130 likes | 392 Views
True Unified Threat Management Fortigate Technology Positioning. Agenda. The legacy network security approach & multi-party UTM The Fortinet approach Maximizing the Fortinet opportunity Summary. The legacy network security approach Multiple point solutions & multi-party UTM. Gateway.
E N D
True Unified Threat Management Fortigate Technology Positioning
Agenda The legacy network security approach & multi-party UTM The Fortinet approach Maximizing the Fortinet opportunity Summary
The legacy network security approach Multiple point solutions & multi-party UTM
Gateway Anti-Virus Anti-Virus Anti-Virus Anti-Virus DLP DLP DLP DLP IPS IPS IPS IPS Anti-Spam Anti-Spam Anti-Spam Anti-Spam Web Filter Web Filter Web Filter Web Filter SSL VPN SSL VPN SSL VPN SSL VPN Firewall Firewall Firewall Firewall Corporate LAN Main drawbacks Key Points: Multi-Party UTM Resilient architecture Consolidated hardware 100% increase in hardware sprawl Inefficient multiple point solutions = latency & vulnerabilities Legacy firewall Cost savings from reduced utility overheads, training etc Very low utilisation of investment – Under 50% A set of individuals, not a team First network security technology BUT! Considerable sprawl in appliances Limited functionality – Port & Protocol, Allow & Block End result is underperforming, over expensive security posture Similar performance issues due to multiple scanning engines Time consuming environment to administer, multiple consoles Insufficient protection against a multitude of threats Sizeable total cost of ownership… Technical training, power & cooling, costly license programs More advanced protection required Reliance on updates from 3rd party databases No major improvement in efficacy
The Fortinet approach An integrated network security platform
Inside Fortigate Advanced Networking Services App Control Virtualisation WAN Opt DLP Wireless Traffic Shaping Proprietary Unified Threat Management Web Filter Firewall SSL VPN Anti-Spam Anti-Virus IPS Purpose built Operating System FortiOS Purpose built hardware Network ASIC General Purpose CPU Content ASIC
Maximising the Fortinet opportunity The unified access layer
Gateway Anti-Virus Anti-Virus DLP DLP IPS IPS Anti-Spam Anti-Spam Web Filter Web Filter SSL VPN SSL VPN Firewall Firewall Corporate LAN WLAN Fortigate: Integrated security platform FortiAP: Secure wireless access Fortigate: Secure site to site connectivity FortiToken: Strong authentication for mobile workers The Unified Access Layer
Summary Legacy security Multiple point solutions are inefficient with a high total cost of ownership Leave gaps in the network security posture Multi-party UTM offer similar problems with very little improvement in performance Fortinet Fortinet offers a different approach with purpose built, accelerated hardware High performance at a low price Complimentary Fortinet technologies provide a ‘unified access layer’ for secure connectivity regardless of location or network type True Unified Threat Management