Skip to content Skip to navigation Skip to footer

Fortinet Managed IPS Rules for AWS Network Firewall

Filter malicious traffic and enhance network security on Amazon VPCs

Free Trial !
web product icon ips

Security Simplified for Amazon VPCs

Enterprises are speeding digital transformation, making the cloud’s role in delivery of services more important than ever. Securing virtual private cloud networks and application workloads is critical, and must not add to a security team’s operational burden.

Fortinet Managed IPS Rules enhances the baseline protection offered by AWS Network Firewall. It reduces the learning curve and delivers network security that is effective, available, and scalable—while keeping management simple.

Improve Security While Reducing Resource Needs

Protect VPCs and Workloads

Protect VPCs and workloads from security breaches

IPS rules are automatically updated by FortiGuard Labs to address the constantly evolving threat landscape. Our threat research experts  analyze 100B+ events every day from millions of security sensors deployed globally.

Security Operation

Significantly reduce security management and operations overhead

Fortinet Managed IPS Rules are set up to address the most common vulnerabilities out of the box. A security expert is not needed for deployment and management.

Protection for Workloads in AWS VPCs

Provide rapid on-demand protection for business-critical workloads in AWS VPCs

Fortinet Managed IPS Rules is available in the AWS Marketplace for rapid deployment anytime. It protects workloads across VPCs and accounts.

Operational Cost

Streamline operational costs without sacrificing security

Avoid upfront investments by leveraging pay-as-you-go (PAYG) pricing models and fully-managed infrastructure. Align network security costs with your usage.

Watch how Managed IPS Rules protects your application workloads and VPCs

立即觀看

Types of Enhanced Protection

Server

Server and OS

Rules that detect vulnerabilities targeting operating systems and common server applications, including DNS, email, and remote access
Malware Protection

Malware Detection

Rules that detect communication attempts from malware backdoors, worms, and remote access Trojans (RATs), including command and control traffic
Network IoT

Application, Network, and IoT

Rules that detect attempts to exploit vulnerabilities in common client applications, including desktop software, network, and IoT
Web Client

Web Client

Rules that detect exploits targeting vulnerabilities in web browsers, including Chrome, Firefox, Internet Explorer, and Edge.
Web Server

Web Server

Rules that detect exploits targeting web server vulnerabilities, including both web servers (e.g., Apache) and proxy web servers (e.g., Squid)
Web Application

Web Application

Rules that detect exploits targeting vulnerabilities in common web applications, including popular CMS platforms such as WordPress and Joomla