Fortinet FortiDB-1000D
Database Security and Compliance
מחירים נוספים מופיעים למטה, או לחצו כאן!
שימו לב: כל המחירים באתר כוללים מע"מ, לפי המחירון המומלץ של Fortinet לאזור EMEA. החיוב יבוצע על פי שער "העברות והמחאות מכירה" של המטבע (דולר אמריקאי) ביום אישור ההזמנה.
Overview:
Automated Security and Compliance
The FortiDB family of appliances and software delivers a complete Database and Application security product line. It delivers centrally-managed security, audit policy compliance and vulnerability management (VM) for databases and applications across your extended enterprise. FortiDB enables you to meet the challenges of increasing access to your business-critical data in ERP, CRM, or SCM systems while decreasing the threat of data breach. Its sophisticated database activity monitoring (DAM), audit and advanced reporting automatically documents your policy compliance with internal policies as well as government or industry regulations such as PCI-DSS, SOX, Basel II, GLBA, and HIPAA.
Discovery and Vulnerability Management
Database and sensitive data discovery, vulnerability management
Database Activity Monitoring and Audit
Both for privileged users and application users
Policy-based Intrusion Protection
Flexible framework to stop malicious transactions
User Access Management
Privilege summary and change monitoring
Database Risk Management and Compliance
For risk mitigation and compliance
Comprehensive Security and Compliance
- Identifies and reports on confidential data access; aids in PCI-DSS, SOX and other regulations
- Periodic scan of every database in your network
- Built-in policies for database transactions and regulations such as SOX, PCI
- Policy-based Intrusion Protection
- Flexible deployment and centralized web-based management
- Flexible audit data collection methods
- native auditing, network sniffer or lightweight agents
- Independent and secure audit storage
- Comprehensive audit/compliance reports
- Tight integration with ArcSight SIEM
Features & Benefits:
Comprehensive Monitoring and Protection
FortiDB enforces acceptable use policies and alerts on database security threats. It continuously monitors all access to personally identifiable data (PID), financial data and other sensitive data types residing in your databases. Additionally, there is an option to block suspicious transactions, utilizing the same policies which were configured for alerting. FortiDB’s full-featured monitoring and auditing technology manages critical policy issues such as change control, internal controls, privileged user monitoring, and privacy protection as well. Its change control features keep track of all changes related to database structures and users. The user privilege change monitoring function provides data for user access management and integration.
Granular Discovery and Vulnerably Management
FortiDB provides Database and Sensitive Data Discovery functions. The Vulnerability Management function automatically detects new security weaknesses, policy noncompliance. FortiDB appliances and software ship with hundreds of preconfigured policies that address industry and governmental requirements, as well as security best practices. They include a comprehensive set of standards-based reports that provide specific, actionable information. The FortiGuard Global Threat Research Team provides dynamic policy and signature updates. This industry-leading research and remediation advice enables you to strengthen the integrity and security of your databases quickly and effectively.
Accelerate Deployment and Lower Costs
Flexible data collection methods ensure easy deployments even in complex environments. Native audit provides completeness and accuracy of audit data for both host based and remote connections. There is an agent based and a sniffer based option for audit data collection which does not require the native audit to be turned on.
The other area which can significantly decrease the complexity of the deployments is the ease of configuration. Besides the hundreds of predefined policies, there is an automatic policy generation function in FortiDB which streamlines the entire configuration process. Ultimately the two factors described above translate into quick deployments and lower costs.
FortiDB Deployment Options
Network Sniffer
- No impact on the server
- Zero network latency
- Transparent to infrastructure
Native Audit
- Selective audit, only 3–4% performance impact
- Does not require agents
- Captures 100% of events
Network Agents
- 2–3% performance impact on the server (not the DB)
- Agents send information back to FortiDB appliances
Highlights
Best-In-Class Discovery and Assessment
- Data and Database Discovery
Besides the basic database discovery, FortiDB can also discover sensitive data such as credit card numbers, Social Security numbers etc. The results can be used for configuring policies to monitor sensitive data access. - Vulnerability Management
Out-of-the-box policies facilitate immediate results. The policies are updated by FortiGuard, and can also be customized. They contain mappings to PCI, CIS and CVE numbers. Remediation advice provides an easy way to manage vulnerabilities. - Privilege Review
The results of the privilege review can be used to establish a more secure role and access right setting in the database. - Profiling
This function creates a user behavior model at the database level, at the individual user or table level. The results can be used to configure policies more accurately to identify suspicious access patterns.
Streamlined Policy/Control Configuration
- Automated Policy Generation
FortiDB can generate User, Session or Table access policies based on transactional data collected over a period of time. These policies then can be applied across multiple databases through the enterprise. - Out-of-the-box DDL, DCL, SOX, PCI Policies
Most policies such as Data Definition Language (DDL), Data Control Language (DCL) and Compliance (SOX, PCI) are out-of-the-box in FortiDB. This facilitates quick configuration and deployment. - Privileged User Monitoring Policies
For privileged user monitoring/audit, there is a quick setup process where the available usernames will be presented directly from the database. Alternatively, the automated policy generation function can be used. - Sensitive Data Access Monitoring
Similar to the privileged user monitoring, tables and columns for monitoring can also be selected directly from the database. It is also recommended to run the sensitive data discovery, so the results can be turned into policies for data access. Alternatively, the automated policy generation function can be used. - Activity Audit Policies
Besides the security focused alert policies, audit policies can also be defined in FortiDB, with the main purpose of auditing specific users or objects
Flexible Monitoring/Audit and Protection Capabilities
- Privileged User and Application User Monitoring
FortiDB can monitor privileged and application users. Both users can be specified during the configuration process. In some cases, a short research is recommended to identify the specific attributes of the two user types. - Configurable Real-time Alerts/Full Event Details
Real-time alerts contain all the attributes which can uniquely identify transactions/users. - Separation of Duties
There is a built-in role-based access management system in FortiDB. It is augmented by an asset-based model, where FortiDB users can be associated with certain groups of databases. - Policy-based Intrusion Prevention
FortiDB can be configured to block suspicious transactions, utilizing the same policies which were created for alerting. - User Access Management and Integration
Access levels in the database can be monitored for changes utilizing the predefined DCL alert policy group. Based on the results, access levels and roles can be adjusted. This information can also be sent to other access management systems for integration.
Reporting and Compliance Automation
- Automated Compliance Reports/Integrated Compliance Frameworks
In addition to the predefined compliance policies, FortiDB also provides the corresponding predefined compliance reports for SOX and PCI. This makes the configuration process quick and efficient. - Reports with Detailed Drilldowns
Reports contain detailed information for more detailed analysis. - Predefined and Custom Reports
There are multiple predefined reports for Vulnerability Management, Database Activity Monitoring and Compliance. Additionally, there are custom reports to meet specific reporting requirements. - Integration with SIEM
FortiDB supports SYSLOG format which is common for SEIM tools. Additionally, there is a specific integration package for ArcSight.
Flexible Deployment Options
- Appliance and Software
FortiDB can be deployed as an appliance or as software. This makes the deployment process easier, especially in larger enterprises and virtualized environments. - Multiple Data Collection Methods
All mainstream data collection methods are supported in FortiDB. Different data collection methods can be used for different databases on the same appliance or on the same software/VM instance.
Top Image - Activity Profiling FortiDB automatically generates user activity baselines for easy policy configuration; Bottom Image - Dashboard the FortiDB dashboard displays essential Vulnerability Assessment and Database Activity Monitoring/Audit information.
Top Image - Alert summary high level overview of alerts and trends; Bottom Image - Alerts Analysis Detailed trend analysis allows users to improve their internal control infrastructure
FortiDB Software
Fortinet also gives you the ability to deploy FortiDB database security software on a range of software platforms. You can install FortiDB on Red Hat Linux, AIX, Solaris 10, Windows XP/Vista, Windows Server 2003, as well as virtualized environments. FortiDB software delivers the same centralized policy management for vulnerability management and database activity monitoring as FortiDB appliances.
Complete Security Solution
FortiDB is part of Fortinet’s comprehensive portfolio of security gateways and complementary products that deliver a powerful blend of integrated multi-threat protection, ASIC-accelerated performance, and constantly updated, in-depth threat intelligence.
This unique combination delivers the highest level of network, content, and application security for organizations of all sizes, including managed service providers and telecommunications carriers. Fortinet’s integrated approach improves your security posture while reducing your total cost of ownership and providing you with a flexible, scalable path for expansion.
The Fortinet portfolio includes:
- FortiGate® Network Security
- FortiAnalyzer™ Centralized Reporting
- FortiMail™ Messaging Security
- FortiManager™ Centralized Management
- FortiClient™ Endpoint Security
- FortiWeb™ Web Application Security
- FortiScan™ Vulnerability Management
Specifications:
FortiDB Models | FortiDB-400C | FortiDB-1000D | FortiDB-3000D |
---|---|---|---|
Hardware Specifications | |||
Security Hardened Platform | Yes | Yes | Yes |
Number of Licensed Database Instances | 10 | 30 | 90 |
Total Interfaces | 4x GbE | 6x GE RJ45, 2x SFP | 4x GbE, 2x GbE SFP |
Number of Hard Drives | 1 | 2x 2 TB | 2 |
Total Hard Drive Capacity | 1 TB | 4 TB Raw, 2 TB RAID1 | 4 TB (2x 2 TB) |
Storage Key (Boot Image) | 2 GB Onboard Flash | 2 GB | 2 GB |
Redundant Hot Swappable Power Supplies | No | Yes | Yes |
Hardware Form Factor | Rack Mount (1-RU) | Rack Mount (2-RU) | Rack Mount (2-RU) |
Dimensions | |||
Height | 1.7 in (4.4 cm) | 3.5 in (8.8 cm) | 3.4 in (8.7 cm) |
Width | 17.1 in (43.5 cm) | 17.2 in (43.8cm) | 20 in ( 48.2 cm) |
Length | 14.3 in (36.4 cm) | 14.5 in (36.8 cm) | 29.7 in (75.5 cm) |
Weight | 14.2 lbs (6.4 kg) | 27.6 lbs (12.5 kg) | 71.5 lbs (32.5 kg) |
Environmental | |||
AC Power Required | 100–240 VAC, 50–60 Hz, 4.0 Amp (Max) | 100–240 VAC, 50–60 Hz | 100–240 VAC, 50–60 Hz, 10 Amp (Max) |
Power Consumption (AVG) | 181 W | 115 W | 317 W |
Operating Temperature | 32 – 104 deg F (0 – 40 deg C) |
32 – 104 deg F (0 – 40 deg C) |
50 to 95 deg F (10 to 35 deg C) |
Storage Temperature | -31 to 158 deg F (-25 to 70 deg C) |
-13–158°F (-25–70°C) | -40–149°F (-40–65°C) |
Humidity | 10 to 90% non-condensing | 5 to 95% non-condensing | 20 to 90% non-condensing |
Compliance | |||
FCC Class A Part 15, UL/CB/cUL , C-Tick, VCCI, CE | FCC Class A Part 15, UL/CB/cUL, C-Tick, VCCI, CE | FCC Class A Part 15, UL/CB/cUL, C-Tick, VCCI, CE, BSMI, KC, GOST | |
Supported Platforms | |||
Database | DB2 UDB V8 (VA only), DB2 UDB V9.x (VA only), DB2 UDB V9.5, DB2 UDB V9.7, MS SQL Server 2000, MS SQL Server 2005, MS SQL Server 2008, MySQL 5.1, 5.5, Oracle 9i, Oracle 10gR1 (VA only), Oracle 10gR2, Oracle 11g, SybaseASE 12.5 (VA only), Sybase ASE 15.x | ||
Repository Database | Apache Derby 10.x, Microsoft SQL Server 2005, Microsoft SQL Server 2008, Oracle 10gR2, Oracle 11g, PostgreSQL 8.3 | ||
Browser | Internet Explorer 7,8,9; Firefox 3,4,5 |
Documentation:
Download the Fortinet FortiDB Database Security Datasheet (PDF).
הערות תמחור:
- שימו לב: כל המחירים באתר כוללים מע"מ.
- החיוב יבוצע על פי שער "העברות והמחאות מכירה" של המטבע (דולר אמריקאי) ביום אישור ההזמנה.
- מחירי המוצרים וזמינותם כפופים לשינויים ללא הודעה מוקדמת.
Database Security and Compliance Appliance - 6 x GE RJ45, 2 x SFP slots, 2 x 2 TB storage, includes license for 30 database instances
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר