What is the Fortinet Fabric and why is it a blanket approach to security?



“Happiness is a warm blanket, Charlie Brown” according to Linus in the Peanuts® cartoon referring to his blue security blanket. But in the case of cybersecurity, a more apt quote would be “security is a Fortinet fabric”.

Enterprise computing environments are complex and attempting to keep them secure only adds to that complexity.

This is especially true in IT security environments comprising of a myriad of diverse products from a range of vendors—each using different technologies while focusing on only one specific aspect of the security picture. Pulling all those moving components together to ensure comprehensive coverage is tough. With so many isolated silos of security, it’s nigh impossible to see the wood for the trees.

That status quo is exactly what Fortinet's security fabric is challenging. It takes away the complexity in these environments by breaking down silos and enabling interactions between different cybersecurity functions and technology

What does it do?

The Fortinet security fabric ensures comprehensive network protection through information sharing and collaborative intelligence, visibility into data movement through security zones, and a centrally managed security policy enforced across the company's internal and external (cloud-based) networks.

Fortinet applies four principles to make sure the security fabric (like lycra) stretches across the entire network:

1. The security fabric offers breadth and depth and extends in both directions. It spans the network from internal endpoints to the cloud; it handles high volumes of traffic and high numbers of connected devices.

2. The fabric is able to track the movement of data inside the network perimeter. It's able to inspect encrypted traffic, enhancing the ability to protect from advanced threats.

3. Devices can share threat information, meaning threats can be detected and managed sooner.

4. Cloud-based Big Data systems collect and share threat intelligence in real-time. Every device connected to the fabric receives the information and can incorporate it into its defensive strategies.

What does the Fortinet Security Fabric solution include?

Network Security. As increasingly sophisticated cyberattacks pound the corporate network perimeter, Fortinet high-performance firewalls provide consolidated advanced security and deep visibility that protects the network from known and unknown threats.

Multi-Cloud Security. The majority of organisations have multiple cloud deployments, which makes consolidated security prevention and detection difficult. Fortinet’s integrated virtual and physical cloud solutions protect all your dynamic cloud environments and SaaS applications.

Web Application Security. Unprotected web applications are easy entry points for hackers to exploit. The FortiWebweb application firewall uses the latest intelligence to protect web applications from sophisticated attacks.

Email Security. Email was the top entry point for ransomware in 2017. The FortiMailsecure email gateway inspects incoming and outgoing email, blocks malicious messages, and prevents sensitive information from being leaked.

Advanced Threat Protection. Companies combating security threats on all fronts need world-class threat intelligence updates automatically delivered to their security solutions. FortiGuard Threat Intelligence shares information about newly discovered exploits. Fortinet sandboxing solutions isolate and inspect any suspicious files detected by security tools.

Secure Unified Access. Securing your business communications, personally identifiable information (PII), and mobile devices require much more than access control because typical Wi-Fi solutions only address connectivity and access security. Fortinet’s secure access solutions do both, delivering comprehensive security and application control for secure Wi-Fi.

Endpoint Security. Endpoint devices connected to the network are common entry points for threats. But endpoint solutions often don’t share threat intelligence with the rest of the network, which slows down threat response. By integrating into the Security Fabric, FortiClientadds another layer of automated security for better overall network protection.

Management and Analytics. Seeing and understanding threats and events throughout the network is a big challenge for enterprises with disparate security products. Fortinet solutions for logging and reportingSIEM, and centralised security management pull data from your Fortinet and Fabric-Ready security products, giving you the visibility to efficiently manage security processes and automate responses.

Why choose a fabric approach?

With the number and virulence of threats growing and the complexity of security architectures increasing, the Fortinet approach to security operations offers a compelling alternative to point and platform solutions that require cybersecurity staff who are trained and well-versed on multiple products and solution components. It alleviates the urgent need to hire additional IT security specialists while enabling existing cybersecurity staff to scale in their support in a simplified, unified manner. The ability to self-discover network-attached elements creates a dynamic centralised management database (CMDB).

The Security Fabric seamlessly enables strong security from endpoint devices to the access layer for wired and wireless networks. It scales from the smallest branch deployments to the largest, most complex and data-intensive campus and data centre environments, plus virtual protection for private, hybrid, and public clouds. This kind of power lets enterprises stay ahead of rapidly growing bandwidth requirements by preventing security from impacting network performance. 

CloudCoCo and Fortinet

CloudCoCo partners with Fortinet to bring the latest security technology— including the security fabric—to our clients.

When you partner with us, you get the top-tier tools of Fortinet, plus our extensive experience deploying best of breed solutions to clients' security problems.

Contact us to learn how we can help you unify disparate cybersecurity technologies in your environment on the Fortinet security fabric.

To view our full Cyber Security offering please visit our dedicated website section.

CloudCoCo can also offer your organization a completely free no-obligation Security Assessment workshop. Please contact us if you’d like to find out more.


Author Profile Photo


5 reasons to choose Microsoft Azure over Amazon Web Services

Author Profile Photo

March 08, 2020

When it comes to providing customers with cloud services, Amazon Web Services (AWS) and Microsoft Azure lead the pack—ranked as first and second respectively by Gartner in their list of infrastructure-as-a-service (IaaS) providers.


Common Microsoft 365 migration issues to avoid

Monitored by CloudCoCo’s own Secured Portal

More Common Microsoft 365 migration issues to avoid