Fortis by Sentinel Zero Trust Security

Additional Info

CompanyFortis by Sentinel
Websitehttps://www.fortisbysentinel.com/
Company size (employees)500 to 999
Headquarters RegionNorth America
Type of solutionCloud/SaaS

Overview

Fortis by Sentinel offers Zero Trust Security solutions designed to proactively protect against lateral movement within a network, reducing the amount of damage that can be caused by an attacker and making it much more difficult for them to achieve their objectives. Fortis Zero Trust Security prevents breaches from spreading across endpoints, clouds, and data centers by continually visualizing how workloads and devices are communicating, creating granular policies that only allow wanted and necessary communication, and automatically isolating breaches. As a result of this segmentation, organizations better understand their risks and can take action to build resilience against all types of threats.

In addition to solutions that operate using Zero Trust Security principles, Fortis by Sentinel also offers multiple one-on-one free workshops for customers interested in creating a Zero Trust environment. Fortis experts discuss the Zero Trust framework and overall journey, and assign customers a score based on their precise level of Zero Trust. A more advanced version of this workshop goes deeper on these concepts and enables customers already invested in Zero Trust to learn more about the remaining steps required to achieve total compliance.

Key Capabilities / Features

Application Insights - Gain real-time visual insights into your application communication flows so you can better understand critical pathways, detect anomalous behavior, build segmentation policies, and test new segmentation rules.


Machine Learning - Machine learning helps quickly identify critical infrastructure services, then recommends labels and Zero Trust segmentation policies to secure legitimate traffic.


Set Security Boundaries - Guided workflows, visualization, and reporting to assist with the safe transition from an allow/deny-list firewall rules approach to a true allow-list model. This avoids the complexity of fully managing a priority order of firewall rules.


Create Segmentation Policies - Policy Generator uses flow history to recommend optimal segmentation policies for your application workloads, no matter their type or location. Policies can be created without in-depth knowledge of networking details.


Advanced Search and Analysis - Search the historical traffic database, analyze traffic patterns, and generate reports to assist with audits, threat hunting, troubleshooting, and creating allow-list rules.


Attack Vectors - A combination of application dependency maps and vulnerability data from scanning tools, vulnerability maps enable a more detailed understanding of attack vectors used by malware and hackers so you can apply segmentation to limit their movement.


Encryption - On-demand, host-to-host traffic encryption between paired workloads using the built-in encryption libraries of host operating systems.


How we are different

• Zero Trust Workshops – Complimentary workshops (beginner and advanced) that provide organizations with an education on the Zero Trust framework, an exploration of how their current investments and policies fit within that framework, and expert guidance on next steps to progress on the Zero Trust journey.


• Seamless Integration – Fortis by Sentinel’s Zero Trust solutions fit perfectly with the rest of our security portfolio. They can be monitored through the Fortis Security Operations Center (SOC) and SIEM, which is powered by Splunk. When our Zero Trust solutions are combined with other elements, it gives our experts more features, analytics, and a more complete picture of your environment. This makes it easier to detect anomalies, issue alerts, and set stronger security policies.


• Agent-Less Visibility and Segmentation Enforcement – If an environment has no agents, our Zero Trust Security solution ingests flow data from networking equipment, cloud metadata, cloud-native security information, and flow logs. This creates a unified map of communication flows across your digital infrastructure. Access Control Lists (ACLs) are then used to segment routers, switches, and load balancers.


  • Vote for this Nomination
    (click the thumbs-up icon to cast your vote)

Browse Award Nominations