FORTINET'S FORTIGATE
“The changeover of our firewall solution was performed seamlessly by Subnet. Over a long period of time, we’ve built up a business partnership based on trust, continuity and relationship development.”
Matthew Western, IT Manager, Investigator College
Investigator College, situated an hour’s drive south of Adelaide on the beautiful Fleurieu Peninsula, boasts dual campuses located in Victor Harbor and Goolwa, as well as an EcoCentre and Eco-Sustainability Trade Skills Centre located at Currency Creek. The College currently has some 700 students and over 80 staff.
Investigator College prides itself on being a ‘first-choice’ educator and has gained a reputation for its ability to provide many and varied educational opportunities ‘right here’ on the South Coast. Subnet has been working with Investigator College since 2011, and with recent and ongoing upgrades to College facilities, all students and faculty have the opportunity to access state-of-the-art technology. It is vital for the functionality of the College that access to the right technology is seamless, safe, and efficient.
Concern:
Changes in the security threat landscape prompted the ICT team at Investigator College to consider other products and protocols to keep the college population secure. Their aging Cisco solution was significantly strained, proving more expensive than budgeted for and couldn’t keep up with the latest forms of sophisticated attacks. The college also required a comprehensive and scalable solution that could be changed to meet the growing threat profile of ICT in Australia. As a result, the cost saving benefits of a newer, faster and more adaptive solution were more appealing.
The Subnet Solution:
Under the guidance of our Senior Systems Engineer, the college’s IT Manager decided that Fortinet’s FortiGate Next Generation Firewall was the right solution. The FortiGate, Next Generation Firewall, utilises purpose-built security processors and threat intelligence services to deliver top-rated protection. Fortigate reduces complexity with automated visibility into applications, users and networks.