1 / 34

Security for a New World

In a rapidly changing security landscape, organizations face increasing cyber threats and risks. Traditional approaches no longer work, as complexity and borderless attacks become prevalent. Security for a New World offers advanced security solutions and network performance, ensuring seamless protection across the entire attack surface.

ijones
Download Presentation

Security for a New World

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security for a New World Alessandro Fontana System Engineer

  2. SECURITY HAS CHANGED 3.2 3 BillionNEW DEVICES PER YEAR THROUGH 2020 BillionSMARTPHONES SHIPPED WORLDWIDE 1.3 BillionINTERNETusers PUBLIC CLOUD MARKET IS ESTIMATED TO REACH $191BILLION 10,000x INCREASE IN CYBER THREATS

  3. SO HAVE THE RISKS “ Average Cost of Cybercrime in the U.S. Dollars (Millions), per incident Sony security spends $22M per year. Sony Breach…direct cost of $35M for one year….cost to reputation $100B+ KowsikGuruswamy, CTO of Menlo Security “

  4. TODAY’S STANDARD APPROACHESNO LONGER WORK TOO Much Focus on compliance Too Risk Based Too MANY POINT SOLUTIONS Enterprises spend too much on checking boxes down a list. Taking a reactive approach only addresses known threats, not the new unknowns. Too many different security vendors whose products do not communicate with one another.

  5. NEW RULES

  6. Rule #1Complexityis the enemyof security

  7. Complexity is the Enemy of Security Cloud Vendor D Each solution is bounded No interaction Nointegration Campus Vendor B Vendor A Branch Vendor C Data Center Vendor E

  8. Rule #2Today’s Security is Borderless

  9. Borderless Attack Surface There’s more ways in Mobile More ways out Internet Cloud Saas Saas Internet Campus Branch Office PoS Data Center Remote Office IoT

  10. Rule #3slow is broken

  11. Slow is Broken Infrastructure Speed Business Security

  12. A new world calls for anew approach Today’s world demands security without compromise.

  13. SECURITY FOR A NEW WORLD IS SECURITY WITHOUT COMPROMISE Advanced Security Network Performance

  14. SECURITY FOR A NEW WORLD IS SECURITY WITHOUT COMPROMISE Advanced Security Network Performance Our customers can have both

  15. Security Without Compromise Seamless Security Across the Entire Attack Surface FortiGuard Threat Intelligence & Services Client Security Secure Access Network Security Application Security Cloud Security FortiGate SEAMLESS Consistent threat posture end-to-end, across the expanding attack surface INTELLIGENT Threat intelligence and advanced threat protection from the inside out for full visibility and control POWERFUL Unrivaled network performance for today – and the power to take on the future

  16. New World Strategies Segmentation Strategies Can Now Be Realized For Protection Against Threats From the Outside and the Inside Employee Information Financial Information Sales Information Intellectual Property Partner Information Supplier Information Customer Information

  17. Fortinet Security Fabric – Protecting from IoT to Cloud Scale Awareness Security Actionable Open Global Intelligence Alliance Partners Client Security IoT Cloud Security FortinetSecurity Fabric Application Security Secure LAN Access Local Intelligence Secure WLAN Access Network Security

  18. Open: Multiple Levels of Fabric API’s for Partner Integration Ecosystem Alliance Partners SIEM Management Fortinet Security Fabric Endpoint SDN Virtual Cloud

  19. Global Intelligence & Control Data Center SDN Orchestration Mobile Antivirus Service Application Control Service Anti-spam Service FortiGuardLabs Global Threat Intelligence Endpoint Campus Internet Internet Intrusion Prevention Service Cloud SaaS SaaS Web Security Service Data Center Full Visibility NGFW DCFW Branch Office UTM Database Security Service Web Filtering Service Single Pane of Glass Cloud PoS Vulnerability Management Service NEW! Mobile App Control Service IP Reputation Service IoT + other threat intelligence sharing initiatives FortiGuard Services FortiGuard Sensors Global Fortinet Device Footprint Internal External

  20. FortiGuard Threat Intelligence Projects CISCP & NCCIC

  21. Global Intelligence & Control Data Center SDN Orchestration Mobile Antivirus Service Application Control Service Anti-spam Service Global Threat Intelligence Endpoint Campus Internet Internet Intrusion Prevention Service Cloud SaaS SaaS Web Security Service Data Center Full Visibility NGFW DCFW Branch Office UTM Database Security Service Web Filtering Service Single Pane of Glass Cloud PoS Vulnerability Management Service NEW! Mobile App Control Service IP Reputation Service IoT + other threat intelligence sharing initiatives Global Fortinet Device Footprint Internal External

  22. Global Intelligence & Control Data Center SDN Orchestration Mobile Antivirus Service Application Control Service Anti-spam Service Global Threat Intelligence Endpoint Campus Internet Internet Intrusion Prevention Service Cloud SaaS SaaS Web Security Service Data Center Full Visibility NGFW DCFW Branch Office UTM Database Security Service Web Filtering Service Single Pane of Glass Cloud PoS Vulnerability Management Service IP Reputation Service NEW! Mobile App Control Service IoT + other threat intelligence sharing initiatives Global Fortinet Device Footprint Internal External

  23. FortiAnalyzer > FortiView> Top Web Sites

  24. FortiAnalyzer > FortiView> Top Applications

  25. Powerful Innovation • Built with speed in mind since 2000 • Custom design perfected • Barriers to entry for any other vendor SECURITY THAT THRILLS

  26. It’s an ASIC Thing

  27. FortiGate Anatomy Parallel Path Processing • Hardware Accelerated Content Analysis and Encryption • Zero CPU Forwarding FortiASIC Content Processor General Purpose CPU FortiASIC Network Processor Integrated Switch Fabric External Network Interfaces • Accelerates Computationally Intensive Tasks • IPS and Antivirus Analysis • VPN Key Exchange FortiASIC-CP8

  28. Fortinet Scales with You Core Protection Advanced Protection Global Intelligence & Services ADVANCED THREAT PROTECTION ENTERPRISE FIREWALL CLOUD SECURITY NEW App Control Antivirus Mobile Security CONNECTED UTM SECURE ACCESS DATA CENTER SECURTY Web App IPS Security Services Anti-spam Web Filtering

  29. Fortinet Facts HQ FOUNDED 2000 OVER 2 MILLION SUNNYVALE, CA IPO DEVICES SHIPPED 100+ 2009 OFFICESWORLDWIDE #1 UNIT SHARE $ 1.17B WORLDWIDE 3,900+ CASH In Network Security (IDC) EMPLOYEES MARKET LEADING TECHNOLOGY 40% 255,000+ 257 PATENTS 228 PENDING GROWTH CUSTOMERS

  30. New world. New rules. No compromises.

  31. Alessandro Fontana | afontana@fortinet.com

More Related