Presentation on theme: "Fortinet and Hawaiian Telcom"— Presentation transcript:
1 Fortinet and Hawaiian Telcom Mike Wysocki - SalesDaryl Jung - SE
2 Your Business Requirements Keep Growing Network ThroughputBudgetary ConstraintsRegulatory PressuresNetwork requirements / demands acceleratingSecurity demands must co-existIT budgets shrinkingSecurity spend increasingIndustries demanding greater IT complianceCompliance needs coming from government regulations as well as business partners / industry mandatesChange in External IT Services Spending From FY09 to FY10%10GBNetwork Throughput of Enterprise Data CenterWe also understand that the operational demands face are changing dramatically as well.The demand for greater throughput and bandwidth requires your organization to invest more in network infrastructure to support the required traffic speeds. As a result of the faster network speeds, you need require faster security tools to keep up.And, while IT threats are increasing, your budget isn’t keeping pace.To make the picture complete, you also face significant regulatory issues to create, enforce, and measure your policy compliance.SOX 404HIPAAMulti-GBFISMA1GB10MB100MBEU Data Protection Directive
3 The Result: More Expense, Less Security, Less Control “I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks.”“Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey New York Times 6/22/11Your network might look something like this…It’s too complicated.And – it leads to security holes.Expensive, complex, lack of control, chase new box in monthsAre you really more secure??Here’s what was said in a recent NY Times article…..“I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks.”“Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey - New York Times 6/22/11
4 Reducing Complexity Is Critical Q: What are the top security-related challenges your organization is facing? (base: of those that are involved in Security investments)The traditional approach of having different devices for different security functions is adding to the problem – not solving it.Reducing complexity is CRITICAL. According to this survey done by Infoworld, the complexity of security solutions is a bigger problem than mobile clients, regulatory issues, bandwidth or employee misuse of data.Source: Navigating IT: Objective & ObstaclesInfoworld, May, 2011
5 12 Steps to Great Security (find 3 issues) Simple Written Security PolicyDatabase and Network Vulnerability AssessmentsPatch and Appliance ManagementRedundancy: High-Availability & WAN-WANGrouping of Divisions… Data Leak PreventionContent Filtering… Application ControlIntegrated Anti-Virus/Gateway Anti-VirusLog ReportingAnti-Spam/SpywareSecure your Tele-CommutersSecure Wireless Access PointsICSA/IPsec Firewall (with logging) & Intrusion PreventionFirst, a brief overview of Fortinet.
6 Protection Policy Process The “Basic” ProblemsProtectionProtect assetsGuard against threatsPolicyImprove employee productivityMeet regulatory requirementsProcessEnable business growthIncrease efficiencyMany of the problems facing organization’s can be summarized as ones of:• Protection – protecting assets and guarding against threats. Preventing personnel from doing things that can lead to security exposure (ex downloading malware, visiting dangerous websites)• Implementing and enforcing policies – these policies can be designed to increase employee productivity (ex – limiting online shopping to lunch hours) or meeting regulatory requirements such as HIPAA or PCI. Fortinet provides ability to craft a detailed, enforceable policy. Of course, such policies should be consistent with the corporate culture and regulatory requirements of an organization• Improving business processes – securely deploying new strategies (ex. Cloud Computing, BYOD etc…) that enable business growth and increasing overall efficiencies by making the most of your infrastructure (ex Bandwidth Management)
7 Staggering Statistics Internet users spent an average of 6 hours (100% increase from a year ago) on social networking sites & the average US worker spends almost 5.5 hours a month visiting social network sites from the office.Nielson Reports: Internet & Social Media Consumer Insights, May ’10The use of social media at work is increasing with nearly 7% of all business Internet traffic going to Facebook, according to new analysis by managed security firm, Network Box.BizReport: Social Media Cuts into Internet Bandwidth Consumption, April ’1077
8 Controlling Web Applications Allow Facebook, but block Facebook applicationsFarmvilleFacebook ChatFacebook VideoAllow YouTube, but block YouTube downloadAllow Google Maps, but block Google Web Talk
9 The Reach of FacebookFacebook alone touts over 500 million active users that spend in excess of 700 billion minutes per month on the site and share 30 billion pieces of contentFacebook platform houses over 550,000 active applications and is integrated with more than one million websitesFacebook’s total site visits in December 2010 eclipsed Google’sOver 20 million applications are installed per day and over 250 million people interact with Facebook from outside the official website on a monthly basis, across 2 million websites
10 Social Networking is Everywhere LinkedIn has around 75 million users worldwideIn July 2010, LinkedIn logged 50 million unique visitorsTwitter has over 105 million registered users posting 750 tweets per secondMySpace has nearly 70 million users in the U.S
11 The Power To Control: Enforcing Policy & Solving Everyday Problems Emily, a financial trader, installed Skype on her company laptop to talk with family.Bill works for a Fortune 100 company and shares company details on Facebook.Endpoint ControlIdentity-Based PoliciesEmily – application policy checking via FortiClientBill: Identity-based policies + DLP, app control. Bill (the CFO) might authorized to post to the Corporate Facebook page while others might notJill: Setting up a VPN – with 2 factor authentication and WAN optimization for improved app performance.Ed: Detect content with sensitive dataEd shared a company presentation via his personal Gmail account.Jill is at Starbucks and needs to communicate and be protected as if she was at HQ.Two-Factor AuthenticationVPN TunnelingWAN OptimizationData Leak Protection
12 What are the Risks? Lack of visibility and control Many businesses are limited in their control of social networking. They use URL filters to either allow complete access to restrict the entire application.Widening attack surfaceMalicious code “is not just coming from the dark corners of the web,” like pornography, gaming and pharmaceutical sites. Its estimated that 77 percent is coming from legitimate sites.Data loss potentialSocial networking sites are all about collaboration and sharing—potentially even of sensitive data. Today, there is little control over data loss in social media arenas because policies do not typically cover what users contribute.
13 Thinking Strategically About Security Future-proof your security infrastructureAnticipate change in threat scapeLook for opportunities to consolidate without compromiseReduce complexityIncrease protectionDecrease riskLower CapEx & OpEx“By 2010, only 10% of emerging security threats will require tactical point solutions, compared with 80% in 2005.Source: GartnerWe believe the way to deal with the changing threatscape and demanding business requirements is to take a more strategic approach to your application, data, and network security.What this means is that you develop a security infrastructure that is able to adapt to changes in threats while also keeping up with changes in the business environment.An infrastructure that reduces complexity while increasing your ability to detect and block new threats; one that reduces risk while reducing costs.“
14 The Result: Market Leadership Worldwide UTM Market ShareQMagic Quadrant forUnified Threat Management2RankCompanyMarketShare (%)118.02Check Point14.03SonicWALL8.34Juniper7.95Cisco6.56WatchGuard4.77McAfee4.08Crossbeam3.09Other33.6Total100.0And – our strategy is paying off! Numerous awards and industry recognition for our success.IDC Worldwide Security Appliances Tracker, Sept 2011 (market share based on factory revenue)Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 201214
15 Fortinet: A New Approach TRADITIONAL SOLUTIONSCumbersome and costlyTHE FORTINET SOLUTIONSimple and cost-effectiveTraditional Solutions are:- Non-integrated- Mix of off the shelf systems and applicationsHave a higher total cost of ownershipAnd, are difficult to deploy, manage and useThe Fortinet approach provides the same technologies without the complexity. With added benefits of:Real-time integrated security intelligenceASIC-accelerated performanceLower total cost of ownershipWhile being easier to deploy, manage and use15
16 Anatomy of the FortiGate Solution FortiOSPurpose-Built HardwareOriginal Threat ResearchFortiOS is the security hardened operating system that powers all FortiGate multi-threat security systems.
17 FortiGate: Integrated Architecture Real-Time ProtectionFortiGuard™ UpdatesFully IntegratedSecurity &NetworkingTechnologiesAVIPSWeb FilterAntispamApp CtrlVMFirewallVPNDLPWAN OptTraffic ShapingWLANVoIPSSL InspHALoad Balancing• We control all components which leads to a rich, comprehensive architecture.• Integration of variety of technologies allows organizations to choose which technologies they require• One company, one architectureNo other vendor provides such a rich, integrated suite of security technologies.Fortinet Offers……Purpose-built software and hardware acceleration through ASICsSpecific processors and hardware to handle various security functions to optimize performance and perform SSL decryption on thousands of simultaneous connectionsOptions for stream-based, flow-based or complete content protectionAcceleration for specific security functions like Ipv6, multicast routing, IPS, application control and flow anti-virus inspection.Clusters, sub-second failover, uninterruptable upgradesManagement System HA & geographical redundancyWAN optimization and caching to accelerate web applications/servers by reducing bandwidth usage, server load, and perceived latencyThe Result: low latency, high performance and resiliency, increased flexibilityHardened PlatformSpecialized OSHigh PerformancePurpose-Built HardwareSupport and ServicesFortiCare™FortiGuard LabsPurpose-built to deliver overlapping, complementary securityProvides both flexibility & defense-in-depth capabilities17
18 Centralized Visibility and Control: FortiManager & FortiAnalzyer Single Pane of Glass ManagementGlobal policy enforcement across 5 or 5,000 devicesIncreased flexibility with granular role-based administrationSimplified configuration of Firewall, IPS, Application Controls and other protectionsFortinet provides for the consolidation of management and analysis functions.No other vendor allows for the management of such a wide range of devices that implement such a wide range of security technologies.Centralized Analysis and ReportingContinuous monitoring across the enterpriseGreater visibility into real-time incidentsMonitor activity by users identityAutomate compliance reporting
19 Real Threat Protection in Action Problem:PORT 80Error message:“Drops” copy of itself on system and attempts to propagate“Innocent” Video Link:Redirects to malicious Website“Out of date” Flash player error:“Download” malware fileSolution:Integrated Web FilteringBlocks access to malicious WebsiteFIREWALLNetwork AntivirusBlocks download of virusWEB FILTERINGANTIVIRUSIntrusion ProtectionBlocks the spread of the wormINTRUSION PROTECTION
20 Threat Protection Solution for IM & P2P Access ControlEnforce appropriate user access onlyLimit IM functionalities (eg. File transfer)Monitoring & AuditDetailed conversation & File transfer loggingIM Message content archivingAntivirusDetects and block infected File transfersEnforce File blocking by extensionsAttack PreventionIPS signatures that stop attacks using known vulnerabilities of IM clients
21 FortiGuard: Research, Updates, Services Rootkits: Kernel HooksBotnets: Dynamic Monitoring, Spambots, New Malware ProtocolsMalware: Code Techniques-PDF/Flash/DocSecurity: Exploits & Vulnerabilities, Zero Day DetectionPacker Research: Unpacking, Generic DetectionFortiGuard Services:AV Signatures – 4x DailyIPS Signatures – 2x DailyAntispam/Web Content Filtering – Real TimeSample CollectionSignature CreationAlerts & EscalationOur FortiGuard labs operate around the clock and around the world. Over 200 professionals are constantly tracking the threat landscape and provide continuous updates. AND, the fact the we don’t rely on third parties for our updates ensures that these updates are current and will work seamlessly on our devices.Global Distribution Network:Application ControlVulnerability ManagementAntispamWeb FilteringIntrusion PreventionAntivirus
22 = = Greening of IT…. ¼ Physical Space ¼ Power Consumption FortiGate Appliance¼ Physical Space¼ Power Consumption=Firewall / VPNAntivirusWeb FilteringIPS=
24 Global Installed Base Fortinet at a glance: 100,000+ customers 900,000 appliances shippedThe world’s leading enterprises, telcos and service providersMajor government education, healthcare and retail institutions
25 Why is Fortinet Successful in Hawaii? Trained Partners – Hawaiian TelcomAvailability – 4 to 5 times a year in Hawaii for client meetingsEngineering Refreshers – 11 Since 2008 – No Cost (except parking)Diverse island client base…EnterpriseHospitalityState and LocalK-12RetailHigher Education
26 Fortinet’s Hawaii Customers State and County Businesses Retail, Banking, Cultural Businesses
27 Fortinet’s Hawaii Customers University and Lower Educational Institutions Travel & Tourism Businesses
28 Hardware and Services Bundles No per user fees!!Security andOS UpdatesMaintenanceSupportOne Full YearBundles also available for our FortiMail product line.2828
29 Why Fortinet? Technology ASIC Chips = speed + complete inspection FortiGuard update network = always up to dateCustom hardware = purpose built for securityScalable = ready for growthValue = ability to replace multiple products in your networkCost / Ease of ManagementLow TCO, no user fees, bundled pricingNo third party updatesOne vendor to deal with support issues/billingFewer technical resources required to manageWe know that on a daily basis, you’re having make hard choices on how to do more without spending more.You are under pressure to open up more of your data to employees, customers, partners, and vendors; at the same time you’re expected to reduce the potential of unauthorized access to your data and backend systems.You’re also expected to make your existing staff and security technologies more effective, and to do it while spending lessAnd, we know you’re expected to lower your expenses
30 Fortinet Corporate Overview Market LeaderUTM - Fast-growth security segmentAdvanced technology and products101+ patents; 113+ pendingStrong global footprint1,700+ employees; 40 offices worldwideBlue chip customer baseOver 125,000 customers (incl. majority of Global 100)Exceptional financial modelFY11 revenues: $434M (34% YoY growth)Q1/12 revenues: $117M (26% YoY growth)Strong balance sheet: $600M+ in cash; no debtIPO - November 2009$434FORTINET REVENUE ($MM)55% CAGR$325$252First, a brief overview of Fortinet.$212$155$123$80$39$1330
31 4 Points = 1 Solution Comprehensive solution Integrated, strategic securityLower TCOLess complexity and easier managementReal-time security24/7 global updatesStrategic flexibilityFit your timeline and budget
Your consent to our cookies if you continue to use this website.