FORTINET in Industrial Control Systems Security Solutions

Fortinet offers products, such as Secure Switching and Wireless LAN FortExtender to ensure connectivity as well as security for automated systems present at any location. FortiManager and FortiAnalyzer consolidated through a FortiGate provide combined centralized configuration with the abilities of reporting, visibility, and event logging. They are built in accordance with international substation automation standards, namely IEC 61850-3, and IEEE 1613.

Fortinet provides the following products under ICS security space:

  1. FortiGate
  2. FortiSandbox
  3. FortiManager
  4. FortiAnalyzer
  5. FortiExtender

FortiGate - FortiGate is a comprehensive multi-layered security solution offered by Fortinet which is suitable to implement the zones and conduits model in extreme and harsh critical ICS infrastructure. FortiGate combines high-performance, next-generation firewall functionality, and robust two-factor authentication, with antivirus, intrusion prevention, URL filtering, and application control.

Features:

  • Centralized Management, Logging, and Reporting
  • Specific ICS/SCADA Aware Functionality
  • Zone Access Control With Fortiauthenticator and Fortitoken
  • Securing the Historian With Fortidb
  • Securing the Web-Based HMI with Fortiweb
  • Securing the #1 Attack Vector with Fortimail
  • Responding to Advanced Persistent Threats

FortiSandbox - With the increasing number of advanced cyber-attacks, one threat is enough to slip through security and breach data. CISOs adopted an essential component, sandboxing, of their security strategies to combat unknown threats. Due to the growth of cloud-based and IoT services, attack surfaces are becoming dynamic. Hence, organizations are integrating sandboxing with a high degree of automation and control due to inadequate cybersecurity.

FortiManager - Various organizations are focusing on adopting the cloud with the increasing digitalization. A majority of the workloads will be in the cloud by 2020.

Features:

  • Centralized Management
  • Enterprise-grade High Availability
  • Secure SD-WAN Provisioning and Monitoring
  • Security Automation
  • Enterprise-ready Integrations
  • Multi-tenancy and Administrative Domains (ADOMs)

FortiAnalyzer - FortiAnalyzer is the analytics-driven security analysis tool built with operations perspective. With action-oriented views and deep drill-down capabilities, FortiAnalyzer not only gives organizations critical insight into threats but also accurately scopes risk across the attack surface, pinpointing where immediate response is required and enables automated response actions.

Features:

  • End-to-end visibility with event correlation and threat detection
  • Advanced compliance reporting
  • Security automation
  • Enterprise-grade high availability

FortiExtender – It is critical to establish and maintain Internet connectivity for business execution. The FortiExtender appliance uses an cellular phone infrastructure along with LTE connectivity to provide broadband speed for a failover or load-balancing configuration and also provide a secondary WAN connection. FortiExtender can provide the primary Internet connection in regions, where there are no options of wired broadband.
Features:

  • CAT6 LTE protocol at 300 Mbps speed
  • Dual carrier support for a number of carrier options, including SIM switching based on pre-set usage limits
  • Powered by Power over Ethernet (PoE)
  • Offers a primary WAN link for ATMs, retail POS, and remote kiosks
  • Placement of modem can be enabled to increase signal strength

USP : Fortinet’s ICS security or SCADA solution protects ICS from advanced threats. Its appliances are highly reliable for harsh environments and compliant with Federal Information Processing Standard (FIPS) 140-2 and Common Criteria Evaluation Assurance Level (EAL) 4+. The solution is easy to deploy and manage, with tightly integrated security, networking, wireless, and admission control capabilities that can track devices and the traffic they produce.

BUYERS
VENDORS
EXPERTS
3.1
ANALYSTS
 

FORTINET detailed analysis

Product Maturity
Company Maturity
Use Case Maturity
Most IMPORTANT
0.0
0.0
0.0
Features and Functionality
3.20
2.90
2.65
Services
0.55
3.85
2.85
Pricing
0
0.00
0.90
Deployment
5.00
3.90
3.45
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

FORTINET has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Asia-Pacific

    31 Participants

  • Niche Quadrant

    All-Latin America

    24 Participants

  • Niche Quadrant

    All-Europe

    34 Participants

STRENGTHS
  • Product Maturity / Modes / Cloud
    Better cloud security
    Fortinet provides the following features for web security Reduced downtime Simple to use Centralized solution for overall security Show More
  • Product Maturity / Control systems / SCADA
    Highly reliable SCADA control system
    Fortinet SCADA is a high-level industry-grade security protection solution that is highly reliable. Since it has a longer lifecycle than most solutions, it is suitable for extreme environments. Show More
  • Product Maturity / Post Deployment / Support & Maintenance
    Great support services
    Fortinet managed security features help execute system commands with no issues. In addition to a great product, the support team is also pro-active and ensured that we got top-notch support. Show More
  • Product Maturity / Firewall / Traffic classification
    Capable of handling high traffic spikes
    Fortinet delivers solutions that are capable of handling traffic spikes from a large population, delivering close to 10Gbps of web filtering (including encrypted traffic), and becoming responsive and strategic over time. Show More
  • Company Maturity / Partner Ecosystem
    Implementation Partners
  • Company Maturity / Sector Footprint
    Energy and Utilities
  • Company Maturity / Sector Footprint
    Other Industry Verticals
  • Company Maturity / Geographic Footprint
    Channel Partners - Asia-Pacific
  • Company Maturity / Geographic Footprint
    Channel Partners - Europe
  • Company Maturity / Geographic Footprint
    Channel Partners - North America
  • Company Maturity / Geographic Footprint
    Direct Presence - Asia-Pacific
  • Company Maturity / Geographic Footprint
    Direct Presence - Europe
  • Company Maturity / Geographic Footprint
    Direct Presence - North America
  • Company Maturity / Geographic Footprint
    Sales Offices/Development Centers -Asia-Pacific
  • Company Maturity / Geographic Footprint
    Sales Offices/Development Centers -Europe
  • Company Maturity / Geographic Footprint
    Sales Offices/Development Centers -Latin America
  • Company Maturity / Geographic Footprint
    Sales Offices/Development Centers -North America
  • Product Maturity / Modes
    Cloud
  • Product Maturity / Modes
    Hybrid
  • Product Maturity / Modes
    On-premise
WEAKNESSES
  • Product Maturity / Pre Deployment / Cyber attack simulation
    Vulenrabilty to Cyber Attacks
    Industrial processes are exposed to cyber risks through a range of vulnerabilities in software and hardware technologies as well as weaknesses inherited from the legacy design of ICS networks Show More
  • Product Maturity / Use Cases / Increased productivity / impr...
    Risking Downtime
    As the output of ICS relates to physical processes, the effects of any downtime – such as a power outage can affect several organizations. Show More
  • Company Maturity / Partner Ecosystem
    System Integrators
  • Company Maturity / Partner Ecosystem
    Talent Availability
  • Company Maturity / Sector Footprint
    Manufacturing
  • Company Maturity / Sector Footprint
    Transportation and Logistics
  • Company Maturity / Geographic Footprint
    Channel Partners - Latin America
  • Company Maturity / Geographic Footprint
    Channel Partners - Middle East and Africa
  • Company Maturity / Geographic Footprint
    Direct Presence - Latin America
  • Company Maturity / Geographic Footprint
    Direct Presence - Middle East and Africa
  • Company Maturity / Geographic Footprint
    Sales Offices/Development Centers -Middle East and Africa
  • Product Maturity / Post Deployment
    Education & Training
  • Product Maturity / Post Deployment
    Incident Response
  • Product Maturity / Use Cases
    Increased productivity / improve system performance
  • Product Maturity / Pre Deployment
    Cyber attack simulation
  • Product Maturity / Pre Deployment
    Implementation
  • Product Maturity / Pre Deployment
    Regulatory compliance
  • Product Maturity / Control systems
    Remote Terminal Unit (RTU)
  • Product Maturity / Nuclear
    NRC -10 CFR - 73.54
  • Product Maturity / Oil and gas
    ISA-99 (Industrial Automation & Control Systems Security)

Have you EVER used FORTINET Products?

Share your experience with potential buyers.

TOP FEATURES
  • Development Tools
    Network traffic anomaly detection tools
  • Control systems
    SCADA
  • Firewall
    Traffic classification
  • Common standards
    General Data Protection Regulation
  • Post Deployment
    Support & Maintenance
  • Modes
    Cloud
  • Firewall
    Sandbox service
  • Energy and Power
    DoE - 21 steps for SCADA security
  • Development Tools
    Outlier analysis tools
  • Whitelisting
    File supported - .exe

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

FORTINET Presence in Industrial Control Systems Security Solutions

Questions & Answers

TOP REVIEWS

Looking for Industrial Control Systems Security Solutions? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS