Story image

Fortinet can centralise your network logging and reporting

27 Jul 15

FortiAnalyzer gives your clients the real-time visibility across the network they need, the analysis capabilities they have wished for and the reporting resources they could only have dreamed about.

Sitting alongside their FortiGate Next Generation Firewall (NGWF), FortiAnalyzer centralises a raft of critical business activity monitoring (BAM) functions: network logging, analytics, reporting, alerts, archiving, data mining and more.

Reporting critical

FortiAnalyzer enables your clients to closely manage their network with real-time monitoring and reporting.

Reporting is critical as it provides the mechanism to document all network activity for both forensics as well as auditing purposes. Many organisations are looking to quantify IT’s contribution to the business model and good reports help provide a ‘dollars and cents’ valuation for IT within the organisation.

Your clients can do all of this - and lots more - from the customisable centralised FortiView dashboard, a feature of FortiOS 5.2. IT managers can collect, correlate and analyse data, monitor activity, set thresholds for alerts and just generally stay on top of things. And the more they work with FortiAnalyzer, the more they’ll discover what they can do.

Real or virtual - options for clients

Your clients can deploy FortiAnalyzer as either physical or virtual appliances. There are excellent benefits for either option in areas such as scalability, pricing, throughput, etc. Which form factor is best for your clients depends on their environment, infrastructure and usage. We can help you specify the right model for your clients.

Real time visibility and disclosure

FortiAnalyzer complements the FortiGate NGFW and adds another layer of control. And when deployed in conjunction with FortiAuthenticator, your clients can have unprecedented visibility of not just network activity but who or what is responsible. With more scrutiny on preventing data breaches and ensuring that staff are complying with corporate acceptable use policies, your clients - especially those with FortiGate NGWF appliances - should be looking very seriously at FortiAnalyzer to round out their security profile.

For further information:

Contact Ingram Micro, to discuss your client’s security requirements. Ingram Micro has a dedicated Fortinet team for network design, quotes, specifications, licensing, training and associated reseller resources.

Andrew Khan, Senior Business Manager, 021 819 793 or 0-9-414 0104, or email andrew.khan@ingrammicro.com

Hugo Hutchinson, Business Development Manager, 021 245 8276 or 0-9-414 0261 or email hugo.hutchinson@ingrammicro.com

Hands-on review: The Logitech R500 laser presentation remote
With a clever ergonomic design, you’ll never have to glance at the device, unless you deliberately look to use the built-in laser pointer to emphasise your presentation.
Noel Leeming slapped with $200,000 fine for misrepresentation
“This prosecution related to multiple consumers in multiple locations. It was not isolated or ‘one off’ conduct.”
Review: Should you buy the Fitbit Charge 3?
If you are new the to the world of wearables you might be wondering if Fitbit’s new offering is a good first step. Maybe I can help with that.
The disaster recovery-as-a-service market is on the rise
As time progresses and advanced technologies are implemented, the demand for disaster recovery-as-a-service is also expected to increase.
Dell dominates enterprise storage market, HPE declines
The enterprise storage system market continues to be a goldmine for most vendors with demand relentlessly rising year-on-year.
Lenovo DCG moves Knight into A/NZ general manager role
Knight will now relocate to Sydney where he will be tasked with managing and growing the company’s data centre business across A/NZ.
Avnet to boost AI/IoT solutions with acquisition
The acquisition of Softweb Solutions adds software and artificial intelligence to Avnet’s ecosystem and bolsters its IoT capabilities.
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”