ShieldX and Fortinet
Over the past year, cyber-attacks have increased by 600%, thanks to malicious actors who take advantage of gaps in the enterprise security posture caused by remote work environments. While enterprise tries to support the need for speed and agility in such remote conditions, it creates vulnerable systems that increase the risk of lateral threat movement which, in turn, leads to attacks such as ransomware, data loss, and service disruption.
ShieldX and Fortinet
ShieldX and Fortinet together elevate security coverage to address the convergence of OT, campus, and multi-cloud data center segmentation and lateral movement prevention with an integrated solution. ShieldX extends perimeter security and campus segmentation with east-west lateral movement prevention. Along with Fortinet, ShieldX enables customers to get an end-to-end view of end-users, workstations, and OT devices from the individual endpoint to the data center by delivering:
- Auto-generation of security policies for proper segmentation
- Application context and quantification of the risk of all assets communicating with these applications
- Identification of attack propagation, addressing the controls required to protect the end-to-end flow.
- Faster response times with the help of additional threat intelligence and alerts from Fortinet solutions – generated from analyzing traffic flowing east-west in the data center – thereby preventing attacks from becoming breaches.
Businesses are creating more applications with greater agility and are under constant attack while NOC and SOC teams’ attentions are fractured with the demands of the day. ShieldX complements Fortinet’s network security while extending customer visibility and control—a crucial component to protecting data and applications across all environments.
ShieldX simplifies day-to-day management and enforcement of security posture via:
- Patented microservices architecture that allows the platform to elastically scale security while recording all changes in a report to ensure compliance.
- Unsupervised machine learning that affects grouping of systems and generates (security) policies based on risk score associated with vulnerabilities of the application structure
- “Virtual patching”, in other words, auto-prevention of exploits from attacking the vulnerabilities through deep packet inspection combined with automated creation and deployment of security policies
- Continuous Integration / Continuous Delivery pipeline integration to strengthen DevOps application development
- Kill chain view of attack propagation in relation to application tiers and their members