IT has become central in driving business processes that serve the organization's objectives of increasing productivity, competitiveness and profit. But, as technology advancements help drive business innovation, they also make the current enterprise IT environment more complex to secure and control.
Fortinet's vision is an intelligent security fabric which spans across the entire network, linking different security sensors and tools together in order to collect, coordinate, and respond to malicious behavior anywhere it occurs in real time. It combines world-align security with dynamic scalability, actionable threat intelligence, automated adaptable response, an ability to interoperate with a rich ecosystem of partners, seamless network segmentation, and an integrated management system that provides single pane of glass visibility and centralized policy creation, distribution, and orchestration.
The Fortinet Security Fabric is based on the following key pillars:
Scalable. Security not only needs to scale to meet volume and performance demands, it needs to scale laterally, seamlessly tracking and securing data from IoT and endpoints, across the distributed network and data center, and into the cloud. The Security Fabric provides three essential elements: A single, unified platform, physical and virtual, on premises and in the cloud, that shares common threat intelligence, enables intelligent collaboration between security devices, and dynamically adapts to new threats; Single-pane-of-glass management across all security technologies, wherever they are deployed, for centralized policy orchestration, threat response coordination, and real-time distributed enforcement; and a single source for security intelligence and updates that combines local information with global intelligence services for real time response to established and emerging threats.
Aware. The need for comprehensive visibility across the distributed enterprise, coupled with granular control and automated response across multiple security devices was a key driver behind Fortinet's development of the Security Fabric.
This fabric ties together data, applications, devices, and workflows to provide a level of awareness that has never been available from any security solutions provider.
Secure. Knowledge is power. The effectiveness of any security strategy or solution is its ability to recognize and respond to threats, especially threats it has never seen before. Constant actionable updates from a trusted intelligence source that gathers real time information from around the globe allow solutions to be tuned to the latest threats. This works even better when every device in your security fabric shares the same information.
FortiGuard's threat research lab provides Security Fabric devices with critical security awareness from: The Threat Intelligence Exchange; Fortinet's FortiGuard threat research team; Live feeds from over 2.3M installed Fortinet solutions.
Actionable. The Security Fabric is designed to respond and adapt to threats in real time by leveraging actionable threat intelligence. It provides collaborative, cooperative functionality between Fortinet's suites of security technologies for increased visibility and response, FortiGate's single security OS across all implementations to simplify control, and a cloud-based management and orchestration tool that allows for centralized control across a dynamic and widely distributed network environment.
Open. Most organizations have already invested in an infrastructure of networking and security platforms and products that are an essential part of their defense capability. Extending the functionality and intelligence of the Security Fabric to leading third-party solutions is critical for many enterprises. Fortinet has developed a series of APIs that allow alliance partners to connect to the Security Fabric in order to further enhance an organization's visibility, control, and response.
The Fortinet Security Fabric Covers:
- nEndpoint client security;
- nSecure (wired, wireless, and VPN) access;
- nNetwork security;
- nData center security (physical and virtual);
- nApplication (OTS and custom) security;
- nCloud security;
- nContent (email and web) security; and
- nInfrastructure (switching and routing) security.