FortiGate 1800F next-generation firewall

1 April 2020 Information Security

Fortinet unveiled the FortiGat 1800F next-generation firewall (NGFW) powered by NP7, the company’s seventh generation network processor, to enable today’s largest enterprises to achieve true internal segmentation as well as scale, performance, detection and enforcement capabilities.

Flat networks fall flat when attacked

Digital innovation is disrupting enterprise organisations, creating new services and business opportunities while also causing increased risk across all industries. Explosive adoption of IoT and mobile devices, as well as applications and services from multiple clouds, are pushing the attack surface beyond the traditional network boundaries. An expanding and fragmented attack surface is undermining the ability of network security leaders to maintain network performance, security, reliability and availability.

In today’s data centres, many enterprise architectures have been built on a high-performance routing and switching infrastructure without integrating security. Many have turned to internal segmentation as a way to regain control over their burgeoning networks and to improve visibility and security.

Internal segmentation requires extreme performance

A new challenge has emerged for enterprises trying to successfully segment their network: security performance. Today’s enterprises face unprecedented performance demands on their infrastructure that often cannot be matched by existing security solutions. For a majority of enterprises, traditional security appliances that are built with off-the-shelf CPUs and hardware to process security traffic have become an infrastructure bottleneck, resulting in degraded user and application experience. Simply put, yesterday’s security performance is no longer enough to secure and enable enterprises at the pace of today’s business innovation.

To meet the extraordinary demands of data centre security and enable a Security-Driven Networking approach, Fortinet is introducing the FortiGate 1800F NGFW.

Use cases and benefits

Fortinet’s FortiGate 1800F NGFW is engineered for large enterprises to quickly and securely drive digital innovation by offering capabilities to meet the huge capacity and performance demands of critical business operations such as:

• Managing internal security risks: Most firewalls simply cannot perform fast enough to enable internal segmentation. With multiple high speed 40G interfaces and the industry’s best threat protection performance with a Security Compute Rating of 3x, FortiGate 1800F enables enterprises to properly segment their network to manage internal security risks. Additionally, FortiGate 1800F intelligently adapts to segmented users, devices and applications – regardless of their location, whether on-premise or in multiple clouds – providing automated threat detection and enforcement.

• Accelerating the cloud on-ramp: IPsec encryption must be high performing to enable and accelerate the cloud on-ramp for organisations adopting multiple clouds for IaaS and SaaS services. FortiGate 1800F offers the highest Security Compute Rating of 14x for IPsec encryption when benchmarked against competitors, enabling the required speed, scale and availability organisations need when on-ramping to the cloud.

• Removing blind spots: With as much as 60% of encrypted traffic containing malware, SSL inspection performance has become critical to properly secure the network. FortiGate 1800F offers the industry’s highest SSL inspection performance with a Security Compute Rating of 20x, as well as support for the industry’s latest TLS 1.3 standard, to eliminate network blind spots by enabling full visibility of clear-text and encrypted network flows.

• Securing services across hybrid architectures: Traditional software-based security solutions have low performance and high latency, which increases time to service and provides a poor user experience. The FortiGate 1800F’s hardware-accelerated Virtual Extension LAN (VXLAN) feature enables massively scalable, adaptable internal segmentation and allows super-fast communication between enormously scaled services, such as compute, storage and applications that are co-hosted on physical and virtual platforms. This allows organisations that leverage a highly scalable virtual services architecture to launch services and applications in the most agile fashion possible to increase productivity and revenue opportunities.

• Enabling secure advanced research: Organisations often transition their research to AI and ML simulations to allow for faster discovery of their objectives. For example, pharmaceuticals can measure the effectiveness of new drugs or develop drugs faster with reduced risks and potentially with lower costs. AI/ML simulations require the transfer of huge datasets (e.g. 1 TB files), called an elephant flow, that today’s data centres struggle to securely transfer, bringing research and collaboration to a crawl. The performance capabilities of FortiGate 1800F allow research organisations to perform big data analysis and natural language processing at unprecedented speeds where a single elephant flow can reach up to 40 Gbps. Just as important, with FortiGate 1800F NGFWs, these elephant flows are secured using high-performance encryption to ensure privacy and compliance.

For more information, go to http://www.fortinet.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.