VIRTUAL DESKTOP TOOLS

Fortinet is the Fastest Growing ZTNA Vendor, Customers Highlight the Benefits of Fortinet Universal ZTNA

Fortinet | August 18, 2022 | Read time : 03:37 min

Fortinet
Fortinet a global leader in broad, integrated and automated cybersecurity solutions, today announced accelerated momentum of Fortinet Universal ZTNA and its ability to provide secure access for any user anywhere, whether they are remote or in the office. In fact, according to the latest Gartner report on enterprise network equipment market share, Fortinet is among the highest five global ZTNA vendors, with the fastest growing revenue of any vendor quarter-over-quarter from 4Q21-1Q22 and year-over-year from 1Q21-1Q22.1 Fortinet attributes this growth to its differentiated approach to ZTNA that supports secure application access for any user in any location, lower total cost of ownership, more seamless transition from VPN, and integration with the Fortinet Security Fabric, including Fortinet Secure SD-WAN.

ZTNA emerges as a top solution to implement Zero Trust principles
Organizations of all sizes are adopting Zero Trust as a corporate security strategy to enable digital acceleration, support remote and hybrid work, and reduce risk. According to Gartner, “60% of organizations will embrace Zero Trust as a starting point for security by 2025. More than half will fail to realize the benefits.”2 While transitioning from implicit trust to an explicit Zero Trust model is a top strategic concern, most organizations – over 80% according to a January 2022 Zero Trust survey from Fortinet – have found it difficult to execute. ZTNA has emerged as a top technology adopted by organizations as a first step to implementing zero trust principles to the corporate network.

Secure access for any user anywhere with Fortinet Universal ZTNA
At an increasing rate, organizations seeking to reduce their risk profile by building a zero trust architecture are turning to Fortinet Universal ZTNA. Key benefits of Fortinet’s solution include:

Consistent user experience in all work locations: Unlike cloud-only ZTNA, Fortinet Universal ZTNA delivers universal enforcement and the same user experience and security policies whether employees are located in densely populated offices, working remotely from home, or on the road.
Easy transition from VPN to ZTNA: Because VPN and ZTNA are managed by the same integrated client from Fortinet FortiClient organizations can transition application access seamlessly and at their own pace.
Existing Fortinet customers can immediately access ZTNA: Customers with existing FortiGate and FortiClient investments already have what they need to start applying Fortinet Universal ZTNA, an unlicensed feature.
ZTNA integrated with SD-WAN: Fortinet is the only vendor delivering ZTNA, SD-WAN, and enterprise-grade security that is integrated by a single operating system to more effectively support secure application access and application steering. All three SD-WAN for connectivity, ZTNA for secure access, and enterprise-grade security for traffic inspection and protection can be configured, orchestrated, and managed using the same centralized console.

Powerful networking and security convergence enabled by FortiOS everywhere: With Fortinet Universal ZTNA, Fortinet continues its legacy of delivering solutions that converge networking and security across its FortiGate platform. This convergence is powered by a single operating system—FortiOS—across all FortiGate form factors, including appliances, virtual machines, container solutions, SASE, and cloud deployments, to deliver coordinated security policies and consistent user experience.

“Fortinet Universal ZTNA delivers the most complete support for work-from-anywhere by delivering a universal approach to ZTNA that is consistent on-prem, in the cloud or as a service via SASE. Because cloud-only ZTNA solutions aren’t able to adequately support in-office workers and do so at a high cost, we’re seeing an increasing adoption of Fortinet Universal ZTNA to support today’s hybrid workforce.”

John Maddison, EVP of Products and CMO at Fortinet

Customer and Partner Validation of Fortinet Universal ZTNA
Organizations around the world rely on Fortinet Universal ZTNA to improve secure access to applications. Current Fortinet customers highlight the value of Fortinet’s offering:

“We are drawn to Fortinet Universal ZTNA because it will allow us to control application access for both on-campus and remote users. Having ZTNA on-prem and in the cloud means we’re able to better ensure our hybrid workforce has access to the applications they need while keeping our network more secure and easier to manage and control with less resources. The ability to use the Fortinet gear we already have to apply ZTNA enforcement is really appealing.”
- Tal David, Networking and Security Global Manager at Sapiens

“We’re currently migrating away from our existing VPN solution to FortiClient with connections through our FortiGates. Because Fortinet delivers several security capabilities from a single agent, we will be removing multiple other security agents. And because the ZTNA agent is a part of FortiClient, we will more easily control our shift from traditional VPN to an easier to manage ZTNA with a more seamless end-user experience. Being able to implement granular control of user-to-application access at our own pace will make a big difference in our plans to reduce security risk in our network.”
- JP DiCicco, IT Infrastructure Operations Manager at RES Americas

“We were really attracted to the Security Fabric concept of the Fortinet solution and how those products all talk to each other and react in real-time based on their observance of threats. That along with the common management interface for the whole suite of products made it a really easy decision for us. Because of the integrated nature of Fortinet’s products, adding on ZTNA to further improve our security posture with granular access control is seamless.”
- Colby Cousens, IT Director at Town of Danvers, Massachusetts

Fortinet’s partners are also leveraging Fortinet Universal ZTNA to support their customers:

“Fortinet’s dedication to consistently converging networking and security via FortiGate allows us to deliver immense value to customers. Having access to next-gen firewalling, SD-WAN and ZTNA all in one location and on one operating system that’s consistent whether on-prem, in the cloud, or as a service means easier management, better user experience, and a higher security posture.”
- Marc Jabian, Cybersecurity Practice Manager at Netsync


About Fortinet
Fortinet makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the world’s largest enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey. The Fortinet Security Fabric platform delivers broad, integrated, and automated protections across the entire digital attack surface, securing critical devices, data, applications, and connections from the data center to the cloud to the home office. Ranking #1 in the most security appliances shipped worldwide, more than 580,000 customers trust Fortinet to protect their businesses. And the Fortinet NSE Training Institute, an initiative of Fortinet’s Training Advancement Agenda (TAA), provides one of the largest and broadest training programs in the industry to make cyber training and new career opportunities available to everyone.

Spotlight

Flexible provisioning of backup services to provide more granular protection of mission-critical applications With vSphere Data Protection Advanced, we get Disaster Recovery (DR) with an easy to use and reliable tool.vSphere Data Protection Advanced is easy to deploy and manage. It has added more value to our smaller customers to have a simple and e¬cient solution.


Other News
VIRTUAL DESKTOP TOOLS

UNICOM Engineering Announces Liquid and Immersion Cooling Portfolio for High-Density Computing

UNICOM Engineering, Inc. | August 23, 2022

UNICOM Engineering, a leading strategic system integration partner providing application platforms, deployment solutions, and lifecycle support services for software technology developers, data center infrastructure, and OEMs worldwide, has launched a new portfolio of immersion-ready servers for both single and two-phase immersion cooling. These servers were designed to expand the boundaries of today’s data centers by addressing the compute, density, and storage requirements of current and future workloads. "Customers are quickly adopting this advanced technology," said Austin Hipes, Chief Technologist and VP of Engineering at UNICOM Engineering. “As data centers try to reduce their carbon footprint, the drive to develop new cooling technologies is imperative. As a result, liquid and immersion cooling are increasingly seen as essential technologies for the efficient and sustainable operations of high-performance workloads, in any location.” UNICOM Engineering’s latest product portfolio offers immersion-ready servers that are density optimized for compute-at-scale with full warranty and field service, all from a trusted partner. UNICOM Engineering builds on the success of our previous platform families while utilizing familiar and trusted technology from leading Tier-1 providers like Intel and Dell Technologies. “Working hand-in-hand with these core partners, UNICOM Engineering offers Direct to Chip Liquid Cooling solutions and fully validated and supported immersion-ready platforms to meet high-density, dynamic business requirements and data center standardization initiatives,” says Hipes. These 1U and 2U systems support a variety of configurations to address specific compute, storage, and accelerator functionality. The systems are also designed to address workloads from High-Performance Computing (HPC), High-Performance Data Analytics (HPDA), and High-Frequency Trading (HFT) to traditional corporate IT, virtual desktop infrastructure, and even AI and Machine learning. As a design and integration specialist, UNICOM Engineering offers comprehensive services that can provide everything from direct to chip liquid cooling solutions to immersion conversion and completely custom-designed server solutions optimized for density in an immersion environment. Additionally, as a strategic system integration partner, they offer the regulatory compliance, logistics, installation services, and global support that immersion solutions require. UNICOM Engineering provides comprehensive validation and optimization services to ensure smooth technology transitions. Field application engineers work with customers to ensure they understand how to take full advantage of Liquid and Immersion Cooling and its feature-rich values. For evaluation unit availability and platform specifications, please contact UNICOM Engineering Sales. About UNICOM Engineering UNICOM Engineering is a leading provider of purpose-built application platforms, appliances, and life cycle deployment services for software developers and OEMs serving storage, security, communications, video, and healthcare IT markets worldwide. We are best known for our solution design technologies, integration expertise, and unique deployment capabilities. All of our turnkey platforms and appliances are designed for longevity and backed by life cycle management services. We create products and business solutions that solve deployment challenges, accelerate time to market, reduce ownership costs, and increase business efficiencies.

Read More

VIRTUAL DESKTOP TOOLS

HUMAN Names Climb Channel Solutions as Preferred Distributor

Climb Channel Solutions | July 27, 2022

Climb Channel Solutions, an international specialty technology distributor and wholly-owned subsidiary of Wayside Technology Group, Inc. (NASDAQ: WSTG) was named preferred distributor with HUMAN’s enterprise defense platform enabling resellers to round out their security stack. “With a full suite of products focused on defending customer data and exposure to fraudulent activity Climb Channel Solutions is proud to be named HUMAN’s preferred distributor, The IT channel will soon be leaning on HUMAN’s products and solutions to help detect fraud within security, inventory, account management, and even marketing.” Dale Foster, CEO at Climb Recent reports have indicated that 77% of all digital attacks are bot-based, and bots and cybercriminals become increasingly sophisticated year after year. Today, HUMAN verifies the humanity of more than 15 trillion digital interactions per week, offering enterprises a platform with unmatched visibility into fraudulent activity across the internet. HUMAN achieves this scale with a suite of products to protect the complete digital customer journey: BotGuard for Applications, BotGuard for Growth Marketing, MediaGuard, and Bot Insights Services. As new partners and enterprises leverage the HUMAN Defense Platform, they benefit collectively from HUMAN’s Modern Defense Strategy, which is built on best-in-class visibility and network effect powered by collective protection and disruptions. “We are thrilled to add Climb Channel Solutions as our preferred distribution partner for North America as we continue to build HUMAN’s channel ecosystem,” said HUMAN Vice President of Channel Sales Ron Wagner. “Climb’s expertise as a value-added distributor along with their focus on emerging and disruptive technology makes them an ideal partner. We look forward to working with Climb and their vast network of resellers to realize HUMAN’s mission of safeguarding the integrity of the internet from bot attacks and fraud to keep digital experiences human.” About HUMAN HUMAN is a cybersecurity company that safeguards enterprises and internet platforms from sophisticated bot attacks and fraud to keep digital experiences human. Our modern defense strategy is enabled by internet visibility, network effect powered by collective protection, and disruptions, enabling enterprises to increase ROI and trust while decreasing customer friction, data contamination, and cybersecurity exposure. Today we verify the humanity of more than 15 trillion interactions per week for some of the largest companies and internet platforms. Protect your digital business with HUMAN.

Read More

VIRTUAL DESKTOP TOOLS

VMware and Award-Winning Cyber Security Leader guardDog.ai Announce Partnership for Virtual Implementations at 2022 VMware Explore

guardDog | August 10, 2022

Guard Dog Solutions, Inc., dba guardDog.ai, and VMware are now partnered. guardDog.ai is launching the VMware implementation of its Fido 3 technology at the 2022 VMware Explore event at the Moscone Center in San Francisco Aug. 29 – Sept. 1, in booth 1914. As the award-winning leader in real-time cyber security protection for business and consumers, guardDog.ai is using VMware’s Tanzu containerization technology to support hardware-free and entirely remote deployment and management of cyber security protection for any size MSSP or organization. guardDog’s subscription-based Fido technology uses patent-pending artificial intelligence from the company’s cloud-based Autonomous Incident Response (AiR) database to pre-emptively recognize all devices connected to a network (including most especially the IoT and smart device connections device management solutions can’t see). The solution exposes and shuts down most cybersecurity threats before exploits can happen, protecting users and organizations from threats such as ransomware, man-in-the-middle attacks, denial of service, and emerging novel threats, protecting networks and the devices attached to them. “Full virtualization has been on our product roadmap from the date of our inception, I have had the opportunity to partner with VMware through multiple organizations I have founded and led, and am particularly compelled by the power of the containerization architecture exemplified in VMware Tanzu. We are extremely pleased to provide what we believe is one of the most exemplary use cases for Tanzu implementation, and we look forward to using this technology to protect users and networks and to move the needle on the war against cybersecurity for many seasons to come.” Peter Bookman, CEO and founder of guardDog.ai “The implementation of guardDog.ai Fido 3 as a containerized appliance is a game changer, creating opportunities for anyone who wants to keep bad actors out of their systems,” says Industry veteran CIO Steve O'Donnell. “A wide variety of industry colleagues and I have had the opportunity to test Fido pre-launch and can report that it operates as advertised, it is fully automated, simple to implement and provides effective protection that can be deployed anywhere.” With the VMware implementation of guardDog.ai’s Fido technology, MSSPs and IT departments can now replace the Fido hardware plugins with entirely virtual and remotely manageable implementations. This provides exceptional economy and ability to deploy and manage guardDog’s protection remotely, from a single location, for any size of organization or IT customer base. guardDog.ai uses AI-driven overlay technology in Fido to find and protect users and networks from attempted cyberattacks in less than two milliseconds, by identifying the threats that device and network management solutions can’t see and proactively halting potential exploits before they begin. In both wired and Wi-Fi networks, Fido protects network and the device users from the threats across the entire Attack Surface, and most especially within the edge territory outside the perimeter of the network or on attached devices that other solutions cannot see. These include the myriad of IoT (Internet of Things) devices such as specialized health monitoring equipment, printers, doorbells, thermostats, smart refrigerators, smart pens, smart TVs, and game systems that are inherently vulnerable to the networks they join. Thanks to the VMware partnership and implimentation, the ability to obtain and deploy virtualized Fido technology also eliminates the supply chain issues of availability delays, while allowing for instant and continual updates to the AiR database of known threats and suspicious network behavior. For all implementations, the virtualized alternatives for guardDog’s Fido v3 technology is making it possible to cover all areas of the potential Attack Surface with far greater economy and ease than before. About guardDog.ai Guard Dog Solutions Inc., headquartered in Salt Lake City, Utah, guardDog.ai has developed a cloud-based Autonomous Incident Response (AiR) cyber security software service that works together with a companion Fido unit to simplify network security. The solution provides protection and visibility as it exposes invisible threats on networks and the devices attached to them, with patented technology to address and prevent cybersecurity threats before they compromise network environments. Every business, government, healthcare institution, home consumer, or other organization, is grappling to find security solutions that are adapting to this changing world. guardDog.ai is pioneering new innovations designed to meet these challenges.

Read More

VIRTUAL DESKTOP TOOLS

Verge.io and Dallas Digital Offer Alternative Enterprise Virtualization Solutions

Verge.io | September 14, 2022

Verge.io, the company with a simpler way to virtualize data centers, and Dallas Digital Services, an IT solutions provider for enterprises and government agencies, today announced an agreement to offer Verge.io’s virtual cloud software stack as a simple, cost-effective alternative to build, deploy and manage virtual data centers. With Verge-OS software, Dallas Digital enables virtualized data centers for its clients with greater savings and efficiencies. Verge-OS abstracts compute, network, and storage from commodity servers and creates pools of raw resources that are simple to run and manage, creating feature-rich infrastructures for environments and workloads like clustered HPC, ultra-converged and hyperconverged data centers, DevOps and Test/Dev, compliant medical and healthcare, remote and edge compute including VDI, and multi-tenant private clouds. “Legacy virtualization platforms require many different SKUs, with complex pricing schemes and significant API integration to build out a virtualized data center, especially at scale,” said Howie Evans Vice President Dallas Digital. “We are pleased to be able to offer Verge-OS as a way to deliver a virtual data center experience but in a secure, hardware-efficient system that can scale compute, memory, and storage resources as needed.” “Recent M&A activity is causing enterprises to look for alternatives to legacy systems, and partnerships with solution providers like Dallas Digital are an ideal way to bring these customers a modernized virtualization platform for the way organizations work today, Verge-OS is not only simpler to configure and run, it’s simpler to buy, and simpler for Dallas Digital to support.” Yan Ness, CEO at Verge.io Verge-OS is an ultra-thin software—less than 300,000 lines of code—that is easy to install and scale on low-cost commodity hardware and self-manages based on AI/ML. A single license replaces separate hypervisor, networking, storage, data protection, and management tools to simplify operations and downsize complex technology stacks. Secure virtual data centers based on Verge-OS include all enterprise data services like global deduplication, disaster recovery, continuous data protection, snapshots, long-distance synch, and auto-failover. They are ideal for creating honeypots, sandboxes, cyber ranges, air-gapped computing, and secure compliance enclaves to meet regulations such as HIPAA, CUI, SOX, NIST, and PCI. Nested multi-tenancy gives service providers, departmental enterprises, and campuses the ability to assign resources and services to groups and sub-groups. About Dallas Digital Services Founded in 1996, Dallas Digital Services began as an on-site service provider for enterprise companies and has developed into a highly recognized solution provider for mission critical and high availability solutions. It is a relationship-driven IT solutions provider, offering best-of-breed technology and services for enterprise organizations as well as public-sector entities. It offers strategic services, technical expertise, and sales support to enable clients to maximize the value of their data center investments. Based on each customer's unique objectives and IT environment, Dallas Digital can assess, architect, implement, and manage solutions that improve current technology performance.

Read More

Spotlight

Flexible provisioning of backup services to provide more granular protection of mission-critical applications With vSphere Data Protection Advanced, we get Disaster Recovery (DR) with an easy to use and reliable tool.vSphere Data Protection Advanced is easy to deploy and manage. It has added more value to our smaller customers to have a simple and e¬cient solution.

Resources