This is a summary of an article written for Network Computing by Fortinet’s John Maddison, EVP of Products & Solutions. The entire article can be accessed here.
The network perimeter is being replaced with new edge networks, such as SaaS applications, user-owned mobile devices, or directly connected systems that no longer backhaul traffic to the central network for inspection. As data moves between multi-cloud, IoT, SD-WAN and next-gen branch offices, and mobile devices, the challenge is ensuring consistency between these environments.
Security solutions built around open standards allow the different edges to see all devices, share threat intelligence, and participate in coordinated threat response. However, they also need to be adapted to the unique requirements of each edge environment. Here are a few:
Second-generation security solutions can’t take us any further. Organizations need a third-generation security designed for today’s digital marketplace, built around high performance, adaptability, cross-device and cross-platform interoperability, and self-learning capabilities that not only see and respond to threats in real time but actually anticipate threats before they happen.
This is a summary of an article written for Network Computing entitled, Securing Today’s New and Varied Network Edges, written by Fortinet’s EVP of Products & Solutions, John Maddison, and published on the Network Computing website on June 11, 2019.
Find out how Fortinet’s Security Fabric delivers broad, integrated, and automated protection across an organization’s entire digital attack surface from IoT to the edge, network core and to multi-clouds.