Fortinet Network Security

Do you store important information in digital form? Do you need real-time scanning of messages and attachments received via email? Do you wish to secure your access channels from outside the organisation and the networks spread geographically from one single management console?

FortiGate – The Complete Firewall Solution

  • Ensures protection in all areas without impacting on the performance of critical applications or the reliability of the network.
  • Security solution with multiple features, flexible for all business segments.
  • Scalable with the diversity of the system: server mail; application servers; database servers; web portals.
  • Allows for secure VPN communication between geographically spread headquarters.
  • FortiGuard® services provide continuous, automatic updating of antivirus/antimalware, IPS, web filtering and antispam features, and protect applications from the new types of attacks.
  • FortiGate® equipment filters all data traffic at protocol and application level.
  • No special requirements at installation. Intuitive graphic configuration interfaces. Reduced time and effort with installing the equipment in remote locations
  • Simplified licensing per device, not per user. Easy and cheap to manage.

Architecture

secur-retea

Integration

  • With no major impact on the IT topology existing in the organisation

Portfolio Categories:

Security Solutions 


Fortinet Email Security
Too much spam? Do you receive a significant amount of unsollicited email? Are recipients receiving email with delays? Is the email server frequently blocked on spam lists? Do you experience difficulties with employees’ activity and with the operation of the mail server?

FortiMail – The Antispam, Antivirus, Antimalware Solution

  • Adaptable for all business segments, from small to enterprise.
  • Quick installation and configuration (appliance solution). No special requirements for network installation.
  • Flexible operation with intuitive web-based interface, accessible from mobile devices.
  • Enterprise antispam and antivirus features.
  • Efficient storage system on RAID technology.
  • Automatic updates of antivirus signatures and of the detection engine, for non stop protection against spam, viruses, worms and trojans.
  • Email agent (MTA). Support for most email clients via traditional protocols.
  • Extended set of reporting tools.
  • Backup support for remote storage of archived emails and optimal long-term operation. Enables migration of messages of certain age on external, cheaper storage devices.

Architecture

arhitectura8

Integration

Network, in 3 possible ways:

  • Email server (manages the entire email flow of the company)
  • Gateway (receives email, then forwards it to the server)
  • Transparent (implemented in front of an existing email server, only scans the traffic with no redirecting).

With other solutions:

  • With Active Directory solutions for users and groups of users
  • With VMware virtualisation solutions for virtual FortiMail appliances.
  • With equipment of the FortiGate or FortiGuard family to offer a multi-layer antivirus, antispam solution for enterprises with several FortiMail devices in place.
  • With mail clients from mobile devices, for cases where mobility is a fundamental requirement.

 

Portfolio Categories:

Security Solutions 


ObserveIT Security

Do you look to achieve more independence from your suppliers? Do you wish to ensure security of the organisation in full confidentiality, identification of human error and of users that can pose the greatest risks?

ObserveIT – User Monitoring Solution

  • Monitors suppliers remotely, checks completion of their obligations and establishes their risk level.
  • Monitors, records and audits user actions. Generates a prioritised list of users that pose the highest risk to the organisation. Enables keyword searching through records.
  • Enables instant access to video records and real-time viewing of activity flows.
  • Real-time signalling of negative action and human error. Customized warnings integrated with the SIEM/NMS systems. Identifies the reason why the error occurred and collects irrefutable evidence.
  • Checks conformity for PCI, HIPAA, SOX and ISO 270001.
  • Native support for multi-tenant use with information sharing within a safe environment.
  • Simplified infrastructure, one console. Consolidates data from multiple monitoring systems.
  • Highly scalable. Enables the same features according to the licensing.
  • Low overall ownership cost, professional implementation services.

Architecture

arhitectura7

  • Multi-level enterprise solution with secure multi-organisation access.
  • Implementation relying on agents that can be installed on various platforms.
  • Runs on Windows and Linux, local or remote sessions – Vmware, ICA, SSH, Telnet, VNC RDP
  • Records and plays any Windows and Unix session, including mouse movements, interaction with graphic interfaces, text entries and command line

 

Portfolio Categories:

Security Solutions 


SolarWinds Log & Event Management
Monitor operating systems, identify unauthorised intrusions, and reduce troubleshooting time with a solution recognised internationally for its easy implementation, complex gathering abilities and quick accessing of information on security incidents.

SolarWinds Log & Event Manager

  • Robust solution, compliant to international standards.
  • Enables centralised collection and management of security information from multiple sources in the organisation.
  • Monitors and issues warnings for any suspicious or malintended activity on a registry, folder or file.
  • Enables quick, automatic action against threat through the Powerful Active Response technology.
  • Prevents data loss and leaks of information through USB devices.
  • Reduces intervention time by efficient identification and correlation of specific rules, reports and quick-implementation response (~ 1h). Enables high data compression.
  • Enables advanced search in the log database. Enables scheduling of searches and receiving answers automatically via email.
  • Provides support for creating customised email templates and generating reports.
  • Web interface with quick access to basic information regarding the status of services and of the IT infrastructure.

arhitectura5arhitectura6

Integration

  • The SolarWinds Log & Event Manager solution enables process monitoring and control through reports according to PCI DSS, GLBA, SOX, NERC CIP, HIPAA standards etc.
  • No integration incompatibilities.

 

Portfolio Categories:

Security Solutions 


Intellinx Antifraud Detection
Do you look to prevent illicit access to accounts and potential internal actions carried out by employed staff that has access to sensitive information? Do you need to check all transactions against money laundry methods? Do you face attacks on your card operations?

Intellinx Anti-Fraud and Anti-Money Laundering Solution

  • Reliable, robust solution, consolidated for the financial field, checking conformity, and operational risks.
  • Monitors online and offline activity in applications and data regarding use of these systems to detect suspicious transactions and create a full user profile.
  • Issues real-time warnings on potential fraudulent behaviour and new fraud scenarios.
  • Stops identity theft, account takeover, man-in-the-browser and DDOS attacks.
  • Triggers actions such as requesting additional credentials; moving a transaction offline or postponing the transaction, thus discouraging fraudulent activities and data theft.
  • Automatically records online staff activity and the flow of business between platforms, with visual review of user screens, keyboard entries and advanced search.
  • Maintains complete visibility upon a user’s activity on all platforms without involving the IT department.

Architecture

arhitectura4

Modular solution composed of:

  • Payment anti-fraud
  • Anti-fraud for mobile devices and web
  • Internal anti-fraud
  • Combating money laundering
  • Monitoring user behaviour
  • Case management
  • Conformity monitoring and management

 

Portfolio Categories:

Security Solutions 


CoSoSys Data Loss Prevention & Device Control
Secure the IT ecosystem against threats from portable and mobile devices and cloud services. Prevent data flow corruption and manage risks in an efficient manner.

Endpoint Protector 4 – 3 in 1 Data Security

  • 3 in 1 solution: Device Control, DLP and MDM. Ready for VMware.
  • Centralised management of portable and mobile device usage, with data loss prevention features.
  • The ‘white-list’ based approach enables use of devices, URLs and domain names for computers/users/groups.
  • Only allows defined actions; eliminates prediction errors.
  • Intuitive endpoint policy and TCO management, 50% lower than the average on the market with Endpoint Protector.
  • Proactive protection against device abuse and data theft for Windows, Mac, Linux, iOS and Android systems.
  • Supplied as hardware or as virtual machine. Can be configured in just a few minutes, 70% quicker than other solutions.
  • Dramatically lowers risks and increases cost productivity, 45% smaller than with other similar solutions.

Features

arhitectura10

Port Security for Windows and Mac OS X Desktops, Notebooks and Netbooks:

  • Protection against risks from portable devices. Stops data leaks, theft, loss; virus infection.

Wide range of compatible devices and applications:

  • USB units (normal, U3); memory cards (SD, etc.); CD/DVD-burner; external HDDs (incl. sATA); printers; floppy; card readers; web cameras; WiFi cards; digital cameras; iPhones/iPads/iPods; smartphone/BlackBerry/PDA
  • Devices: FireWire, MP3 Player/Media Player, biometrical, bluetooth, ZIP, expressCards (SSD), USB wireless, serial port, Teensy cards, PCMCIA storage, Thunderbolt, network share
  • Email clients: Outlook, Lotus Notes, Thunderbird, etc.
  • Web browsers: Internet Explorer, Firefox, Chrome, Safari
  • Instant messenger: Skype, ICQ, AIM, Microsoft Communicator, Yahoo Messenger, etc.
  • Cloud / File Sharing services: Dropbox, iCloud, SkyDrive, BitTorrent, Kazaa, etc.
  • Other applications: iTunes, Samsung Kies, Windows DVD Maker, Total Commander, FileZilla, Team Viewer, EasyLock etc.

 

 

Portfolio Categories:

Security Solutions 


Symantec Encrypting
Do you want to stop or prevent loss of important data? To you look for quick encryption, storage and transparent sharing of mail, data and information stored locally, without affecting user experience? Do you need a confident solution for deleting confidential information?

Symantec Encryption Family – Encryption Solutions

  • Protects data stored localy on desktops, laptops, terminals, mobile storage devices or cloud storage, including for boot sectors or system and swap files.
  • Secures information depending on the manner of handling, storage location, destination. Adaptable for terminals, email, instant messages, files, various and multiple encryption requests.
  • Uses PGP Self-Decrypting Archive, PGP Virtual Disk and PGP Zip for transparent encryption and sharing of data and creation of encrypted containers that are independent from the storage medium for data transport and sharing. Encrypts mail on desktop, gateway, mobile devices.
  • Centralises creation, implementation and management of security policies. Advanced reporting features.
  • Ensures compliance with security standards of data taken over from PGP Technology and implementation of good practice recommendations, by using last-generation algorithms.

Architecture

arhitectura9

Integration

  • Symantec Encryption Management for centralised component deployment and management.
  • Encryption Desktop Professional – Drive and Desktop Email encryption features.
  • Encryption Desktop Storage – with encryption features for Drive and File Share,

Central point: the management server.

Licenses purchased separately for the required features:

  • Symantec Desktop Email – encryption, signing, decryption and checking of email messages, automatic and transparent.
  • PGP Viewer – decrypting, checking and displaying email messages outside the frequently used platform.
  • Symantec File Share Encryption – safe sharing of encrypted files.
  • Symantec Drive Encryption – encrypting of an entire drive (including boot information, swap files); full anti-theft protection.
  • PGP Virtual Disk Volumes – encrypted virtual disk (component of the local HDD).
  • PGP Zip – add any combination of files to encrypted archives.
  • PGP Shredder – full, certain destruction of files and folders, with no possibility of specialised recovery.
  • Key Management – management of keys (symmetrical, public or private).

Portfolio Categories:

Security Solutions