Presentation is loading. Please wait.

Presentation is loading. Please wait.

Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales 310.536.0039 Daryl Jung - SE 626.592.3789.

Similar presentations

Presentation on theme: "Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales 310.536.0039 Daryl Jung - SE 626.592.3789."— Presentation transcript:

1 Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales Daryl Jung - SE

2 Fortinet Confidential Your Business Requirements Keep Growing 2 Network Throughput of Enterprise Data Center 10MB 100MB 1GB Multi-GB 10GB Industries demanding greater IT compliance Compliance needs coming from government regulations as well as business partners / industry mandates IT budgets shrinking Security spend increasing Network requirements / demands accelerating Security demands must co-exist SOX 404 FISMA HIPAA Change in External IT Services Spending From FY09 to FY10 % EU Data Protection Directive

3 Fortinet Confidential I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks. Security Professionals Say Network Breaches Are Rampant Ponemon Institute Survey New York Times 6/22/11 The Result: More Expense, Less Security, Less Control

4 Fortinet Confidential Reducing Complexity Is Critical Source: Navigating IT: Objective & Obstacles Infoworld, May, 2011 Q: What are the top security-related challenges your organization is facing? (base: of those that are involved in Security investments)

5 Fortinet Confidential 12 Steps to Great Security (find 3 issues) 5 Simple Written Security Policy Database and Network Vulnerability Assessments Patch and Appliance Management Redundancy: High-Availability & WAN-WAN Grouping of Divisions … Data Leak Prevention Content Filtering… Application Control Integrated Anti-Virus/Gateway Anti-Virus Log Reporting Anti-Spam/Spyware Secure your Tele-Commuters Secure Wireless Access Points ICSA/IPsec Firewall (with logging) & Intrusion Prevention

6 Fortinet Confidential Protection Protect assets Guard against threats Policy Improve employee productivity Meet regulatory requirements Process Enable business growth Increase efficiency The Basic Problems

7 Fortinet Confidential Staggering Statistics 7 Internet users spent an average of 6 hours (100% increase from a year ago) on social networking sites & the average US worker spends almost 5.5 hours a month visiting social network sites from the office. Nielson Reports: Internet & Social Media Consumer Insights, May 10 The use of social media at work is increasing with nearly 7% of all business Internet traffic going to Facebook, according to new analysis by managed security firm, Network Box. BizReport: Social Media Cuts into Internet Bandwidth Consumption, April 10

8 Fortinet Confidential Controlling Web Applications Allow Facebook, but block Facebook applications » Farmville » Facebook Chat » Facebook Video Allow YouTube, but block YouTube download Allow Google Maps, but block Google Web Talk

9 Fortinet Confidential The Reach of Facebook 9 Facebook alone touts over 500 million active users that spend in excess of 700 billion minutes per month on the site and share 30 billion pieces of content Facebook platform houses over 550,000 active applications and is integrated with more than one million websites Facebooks total site visits in December 2010 eclipsed Googles Over 20 million applications are installed per day and over 250 million people interact with Facebook from outside the official website on a monthly basis, across 2 million websites

10 Fortinet Confidential Social Networking is Everywhere 10 LinkedIn has around 75 million users worldwide In July 2010, LinkedIn logged 50 million unique visitors Twitter has over 105 million registered users posting 750 tweets per second MySpace has nearly 70 million users in the U.S

11 Fortinet Confidential The Power To Control: Enforcing Policy & Solving Everyday Problems 11 Emily, a financial trader, installed Skype on her company laptop to talk with family. Bill works for a Fortune 100 company and shares company details on Facebook. Ed shared a company presentation via his personal Gmail account. Jill is at Starbucks and needs to communicate and be protected as if she was at HQ. Data Leak Protection Endpoint Control Identity-Based Policies - Two-Factor Authentication - VPN Tunneling - WAN Optimization - Two-Factor Authentication - VPN Tunneling - WAN Optimization

12 Fortinet Confidential What are the Risks? 12 Lack of visibility and control Many businesses are limited in their control of social networking. They use URL filters to either allow complete access to restrict the entire application. Widening attack surface Malicious code is not just coming from the dark corners of the web, like pornography, gaming and pharmaceutical sites. Its estimated that 77 percent is coming from legitimate sites. Data loss potential Social networking sites are all about collaboration and sharingpotentially even of sensitive data. Today, there is little control over data loss in social media arenas because policies do not typically cover what users contribute.

13 Fortinet Confidential Thinking Strategically About Security 13 Future-proof your security infrastructure »Anticipate change in threat scape Look for opportunities to consolidate without compromise »Reduce complexity »Increase protection »Decrease risk »Lower CapEx & OpEx By 2010, only 10% of emerging security threats will require tactical point solutions, compared with 80% in Source: Gartner

14 Fortinet Confidential The Result: Market Leadership (1) IDC Worldwide Security Appliances Tracker, Sept 2011 (market share based on factory revenue) (2) Gartner, Inc., Magic Quadrant for Unified Threat Management, March 2012 RankCompany Market Share (%) Check Point SonicWALL 8.3 4Juniper 7.9 5Cisco 6.5 6WatchGuard 4.7 7McAfee 4.0 8Crossbeam 3.0 9Other 33.6 Total Magic Quadrant for Unified Threat Management 2 Worldwide UTM Market Share Q

15 Fortinet Confidential Fortinet: A New Approach TRADITIONAL SOLUTIONS Cumbersome and costly THE FORTINET SOLUTION Simple and cost-effective

16 Fortinet Confidential FortiOS Purpose- Built Hardware Original Threat Research Anatomy of the FortiGate Solution FortiOS is the security hardened operating system that powers all FortiGate multi-threat security systems.

17 Fortinet Confidential Purpose-Built Hardware Specialized OS Firewall Fully Integrated Security & Networking Technologies Hardened Platform High Performance Real-Time Protection Traffic ShapingVPN SSL Insp DLPWAN Opt FortiGuard Updates WLANLoad BalancingVoIPHA Support and Services FortiCareFortiGuard Labs AVIPS AntispamWeb FilterApp Ctrl VM Purpose-built to deliver overlapping, complementary security Provides both flexibility & defense-in-depth capabilities FortiGate: Integrated Architecture

18 Fortinet Confidential Centralized Visibility and Control: FortiManager & FortiAnalzyer Single Pane of Glass Management Global policy enforcement across 5 or 5,000 devices Increased flexibility with granular role-based administration Simplified configuration of Firewall, IPS, Application Controls and other protections Centralized Analysis and Reporting Continuous monitoring across the enterprise Greater visibility into real-time incidents Monitor activity by users identity Automate compliance reporting

19 Fortinet Confidential Real Threat Protection in Action Innocent Video Link: Redirects to malicious Website Integrated Web Filtering Blocks access to malicious Website Network Antivirus Blocks download of virus Intrusion Protection Blocks the spread of the worm Solution: Error message: Drops copy of itself on system and attempts to propagate Out of date Flash player error: Download malware file Problem:

20 Fortinet Confidential Threat Protection Solution for IM & P2P 20 Access Control Enforce appropriate user access only Limit IM functionalities (eg. File transfer) Monitoring & Audit Detailed conversation & File transfer logging IM Message content archiving Antivirus Detects and block infected File transfers Enforce File blocking by extensions Attack Prevention IPS signatures that stop attacks using known vulnerabilities of IM clients

21 Fortinet Confidential FortiGuard: Research, Updates, Services FortiGuard Research: Rootkits: Kernel Hooks Botnets: Dynamic Monitoring, Spambots, New Malware Protocols Malware: Code Techniques-PDF/Flash/Doc Security: Exploits & Vulnerabilities, Zero Day Detection Packer Research: Unpacking, Generic Detection FortiGuard Services: AV Signatures – 4x Daily IPS Signatures – 2x Daily Antispam/Web Content Filtering – Real Time Sample Collection Signature Creation Alerts & Escalation Global Distribution Network: Application Control Vulnerability Management Antispam Web Filtering Intrusion Prevention Antivirus

22 Fortinet Confidential Greening of IT…. Firewall / VPN Antivirus Web Filtering IPS FortiGate Appliance ¼ Physical Space ¼ Power Consumption = =

23 Fortinet Confidential Comprehensive Product Portfolio Powerful Centralized Management & Reporting Secure & Client Software FortiGate-50B – FortiGate-100A SMB & Remote Office FortiGate-200A – FortiGate-800F Enterprise FortiGate-1000A – FortiGate-5000 Carrier, MSSP & Large Enterprise

24 Fortinet Confidential 24 Fortinet at a glance: 100,000+ customers 900,000 appliances shipped The worlds leading enterprises, telcos and service providers Major government education, healthcare and retail institutions Global Installed Base

25 Fortinet Confidential Why is Fortinet Successful in Hawaii? Trained Partners – Hawaiian Telcom Availability – 4 to 5 times a year in Hawaii for client meetings Engineering Refreshers – 11 Since 2008 – No Cost (except parking) Diverse island client base… Enterprise Hospitality State and Local K-12 Retail Higher Education 25

26 Fortinet Confidential Fortinets Hawaii Customers 26 State and County BusinessesRetail, Banking, Cultural Businesses

27 Fortinet Confidential 27 Fortinets Hawaii Customers University and Lower Educational InstitutionsTravel & Tourism Businesses

28 Fortinet Confidential 28 Hardware and Services Bundles Bundles also available for our FortiMail product line. Security and OS Updates MaintenanceSupport Hardware One Full Year No per user fees!!

29 Fortinet Confidential Why Fortinet? Technology ASIC Chips = speed + complete inspection FortiGuard update network = always up to date Custom hardware = purpose built for security Scalable = ready for growth Value = ability to replace multiple products in your network Cost / Ease of Management Low TCO, no user fees, bundled pricing No third party updates One vendor to deal with support issues/billing Fewer technical resources required to manage

30 Fortinet Confidential Fortinet Corporate Overview $434 $39 $80 $123 $155 $212 $252 $325 FORTINET REVENUE ($MM) 55% CAGR $ Market Leader UTM - Fast-growth security segment Advanced technology and products 101+ patents; 113+ pending Strong global footprint 1,700+ employees; 40 offices worldwide Blue chip customer base Over 125,000 customers (incl. majority of Global 100) Exceptional financial model FY11 revenues: $434M (34% YoY growth) Q1/12 revenues: $117M (26% YoY growth) Strong balance sheet: $600M+ in cash; no debt IPO - November 2009

31 Fortinet Confidential 4 Points = 1 Solution Comprehensive solution »Integrated, strategic security Lower TCO »Less complexity and easier management Real-time security »24/7 global updates Strategic flexibility »Fit your timeline and budget

32 Fortinet Confidential Thank You

Download ppt "Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales 310.536.0039 Daryl Jung - SE 626.592.3789."

Similar presentations

Ads by Google