1 / 9

True Unified Threat Management Fortigate Technology Positioning

True Unified Threat Management Fortigate Technology Positioning. Agenda. The legacy network security approach & multi-party UTM The Fortinet approach Maximizing the Fortinet opportunity Summary. The legacy network security approach Multiple point solutions & multi-party UTM. Gateway.

adsila
Download Presentation

True Unified Threat Management Fortigate Technology Positioning

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. True Unified Threat Management Fortigate Technology Positioning

  2. Agenda The legacy network security approach & multi-party UTM The Fortinet approach Maximizing the Fortinet opportunity Summary

  3. The legacy network security approach Multiple point solutions & multi-party UTM

  4. Gateway Anti-Virus Anti-Virus Anti-Virus Anti-Virus DLP DLP DLP DLP IPS IPS IPS IPS Anti-Spam Anti-Spam Anti-Spam Anti-Spam Web Filter Web Filter Web Filter Web Filter SSL VPN SSL VPN SSL VPN SSL VPN Firewall Firewall Firewall Firewall Corporate LAN Main drawbacks Key Points: Multi-Party UTM Resilient architecture Consolidated hardware 100% increase in hardware sprawl Inefficient multiple point solutions = latency & vulnerabilities Legacy firewall Cost savings from reduced utility overheads, training etc Very low utilisation of investment – Under 50% A set of individuals, not a team First network security technology BUT! Considerable sprawl in appliances Limited functionality – Port & Protocol, Allow & Block End result is underperforming, over expensive security posture Similar performance issues due to multiple scanning engines Time consuming environment to administer, multiple consoles Insufficient protection against a multitude of threats Sizeable total cost of ownership… Technical training, power & cooling, costly license programs More advanced protection required Reliance on updates from 3rd party databases No major improvement in efficacy

  5. The Fortinet approach An integrated network security platform

  6. Inside Fortigate Advanced Networking Services App Control Virtualisation WAN Opt DLP Wireless Traffic Shaping Proprietary Unified Threat Management Web Filter Firewall SSL VPN Anti-Spam Anti-Virus IPS Purpose built Operating System FortiOS Purpose built hardware Network ASIC General Purpose CPU Content ASIC

  7. Maximising the Fortinet opportunity The unified access layer

  8. Gateway Anti-Virus Anti-Virus DLP DLP IPS IPS Anti-Spam Anti-Spam Web Filter Web Filter SSL VPN SSL VPN Firewall Firewall Corporate LAN WLAN Fortigate: Integrated security platform FortiAP: Secure wireless access Fortigate: Secure site to site connectivity FortiToken: Strong authentication for mobile workers The Unified Access Layer

  9. Summary Legacy security Multiple point solutions are inefficient with a high total cost of ownership Leave gaps in the network security posture Multi-party UTM offer similar problems with very little improvement in performance Fortinet Fortinet offers a different approach with purpose built, accelerated hardware High performance at a low price Complimentary Fortinet technologies provide a ‘unified access layer’ for secure connectivity regardless of location or network type True Unified Threat Management

More Related