270 likes | 517 Views
Fighting Cybercrime Vorguvara Spring Summit 2011. Franck Bernard , CM Finland/Baltic fbernard@fortinet.com Olli Mikkonen , Security Specialist omikkonen@fortinet.com September 13, 2014. Fortinet Corporate Overview. Founded in 2000
E N D
Fighting Cybercrime Vorguvara Spring Summit 2011 Franck Bernard, CM Finland/Baltic fbernard@fortinet.com Olli Mikkonen, Security Specialist omikkonen@fortinet.com September 13, 2014
Fortinet Corporate Overview Founded in 2000 Global presence with 30+ offices worldwide & 1,300+ employees 5,000+ channel partners 100,000+ customers IPO Nov 2009 NASDAQ: FTNT 2010 revenue of $325 Million 29% YoY growth Q1 2011: 35% YoY growth World class management team Fortinet Revenue ($MM) 63.9% CAGR 2
Market Leadership Across the Board Magic Quadrant for Unified Threat Management (2) UTM Market Competitive Landscape, 2009(3) Worldwide UTM Market Share Q4 2010 (1) High AbilitytoDeliver Low Low Market Penetration High Market Leader Contender Niche Participant Challenger Specialist Notes IDC Worldwide Security Appliances Tracker, March 2011 (market share based on factory revenue) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, October 2010 Frost & Sullivan, “World Unified Threat Management, Products Market 2009”, 2010 3
Introduction Famous quote from Valerie McNiven, US Treasury advisor on cybercrime: “Last year was the first year that proceeds from cybercrime were greater than proceeds from the sales of illegaldrugs, and that was, I believe, over $105 billion” [1] [1] Reuters, 2005
You think that unlike traditional crime, Cybercrime does not kill people… Think twice. • in a Written Statement for the U.S. House Comittee on Homeland Security, counterterrorism expert Andrew R. Cochran recalls that: • “The terrorists who executed the devastating 2004 Madrid train bombings, which killed almost 200 people, and who carried out the deadly July 7, 2005, attacks on the transportation system in London were self-financed, in part through credit card fraud”
Current Malware Trends • Cybercriminals are going To The Cloud • Social Engineering is still thriving • Cracking Services for anyone • Botnets for the masses
Attack Activity March 21st – April 20th, 2010. Source: http://www.fortiguard.com/report/roundup_april_2010.html#1
Threat & Threat Ecosystem Evolution • Threats have continuously evolved over time • The threat / counter threat model is broken • Threats come in from everywhere. Mobile hosts, encrypted, WiFi, the Cloud,… • Threat complexity and focus increase = requires faster and more focused security means • Not seeing is not knowing 10
Security is a process, not a product. ..... but products can help. 11
Fortinet’s Security Strategy Sophisticated Security & Management Solution See, analyze, protect.
Fortinet’s Strategic Security Portfolio Extension Security Management & Analysis UTM FortiGate Email Security Endpoint Security Web, Database, App Taking security beyond UTM End to end IT security Networks More protection focus! Content & Applications 13 Endpoints
Fortinet Product Portfolio Unified Threat Management Centralized Management Application Security FortiGate Network Security Platform FortiManager Centralized Device Management FortiMail Messaging Security FortiAnalyzer Centralized Logging and Reporting FortiWeb Web & XML Application Firewall FortiAP Network Security Platform Security Services Host Security Data Security FortiClient Endpoint Security FortiGuard Real time Security Services FortiDB Database Security FortiScan Asset Vulnerability Management 14
Fortinet Competitive Advantages Comprehensive High-Performance Real Time FortiOS Operating System FortiASIC Network Processor FortiGuard Subscription Service FIREWALL VPN IPS ANTIVIRUS/ ANTISPYWARE WEB FILTERING DLP APPLICATION CONTROL WAN OPTIMIZATION ANTISPAM Consolidated Security FortiASIC Content Processor FortiCare Customer Support
Fortinet pioneered a New Approach Real-time, integrated security intelligence ASIC-accelerated performance Lower total cost of ownership Easy to deploy / manage / use Stand-alone, non-integrated security Mix of off the shelf systems and applications Higher total cost of ownership Difficult to deploy / manage / use Traditional Network Security Solutions The Fortinet Solution 16
FortiGate Platform • Consolidated security appliance • Block network & content threats • Accelerated performance • 10 GbE • Up to 120 Gbps • Platforms for every market segment • Carrier to SOHO • No per-user licensing 17
Fortinet Competitive Advantages Comprehensive High-Performance Real Time FortiOS Operating System FortiASIC Network Processor FortiGuard Subscription Service FIREWALL VPN IPS ANTIVIRUS/ ANTISPYWARE WEB FILTERING DLP APPLICATION CONTROL WAN OPTIMIZATION ANTISPAM Consolidated Security FortiASIC Content Processor FortiCare Customer Support
Purposeful Acceleration = lower €/Mbps of scanning FortiASIC FortiOS • ASICs accelerate FortiOS security and network functions • Enables faster performance against competitors • Multiple ASICs (CP and NP) targeting key functions • Mature design across CP and NP • Custom built operating system • Architected for security and networking demands • Leverages custom hardware platform • Mature OS - at version 4.0 today 19
Fortinet Competitive Advantages Comprehensive High-Performance Full Control FortiOS Operating System FortiASIC Network Processor FortiGuard Subscription Service FIREWALL VPN IPS ANTIVIRUS/ ANTISPYWARE WEB FILTERING DLP APPLICATION CONTROL WAN OPTIMIZATION ANTISPAM Consolidated Security FortiASIC Content Processor FortiCare Customer Support
FortiGuard Services Network Web Filtering IPS Antivirus Antispam • Real-time updates • “Push” / “pull” updates for Fortinet customers • Tied to FortiCare registration system • Distributed infrastructure • Multiple servers deployed globally • Approximately 16 data center locations • Hierarchical deployment strategy • Main server update pushes secondary updates • Gather feedback from worldwide installed base 21
Intelligent security redundancy = cleaner pipes APPLICATION APPLICATION APPLICATION APPLICATION APPLICATION FIREWALL APPLICATION CONTROL ANTIVIRUS/ANTISPYWARE INTRUSION PREVENTION • Requires an integrated security strategy • Comprehensive, integrated inspection • Overlapping, complementary layers of protection 23
Fortinet Virtual Appliances (VM Ware) Shipping! Shipping!
Summary Consolidated Security Complete content protection Visibility Unmatched performance Purpose-built hardware and software Lower TCO Less complexity, faster deployment, easier management Real-time security 24/7 global updates deliver security expertise
Franck Bernard, Finland/Baltic region fbernard@fortinet.com THANK YOU!