1 / 32

Fortinet

Fortinet. Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789. Regulatory Pressures. Budgetary Constraints. Network Throughput. Network Throughput of Enterprise Data Center. Your Business Requirements Keep Growing.

cardea
Download Presentation

Fortinet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Fortinet Mike Wysocki - Salesmwysocki@fortinet.com 310.536.0039 Daryl Jung - SEdjung@fortinet.com 626.592.3789

  2. Regulatory Pressures Budgetary Constraints Network Throughput Network Throughput of Enterprise Data Center Your Business Requirements Keep Growing • Network requirements / demands accelerating • Security demands must co-exist • Industries demanding greater IT compliance • Compliance needs coming from government regulations as well as business partners / industry mandates • IT budgets shrinking • Security spend increasing Change in External IT Services Spending From FY09 to FY10 % 10GB SOX 404 HIPAA Multi-GB FISMA 1GB 100MB 10MB EU Data Protection Directive

  3. The Result: More Expense, Less Security, Less Control “I.T. departments must manage a growing array of specialized security technologiesthat may or may not work togetherto help security departments detect and halt attacks.” “Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey New York Times 6/22/11

  4. Reducing Complexity Is Critical Q: What are the top security-related challenges your organization is facing? (base: of those that are involved in Security investments) • Source: Navigating IT: Objective & Obstacles Infoworld, May, 2011

  5. 12 Steps to Great Security (find 3 issues) • Simple Written Security Policy • Database and Network Vulnerability Assessments • Patch and Appliance Management • Redundancy: High-Availability & WAN-WAN • Grouping of Divisions…Data Leak Prevention • Content Filtering… Application Control • Integrated Anti-Virus/Gateway Anti-Virus • Log Reporting • Anti-Spam/Spyware • Secure your Tele-Commuters • Secure Wireless Access Points • ICSA/IPsec Firewall (with logging) & Intrusion Prevention

  6. The “Basic” Problems • Policy • Improve employee productivity • Meet regulatory requirements • Protection • Protect assets • Guard against threats • Process • Enable business growth • Increase efficiency

  7. Staggering Statistics • Internet users spent an average of 6 hours (100% increase from a year ago) on social networking sites & the average US worker spends almost 5.5 hours a month visiting social network sites from the office. • Nielson Reports: Internet & Social Media Consumer Insights, May ’10 • The use of social media at work is increasing with nearly 7% of all business Internet traffic going to Facebook, according to new analysis by managed security firm, Network Box. • BizReport: Social Media Cuts into Internet Bandwidth Consumption, April ’10 7

  8. Controlling Web Applications • Allow Facebook, but block Facebook applications • Farmville • Facebook Chat • Facebook Video • Allow YouTube, but block YouTube download • Allow Google Maps, but block Google Web Talk

  9. The Reach of Facebook Facebook alone touts over 500 million active users that spend in excess of 700 billion minutes per month on the site and share 30 billion pieces of content Facebook platform houses over 550,000 active applications and is integrated with more than one million websites Facebook’s total site visits in December 2010 eclipsed Google’s Over 20 million applications are installed per day and over 250 million people interact with Facebook from outside the official website on a monthly basis, across 2 million websites

  10. What are the Risks? • Lack of visibility and control • Many businesses are limited in their control of social networking. They use URL filters to either allow complete access to restrict the entire application. • Widening attack surface • Malicious code “is not just coming from the dark corners of the web,” like pornography, gaming and pharmaceutical sites. Its estimated that 77 percent is coming from legitimate sites. • Data loss potential • Social networking sites are all about collaboration and sharing—potentially even of sensitive data. Today, there is little control over data loss in social media arenas because policies do not typically cover what users contribute.

  11. Thinking Strategically About Security • Future-proof your security infrastructure • Anticipate change in threat scape • Look for opportunities to consolidate without compromise • Reduce complexity • Increase protection • Decrease risk • Lower CapEx & OpEx “ By 2010, only 10% of emerging security threats will require tactical point solutions, compared with 80% in 2005. Source: Gartner “

  12. The Result:Market Leadership Worldwide UTM Market Share Q3 20111 Magic Quadrant for Unified Threat Management2 IDC Worldwide Security Appliances Tracker, Sept 2011 (market share based on factory revenue) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012

  13. Fortinet: A New Approach TRADITIONAL SOLUTIONS Cumbersome and costly THE FORTINET SOLUTION Simple and cost-effective

  14. Anatomy of the FortiGate Solution FortiOS is the security hardened operating system that powers all FortiGate multi-threat security systems.

  15. FortiGate:Integrated Architecture FortiGuard™ Updates Real-Time Protection Fully Integrated Security & Networking Technologies Web Filter Antispam App Ctrl VM AV IPS Firewall VPN DLP WAN Opt Traffic Shaping WLAN VoIP SSL Insp HA Load Balancing SpecializedOS Hardened Platform Purpose-Built Hardware High Performance FortiCare™ FortiGuard Labs Support and Services • Purpose-built to deliver overlapping, complementary security • Provides both flexibility & defense-in-depth capabilities

  16. FortiOS • Fully Integrated Technologies • Manage all policy enforcement from a central console • Single Inspection of Packets • Delivers greater efficiency and intelligence • Deployment Ease & Flexibility • Same console for all FortiGate platforms, all technologies • Ability to deploy security solutions as needed • IPv6 Ready

  17. Complete Content Protection PORT 80 UNAUTHORIZED APPLICATION AUTHORIZED APPLICATION VIRUS WEB APPLICATION WORM FIREWALL APPLICATION CONTROL ANTIVIRUS/ANTISPYWARE INTRUSION PREVENTION • Application control + Identity-based policy enforcement, Defense in depth • Allow but don’t trust any application • Examine all content • Continuously enforce policies

  18. Centralized Visibility and Control:FortiManager & FortiAnalzyer • Single Pane of Glass Management • Global policy enforcement across 5 or 5,000 devices • Increased flexibility with granular role-based administration • Simplified configuration of Firewall, IPS, Application Controls and other protections • Centralized Analysis and Reporting • Continuous monitoring across the enterprise • Greater visibility into real-time incidents • Monitor activity by users identity • Automate compliance reporting

  19. Threat Protection Solution for IM & P2P • Access Control • Enforce appropriate user access only • Limit IM functionalities (eg. File transfer) • Monitoring & Audit • Detailed conversation & File transfer logging • IM Message content archiving • Antivirus • Detects and block infected File transfers • Enforce File blocking by extensions • Attack Prevention • IPS signatures that stop attacks using known vulnerabilities of IM clients

  20. FortiGuard Research, Updates, Services • FortiGuard Research: • Rootkits: Kernel Hooks • Botnets: Dynamic Monitoring, Spambots, New Malware Protocols • Malware: Code Techniques-PDF/Flash/Doc • Security: Exploits & Vulnerabilities, Zero Day Detection • Packer Research: Unpacking, Generic Detection • FortiGuard Services: • AV Signatures – 4x Daily • IPS Signatures – 2x Daily • Antispam/Web Content Filtering – Real Time • Sample Collection • Signature Creation • Alerts & Escalation • Global Distribution Network: • Application Control • Vulnerability Management • Antispam • Web Filtering • Intrusion Prevention • Antivirus

  21. Greening of IT…. Firewall / VPN IPS Antivirus Web Filtering FortiGate Appliance ¼ Physical Space ¼ Power Consumption = =

  22. The Fortinet Platform – Security Engine Anti Virus ApplicationControl WiFi Controller Firewall WebFiltering DLP FortiOS FortiASIC Anti Spam IPS WAN Acceleration VPN TrafficOptimization

  23. Carrier, MSSP & LargeEnterprise Enterprise SMB & Remote Office FortiGate1000 to 5000 Series FortiGate 200 to 800 Series FortiGate30 to 100 Series Broad Product Portfolio FortiManager FortiAnalyzer FortiAPSeries FortiScan FortiWeb FortiDB FortiMail

  24. Comprehensive Portfolio • VM • FortiAP FortiOS • SMALL/MEDIUM ENTERPRISE • SERVICE PROVIDER • FortiGate 1000-5000 Series FortiASIC • FortiGate 20-1000 Series • LARGE ENTERPRISE • FortiAuthenticator • FortiSwitch • FortiGate 1000-5000 Series • FortiScan • FortiManager • FortiDB • FortiAnalyzer • FortiMail • FortiWeb

  25. Global Installed Base • Fortinet at a glance: • 100,000+ customers • 1,000,000 appliances shipped • The world’s leading enterprises, telcos and service providers • Major government education, healthcare and retail institutions

  26. Bundles also available for our FortiMail product line. Hardware and Services Bundles Hardware No per user fees!! Security and OS Updates Maintenance Support One Full Year 30

  27. A Proven Partner • Proven Industry Leadership • Since 2000, Fortinet has received more than 100 product & company awards. • IDC: Overall leader in UTM factory revenue for all of 2009 • Gartner: Leader in Unified Threat Management Magic Quadrant • Frost & Sullivan: 2010 "Fortinet is the established and undisputed leader" of worldwide UTM market • SC Magazine: 2009 Readers' Trust Award for "Best Integrated Security Solution” • Certified security • Five ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam, WAF) • Government Certifications (FIPS-2, Common Criteria EAL4+, JITC IPv6, SCAP) • ISO 9001 certification

  28. Fortinet Corporate Overview • Market Leader • UTM - Fast-growth security segment • Advanced technology and products • 80+ patents; 115+ pending • Strong global footprint • 1,500+ employees; 30 offices worldwide • Blue chip customer base • 100,000 customers (incl. majority of Global 100) • Exceptional financial model • FY11 revenues: $434M (34% YoY growth) • Q411 revenues: $121M (29% YoY growth) • Strong balance sheet: $500M+ in cash; no debt • IPO - November 2009 $434 FORTINET REVENUE ($MM) 48% CAGR $325 $252 $212 $155 $123 $80 $39 $13 03 04 05 06 07 08 09 10 11

  29. Why Fortinet? Technology • ASIC Chips = speed + complete inspection • FortiGuard update network = always up to date • Custom hardware = purpose built for security • Scalable = ready for growth • Value = ability to replace multiple products in your network Cost / Ease of Management • Low TCO, no user fees, bundled pricing • No third party updates • One vendor to deal with support issues/billing • Fewer technical resources required to manage

  30. World’s Fastest Firewall

  31. 4 Points = 1 Solution • Comprehensive solution • Integrated, strategic security • Lower TCO • Less complexity and easier management • Real-time security • 24/7 global updates • Strategic flexibility • Fit your timeline and budget

  32. Thank You www.fortinet.com

More Related