Fortinet Expands Security Fabric Capabilities

Fortinet has announced enhanced offerings that provide the building blocks for tomorrow’s self-provisioning, self-operating and self-correcting, Intent-Based Network Security.

The latest innovations in the Security Fabric include the release of FortiOS 5.6, the world’s most advanced security operating system, along with Fortinet’s new Security Operations Solution.

Ken Xie, founder, chairman of the board and chief executive officer at FortinetKen Xie, Founder, Chairman of the board and CEO at Fortinet said, “The Fortinet Security Fabric delivers the broad, powerful, and automated security solutions needed to solve today’s challenges while laying the foundation for the self-sufficient, Intent-Based Network Security that will be critical to protect tomorrow’s enterprises.” The demands of today’s digital economy are driving increasingly complex networks that require highly skilled and rare talent to design, deploy, operate, and most importantly secure. The Fortinet Security Fabric lays the groundwork for tomorrow’s intent-based network security, he continued.

The major enhancements to Fortinet’s flagship operating system combined with its Security Operations Solution deliver unprecedented vision and automation capabilities across an enterprise’s entire infrastructure, from the endpoints to the cloud. These combined capabilities also represent continued innovation of the Fortinet Security Fabric and provide a framework for tomorrow’s advanced Intent-Based Network Security.

The FortiOS release 5.6 combines numerous technological innovations to deliver universal and centralized capabilities far beyond those of traditional security platforms or point solutions available today.

The Fortinet Security Operations Solution unifies network and security operations within the Fortinet Security Fabric to arm IT and security leaders with insights that maximize their technology infrastructure. Security Operations consists of FortiSIEM, FortiAnalyzer, and FortiManager solutions that can be deployed standalone or in conjunction to meet the unique needs of individual organizations.

Comments

Comments