2 Agenda The legacy network security approach & multi-party UTM The Fortinet approachMaximizing the Fortinet opportunitySummary
3 Multiple point solutions & multi-party UTM The legacy network security approachMultiple point solutions & multi-party UTM
4 Resilient architecture Key Points: Main drawbacks GatewayCorporate LANDLPIPSAnti-VirusFirewallAnti-SpamWeb FilterSSL VPNDLPIPSIPSAnti-VirusAnti-SpamWeb FilterSSL VPNDLPFirewallAnti-VirusFirewallAnti-SpamWeb FilterSSL VPNMulti-Party UTMResilient architectureKey Points:Main drawbacksConsolidated hardware100% increase in hardware sprawlInefficient multiple point solutions = latency & vulnerabilitiesLegacy firewallCost savings from reduced utility overheads, training etcFirst network security technologyVery low utilisation of investment – Under 50%A set of individuals, not a teamBUT!Considerable sprawl in appliancesEnd result is underperforming, over expensive security postureLimited functionality – Port & Protocol, Allow & BlockSimilar performance issues due to multiple scanning enginesTime consuming environment to administer, multiple consolesInsufficient protection against a multitude of threatsReliance on updates from 3rd party databasesSizeable total cost of ownership… Technical training, power & cooling, costly license programsMore advanced protection requiredNo major improvement in efficacy
5 An integrated network security platform The Fortinet approachAn integrated network security platform
7 Maximising the Fortinet opportunity The unified access layer
8 Fortigate: Integrated security platform GatewayCorporate LANWLANIPSAnti-VirusAnti-SpamWeb FilterSSL VPNDLPFirewallFortigate: Integrated security platformFortiAP: Secure wireless accessFortigate: Secure site to site connectivityFortiToken: Strong authentication for mobile workersThe Unified Access Layer
9 Summary Legacy security Multiple point solutions are inefficient with a high total cost of ownershipLeave gaps in the network security postureMulti-party UTM offer similar problems with very little improvement in performanceFortinetFortinet offers a different approach with purpose built, accelerated hardwareHigh performance at a low priceComplimentary Fortinet technologies provide a ‘unified access layer’ for secure connectivity regardless of location or network typeTrue Unified Threat Management
Your consent to our cookies if you continue to use this website.