安全架構師們考慮的是如何為其企業提供全面的威脅防護，包括入侵防禦、Web過濾、反惡意軟件和應用程式控制。同時，端點的安全產品的部署與堆疊，缺乏統一與整合的安全視角與安全管理，造成了管理與營運方面的障礙。具 Gartner估計，2019年，有 80％ 的企業流量將是使用加密機制，而 50％ 針對企業的攻擊將隱藏在加密流量中。
FortiGate 下一代防火牆利用 FortiGuard 實驗室專用的安全處理器和威脅情報安全服務，提供高性能的頂級保護，包括流量加密。 FortiGate 透過自動查核應用程式與降低網絡複雜性，提供安全評量，讓網路安全得到最佳實踐。
FortiGate NGFW 下一代防火牆相關新聞 :
7/17/2018: Fortinet Receives Recommended Rating in Latest NSS Labs NGFW Report, Delivers High SSL Performance Suited for Encrypted Cloud Access. Receives Fifth Consecutive “Recommended” Rating, Blocked 100 Percent of Evasions and Achieved Minimal Performance Degradation for SSL Inspection
7/31/2018: Fortinet Announces Enhancements to Our Security Services Portfolio. Defending against the ever-expanding threat landscape requires real-time threat research and intelligence. Enhancing our subscription services to provide this crucial resource, we are announcing two critical changes.
2/27/2018: Fortinet Delivers Third Generation of Network Security with the Evolution of its Security Fabric. FortiOS 6.0 delivers more than 200 new capabilities across Security Fabric to automate security operations and protect the digital attack surface
FortiGate: Next-Generation Firewall Product Details
FortiGate enterprise firewalls offer flexible deployments from the network edge to the core, data center, internal segment, and the Cloud. FortiGate enterprise firewalls leverages purpose-built security processors (SPUs) that delivers scalable performance of advanced security services like Threat Protection, SSL inspection, and ultra-low latency for protecting internal segments and mission critical environments.
FortiGate NGFW provides automated visibility into cloud applications, IoT devices and automatically discovers end to end topology view of the enterprise network. FortiGate is a core part of security fabric and validated security protect the enterprise network from known and unknown attacks.
Features and Benefits
High-performance threat protection
Industry's highest threat protection and SSL inspection performance to protect from malware attacks hiding in encrypted traffic
Validated security effectiveness
Independently certified and continuous threat intelligence updates provide robust protection from known and unknown attacks
Protect mission critical applications
Highly scalable segmentation and ultra-low latency to protect network segments
Continuous risk assessment via automation
Leverage automated workflow and auditing features to deal with scarce security staff and continuously maintain compliance posture
Security Fabric integration
Intelligently share threats across the entire digital attack surface to provide quick and automated protection
Enterprise class security management