Fortinet white logo
Fortinet white logo

About FortiGate for IBM Cloud

About FortiGate for IBM Cloud

By combining stateful inspection with a comprehensive suite of powerful security features, FortiGate next generation firewall technology delivers complete content and network protection. This solution is available for deployment on IBM Cloud.

In addition to advanced features such as an extreme threat database, vulnerability management, and flow-based inspection, features including application control, firewall, antivirus, IPS, web filter, and VPN work in concert to identify and mitigate the latest complex security threats.

Highlights of FortiGate for IBM Cloud include the following:

  • Delivers complete content and network protection by combining stateful inspection with a comprehensive suite of powerful security features.
  • IPS technology protects against current and emerging network-level threats. In addition to signature-based threat detection, IPS performs anomaly-based detection, which alerts users to any traffic that matches attack behavior profiles.
  • Docker application control signatures protect your container environments from newly emerged security threats. See FortiGate-VM on a Docker Environment.

When deploying Fortinet products on a cloud platform, it is critical to understand that you are responsible for all costs incurred from the resources you use. This includes but is not limited to the following: CPU, memory, storage volumes, snapshots, data transfers, and network bandwidth.

Once your deployment is live, services may automatically generate temporary files, system logs, or additional volumes and snapshots. These can consume disk space and lead to unexpected charges.

To avoid surprise costs, it is your responsibility to do the following:

  • Regularly check which services and features are active in your cloud environment.
  • Monitor disk usage and be aware of what triggers new volume or snapshot creation.
  • Set appropriate usage limits, quotas, and budget alerts.
  • Configure disk space threshold alarms and act promptly when notified.
  • Each cloud provider has different tools for managing and monitoring these settings. Refer to IBM Cloud documentation to configure alerts, budgets, and usage controls appropriately.

About FortiGate for IBM Cloud

About FortiGate for IBM Cloud

By combining stateful inspection with a comprehensive suite of powerful security features, FortiGate next generation firewall technology delivers complete content and network protection. This solution is available for deployment on IBM Cloud.

In addition to advanced features such as an extreme threat database, vulnerability management, and flow-based inspection, features including application control, firewall, antivirus, IPS, web filter, and VPN work in concert to identify and mitigate the latest complex security threats.

Highlights of FortiGate for IBM Cloud include the following:

  • Delivers complete content and network protection by combining stateful inspection with a comprehensive suite of powerful security features.
  • IPS technology protects against current and emerging network-level threats. In addition to signature-based threat detection, IPS performs anomaly-based detection, which alerts users to any traffic that matches attack behavior profiles.
  • Docker application control signatures protect your container environments from newly emerged security threats. See FortiGate-VM on a Docker Environment.

When deploying Fortinet products on a cloud platform, it is critical to understand that you are responsible for all costs incurred from the resources you use. This includes but is not limited to the following: CPU, memory, storage volumes, snapshots, data transfers, and network bandwidth.

Once your deployment is live, services may automatically generate temporary files, system logs, or additional volumes and snapshots. These can consume disk space and lead to unexpected charges.

To avoid surprise costs, it is your responsibility to do the following:

  • Regularly check which services and features are active in your cloud environment.
  • Monitor disk usage and be aware of what triggers new volume or snapshot creation.
  • Set appropriate usage limits, quotas, and budget alerts.
  • Configure disk space threshold alarms and act promptly when notified.
  • Each cloud provider has different tools for managing and monitoring these settings. Refer to IBM Cloud documentation to configure alerts, budgets, and usage controls appropriately.