Fortinet

Páginas: 2 (305 palabras) Publicado: 18 de enero de 2013
Distributed Perimeters Require Security at Switching Speeds
Traditional perimeter security technologies have become obsolete in defending against today’s blended security threats. Using multipleattack vectors, these
threats are increasing in volume and sophistication, leveraging every available network connection point to proliferate. Organizations with mobile or remote users
are causingcentralized security perimeters to transform into a “distributed perimeter,” enabling new entry points for security threats. With so many network
access points, it has become impossible to deploy asingle point of network protection within an enterprise infrastructure.
Internal Segmentation Restraints
As networks grow, administrators aspire to segregate user-groups and applications such as VoIPinto smaller security zones for improved security. Dividing the
network with security segmentation points isolates security events, increases policy granularity, and protects sensitive information.Unfortunately most mid-range
security devices lack the interface count or the raw throughput to facilitate extensive internal network security segmentation.
ASIC-Accelerated Multi-Threat SecuritySolution
The FortiGate-310B answers the call of growing mid-sized networks by integrating a purpose-built security processing ASIC, known as the FortiASIC Network
Processor, designed to deliver securitythroughput at switching speeds. Eight hardware accelerated interfaces (expandable to 12) allow networks to enforce
firewall policy between network segmentation points for layered security withswitch-like performance. An additional purpose-built ASIC, known as the FortiASIC
Content Processor, provides additional acceleration for content intensive security technologies such as intrusion preventionand antivirus scanning for dangerous
traffic streams. The inclusion of an Advanced Mezzanine Card (AMC) expansion slot allows for even more flexibility, offering additional ASIC-accelerated ports...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Fortinet
  • Fortinet
  • Procedimientos Fortinet
  • Fortinet
  • fortinet
  • Fortinet
  • Reinstalación Firmware Fortinet
  • Control Vs Fortinet LAS

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS