Managed IPS Rules
Fortinet Managed IPS Rules for AWS Network Firewall
Filter malicious traffic and enhance network security on Amazon VPCs
Security Simplified for Amazon VPCs
Enterprises are speeding digital transformation, making the cloud’s role in delivery of services more important than ever. Securing virtual private cloud networks and application workloads is critical, and must not add to a security team’s operational burden.
Fortinet Managed IPS Rules enhances the baseline protection offered by AWS Network Firewall. It reduces the learning curve and delivers network security that is effective, available, and scalable—while keeping management simple.
Improve Security While Reducing Resource Needs
Protect VPCs and workloads from security breaches
IPS rules are automatically updated by FortiGuard Labs to address the constantly evolving threat landscape. Our threat research experts analyze 100B+ events every day from millions of security sensors deployed globally.
Significantly reduce security management and operations overhead
Fortinet Managed IPS Rules are set up to address the most common vulnerabilities out of the box. A security expert is not needed for deployment and management.
Provide rapid on-demand protection for business-critical workloads in AWS VPCs
Fortinet Managed IPS Rules is available in the AWS Marketplace for rapid deployment anytime. It protects workloads across VPCs and accounts.
Streamline operational costs without sacrificing security
Avoid upfront investments by leveraging pay-as-you-go (PAYG) pricing models and fully-managed infrastructure. Align network security costs with your usage.
Types of Enhanced Protection
Server and OS
Rules that detect vulnerabilities targeting operating systems and common server applications, including DNS, email, and remote access
Web Client
Rules that detect exploits targeting vulnerabilities in web browsers, including Chrome, Firefox, Internet Explorer, and Edge.
Malware Detection
Rules that detect communication attempts from malware backdoors, worms, and remote access Trojans (RATs), including command and control traffic
Web Server
Rules that detect exploits targeting web server vulnerabilities, including both web servers (e.g., Apache) and proxy web servers (e.g., Squid)
Application, Network, and IoT
Rules that detect attempts to exploit vulnerabilities in common client applications, including desktop software, network, and IoT
Web Application
Rules that detect exploits targeting vulnerabilities in common web applications, including popular CMS platforms such as WordPress and Joomla