Fortinet

Flexible Service Model

Our philosophy at icorp includes having a “Flexible Service Model” which we can adapt to your special requirements using measurable goals that help us satisfy the expectations stated in the SLA—all without sacrificing technical and economic competitiveness.

The ability to easily transform our generalized services into tailored, turnkey solutions has become one of the most important competitive benefits that icorp offers.

What is it?

Cybersecurity encompasses sets of standards, procedures and tools whose aim is to ensure the availability, integrity, confidentiality and proper use of information that resides in an information system. Achieving security in a networked environment requires being able to identify and eliminate vulnerabilities.

Today it is critical that an enterprise have both external and internal perimeter security measures in place. There has been a growing trend in cyber-attacks in recent years which can seriously and adversely affect business operations.

红牛棋牌线路A large majority of threats come from company employees who, because they are unrestricted, are free to send information to the Internet or browse web pages and inadvertently download viruses that open a door for the attacker.

See more

红牛棋牌线路 Industry Leader

红牛棋牌线路Fortinet is a leading, global innovator in network security. Their mission is to provide the most innovative security platform with relevant capabilities that assure the simplification and security of the IT infrastructure. Fortinet provides network security devices and security subscription services to carriers, data centers, businesses, retailers and managed service providers. Because of its constant innovations in hardware and network software, and its features for detection and security management, Fortinet has a large, growing base of satisfied customers that includes most of the Fortune Global 100. Fortinet sets the standard for the IT security market.

The main benefits of deploying a security solution are:

  • Protection against any type of cyber-threat.
  • Protection of proprietary information and other important business data.
  • Increases user productivity.
  • Optimizes network resources and Internet bandwidth.
  • Increases immunity to security threats so that business operations may continue.
  • Helps protect the corporate image.
  • Saves costs by having centralized security management.
  • Prevents data loss due to security incidents.
  • Technical assistance also available directly from the supplier.

We are certified by the supplier.

An attractive solution

红牛棋牌线路One key benefit of Fortinet's equipment is that each available model is built for the express purpose of providing protection without obstructing the functional nature of other equipment, or requiring additional licensing to activate other modules or features.

红牛棋牌线路 FortiGate uses powerful ASIC-accelerated performance which provides for an effective, integrated multi-threat solution that is constantly self-updating.

红牛棋牌线路 The security solutions from Fortinet address firewall, VPN, antivirus, web filtering, IPS, application control, and email filtering. The products can be deployed individually or in combinations that complement any security solutions that may already exist in the enterprise.

Fortinet also adds an additional bundle of services that include administration, analysis, email, databases and endpoint security products.

红牛棋牌线路 FortiGate's devices equipped with custom ASIC processors are characterized for having high performance and exceptionally low latency. An important part of the architecture is FortiASIC since it can detect and remove the more complex combination of threats in real time without affecting network performance. In addition, it has a complementary set of tools for analysis and databases; as well as features that protect end-users in a flexible manner. It also has features for industry and government standards compliance, all while aiming to reduce the cost of security management.

红牛棋牌线路 FortiOS is a recently released multi-layered security system that protects against sophisticated malware. It serves as the basis of the entire integrated security platform. It offers more security, intelligence and controls in order to protect companies against today's threats and the inherent risks associated with BYOD policies.

Advanced options use behavior analysis to achieve a security classification for each device. In this way, specific and practical information gets reported when potential attacks are detected in real time, before the local network can be compromised. The new advanced malware detection system adds logic that is based on a heuristic engine, as well as cloud services that include a sandbox and an IP reputation database to detect botnets.

Identifies devices and applies specific access policies and security profiles according to location, use, device type, or the group of devices to which it belongs.

You can now run a live migration in a non-clustered environment and run more than one live migration at the same time while using greater network bandwidths.

You can automatically adjust the role-based policies for users and customers based on location, data and application profile. Enhanced reporting and analysis provide deeper insights into the behavior of your network, users, devices, applications and threats.

A solid solution
  • NAT Mode: Allows the separation and control of traffic passing through the firewall when the firewall sits between the Internet and the internal network.
  • Transparent Mode: Used when the firewall is used internally and no changes are required in the infrastructure that use UTM filtering (but the UTM must still act as a layer 2 bridge).
  • Site to Site: Used to make point to point connections using IPSec or SSL encryption, which is the strongest encryption available in the industry.
  • Dialup User: Used to allow remote users to connect to the corporate network using installed agents or using some other type of supported VPN device that can act as a bridge to securely connect two private networks via the Internet.

With the new FortiOS operating system we can create policies based on user identity, device type, operating system and network addressing or we can mix all of them together to achieve greater granularity in the different security layers.

  • Antivirus: Perimeter-level protection against malware is provided through flow-based inspection modes that inspect protocols such as SMTP, HTTP, FTP and others.
  • Web Filtering: Protection for web browsing includes filtering content by category, examining the flow and either blocking or allowing access according to type.
  • Application Control: Used to control which applications can be used by end-users, basing the decision on policies tied to category, frequency of use, technologies used and risk.
  • IPS: Used to mitigate attacks from known and unknown sources that might exploit vulnerabilities in server operating systems, protocols or applications.
  • Email Filtering: Used to inspect the flow of email, and blocking it or tagging it using inspection mechanisms for detecting spam, and thus avoiding incoming email from domains listed in the black-white list (BWL).
  • DLP : Prevents data loss by using built-in filters which are kept updated dynamically using cloud services.

Used to control mobile devices and to create combined policies for different types of devices and operating systems and for the more common IP addresses that are used in businesses.

Used to create logically separated management entities as if they were physically separated equipment.

The following devices can be integrated from the Fortigate console:

  • FortiAP : Fortinet's solution for wireless networking
  • FortiSwitch : Fortinet's solution that addresses layer 2 networking needs
  • FortiClient : Protection for the end-user. Policies can be maintained (even remotely) and activities like analysis, management and solution deployment can be viewed in a consolidated interface.

Turnkey projects

We work in conjunction with your IT staff to deliver turnkey solutions红牛棋牌线路 that meet your business objectives by enabling the efficient use of resources. We help you to integrate and set solutions in motion so that your IT staff can better concentrate their efforts on developing business strategy instead of spending their time with maintenance and operations.

We are certified by the supplier.