Secure wireless LAN solution

July 2013 Products & Solutions, Information Security

Fortinet has released its new secure wireless LAN solution specifically designed for distributed enterprises. The Fortinet Secure WLAN integrates wireless and wired access, security, authentication, switching and management, in an easily managed system that allows system-wide policy enforcement. With it, administrators gain a broad, unified solution that provides unmatched protection, superior TCO and granular control through user authentication and device visibility across the entire network. As part of the solution, Fortinet unveiled new wired and wireless products: the FortiSwitch-28C and FortiSwitch-348B Ethernet switches and FortiAP-14C and FortiAP-28C wireless access points.

“Because of the explosive growth of mobile devices and applications in the workplace, networks need to be re-architected for low latency, increased throughput, and of course strong security,” said Rohit Mehra, vice president, network infrastructure, IDC. “Solutions such as Fortinet’s new secure WLAN solution address the major pain points that distributed enterprises face today – securely accommodating the exponential growth of BYOD for both employee and guest access; identifying and mitigating security issues; and reducing costs and complexities associated with provisioning and managing overlay wireless networks.”

The Secure WLAN solution uniquely integrates security into the fabric of the network to help organisations effectively address enterprise mobility. With it, Fortinet offers the most comprehensive solution on the market for consistently protecting the enterprise wired and wireless networks.

To learn more about Fortinet’s Secure WLAN solution register here for a free Webinar: http://w.on24.com/r.htm?e=604889&s=1&k=89BE45C3097FE69623A7A795E1161744





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Dahua expands wireless 4G security monitoring
Products & Solutions Surveillance Smart Home Automation
Dahua Technology has launched a new wireless 4G security camera under its WITHS series, designed to deliver simplified deployment, continuous monitoring, and dependable performance in remote and power-limited environments.

Read more...
Claude Mythos wake-up call
Technews Publishing AI & Data Analytics Information Security
AI has crossed a critical cybersecurity threshold and frontier models are accelerating attack lifecycles and will enable attackers to identify and exploit vulnerabilities at scale and speed, through novel methods that were previously the domain of advanced nation-state entities.

Read more...
If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.

Read more...
SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage you need insight.

Read more...
Bringing fire safety closer to home
SafeQuip Fire & Safety Products & Solutions Smart Home Automation
SafeQuip’s latest product launch introduces two compact, disposable fire extinguishers for everyday use, one suitable for Class A, B, and C fires, the other rated for Class A, B and F fires.

Read more...
The role of safe storage in mitigating burglary and fire risk
Gunnebo Safe Storage Africa Products & Solutions Fire & Safety Smart Home Automation
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.