The name of the base system (platform): | FortiOS |
Developers: | Fortinet |
Date of the premiere of the system: | 2017/02/07 |
Technology: | Firewall |
For February 7, 2017 Fortinet Internal Segmentation Firewall is the adaptive system of network security focused on tracking and management of threats to corporate networks from IoT.
On February 7, 2017 the Fortinet company announced expansion of adaptive system of network security Fortinet for the purpose of ensuring protection of corporate networks against constantly appearing cyberthreats which conductor is Internet of Things (IoT).
The adaptive system of network security of Fortinet contains functions of tracking, integration, management and scaling of infrastructure, they provide effective protection against threats which growth of quantity is connected with distribution of IoT devices.
Now malefactors as the purpose in the field of information security even more often select IoT devices. Thus, Internet of Things turns into the Internet of threats. The most important task of the modern organizations is deployment of means of protecting which support identification and the analysis of a huge number of the threats arriving from IoT and protection of infrastructures against these threats. The adaptive system of network security of Fortinet is equipped with the functions of protection of corporate networks which proved the efficiency and also serves as a basis for implementation of functions of tracking and automation which in the future will play an important role in the course of IoT information security support. Phil Quade, the head on information security of Fortinet company |
Protection against a set of the attacks from IoT using adaptive system of network security The recent attacks which conductor was IoT showed ease of use of billions of devices for defeat of millions of users and virtual economies of the whole countries. This problem is aggravated with lack of basic functions of protection and management in many IoT devices.
The specified problem is most relevant for the organizations which data move between different environments and devices — from tablets to cloud applicaions — and, therefore, need special protection. The organizations need to pay attention to three strategic functions of network security providing protection of infrastructure against threats from IoT:
- The analysis — complete idea of network condition plays a significant role in verification process of authenticity and classification of IoT devices, development of profiles of risk and distribution of IoT devices by groups depending on the level of their reliability. The solution FortiOS which provides the complete information on a status of each element of security and a component of corporate network is the cornerstone of adaptive system of network security of Fortinet. Thanks to it IT specialists can identify IoT devices and traffic in critical points of infrastructure and to manage them.
- Segmentation — the organizations should have an opportunity to separate devices and communication channels of IoT into groups on a basis the politician and to confer basic powers depending on a profile of risk of a certain IoT device. The Fortinet Internal Segmentation Firewall firewall supports implementation of internal segmentation of corporate networks and devices thanks to what IT specialists can apply the detailed security policies depending on type of devices and requirements of access to network.
- Protection — adaptive system of network security of Fortinet supports comparison of data on violations of security of IoT to data on threats for the purpose of synchronization of response to IoT threats. Also the security system allows to place the infected IoT devices in a quarantine and to eliminate vulnerabilities in different points of network for the purpose of prevention of distribution of threats and access of harmful traffic to important IT systems and corporate data.
The security system of networks on the basis of the purposes allows to automate implementation of the corporate strategies and transactions connected with IoT by satisfaction of business needs due to acceptance of agreed measures of ensuring network security without intervention of the specialist.