Cyber Security Engineer at a tech vendor with 1-10 employees
Real User
2020-02-05T08:05:09Z
Feb 5, 2020
I am a design engineer and we are designing a security operation center for data censoring in Turkey. We are using FortiGate to protect more than 3000 end users. More than one gigabyte per second bandwidth is necessary. FortiGate was quite useful for this scenario, but we are just in the planning and analyzing phase. The tender should be in the near future.
Manager-Information Technology at a tech services company with 1-10 employees
Real User
2020-02-02T10:42:08Z
Feb 2, 2020
We are primarily using the solution on the VPN box as a perimeter firewall. We use it to secure internal networks and a few servers. Our network is solely on Fortigate.
Platforms and Products Manager at a media company with 501-1,000 employees
Vendor
2018-10-21T07:40:00Z
Oct 21, 2018
In our office, primarily everything goes through FortiGate. We expand that for all the firewall rooms that we have. We have features that link to FortiGate and from FortiGate on the shelf we ran the core cells. There is primary access to each of the devices and then we also use it between our offices. We use VPN tunnels in between offices. There are all of the typical settings within a firewall device: Protection, application control, and quality tracking.
FortiGate Virtual Appliances allow you to mitigate blind spots by implementing critical security controls within your virtual infrastructure. They also allow you to rapidly provision security infrastructure whenever and wherever it is needed. FortiGate virtual appliances feature all of the security and networking services common to traditional hardware-based FortiGate appliances. With the addition of virtual appliances from Fortinet, you can deploy a mix of hardware and virtual appliances,...
We primarily use the solution for the security so that our systems will not be penetrated externally.
We primarily use the solution for LAN connections.
Our primary use cases are using the solution as a configuring solution or data management. We use it for simple data center segmentation.
I am a design engineer and we are designing a security operation center for data censoring in Turkey. We are using FortiGate to protect more than 3000 end users. More than one gigabyte per second bandwidth is necessary. FortiGate was quite useful for this scenario, but we are just in the planning and analyzing phase. The tender should be in the near future.
We are a solution provider and this is one of the products that we implement for our clients.
FortiGate-VM is installed in our data centers and is used for site-to-site connections between offices.
We primarily use this solution for the firewall and IPS.
We are primarily using the solution on the VPN box as a perimeter firewall. We use it to secure internal networks and a few servers. Our network is solely on Fortigate.
In our office, primarily everything goes through FortiGate. We expand that for all the firewall rooms that we have. We have features that link to FortiGate and from FortiGate on the shelf we ran the core cells. There is primary access to each of the devices and then we also use it between our offices. We use VPN tunnels in between offices. There are all of the typical settings within a firewall device: Protection, application control, and quality tracking.