, switching, security, WAN optimization, and MDM,
WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Network Firewall (INFW)
WHITE PAPER Protecting Your Network From the Inside-Out Internal Network Firewall (INFW) Protecting Your Network From the Inside-Out Internal Network Firewall (INFW) Table of Contents Summary 3 Advanced
FortiGate/FortiWiFi 60D Series
DATA SHEET FortiGate/FortiWiFi 60D Series Integrated Threat Management for Small Networks FortiGate/FortiWiFi 60D Series FortiGate 60D, 60D-POE, FortiWiFi 60D, 60D-POE The FortiGate/FortiWiFi 60D Series
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking
ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...
INDEPENDENT VALIDATION OF FORTINET SOLUTIONS. NSS Labs Real-World Group Tests
INDEPENDENT VALIDATION OF FORTINET SOLUTIONS NSS Labs Real-World Group Tests INDEPENDENT VALIDATION OF FORTINET SOLUTIONS Introduction Organizations can get overwhelmed by vendor claims and alleged silver
SOLUTION GUIDE. Secure Access Architecture. Enterprise Network Access with Complete Security
SOLUTION GUIDE Secure Access Architecture Enterprise Network Access with Complete Security Introduction Technology and market trends are rapidly changing the way enterprises deploy local area networks,
FortiVoice Enterprise
DATA SHEET FortiVoice Enterprise Phone systems FVE-20E2/4, 100E, 300E-T, 500E-T2, 1000E, 1000E-T, 2000E-T2, 3000E and VM Phone systems The IP PBX voice solutions give you total call control and sophisticated
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments Centralized WLAN management and auto provisioning Manages up to 0 APs with granular access control Advanced RF management
FortiCore A-Series. SDN Security Appliances. Highlights. Securing Software Defined Networking (SDN) Architectures. Key Features & Benefits
DATA SHEET FortiCore A-Series SDN Security Appliances FortiCore A-Series FortiCore 6200A, 6240A, and 6300A SDN Security Appliances The FortiCore A-Series of Software-Defined Networking (SDN) security appliances
INTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
Is Your Network Ready for the ipad?
Is Your Network Ready for the ipad? Geoff Haggart Vice President, EMEA Meraki Airwatch MDM Interface ipad Exploding Onto Enterprise Networks ipad Exploding Onto Enterprise Networks Networking challenges
Meraki 2015 Solution Brochure
Meraki 2015 Solution Brochure Introduction 100% Cloud Managed Enterprise Networks Cisco Meraki cloud managed edge, branch, and campus networking solutions bring simplicity to enterprise-class networks.
FortiGate/FortiWiFi 90D Series
DATA SHEET FortiGate/FortiWiFi 90D Series Enterprise-Grade Protection for Distributed Network Locations FortiGate/FortiWiFi 90D Series FortiGate 90D, 90D-POE, FortiWiFi 90D, 90D-POE The FortiGate/FortiWiFi
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses
Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses Patrick Bedwell VP, Product Marketing 1 Copyright 2014 Fortinet Inc. All rights reserved. Today s Agenda Security
Meraki: Introduction to Cloud Networking
Meraki: Introduction to Cloud Networking April 30, 2014 Sharif Kotb Meraki Business Manager KSA, UAE, Turkey, & Qatar Agenda About Cisco s Cloud Managed Networking Cloud Architecture Solution Overview
The Fortinet Secure Health Architecture
The Fortinet Secure Health Architecture Providing Next Generation Secure Healthcare for The Healthcare Industry Authored by: Mark Hanson U.S. Director Fortinet, Inc. - Healthcare Introduction Healthcare
BYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
SOLUTION GUIDE. Hybrid WAN Solutions with FortiWAN. The cost-effective way to deliver the WAN bandwidth and redundancy your organization demands
SOLUTION GUIDE Hybrid WAN Solutions with FortiWAN The cost-effective way to deliver the WAN bandwidth and redundancy your organization demands Overview Almost every organization faces the need for increased
MSP Dashboard. Solution Guide
Solution Guide MSP Dashboard This document discusses the Cisco Meraki Managed Services Dashboard, which contains features purpose-built for Managed Service Providers offering cloud-managed networking as
The Fortinet Secure Health Architecture
The Fortinet Secure Health Architecture Providing End-to-End Security for Modern Healthcare Organizations Introduction Healthcare providers are migrating from large, independent stand alone organizations
FortiGate/FortiWiFi -90D Series Enterprise-Grade Protection for Smaller Networks
FortiGate/FortiWiFi -90D Series Enterprise-Grade Protection for Smaller Networks FortiGate/FortiWiFi-90D Series consolidated security appliances deliver comprehensive enterprise-class protection for remote
Meraki as Cisco Cloud Services Manage your network Where ever you are!
Meraki as Cisco Cloud Services Manage your network Where ever you are! Marketing/Technical description for services Scope of the Service Cloud services can deliver big technology benefits to midsized and
How To Get A Fortinet Security System For Free
Fortinet FortiGate Appliances Earn Coveted Recommend Ratings from NSS Labs in Next Generation Firewall, IPS, and Network Firewall in NSS Labs Group Tests Fortinet s Enterprise-Class Triple Play Fortinet
Monitoring & Measuring: Wi-Fi as a Service
Monitoring & Measuring: Wi-Fi as a Service Parker Smith, Director of Business Development, ProCloud Services, ADTRAN IT Professional Wi-Fi Trek 2015 Agenda Wireless Trends and Impacts How Cloud Wireless
Fortinet s Data Center Solution
SOLUTION BRIEF Fortinet s Data Center Solution High Performance Network Security for Government Operations Introduction The data center is the focal point of several trends in computing and networking
Why Migrate to the Cisco Unified Wireless Network?
Why Migrate to the Cisco Unified Wireless Network? Cisco is encouraging our customers to migrate to the Cisco Unified Wireless Network. This paper reviews the advantages of and reasons for migrating to
Advantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
FortiGate 100D Series
DATA SHEET FortiGate 100D Series Integrated Security for Small and Medium Enterprises FortiGate 100D Series FortiGate 100D, 140D, 140D-POE and 140D-POE-T1 In order to comply with legislation and secure
Introduction to Cloud Networking. Meraki Solution Overview
Introduction to Cloud Networking Meraki Solution Overview 1 About Meraki, part of Cisco Leader in cloud networking: 20,000+ customer networks deployed Initial technology developed at MIT - tradition of
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
Pronto Cloud Controller The Next Generation Control
Pronto Cloud Controller The Next Generation Control www.prontonetworks.com Cloud Managed Wi-Fi Cloud at its Best The Pronto Cloud Controller (PCC) is a next generation cloud Wi-Fi network configuration,
WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
Deploy and Manage a Highly Scalable, Worry-Free WLAN
Deploy and Manage a Highly Scalable, Worry-Free WLAN Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control simplifies complex, inconvenient cabling Wi-Fi
FortiAP Wireless Access Points
DATA SHEET FortiAP Wireless Access Points Integrated Wireless Security and Access FortiAP Wireless Access Points FortiAP 210B and 222B Integrated Wireless Security and Access The Need for a Fortified Wireless
How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility
w h i t e p a p e r How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility So much is happening today to give you a chance to rethink your wireless architecture. Indeed, you
Cisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
isheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
Fortinet Presence Analytics Solution
SOLUTION BRIEF SOLUTION BRIEF: FORTINET PRESENCE ANALYTICS PRESENCE ANALYTICS Benefits Boost sales Understand visitor behavior Increase brand loyalty Build an opt-in list Create targeted offers Measure
How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
THE POWER OF WING SIMPLIFIED ZEBRA TECHNOLOGIES
THE POWER OF WING SIMPLIFIED TOP 5 BENEFITS OF WiNG Express helps small to mid-size organizations better compete by providing a true enterprise class WLAN that delivers the dependable and secure high performance
FortiWeb Web Application Firewall. Ensuring Compliance for PCI DSS requirement 6.6 SOLUTION GUIDE
FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS requirement 6.6 SOLUTION GUIDE Overview Web applications and the elements surrounding them have not only become a key part of every company
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Secure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
Deploying a Secure Wireless VoIP Solution in Healthcare
Deploying a Secure Wireless VoIP Solution in Healthcare Situation Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants
FortiAuthenticator TM User Identity Management and Single Sign-On
FortiAuthenticator TM User Identity Management and Single Sign-On FortiAuthenticator user identity management appliances strengthen enterprise security by simplifying and centralizing the management and
When is Cloud-managed WLAN a Good Fit?
When is Cloud-managed WLAN a Good Fit? August 2015 MOBILE RESEARCH COUNCIL www.mobileresearchcouncil.com [email protected], or Call (888) 408-0252 Mobile and Cloud Computing Transform the
Cisco Wireless Control System (WCS)
Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,
Wi-Fi Security. More Control, Less Complexity. Private Pre-Shared Key
Wi-Fi Security More Control, Less Complexity Private Pre-Shared Key Mobility Meets Security Are the consumer devices in your environment exploding? Are your employees bringing their own devices? And has
JUNIPER NETWORKS WIRELESS LAN SOLUTION
SOLUTION BROCHURE JUNIPER NETWORKS WIRELESS LAN SOLUTION Deliver Secure, Scalable, and Reliable Campus Mobility While Maximizing Performance and Minimizing Cost of Ownership Wireless LAN Solution Overview
Meraki Wireless Solution Comparison
Meraki Wireless Solution Comparison Why Meraki? Simplified cloud management Intuitive interface allows devices to be configured in minutes without training or dedicated staff Centrally manage thousands
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
Managing a FortiSwitch unit with a FortiGate Administration Guide
Managing a FortiSwitch unit with a FortiGate Administration Guide Managing a FortiSwitch unit with a FortiGate April 30, 2014. Copyright 2014 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare
NetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior
NetDefend Firewall UTM Services
Product Highlights Intrusion Prevention System Dectects and prevents known and unknown attacks/ exploits/vulnerabilities, preventing outbreaks and keeping your network safe. Gateway Anti Virus Protection
PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core
PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566
FortiGuard Security Services
FortiGuard Security Services FORTIGUARD SECURITY SERVICES FortiGuard Labs: Securing Your Organization Extensive knowledge of the threat landscape combined with the ability to respond quickly at multiple
Eliminating the cost and complexity of hardware controllers with cloud-based centralized management
Eliminating the cost and complexity of hardware controllers with cloud-based centralized management Enterprise-class 802.11n wireless access points Centrally managed over the web Manages devices, applications,
Enterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
