Cloud Security Authors: Yeshim Deniz, Zakia Bouachraoui, Liz McMillan, Elizabeth White, Ravi Rajamiyer

Related Topics: Cloud Security

News Feed Item

Fortinet Offers Cure for First Medical Management Hospital's Network Security and Management Pains

Integrated Security Appliances Protect Hospital's Distributed Network

SUNNYVALE, CA -- (Marketwire) -- 07/21/09 -- Fortinet® -- market-leading network security provider and worldwide leader of unified threat management (UTM) solutions -- today announced that First Medical Management/Pacific Hospital of Long Beach has engaged with Fortinet to help secure its core and distributed network with the Fortinet family of multi-threat security appliances including FortiGate® for network protection and FortiClient(TM) for endpoint security. In addition, Fortinet's management solution, FortiManager(TM), has been deployed to easily and remotely make network security changes and to manage all appliances no matter where they are located.

First Medical Management selected Fortinet's multi-threat security appliances over other UTM solutions due to the products' enterprise capabilities. These features include the ability to create role-based policies for employees, easy management of distributed networks of more than 1,000 users, end point and core security managed from the same platform and, with the release of Fortinet's new operating system FortiOS(TM) 4.0, the ability to have data loss protection (DLP) at no additional cost.

"Our initial Fortinet deployment was in 2005 and since then we have added FortiClient and upgraded to FortiOS 4.0 to take advantage of all the newly added features. We continue to be impressed with the enterprise-level security features that the product line offers without network degradation," said Donald Newton, security engineer at First Medical Management Pacific Inc. "You can't go wrong with Fortinet. It just keeps getting better."

One key enterprise capability essential for successful operation of First Medical Management's network is Fortinet Server Authentication Extension (FSAE) in combination with Microsoft Active Directory. This feature allows First Medical Management's IT team to create four distinct user profiles based on the needs of employees: 1) no Internet 2) restricted Internet 3) basic Internet and 4) executive Internet. Prior to the Fortinet deployment, all employees were allowed the same level of access and did not give First Medical Management enough flexibility in managing its network traffic.

In addition to FSAE, First Medical Management has also benefited from Fortinet's newly announced FortiOS 4.0 upgrade. This new operating system helps First Medical's IT team meet compliance regulations, such as HIPAA, that prohibit hospital data from being distributed illegally outside the network via instant messaging protocols. The new data loss prevention functionality within FortiOS 4.0 enables the company to provide an extra level of data protection without having to deploy a new solution.

Deployment Scenario

Two FortiGate-1000A appliances are located at the hospital's main site in Long Beach, Calif. and are being used for network address translation (NAT). Acting as the gateway for remote site-to-site IPSec VPN and for all Internet access, the FortiGate-1000A appliances act as the access point through which all Internet entries and exits must pass through.

Located at the data center in Irvine, Calif., another FortiGate-1000A is being used for back-up and, because it has its own bandwidth allotment, the appliance is being used for remote users to VPN into the network.

At smaller sites, such as clinics and for vice presidents and directors working remotely, First Medical Management has deployed FortiGate-60 appliances, which are ideal for remote/branch office deployments. Fifteen additional FortiGate-60 appliances are also deployed at a hospital in San Diego for IPSec VPN, routing and Web content filtering.

Two years after its initial FortiGate installation, First Medical Management has augmented its Fortinet deployment with 1,000 FortiClient end-point security solutions which are installed on the laptops of those who always work remotely and those who sometimes need to work remotely. The FortiClients are being used mainly for SSL VPN connectivity to the main network and are also being used as the security protection for Cisco IP phones.

To manage all its remote appliances, First Medical Management has deployed a FortiManager-800 central management system at its headquarters. FortiManager minimizes the administrative effort required to deploy, configure, monitor and maintain the full range of network protection services provided by Fortinet products.

Fortinet's FortiGate systems are ASIC-accelerated security appliances that integrate essential network and security services such as antivirus, firewall, VPN, intrusion prevention, Web filtering, anti-spam, application control, data leakage protection, SSL inspection and WAN acceleration. All FortiGate systems are kept up to date automatically by Fortinet's FortiGuard® Network, which helps ensure protection against the most damaging, content-based threats from email and Web traffic such as viruses, worms, intrusions, other unwanted network traffic and more.

About First Medical Management (www.phlb.org)

Pacific Hospital of Long Beach is a full-service, for-profit, teaching hospital with 184 licensed acute care beds. We are fully accredited and have all the innovative technology that is expected of a medical center but with an important difference.

Our environment is small enough to assure patients of calm, homelike surroundings while providing a capable, professional staff. The result is a perfect blend of sensitivity and technology.

About Fortinet (www.fortinet.com)

Fortinet is the pioneer and leading provider of ASIC-accelerated unified threat management, or UTM, security systems, which are used by enterprises and service providers to increase their security while reducing total operating costs. Fortinet solutions were built from the ground up to integrate multiple levels of security protection -- including firewall, antivirus, intrusion prevention, VPN, spyware prevention and anti-spam -- designed to help customers protect against network and content level threats. Leveraging a custom ASIC and unified interface, Fortinet solutions offer advanced security functionality that scales from remote office to chassis-based solutions with integrated management and reporting. Fortinet solutions have won multiple awards around the world and are the only security products that are certified in six programs by ICSA Labs: Firewall, Antivirus, IPSec, SSL, Network IPS and Anti-Spam. Fortinet is privately held and based in Sunnyvale, California.

Copyright © 2009 Fortinet, Inc. All rights reserved. The symbols ® and (TM) denote respectively federally registered trademarks and unregistered trademarks of Fortinet, Inc., its subsidiaries and affiliates. Fortinet's trademarks include, but are not limited to, the following: Fortinet, FortiGate, FortiGuard, FortiManager, FortiMail, FortiClient, FortiCare, FortiAnalyzer, FortiReporter, FortiOS, FortiASIC, FortiWiFi, FortiSwitch, FortiVoIP, FortiBIOS, FortiLog, FortiResponse, FortiCarrier, FortiScan, FortiDB and FortiWeb. Other trademarks belong to their respective owners. Fortinet has not independently verified statements or certifications herein attributed to third parties.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Media Contacts:
Maeve Naughton
Fortinet, Inc.
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...