Connect with us

Hi, what are you looking for?


Network Security

Fortinet Targets Mid-to-Large-Sized Enterprises With New Security Appliances

Network security firm Fortinet today introduced several new network security appliances targeted to mid-sized enterprises, along with solutions to help protect messaging environments, provide remote access authentication and optimize Web content caching.

Network security firm Fortinet today introduced several new network security appliances targeted to mid-sized enterprises, along with solutions to help protect messaging environments, provide remote access authentication and optimize Web content caching.

As part of the new lineup, Fortinet introduced the new FortiManager™-400C, an appliance that provides centralized policy-based provisioning, configuration and update management for FortiGate, FortiWiFi™ and FortiMail™ appliances, as well as FortiClient™ endpoint security agents. The 1-RU rack mounted appliance provides features including device discovery, group management, auditing facilities and the ability to manage complex mesh and star VPN environments.

In addition, Fortinet launched the FortiAnalyzer™-400C, an appliance that aggregates, analyzes and reports on log data gathered from Fortinet devices and other syslog-compatible devices. The appliance is designed to streamline the identification of attack patterns, measure policy compliance and help organizations comply with regulations regarding privacy and disclosure of security breaches. Delivering a 4x increase in memory and storage capacity over its predecessor (FortiAnalyzer-400B), the updated appliance supports a significantly greater number of logs and logs-per-second performance.

Ferrari at Fortinet Booth at RSA Conference 2012Also in the lineup comes the new FortiMail™-400C, a secure messaging appliance designed to provide protection against spam, malware and other message-borne threats. Newly released FortiMail 4.0 MR3 operating software brings extended IPv6 support and other enhancements. The new hardware provides a 30 percent boost in message-per-hour (MPH) performance for email routing (400k) and FortiGuard Antispam (350k) over the earlier FortiMail-400B model.

Fortinet also launched the FortiAuthenticator™-400C, a new appliance that providers centralized user authentication and management, equipped with RADIUS and LDAP, two-factor and certificate-based authentication, as well as single sign-on support. The FortiAuthenticator-400C appliance also comes with support for FortiToken™ Mobile, the company’s Software-based mobile tokens for the iOS and Android platforms, as well as SMS and Email Two-Factor Authentication, and the ability for users to self-register in order to be granted access to enterprise resources such as wireless connections and guest portals.

The company also rolled out a dedicated content caching appliance focused on delivering high-performance video content caching. The new appliance, the FortiCache-400C, is designed to accelerate network performance by reducing the load and latency caused by bandwidth-intensive content such as video. Perhaps this could be helpful as “March Madness” approaches and networks become saturated with streaming video traffic as employees look to watch games online.

Other enhancements in the FortiCache-400C include Web Content Filtering that allows network administrators to block access to selected applications to shield users from inappropriate or malicious content, as well as Web Cache Communication Protocol (WCCP) support to enable scalability via integration with Fortinet and third-party WCCP-capable devices.

Fortinet said the FortiManager-400C, FortiAnalyzer-400C, FortiWeb-400C, FortiDNS-400C, FortiMail-400C, FortiAuthenticator-400C, FortiCache-400C and FortiToken Mobile for iOS are available immediately. FortiToken Mobile for Android will be available March 15, 2012.

Advertisement. Scroll to continue reading.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

Our networks have become atomized which, for starters, means they’re highly dispersed. Not just in terms of the infrastructure – legacy, on-premises, hybrid, multi-cloud,...