Fortinet identifies 3 steps to implement a security-driven network

(Edited Press Release)

There is a new generation of security designed for today’s complex, distributed, and dynamic environments. It starts with Security-driven Networking, an approach that tightly integrates an organization’s network infrastructure and security architecture into a single solution. Weaving security deep into the network in this way is essential for effectively defending today’s highly dynamic environments. And by deploying Security-driven Networking solutions across all of their edge environments, organizations can ensure consistent policy orchestration and enforcement across today’s highly flexible perimeters.

This enables the network to reroute traffic, replace connections, move resources from one domain to another, and dynamically scale up and out without ever compromising the ability of security systems to track workflows, transactions, users, data, or devices.

Fortinet identifies three critical steps for implementing a security-driven network:

1. Secure PDIO.

Want a new cloud infrastructure? It doesn’t just need to include security. It needs to use a security platform that can function as part of the central security fabric. The security fabric should also be built using the exact same security tools used to protect the rest of the network. And when virtual devices need to spin up or out, or when connections between a branch office and business applications in the cloud need to roll over, it needs to literally be part of that process, ensuring that security is always watching, always sharing, and always ready to respond.

2. Access control and segmentation.

When new devices are added to the network, the integrated security system needs to automatically identify them and apply rules before granting access to network resources. That includes automatically assigning devices to secured network segments that have been enhanced with authentication for increased control and flexibility. These network segments are then monitored by the security fabric to prevent unauthorized behaviors, inspect applications, and secure workflows, driving access security deep into the distributed network.

3. Consistent protection everywhere.

There is a need for a solution designed to function natively in all public and private cloud environments and comes in form factors ranging from powerful datacenter edge devices, to small desktop footprints, to virtual solutions running in cloud environments, to cloud-based solutions designed to secure devices and data off-network, to software running on endpoint devices, to versions designed to run in a container or be added to an application to secure data and transactions.