5 Fortinet FortiGuard Security Services That Stop Advanced Threats

The cyber threat landscape is growing faster, more elusive, and more complicated every day. Small businesses and enterprises alike struggle with real headaches regarding the dizzying amount of security services, solutions, add-ons, and subscriptions they patch together to achieve comprehensive protection.

The need to bundle a suite of robust security services into a uniform and unified security platform is greater than ever. Fortinet offers a long list of advanced security services that work together in unison to form the Fortinet Security Fabric, taking some pressure off organizations tired of building network security Frankensteins out of disparate pieces.

Below, we’ll go over some of Fortinet’s most advanced FortiGuard malware & zero-day squashing services and outline exactly how easy it is to make them all work together as a single, well-oiled machine.

1 – FortiGuard Application Control

With so many organizations relying on third-party applications for critical business functions, being able to easily assign rules to police them is crucial. Fortinet’s FortiGuard Application Control Service lets network administrators quickly allow, deny, or restrict applications on the fly. FortiGuard Application Control allows for fine-tuning of custom policies based on application categories and grants control over thousands of the Internet’s most common applications. Optimizing bandwidth to individual applications means prioritizing traffic to the apps that a business relies on while de-prioritizing less important ones. Security is further enhanced with the ability to completely block access to known risky applications.

Traditional firewalls are often only able to identify ports, IP addresses, and protocols, leaving much to be desired when it comes to visibility. Visibility into application usage through Application Control allows decision makers to see which apps are being used most often, how usage trends over time, and usage statistics at a glance through convenient reports. Best of all, this visibility takes place in real time.

2 – Content Disarm & Reconstruction

Fortinet’s Content Disarm & Reconstruction (CDR) is a personal bomb squad on your firewall. With advanced threats such as malware cocktails and zero-day exploits constantly evolving to find new vulnerabilities, you can never be too safe when opening files. Data is sanitized by CDR, making signature-based and reputation-based scanning a thing of the past. All active content in an incoming file is treated like a threat and removed, leaving you with a flat file bereft of any data elements that do no match up with firewall policies. The potential of any malicious content in a file is stripped out and tossed aside, and on the other side, users receive a clean, trusted version. CDR prevents cyber threats through some of hackers’ most common routes: email, web browsers, file servers, FTP, webmail, and more.

3 – FortiSandbox Cloud

Most cybersecurity vendors are now sporting their own sandbox appliances and services, but Fortinet’s FortiSandbox Cloud makes life easy for small businesses looking to avoid complex deployments. FortiSandbox is a cloud-based option that gets to work straight out of the “box” and integrates with a wide range of your Fortinet products like FortiGate, FortiMail, FortiWeb, and FortiClient. Extending protection to these areas is as easy as a single click.

Unknown threats are no longer able to sneak past the usual security controls provided by an NGFW. Instead, suspicious code is observed in a simulated environment and receives a security verdict depending on behavior before passing onto your network. Unlike other resource-hungry sandbox options on the market, Fortinet speeds up advanced threat detection by employing prefilters, real-time threat intelligence, and integration with the Fortinet Security Fabric to minimize volume of scanning.

4 – Intrusion Prevention Service

Data breaches are becoming more and more common and criminals are aiming for increasingly larger targets–for example, the entire population of Ecuador. With much of the business world under constant barrage, the ability to defend the network perimeter and the divisions between network segments is more important than ever. FortiGuard Intrusion Prevention Service (IPS) protects against network intrusions by detecting and blocking threats before they can reach devices. With multiple inspection engines, FortiGuard IPS also has minimal impact on performance speeds.

Real-time threat intelligence from FortiGuard Labs is automatically streamed to your NGFW, providing it with up-to-the-minute data on emerging threats observed all around the globe. Fortinet’s threat intelligence research team creates over a thousand new rules for intrusion prevention every week.

5 – Virus Outbreak Protection Service

FortiGuard Virus Outbreak Protection adds new layers of protection to existing FortiGuard AntiVirus capabilities by subsidizing threat intelligence with third-party malware signature blocks, curated by FortiGuard. Protection against unknown threats and zero days requires quick reactions from your network. Virus Outbreak Protection stops virus outbreaks even if signatures are not yet available from FortiGuard and prevents outbreaks until new signatures become available. This is accomplished by using checksums to filter files, effectively using hash values from third-party sources to determine probable virus files. This collaborative approach puts the intelligence of multiple antivirus services behind your security.

What’s the Easiest Way to Get Them All?

If you’re looking to add these robust services to your security posture, you’re in luck: all five services are included in both Fortinet’s UTM Bundles and Enterprise Bundles. FortiGuard bundles combine all of the foundational security services that you expect with a standard unified threat management system, then bolster them to new heights with fortified zero-day protection, sandboxing capabilities, mobile protection, and more. FortiGuard Bundles consolidate all of Fortinet’s advanced product offerings into one affordable price-point, making it a one-stop solution for businesses of all sizes.

Shop Fortinet Products


4 Things to Consider Before an SD-WAN Migration

Just about any Google search for the phrase “SD-WAN” will turn up an overabundance of articles explaining why replacing traditional MPLS with SD-WAN solutions can save you time and money.  Heck, we even published a podcast about it. There is certainly no shortage of elevator pitches pointing you toward SD-WAN (also known as a software-defined wide area network); however, like all things in life, there is far more to the process than “just doing it.” Keep reading and we’ll lay out four key considerations to account for before any SD-WAN migration.

1 – Take Inventory

Your first step should be taking an accurate inventory of all of the locations, connections, and applications using your network. Categorize these locations by requirements. Do they rely on extremely high availability? What requirements are there for factors such a packet loss and jitter? Consider also the costs that each piece of the puzzle will require. All of these factors figure into what your business’s path to SD-WAN looks like.

Forming a highly detailed network diagram should be a priority. Knowing your WAN–including physical locations of devices and the layout of your LAN (local area network)–is crucial. Individual locations may require unique services, bandwidth, or traffic considerations. You will likely be sharing this network diagram with any third-party vendors you work with, ISPs, and your IT team so that all parties participating in the migration have a comprehensive understand of your needs. Firewalls.com always recommends that you leave plenty of wiggle room in your systems to accommodate for growth. With so many applications increasingly re-homing in the cloud, you should absolutely plan for the future of your SD-WAN solution to be able to accommodate them in the coming years.

2 – Determine What the Roll-Out Will Look Like

The second consideration is how quickly you expect your SD-WAN roll-out will be. Businesses have the option to switch everything from MPLS (multiprotocol label switching) as a routing technique to SD-WAN at once, or complete the process in a number of smaller, more modest phases.

SD-WAN is a flexible solution that can work in tandem with MPLS deployments already in place, allowing businesses to operate both simultaneously. Many organizations, especially small businesses, may not be ready or be able to migrate their entire WAN infrastructure in one process, and that’s okay. Hybrid WAN management, where certain connections are handled by MPLS and the rest by SD-WAN are not only possible, but fairly common.

Even if an organization is unable to fully transfer connections to SD-WAN, hybrid WAN management allows for reduced costs associated with bandwidth over time. Not only is this extremely flexible, but the money saved through SD-WAN begets resources needed for the later continuation of digital transformation. Or, put plainly, sometimes you have to save money to save more money later. Hybrid WAN environments make that possible.

3 – Acquire Dedicated Internet Access Lines Early

After taking inventory of the network and diagramming WAN infrastructure, you’ll have a solid idea of exactly what connections and bandwidth requirements to consider. Organizations need to start very early on with the process of orchestrating Internet service provider (ISP) installations, especially if connecting outposts or branch offices in remote locations. Getting Internet circuits installed can take several weeks or months. If the entire SD-WAN migration grinds to a halt while waiting on an ISP to haul fiber to branch locations, businesses can find themselves relying on more expensive MPLS solutions for longer than expected. Those costs add up and can act as a costly spoiler unaccounted for in initial budgeting.

4 – Consider Effects on End Users

Change, even positive change, causes friction. Friction in a business environment can have ripple effects on budget, productivity, and reputation, so it is imperative that businesses are fully prepared for cause-and-effect wrinkles in their daily routines. To that end, there are a number of questions you should ask about how an SD-WAN migration can impact users and internal traffic.

How much downtime should be expected for individual applications during the migration? If these are business critical applications, how can this impact be mitigated to minimally interfere with company workflow?

What changes will end users see in their daily network usage after successfully migrating to SD-WAN? Consider the training your staff may need to understand how this new infrastructure affects them. Again, change creates friction that may rub end users the wrong way, particularly if they’re used to doing things a certain way for a long time.

Speaking of end users, SD-WAN often extends greater access to mobile users on your network by eliminating the backhauling issues that mobile devices face with MPLS. Mobile backhaul describes the unseen process of how data-hungry mobile devices interact with wireless networks and data centers. However, SD-WAN excels at backhauling optimization, allowing for freer access to the network for mobile users. While this may be a boon for mobile workers, organizations should take additional security steps to account for increased mobile traffic on the network. Fortinet’s Secure SD-WAN integrates seamlessly with the rest of the Fortinet Security Fabric, extending powerful mobile security to minimize this impact when using products such as FortiGuard Mobile Service.

Another change that comes with SD-WAN migration is the beneficial impact it has on the IT department. SD-WAN can improve visibility and reduce the number of touch points and management tasks that IT needs to keep up with on a day-to-day basis. Organizations should consider how this lessened burden on the IT schedule can be taken advantage of to further improve network security and performance. What are network administrators to do with all of this extra time and increased control?

SD-WAN Management Made Easy

Hopefully this article has instilled some confidence if you’re on the fence about an SD-WAN migration. But Firewalls.com can still make managing your SD-WAN even easier. With a Security Operations Center filled to the brim with highly certified network administrators and architects, our Professional Services team can actively manage and configure SD-WAN on your behalf as an affordable, commitment-free monthly subscription. Give us a call at the number below to learn how Firewalls.com Professional Services can turn SD-WAN into an E-Z win.

Call us at 866-957-2975 to learn more!


Reviewing the Specs and Features of the WatchGuard Firebox T Series T35 and T55 Firewalls

WatchGuard Firebox T Series Firewalls

Small businesses can’t afford to skimp on cyber security, but oftentimes, the idea of a complicated setup without knowledgeable IT staff to handle it can have owners thinking “it’s too much trouble.” The bottom line is though, you need someone watching out for your network, guarding against attacks. Watching and guarding, hmm, who might take that mantle? With more than 20 years as a leading (and routinely award-winning) network security provider, WatchGuard is ready to have your organization’s back. And for small business networks, WatchGuard Firebox T Series firewalls have something for everyone.

In our latest feature review, we zero in on the Firebox T35 and Firebox T55, similar tabletop firewalls that pack a network security punch. These appliances are available in wired and wireless models, with easy deployment and management no matter which one you choose. Learn more about these two top notch unified threat management options in our new video:

 

WatchGuard FireBox T35/T35W Spec Snapshot

 

 

 

 

Here’s a quick snapshot of the technical specifications for this small business firewall:

Firebox T35

Max Firewall Throughput: 940 Mbps

UTM Throughput: 278 Mbps

Available Interface Ports: 2xUSB; 1 Serial; 5xGbE (1 PoE)

Concurrent Sessions: 1,300,000

Recommended Users: 11-25

See the full FireBox T35/T55 Datasheet

WatchGuard Firebox T55/T55W Spec Snapshot

 

 

 

 

Here’s a quick snapshot of the technical specifications for this small business firewall:

Firebox T55

Max Firewall Throughput: 1 Gbps

UTM Throughput: 523 Mbps

Available Interface Ports: 2xUSB; 1 Serial; 5xGbE (1 PoE)

Concurrent Connections: 1,300,000

Recommended Users: 26-35

See the full FireBox T35/T55 Datasheet

More firewall feature reviews to see

If you’re still shopping around for the right firewall, we have more videos to compare your options. You’ll find feature reviews of the:

Already watched all the videos? Not to worry, we’ve got plenty of additional resources to help you find the firewall that’s right for your network. To name just a couple, read through our firewall buyer’s guide series and our convenient comparison tables. You can also find more by perusing articles right here on this blog.

Watching out for WatchGuard

Get a closer look at the WatchGuard FireBox T Series of firewalls at our WatchGuard FireBox T Series page, which includes links to all T Series models available, datasheets, and more.

 

CHEck OUT the WatchGuard Firebox T Series


Chipping In: Spotlighting Fortinet’s SD-WAN ASIC

The Chip’s on the Table

We recently introduced you to Fortinet’s latest FortiGate firewall, the FG-100F. One of the appliance’s key selling points is its unprecedented ability to handle SD-WAN and network security all-in-one. To make a first-of-its-kind all-in-one requires going all-in, putting your chips on the table. In this case though, it’s just one chip that takes the whole pot.

Fortinet’s new SoC4 (SoC = system on a chip) is a result of the network security leader’s lengthy background developing application-specific integrated circuits (or ASICs). The SoC4 is a purpose-built SD-WAN ASIC, a silicon chip that allows one appliance to provide top-notch SD-WAN (software-defined wide area networking), advanced routing, and Fortinet’s industry leading security, all without sacrificing performance.

Performance, You Say?

In fact, that performance is what sets the SD-WAN ASIC apart. You’ll get lightning-quick application identification and application steering for more than 5,000 applications, enabling digital transformation at the WAN edge (which is where an organization connects to external networks). Unlike having to wait too long for a fellow poker player to make a move, your users will avoid delays accessing their applications. You’ll see accelerated overlay performance with low latency – and your users will appreciate it. Fortinet takes a deeper dive into its new chip on this video:

 

 

SD-WAN Is Here to Stay

Why does all this matter? No bluff: SD-WAN’s prevalence continues to increase, as it allows organizations to connect hubs with branch offices via the internet rather than more expensive dedicated connections like MPLS. It also beats MPLS at failover, as it seamlessly moves on to the next point if one fails (no need to wait on the dealer). With SD-WAN, you can ensure your network is performing at its best by routing traffic on the most efficient path. And you can manage SD-WAN on premises or through the cloud. With Fortinet’s SD-WAN ASIC-powered solution, you can do all this without worrying about security (a top concern of network professionals when it comes to WAN).

Where Do I Start?

Need a little more information before playing your SD-WAN hand? Watch our feature review of the FortiGate 100F to learn more about its SD-WAN and security capabilities thanks to the power of Fortinet’s SD-WAN ASIC. Then, browse our site to find the firewall subscription bundle that’s right for you.

Shop the FORTIGate 100F

 


Buying a Network Switch: 5 Things to Consider

Why Do I Need a Network Switch?

Whether you have a small business or enterprise organization, your network needs to keep several users reliably and securely connected around the clock. No matter how fast your ISP hooks you up, you’ll need appropriate equipment to spread the high-speed love. Enter the network switch, an oft-overlooked but vitally important piece of the networking puzzle. How do you decide which network switch is right for you? Let’s countdown some factors to consider in relation to your network needs.

1 User count

It all starts with the number of users you need to connect. Remember, a user isn’t just a person on a computer – users include other connected devices as well, like printers (you’ll probably have at least a couple of those), VoIP phones (your business likely will need to communicate with others verbally from time to time), surveillance cameras (just in case), firewalls (a network security must), and wireless access points (those APs have to get their internet connections from somewhere). Generally speaking, a higher number of users requires more ports and faster transfer speeds.

Blog Banner General Buy Now Red-High-Quality

2 Power

Remember those access points? In many cases, you’ll be placing your APs in locations that make traditional power outlets hard to reach. Fortunately, many APs (as well as VoIP phones, firewalls, and other devices) can get their electricity through Power over Ethernet, aka PoE. This means they can stay connected and receive power using only an Ethernet cord. Look for a network switch with Ethernet ports that support the PoE needs of your network.

3 Speed

Network switches don’t create speed, but the wrong switch could slow your network down significantly. If you’re transferring a lot of data, you’ll want to make sure you have ports that can handle your need for speed. Look for 10/100/1000, aka Gigabit ethernet (GbE), ports. These ports will automatically sense and use the fastest speed shared by the sending and receiving devices. For less heavy duty scenarios, a switch with 10/100 ports may suffice (those are speeds of 10 or 100 Mbps), but most modern switches support GbE ports.

4 Managed vs Unmanaged

This one’s a pretty easy choice. If you’re looking at a switch to connect the key pieces of your organizational network, you’ll want a managed switch. What’s the difference between managed and unmanaged? An unmanaged switch is often called “plug-and-play,” and while that sounds convenient, it means there is no ability to configure an unmanaged network switch because it lacks a “brain.” A managed switch gives you the ability to manually configure, monitor, and manage the devices on your network.

Configuring a network switch allows you to better optimize network performance and security – keeping sensitive data siloed and enabling only active ports to minimize your attack surface. It just so happens our security experts at Firewalls.com can work with you to get that configuration just right and keep it that way – actively managing your switch for you, no matter the brand. Unmanaged switches can be useful in lower-stakes network setups or as a supplement – like adding connections in a conference room.

Learn about Switch Configuration

MANAGE MY Switch

5 Value

Just like an unmanaged switch, this is a no-brainer to consider when shopping for a switch (or any significant purchase). At Firewalls.com, you can find value that fits your network, whether you need 12 or 48 port. We offer network switches including the Ruckus ICX SeriesFortinet FortiSwitch Series, and the Cisco Meraki MS Series to help you get your network running smoothly. Visit our Network Switch page and use the filters on the left-hand side of the page to find the network switch that best fits your demands.

Blog Banner General Buy Now Red-High-Quality

FIND MY SWITCH


← Older posts Newer posts →