Finance Industry- Fortigate Migration project case study

 

About the company

A renowned financial institution that offers a range of banking services to its members. It operates with a member-centric approach, prioritizing personalized service and community involvement. The company provides various financial products including savings and checking accounts, loans, mortgages, and investment opportunities.

CHALLENGES

The customer requested to migrate their Watchguard Firewall setup to a new FortiGate firewall currently in production. Alongside this migration, they have also asked for a comprehensive review of their current firewall configuration. This process ensures that all settings, rules, and security policies from the Watchguard firewall are accurately transferred and optimized for the FortiGate environment. Additionally, the review will assess the effectiveness and efficiency of their current firewall setup to identify any potential improvements or adjustments needed to enhance network security and performance.

ASsessment and solution

The project involved a phased approach starting with the migration of the existing Watchguard Firewall configuration to the new FortiGate firewall, ensuring all settings and rules are seamlessly transferred and validated. Concurrently, a detailed firewall review report was generated to assess the current configuration's strengths, weaknesses, and compliance with security best practices. This report informs any necessary adjustments or enhancements to optimize network security and performance. Finally, the cutover phase was planned and executed to minimize downtime and ensure a smooth transition to the new FortiGate firewall, backed by thorough testing and validation of all migrated configurations and policies.

Advantages

The migration from the existing Watchguard Firewall to the new Fortigate firewall has been successfully completed, leveraging advanced features such as deep packet inspection and application control to enhance security. A thorough review of the firewall configuration was conducted to ensure alignment with current security standards, optimizing protection against evolving threats. The cutover process was efficiently planned and executed, minimizing downtime and ensuring uninterrupted network operations throughout the transition