Story image

Defence-in-depth: Hardening every component on the network

16 Oct 17

If there are any positives to be taken from the recent Equifax data breach, which exposed the personal information of some 143 million customers in North America, it’s that cyber security has been highlighted once again as a priority for boards, C-level executives and CISOs in particular. Indeed, recent research has indicated that a company’s share price drops on average 5% on the day a data breach is disclosed. If that doesn’t make your clients think twice about investing more resource into their cyber defences, nothing will.

“There is always room for improvement when it comes to cyber security,” says Swapneil Diwaan, Business Unit Manager at Ingram Micro, New Zealand’s largest and most experienced distributor of Fortinet’s cyber security solutions.

“Your clients have most likely built up their network infrastructure over time when their major concerns were scalability, interoperability, transmission speeds, support and affordability. Security was seen as something to be tacked onto the network at the perimeter and maybe at end user devices. But as adversaries have upped their game, that approach to security is no longer viable. Your clients have to build in security at every layer on the network: devices, applications, data and users.”

“But that takes time, money, resources and strategic vision from upper level management,” continues Diwaan. “Your challenge, as a trusted advisor on cyber security, is to provide a workable plan that gives your clients clarity on how they can improve their security profile without breaking the bank.”  

Building depth into your client’s security profile

“It starts with the firewall at the perimeter,” says Rod Christie, Solutions Architect with Ingram Micro’s Fortinet Business Unit. “That is the basic unit and orchestrates every other security component. Today’s next-generation firewalls go one step further and add firewall protection between individual server instances (both physical and virtual) inside the network. Called internal segmentation, this key function of FortiGate firewalls ensures that even if malware sneaks by the perimeter, it gets stopped before it can corrupt anything else.”

Adding security to end user devices is also absolutely necessary. “It’s not enough to simply load anti-virus client-side protection,” continues Christie. “Mobile phones and laptops are at risk for any number of reasons. But they can also be a valuable tool for proactive security. For instance, FortiClient integrates endpoints into Fortinet’s Security Fabric for early detection and prevention of advanced threats. This deep real-time visibility into the network allows administrators to investigate and remotely quarantine compromised endpoints.”

Incremental implementation

“These twin strategies set the stage for incremental implementation of additional security solutions,” adds Diwaan.” For instance, inside the network itself, FortiSwitches can be fully integrated into the Security Fabric and reduce complexity and decrease overheads whilst streamlining policy management. So whenever your clients need to upgrade based on performance requirements, you can suggest a FortiSwitch. Available in multiple form factors, the data centre-ready FortiSwitch 3032D boasts a massive 2560 Gbps throughput.”

“The same is true for access points,” he continues. “Fortinet’s Secure Access Points add additional security to protect users whilst feeding valuable metrics back into the Security Fabric. Again, any time your clients want to expand their wireless coverage, you can suggest FortiAP-S series access points with on-board IPS, antivirus scanning, web-filtering and application control.”

“As your clients harden their hardware they can add more specialised security functionality on an as needed basis,” continues Diwaan. “FortiMail, FortiAuthenticator, FortiAnalyzer, FortiSandbox, FortiSIEM and other members of the Fortinet family all increase the depth and resilience of the Security Fabric. Your clients don’t have to do it all at once…if for no other reason that it might overwhelm their IT support staff… but at least they can plan specific timeframes and budget allocations.”

“It’s a winning strategy,” concludes Diwaan. “By adopting a defence-in-depth security profile, your clients will enhance protection for their data, applications, users and networks whilst reducing complexity and operational overheads. It will also provide a firm foundation for you to solidify your relationship with the client and build sustainable revenues. And, with Fortinet’s track record of innovation, you’ll be assured of a steady stream of enhancements and new solutions into the future.”

For further information, please contact:

James Meuli, Solution Architect / NSE4 Trainer
M: 027 552 0167

Rod Christie, Solution Architect
M: 027 568 0053

Jeffrey Whale, Business Development Manager
M: 027 543 5927

Gerrard Kennedy, Business Development Manager
M: 027 543 8212

Swapneil Diwaan, Business Manager
M: 021 240 1240

White box losing out to brands in 100 GE switching market
H3C, Cisco and Huawei have all gained share in the growing competition in the data centre switching market.
Gartner names newcomer Exabeam a leader in SIEM
The vendor landscape for SIEM is evolving, with recent entrants bringing technologies optimised for analytics use cases.
52mil users affected by Google+’s second data breach
Google+ APIs will be shut down within the next 90 days, and the consumer platform will be disabled in April 2019 instead of August 2019 as originally planned.
Genesys PureCloud generates triple-digit revenue growth year on year
In Australia and New Zealand, the company boosted PureCloud revenue by nearly 100%.
Symantec releases neural network-integrated USB scanning station
Symantec Industrial Control System Protection Neural helps defend against USB-borne cyber attacks on operational technology.
IDC: Standalone VR headset shipments grow 428.6% in 3Q18
The VR headset market returned to growth in 3Q18 after four consecutive quarters of decline and now makes up 97% of the combined market.
Kidd made Ingram Micro executive for cloud
Barbara Kidd has been promoted to cloud general manager as the company signs new vendors to its Cloud Marketplace.
Open source will be the next big thing for the channel
Channel firms should be on the lookout for opportunities across open source and more diverse software offerings like software-defined containers and storage.