The clientSince 2004 Skytechnology has provided compliance and integrated services to the automotive sectors, telecommunications, aerospace and defense, rail, medical devices, pharma, energy and automation sectors.The company supplies key-in-hand products, which include tested manufactured prototypes and certificates ready for production. Hardware and software development is carried out in accordance with international standards (Cenelec, CE, etc.) and market-specific directives (IEC61508, EN50128, DO254, etc.).Skytechnology builds test and simulation systems. Provides consulting services in the areas of Verification & Validation, and RAMS analysis.Using the services provided by Skytechnology,clients can focus resources and expertise in developing value-added components unique to their products and applications.The technological areas in which Skytechnology operates are:- HW Services - FPGA Services - SW Services - Test and simulation systems - Governance & Compliance Download the case history PDFDownload PDF Websitewww.skytechnology.it Commodities SectorDevelopment of HW and SW in embedded environment Number of employeesOver 100 PartnerProduce Ict Case history dataThe client, for reasons of compliance with the current rules, expressed the request to perform a technological upgrade within its premises to increase the level of infrastructure security. It was therefore necessary to update the existing firewall system in the Skytechnology locations in Turin, Milan and Rome. The migration project was carried out by replacing the old "Watchguard" systems with new "Fortigate" models, designed to provide greater security. The latter, in fact, using UTM agents and a Proxy system to manage access to the web in a controlled manner. Another focal point of the project was the creation of an IPSEC VPN for interconnection and data exchange between the three dislocated locations, thus enabling a faster and safer exchange of business data.The systems used within the offices, as dated, they were obsolete and could not guarantee reliability in the field of cybersecurity. Today, thanks to the intervention carried out, the system guarantees continuity of service through the new technologies of the Fortigate Suite.The latest version of FortiOS allowed the implemented solution to manage the devices in a more granular way in relation to their use,ensuring full transparency on the network. For this very reason, the functionality offered by systems such as FortiView is critical to evaluating users' network traffic, the most used applications, and the layers of intercepted threats. FortiOs has improved the implementation of Antivirus protection in Flow Based and Proxy. How does FortiOS work? Directly from the console you can, among other things, send any suspicious file to Forti Guard SandBox for verification, without exiting the dashboard, or take action on email filtering verification. In addition, the IPsec and VPN SSL tools were improved, in this latter case with a Wizard to generate a new VPN template and the ability to compose your own model yourself.It is important to be able to condense all management possibilities into a single container (repository). In FortiOS, policies, people, devices, and VPNs are saved in one place, allowing centralized control of all accesses. It is an enterprise-class security appliance, but at the same time practical to manage even for those who have limited resources ypical of medium-sized companies, or startups that are part of a very large collaboration network.All this is possible with a minimum baseline implementation time that will allow you to act on each parameter later in a simple and intuitive way. Solutions adopted3 FORTIGATE D300 (one per location) for perimeter security management Products usedFortigate D300 Benefits obtained- Native anti-malware and antivirus protection - IPSEC VPN between locations - Controlled network access through VPN access (Microsoft) for resources outside the corporate network - Proxy for the controlled management of Internet access - Timely monitoring and reporting on network status and traffic optimization - Ability to use OWA in offline mode Business benefits- Anti-malware and native antivirus protection - IPSEC VPN between locations - Controlled network access via VPN (Microsoft) access for resources outside the corporate network - Proxy for controlled management of Internet access - Monitoring and timely network status reporting and traffic optimization - Ability to use OWA in offline mode Business benefits- Business Continuity - Less downtime for maintenance - Controlled access monitoring - Access data safely as quickly as possible - Perimeter Security with High Security Standards Optimization Summary Thanks to the work carried out, the system ensures continuity of service through the new technologies of the Fortigate Suite. The latest version of FortiOS has allowed the implemented solution to manage the devices in a more granular way in relation to their use,ensuring full transparency on the network. All this is possible with a minimum baseline implementation time that will allow you to act on each parameter later in a simple and intuitive way. Future developmentsBetacom is the core of the project, as it manages all of the client's internal infrastructure with its team. New opportunities are currently being developed to adapt the client to the new regulations regarding procedures under the new EU General Data Protection Regulation, also called GDPR.