Fortinet Inc. announced that Giant Tiger has deployed FortiGate(R) appliances, FortiAP wireless appliances as well as Fortinet's analysis appliance, FortiAnalyzer(TM). The FortiGate appliances are being used for core and distributed network security protection by helping to provide firewall, IPSec VPN, SSL VPN, antivirus, intrusion prevention, application control and web content filtering protection. FortiAnalyzer is also being used to analyze network usage at the headquarters and at the more than 200 retail stores. Previously using a Juniper network security solution, Giant Tiger was having difficulty managing disparate security appliances. Working closely with Fortinet partner, INSA, a Canadian-based service and consulting firm specializing in IT Network Security, Giant Tiger looked at Fortinet, Juniper, Websense and SonicWall when it came time to refresh its network infrastructure. Fortinet was selected for many reasons including the no per user licensing needed. Additionally, the FortiGate appliances' virtual domain (VDOM) ability reduced the amount of appliances needed at each location which would ultimately reduce capital costs. A FortiGate appliance is located at Giant Tiger's central hub and is being used to inspect traffic traversing the network, including the traffic coming in and out of the retail locations. In addition, the company has given SSL VPN access to more than 200 Giant Tiger employees who need to connect remotely to the corporate network. Within the stores, FortiGate appliances are being used as a site-to-site IPSec termination point and with Fortinet's VDOM capability, the company has the ability to have a second virtual firewall deployed in transparent mode at the stores. Additionally, all Giant Tiger stores have a FortiAP thin access point deployed which replaced Motorola APs. Because the FortiGate appliance acts as a wireless controller, Giant Tiger was able to eliminate the need for a separate wireless controller device at each store, thereby further saving time, money and space. Giant Tiger can also allow specific parts of Web 2.0 applications and not others. For example, they can allow for instant messaging, but not for file transfer within IM. This helps the company maintain productivity with its employees and third party vendors but reduces the risk of the network being infiltrated by botnets and other types of malicious attacks.