FORTIOS: ENABLING THE FORTINET SECURITY FABRIC
In addition to an acute shortage of skilled staff and limited budgets, This approach would also allow security to dynamically expand and
today’s enterprise security leaders face growing complexity adapt as more workloads and data are added, while at the same
everywhere they turn—from increasingly sophisticated cyber time easily follow and protect data, users, and applications as they
threats, to an expanding collection of disparate security products move back and forth between smart devices, borderless networks,
staggered across their networks, to new demands for compliance and cloud-based environments.
from regulation and security standards. The drive for digital The Fortinet Security Fabric provides a more effective alternative
transformation (DX) across all areas of a business requires networks to point and platform solutions. All security components within the
to evolve rapidly, calling for applications, data, and services to flow security fabric are made available to each other in real time to provide
faster across an increasingly diverse landscape of users, domains, broad, integrated, and automated protection against sophisticated
and devices. As a result, networks are increasingly borderless. threats. And the FortiOS network operating system provides the
Internet of Things (IoT) devices and cloud infrastructure now require foundation to establish and enable the Security Fabric. The latest
organizations to worry about an attack surface that may not even release—FortiOS 6.0—includes more than 200 new features
be visible to IT. and capabilities that are designed to help enterprises embrace
digital transformation without impacting network performance or
SECURITY FABRIC APPROACH compromising security.
There are approaches that attempt to use multiple point and platform
solutions to address these challenges. But what if all the data and BROAD: TRANSPARENT VISIBILITY & CONTROL
security elements across an organization’s various environments To protect today’s businesses, security solutions cannot stand alone
could be tightly integrated, cohesive, and coherent—like a as isolated devices scattered across the network. Our Security
seamlessly woven fabric? Such an approach would allow companies Fabric covers the entire attack surface in order to stop the impact of
to see, control, integrate, and manage security across their entire a threat at multiple points. To help achieve this, FortiOS 6.0 enables
network (even the cloud), to enable a secure digital business model. greater visibility and control across the entire environment—including
endpoints, access points, network elements, the data center, the
FortiManager
FortiAnalzer cloud, and even the applications and the data itself. Combined with
FortiSIEM
dynamic network segmentation that logically separates data and
resources, the Security Fabric can cover all attack vectors to discover
threats and contain them as they attempt to move from one network
Partner API FortiGateVM zone to the next.
Expanded cloud connectors within the Security Fabric enable full
visibility across multi-cloud environments, including private,
Infrastructure-as-a-Service (IaaS), and native cloud controls.
FortiOS
FortiCASB (cloud access security broker) also provides visibility
and advanced threat protection of Software-as-a-Service
FortiClient FortiWeb
(SaaS) applications. Multi-cloud visibility can help organizations
correlate both on- and off-network traffic through a single security
FortiGate
management console.
Other new features within FortiOS 6.0 support best practices for
auditing and compliance to make it easier for businesses to
FortiAP FortiGuard
FortiSwitch
FortiMail comply with the latest standards and regulations (e.g., GDPR, PCI,
HIPAA). FortiOS 6.0 includes built-in rules that help enterprises
avoid lengthy rule-creating processes which can be difficult to
FortiSandbox enforce and time-consuming to track.
SOLUTION BRIEF
SOLUTION BRIEF: FORTIOS: ENABLING THE FORTINET SECURITY FABRIC
INTEGRATED: THREAT INTELLIGENCE & instantaneous to minimize exposure. The Fortinet Security Fabric is
DETECTION designed to shrink the windows from both intrusion to detection
and detection to response. The Security Fabric correlates
Security has become incredibly complex for many organizations.
threat intelligence to determine the level of risk and automatically
They continuously add more point products to cover new security
synchronizes a coordinated response. It shares intelligence about
gaps and exposures. This, in turn, compounds the ongoing
newly discovered threats, dynamically isolates affected devices,
resource strains of deployment, management, and oversight—many
partitions network segments, updates rules, pushes out new
of which may be manual processes. New regulations are increasing
policies, and removes malware. And beyond reducing risk exposure,
compliance and reporting requirements. Security budgets
replacing manual security processes with automation also helps
are shrinking. And there’s a worldwide scarcity of skilled security
address the organizational challenges of tighter budgets and a
professionals—so organizations might very well be shorthanded
skilled staffing shortage.
within this perfect storm.
FortiOS 6.0 introduces many new capabilities in this area, including
To ensure comprehensive protection in the face of today’s
automated application inventory on each device and automation
overwhelming complexity, all of the different parts of a company’s
of security responses to events across Fortinet switches and
security infrastructure must work together as a single, unified
wireless access points. Automated workflow with continuous
system. Our Security Fabric is designed not only for integrated
risk assessment allows users to easily set responses based on
protection across all devices and systems securing the distributed
predefined triggers, such as system events, threat alerts, user
network but also for rapid awareness of advanced threats. FortiOS
and device status. Responses (such as quarantine, notification,
6.0 integrates many new intelligent features that enable precise
configuration adjustments) and custom reports provide real-time
threat detection capabilities throughout the infrastructure.
control of workflow environments. Automated auditing provides
Intelligence shared throughout a cohesive, end-to-end security
trending data on a business’ security compliance posture with
architecture unlocks potential automation, reducing the impact
benchmarking that ranks organizations against similar firms in terms
of staffing shortages. For example, the Security Fabric can
of size and industry.
take automated action based on trusted analysis, streamline
communications, and expedite patching without the limits of human
monitoring and intervention.
SUMMARY
Digital transformation (DX) raises multiple security challenges for
FortiOS 6.0 also supports integrated secure SD-WAN within the
an enterprise. Trends in computing and networking will continue
Security Fabric, providing application prioritization for granular
to drive changes across businesses infrastructures, architectures,
control of SaaS, VoIP, and other business apps. These granular
and practices, while cyber criminals continue to evolve new and
transactions are key in achieving better application performance
better ways to exploit exposed vulnerabilities. As a critical part of
for SaaS, VoIP, and business applications with in-built automated
these changes, business leaders must embrace a new approach to
failover capabilities. New one-touch VPN and zero-touch
securing the entirety of their distributed infrastructures. The Fortinet
deployment further reduce complexity and rapidly enable new
Security Fabric provides an intelligent architecture designed around
enterprise branches.
scalable, interconnected security combined with high awareness,
FortiGuard Audit and Security Update Service includes several actionable threat intelligence, and open API standards to protect
new intelligence-based features, including expanded audit rules and even the most demanding enterprise environments.
customized auditing based on network environments, as well as
FortiOS 6.0 is the latest version of Fortinet’s network security
on-demand regulatory and compliance reports. This helps reduce
operating system. With hundreds of enhancements and feature
the risk of compliance violations as well as the operational burdens
additions, it expands the Security Fabric with deeper visibility
of increasing regulatory requirements.
and control across the breadth of an organization’s entire attack
surface, integrated intelligence throughout the network for seamless
AUTOMATED: EFFICIENT OPERATIONS
protection and threat detection, and automated operations that
Integration and automation go hand in hand. Once a threat quickly identify and resolve security issues.
is detected, the response time to a security event must be
www.fortinet.com
Copyright © 2017 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law
trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other
results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied,
except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in
such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal
lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most
current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this
publication without notice, and the most current version of the publication shall be applicable. February 23, 2018 8:08 AM
Mac:Users:susiehwang:Desktop:Egnyte:Egnyte:Shared:Creative Services:Team:Susie-Hwang:Egnyte:Shared:CREATIVE SERVICES:Team:Susie-Hwang:SB-FortiOS6:sb-fortiOS6-022218-525pm