Not long ago, our Xiologix CTO was working with a new manufacturing client. They initially worked with a different partner and brought us in to work with them on their security posture because the other partner left them still needing more in the manner of configuration, support, and they found some serious deficiencies in their deployment. Happy to work with the client, we got their environment cleaned up, and it laid the foundation for more success that layered on after that.
The admin we worked with moved into a new role in a retail environment and wanted to continue our relationship and wanted our help get them updated and secure. They were running an active Cisco PIX and ASA Infrastructure with Meraki equipment. We migrated over their configuration and set up a new Fortinet Security framework infrastructure.
After the successful cut over, things were working, and the client thought the job was done. Our CTO continued, “let’s take a look at our threat view, just to make sure everything is working fine” and that’s when reality set in. Five minutes before the migration, everything was working the same way it had been five minutes before that point, five days, five weeks, and who knows how many years. But here we are in the future, five minutes in the future, and they found numerous instances of Malware running (but now being blocked) by the Fortinet Firewall. Command and Control, and other instances of bad juju were running on essential business assets and servers.
It was a relief on the one side to know issues like this were now being detected and stopped. Our CTO commented, “See, I just gave you a bunch of work to do!” The client was thoroughly surprised but ready to work through the cleanup process. It is eye-opening when a simple adoption of modern technology like a Fortinet security solution can immediately return its value and provide visibility, insight, and action against malicious activity.