Professional Documents
Culture Documents
INTRODUCTION 1
CONCLUSION 11
INTRODUCTION
Security professionals at enterprises of all sizes recognize this situation and these products may be
worry about the expanding network attack surface, operating as silos on your network.
applications, data, and users in a borderless
environment. From the mobile workforce to the data Unfortunately, security products dont communicate
center, public, private, and hybrid clouds, SaaS apps, with each other in the accidental architectures
and the Internet of Things (IoT)all have dramatically of today. They must all be managed separately,
increased the attack surface while making it much increasing complexity and leaving gaps in security
harder to define and secure. across the dynamic attack surface.
As organizations grow larger over time, perhaps The enterprise perimeter has stretched so far, its no
acquiring other companies in the process, they find longer recognizable. Its clear that firewall technology
they have many security vendors products deployed must evolve with the borderless enterprise.
at different points across the enterprise. You may
Although the NGFW is still the primary means of and network traffic to address the entire threat surface.
defense at the enterprise perimeter, security experts The need to secure borderless environments is whats
know that a borderless enterprise must consider driving this evolution.
users and deployment needs as well as network size.
While the environment is changing, threat actors are This is why IT organizations are looking for greater
targeting weak pointsoften where IT security has not security effectiveness including compatibility across
been invested. form factors, consolidation of security areas, a high
level of reliable network performance, and simplified
Security experts see that many vendors are not able to security management within a single pane of glass.
provide flexibility in deploying firewalls to the extended
enterprise locations, which can result in multiple The Fortinet Enterprise Firewall Solution represents
operating systems with different management consoles. a new era of firewall technology by deploying
Adding complexity kills security. This explains why enterprise firewalls strategically in a collective security
organizations are still being breached today. fabric that stretches across the expanding network
attack surface.
As cyberthreats continue to grow in sophistication,
firewall technology must evolve beyond applications
In the new era of firewall technology, enterprise placements and should be treated with the same
firewalls are a key component of the Fortinet security requirements. Attackers assume there will
Security Fabric. Instead of operating in silos, they be a weaker security posture at these sites and that
work together, enabled by the communication and makes them prime targets.
collaboration of the Security Fabric. The more firewalls
there are strategically placed and communicating The four primary enterprise firewall deployment
with each other throughout your borderless network modes are:
infrastructure, the faster your response and breach Next-Generation Firewall (NGFW)
mitigation times will be.
Data Center Firewall (DCFW)
In borderless enterprise network environments, Internal Segmentation Firewall (ISFW)
your data center and distributed enterprise are just Distributed Enterprise Firewall (DEFW)
as important as your enterprise perimeter and core