Site icon GIXtools

Fortinet eases firewall management with hardware-as-a-service package

Fortinet is unveiling a hardware-as-a-service offering that promises to ease the stress of keeping up with the latest firewall technology. The new FortiGate-as-a-Service (FGaaS) offering lets customers choose the hardware they want the FortiGate next-generation firewalls to run on, and Fortinet will configure and manage the devices.

“…We’re offering our FortiGates as part of a consumption-based service for customers to use whenever they want,” said Nirav Shah, vice president of products and solutions with Fortinet. “For customers and service providers wanting to sign up for the service, it’s as simple as logging in and using their FortiPoints credits to purchase exactly what they want to use. Through the portal, they select the datacenter location, the FortiGate model that’s right for their use case, as well as the service bundle they want to add. Within minutes they have a dedicated FortiGate ‘as-a-Service’ that is completely managed and maintained by Fortinet.”

Today’s enterprises are battling increasingly sophisticated cyberthreats and navigating complex regulatory environments. At the same time, they expect faster deployment and more scalability of IT infrastructures, Shah wrote in a blog about the new service. “FGaaS introduces a more flexible form factor to our family of FortiGate Next-Generation Firewalls (NGFWs). This offering fits the OpEx model, so it is financially strategic while enabling enterprises to be more agile and innovative in their approaches to cybersecurity,” Shah wrote.

Organizations that want to move away from building and maintaining their own data centers can use FGaaS to connect and secure their distributed sites and use the company’s secure access service edge (SASE) offering, FortiSASE, to protect remote users, Shah stated.

Fortinet’s NGFW portfolio spans branch, campus and data center sites and features core capabilities including deep packet inspection, intrusion prevention, network access control, zero-trust enforcement, and threat intelligence feed integration.

Source:: Network World

Exit mobile version