Challenge

A global business process outsourcing company providing inbound customer care and technology helpdesk, outbound sales, and market research services, was looking to strengthen its network perimeter with the latest next-generation firewall (NGFW) solutions. The company had an existing UTM device at its Manila location.

Solution

After a thorough analysis of the entire network, Black Box offered a solution with a consultative approach and suggested the Fortinet NGFW solution, along with a log analyzer, to separate internal and external networks within the setup. A comprehensive demonstration showed the customer how to achieve centralized user authentication, ensure granular policy control, as well as enable various types of gateway-level threat protection to optimize resource utilization, garner customized reports to monitor user activity, and ensure resource utilization, without changing the current IT setup.

The Fortinet NGFW solution:

  • Replaced all distributed proxies;
  • Isolated the Internet from the internal network;
  • Optimized bandwidth utilization;
  • Removed all public address blocks from the internal network;
  • Provided centralized authenticated policy-driven Internet access and VPN services for users to access IIT-G resources securely from anywhere;
  • Resulted in an overall simplified security policy management and tightened perimeter security without administrative burden.

Result

Black Box worked with Fortinet to ensure successful evaluation of the NGFW solution according to customer expectations. The order was awarded to Black Box because of its consultative and holistic approach to the perimeter security solution. The company demonstrated some of the measures from the current infrastructure that can strengthen the security posture in conjunction with other devices. Through this techno-professional approach, Black Box won not only the customer's trust, but also that of Fortinet.

Learn more

Solution: Cybersecurity
Blog: Securing Your Remote Workers for Fluid Networking in a Hybrid Environment
Blog: Social Engineering and the Weakest Link - Your Employees

Subscribe Now