Setup a basic site-to-site IPsec VPN between headquarters and branch office using FortiGates running FortiOS v5.0.
All Videos »
Fortinet Intrusion Prevention System (IPS) technology protects networks from both known and unknown threats, blocking attacks that might otherwise take advantage of network vulnerabilities and unpatched systems. Fortinet understands that your enterprise or service provider network is supporting many different applications, protocols and operating systems at the same time. This diverse infrastructure can complicate maintenance and patching of servers and network devices, resulting in delays and systems that are vulnerable to evolving threats.
Intrusion Prevention System (IPS) from Fortinet offers a wide range of features that can be used to monitor and block malicious network activity including: predefined and custom signatures, protocol decoders, out-of-band mode (or one-arm IPS mode), packet logging, and IPS sensors. IPS sensors provide a convenient, centralized location to configure and deploy an arsenal of IPS tools. You can install Fortinet Intrusion Prevention Technology, available in all FortiGate® Next Generation Firewall and FortiWiFi™ Wireless Security platforms, at the edge of your network or within the network core to protect critical business applications from both external and internal attacks.
Backed by automatic, real-time updates delivered by FortiGuard™ Services, FortiGate® IPS technology leverages a database of thousands of unique attack signatures to stop attacks that might evade conventional firewall defenses, plus anomaly-based detection that enables the system to recognize threats for which no signature has yet been developed. The combination of known and unknown threat prevention, plus tight integration with other Fortinet Network Security Technologies, enables FortiGate systems to stop attacks regardless of whether your network is wired or wireless, a partner extranet, or connected to a branch office.
Custom IPS signatures can be created to extend protection further. For example, you can use custom IPS signatures to protect unusual or specialized applications, or even custom platforms from known and unknown attacks. In addition, custom IPS signatures can be used for specialized network traffic analysis and pattern matching. For example, if your network is experiencing unusual or unwanted traffic, you can create a custom IPS signature to monitor and understand traffic patterns.
In looking for a network security vendor, it was very important for us to find one that would support our new EVDO network, one that we could manage remotely and one that had consolidated functionality so that we could easily and cost-effectively add network security functions on an as-needed basis. Fortinet was the only vendor that met all these needs.