1 min read

Fortinet’s Five Tips to Minimising The Security Scourge of Policy Accumulation

imagesDespite the fact that the typical enterprise user typically employs multiple devices, exchanging information from many locations and using application data across hybrid cloud infrastructures, the network security management of most organisations still struggles to accomplish secure unified access without leaving a morass of duplicated and often contradictory policies in their wake. According to Fortinet, the escalating number and complexity of security rules and policies accumulated by organisations over time is leaving many unable to respond effectively to the changing threat landscape.

“Rules are constantly added to security devices, but seldom removed, and this complexity is spiraling out of control,” said Vishak Raman, Senior Regional Director SAARC, at Fortinet. “Administrators find it increasingly challenging to understand the security they are implementing and are under impossible time pressures to troubleshoot new problems. The risk is that security holes open up amid the chaos. The answer to complexity is not more complexity.”

Fortinet has followed up the release of its new FortiOS 5 operating system with a new white paper resource for security administrators to easily and seamlessly implement ID-based ‘smart policies’ across their wired and wireless network infrastructures. Entitled “Making Smart Policies with FortiOS 5”, the white paper shows how organisations can unify access and security policies, apply an integrated, ID based authentication and authorisation model, and benefit from simplified visibility of detailed real-time data.