Fiduasia - The Source of Information Technology

Our Services  >  Network Security

  • Our Company

Fiduasia partner with Fortinet – the worldwide provider of network security appliances and market leader in unified threat management.

With the increase in possible threats to your company’s network, it is becoming more important to keep those threats outside and keep critical company data inside the network. This is where Fortinet’s ‘Fortigate’ firewall solutions can be deployed; to control the traffic going into your network, ensuring it is kept secure.

Fortinet has recently won a number of awards including Business Solutions Magazines “2012 Best Channel Vendor” in the security category and the Info-Tech “Champion” award and “Best Overall Value” award for Next Generation Firewall.

FortiGate Network Security Platform

This platform delivers high performance and protection, while simplifying your network at the most affordable prices. There are a range of models available to suit the requirements of small businesses, right through to large enterprises.

Why Choose the Fortigate Security Platform?

  • Firewall, VPN, and Traffic Shaping
  • Intrusion Prevention System (IPS)
  • Antivirus/Antispyware/Antimalware
  • Integrated Wireless Controller
  • Application Control
  • Data Loss Prevention (DLP)
  • Vulnerability Management
  • IPv6 Support
  • Web Filtering
  • Antispam
  • VoIP Support
  • Layer 2/3 Routing
  • WAN Optimization & Web Caching

Why Fiduasia?

We will advise on the most suitable firewall solution for your business and provide these to you with discounted prices.

Our dedicated technical engineers will configure the firewall to your network and provide ongoing monitoring, management and support including:

  • Monitoring whether traffic has been blocked by the firewall
  • Creating new firewall rules
  • Adding new virtual IP mapping & static routes
  • Creating SSL VPN groups & portals
  • Producing IPsec VPN tunnels
  • Creating new firewall object addresses
  • Establishing new traffic shaping rules & profiles
  • Patching firmware
  • Creating new Unified Threat Management profiles including AV, Web Filter, Application Control, Intrusion Protection, Email Filters, Data Leak Prevention, Endpoint Controls & Vulnerability Scans
  • Creating Wi-Fi SSIDs