PC Week : It turns out that developers of firewalls (along with developers of many other security tools, such as DLP ) are gravitating towards creating universal information security combines, focused on the maximum number of information security tasks and capable of becoming decision-making centers for information security events? How, given this trend, are the boundaries between different information security tools being built today?
A.A.: I of Fortinet. Its product portfolio includes many offerings: firewalls, web application protection screens, distributed threat defense systems, workstation protection tools, DDoS attack protection tools, and even an information security event management system.
Fortinet believes that offering all these tools separately is less effective than implementing the Fortinet Security Fabric concept it developed, which takes into account the approaches to building a business for a specific customer and the methods of implementing information security protection for them. The products offered by tunisia whatsapp data within this information security fabric interact with each other according to developed specialized technical protocols, are integrated, implementing a seamless, integral information security solution. By the way, solutions from third-party manufacturers of information security tools can be integrated into this fabric.
Niche information security solutions can only be used as individual tools to meet specific information security requirements.
PC Week : Can you give examples of cloud-based information security services that are in demand today?
A.A.: Of course. They can be divided into two groups by the method of provision. The first one is the Customers Premises Equipment model, which implies that the security tools are placed in the client’s infrastructure, and their settings and management are handled by the provider. Several companies already provide such services in Russia, including Rostelecom.