Ad Banner
Press Releases

Fortinet introduces high-performance FortiGate Next-Generation Firewalls

John Maddison, EVP of products and solutions at Fortinet
“Segmentation is becoming as fundamental as patching vulnerable systems. Intent-based Segmentation aligns business goals with infrastructure changes and ultimately, dynamically separates infrastructure to protect users, data and systems. A fundamental element of Intent-based Segmentation is the high-performance NGFW. The new FortiGate 3400E and 3600E Series provide industry-leading threat protection and SSL inspection performance allowing customers to implement a holistic end-to-end architecture.”

News Summary
Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, today announced its new high-performance FortiGate Next-Generation Firewalls (NGFWs), comprised of FortiGate 3600E, FortiGate 3400E, FortiGate 600E and FortiGate 400E Series, enabling organizations to implement Intent-based Segmentation into their security architecture.

● Intent-based Segmentation allows organizations to achieve granular access control, continuous trust assessment, end-to-end visibility and automated threat protection.

● In addition to delivering Intent-based Segmentation, FortiGate 3600E offers 30Gbps threat protection and 34Gbps SSL inspection performance. FortiGate 3400E offers 23Gbps threat protection and 30Gbps SSL inspection performance.

● FortiGate has a longstanding trajectory of earning NSS Labs Recommended ratings in the Next-Generation Firewalls group tests given its high SSL inspection performance with minimal performance degradation as one of the reasons.

The combination of business growth, workloads migrating to multiple clouds and increasing cyber attacks makes it difficult for organizations to maintain a robust security architecture that effectively implements consistent security policy across all network environments. Having flat networks with a single enforcement point further compounds this problem by making it easier for cybercriminals to get inside the network. Once inside, they become part of the trusted zone, allowing them to quickly spread threats laterally. It’s extremely hard to detect and contain these cybercriminals as they move deeper into the network, resulting in cascading risks and exfilteration of valuable data.

CONTINUE READING…