170 likes | 362 Views
Title of Presentation. Over Users, Apps, Data, Devices. Fortinet: Franck Bernard (Country Manager), Olli Mikkonen (Systems Engineer). SPEAKER NAME. Fortinet in Figures. Fortinet, Inc. Over 1,600 employees and 30+ offices Shipped 800,000+ FortiGate appliances to date
E N D
Title of Presentation Over Users, Apps, Data, Devices. Fortinet: Franck Bernard (Country Manager), Olli Mikkonen (Systems Engineer) SPEAKER NAME
Fortinet in Figures Fortinet, Inc. • Over 1,600 employees and 30+ offices • Shipped 800,000+ FortiGate appliances to date • 125,000+ customers including majority of Global 100 • 5,000+ channel partners • 80+ patents; 115+ pending • Billings: $475.8 million in 2011; +27% versus 2010 • Consistently strong sequential growth • Profitable: Cash and investments of $538.7 million - no debt • FTNT #9 in Barron’s Tech’s Top 10
Major Certifications Media/Industry Analysts Recognition Fortinet– A Security Label
Worldwide UTM Market Share Q3 2011 (1) Continued Leadership Notes (1) IDC Worldwide Security Appliances Tracker, Dec 2011(market share based on factory revenue
1 Gaining Control • Provide visibility and control • atuserandapplicationlevels In order to secure and control their IT infrastructure, organizations must adopt solutions that: 2 3 Identify/Block threats inside applications Minimizelatencyand impact onnetwork performance 4 Secure and provide visibilityat thegatewayand around 5 Enable seamless integration and global management
Control the IT Infrastructure FortiOS • SMALL/MEDIUM ENTERPRISE • FortiAuthenticator • SERVICE PROVIDER • VM • FortiGate 3000-5000 Series • FortiGate 20-1000 Series FortiASIC • LARGE ENTERPRISE • FortiGate 1000-3000 Series • FortiAP • FortiSwitch • FortiManager • FortiScan • FortiDB • FortiAnalyzer • FortiMail • FortiWeb
The Power To Control • Controlling Apps & Features Within Apps • Categories of Apps • Individual Apps • Actions Within Apps • Defining User Behavior • By Domain • By Groups • By Individual Users • Controlling Data • Prioritize • Limit Access By Groups or Users • - Time of Day • - Day of Week
The Power To: Solve Everyday Problems Endpoint Control Emily, a financial trader, installed Skype on her company laptop to talk with family. Identity-Based Policies Bill works for a Fortune 100 company and shares company details on Facebook. 2-Factor Authentication VPN Tunneling WAN Optimization Jill is at Starbucks and needs to communicate and be protected as if she was at HQ. Data Leak Protection Ed shared a company presentation via his personal Gmail account.
FortiProtected WLAN Multi-Threat Security with Integrated Wireless Controller Fortified Wireless Space Secure Wireless Access Points 12
FortiAP-200 Series Product Features 2 or 4 Internal Low-Loss, Quad-Band a/b/g/n Omni-directional Antennas 2x2 MIMO uses latest signal processing technology for 300Mbps throughput per Radio Simultaneous Dual Radio Operation (FAP220B, FAP220B) 16 SSID – 2 dedicated for scanning Integrated mounting option (rear) Gigabit Ethernet with 802.3af PoE support (B series) 12V DC Power Input Option Kensington Security Slot
Choice of Form Factor DMZ/Private Zone Virtualized Data Center Server Desktops / Private Servers / DMZ Public Zone Hardware Appliances Virtual Appliances 14 Run it all on physical appliances or as virtual software
Cloud Security Obvious Benefits Flexible Deployment Options Management • Evaluations • FortiManager, FortiAnalzyer • FortiWeb, FortiMail • Different sizes for different customers • Small business vs. Amazon/Netflix • Options: • Physical Device • Physical VDOM • Virtual Device • Virtual VDOM • Single management console for both physical & virtual • Operator Independence (they don’t need to know)
Become Your Security Partner of Choice • Lead in Product Innovation • Continue investment on performance • Grow Forti-Wifi, Forti-AP, FortiMail and other new technologies • Deliver Highest Levels of Quality and Customer Satisfaction • Focus on QA • Pursue Investment in support • Have The Best Team In The Industry • Maintain and develop high-quality channel • Aggressively hire top candidates in R&D, Sales, etc. • Remain a very strong and stable company • Become a Top 3 player in the network security market • Achieve predictable financial and operational results
The Power to Control • End to endsecurity • Highuptime/availability • Easymanagement • Proactiveprotection • IncreasedProtection • ImprovedPolicy Compliance • LowerTCO • EnhancedProductivity Delivers Technology Business The Power to Benefits Control
Thank You www.fortinet.com