Presentation is loading. Please wait.

Presentation is loading. Please wait.

Fortinet An Introduction

Similar presentations


Presentation on theme: "Fortinet An Introduction"— Presentation transcript:

1 Fortinet An Introduction
This presentation is designed to act as an introduction to Fortinet.Typical audience is business and technical decision makers in Mid to large enterprise customers. Appropriate for Executive Briefing type situations lasting about an hour.

2 The power to Control verify visualize simplify consolidate manage
The strength of Fortinet is our ability to provide organizations with the power they need to manage and gain control over their IT infrastructure using our Security technologies. protect secure accelerate enable enforce

3 Agenda Fortinet Introduction Strategic Solutions Technology Overview
First, we’ll provide a brief overview of Fortinet and why our approach is different from other security technology vendors. Next, we’ll show how our technologies can provide solutions to your most pressing business problems. And finally, we provide a brief overview of Fortinet technologies and products.

4 Fortinet Corporate Overview
Market Leader UTM - Fast-growth security segment Advanced technology and products 80+ patents; 115+ pending Strong global footprint 1,500+ employees; 30 offices worldwide Blue chip customer base 100,000 customers (incl. majority of Global 100) Exceptional financial model FY11 revenues: $434M (34% YoY growth) Q411 revenues: $121M (29% YoY growth) Strong balance sheet: $500M+ in cash; no debt IPO - November 2009 $434 FORTINET REVENUE ($MM) 48% CAGR $325 $252 First, a brief overview of Fortinet. $212 $155 $123 $80 $39 $13 4

5 A VICIOUS CIRCLE Network Security: The Traditional Approach
New Threat Intercepts New Device: ‘Next Generation’ Firewall New Device: VPN Termination A VICIOUS CIRCLE The traditional approach to security doesn’t work. E.g., VPN for secure remote access in 97 as market moved from Frame Relay/Dedicated line, to remote access over PSTN . Encrypted VPN Tunnels became critical technology. Same thing happened as new threats arose – Spam led to Spam filtering devices App layer attacks led to need for app control and app layer inspection. Management, visibility, control all suffer Best of breed lasts about 18 months, then other vendors pile into market Buying the new shiny toy doesn’t work in the long run – Silicon Valley is littered with companies that last a few years after introducing a new technology. New Threat App Layer Attacks New Threat Spam New Device: Spam Filtering

6 More Expense, Less Security, Less Control
The Result: More Expense, Less Security, Less Control “I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks.” “Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey New York Times 6/22/11 Your network might look something like this… It’s too complicated. And – it leads to security holes. Expensive, complex, lack of control, chase new box in months Are you really more secure?? Here’s what was said in a recent NY Times article….. “I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks.” “Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey - New York Times 6/22/11

7 Reducing Complexity Is Critical
Q: What are the top security-related challenges your organization is facing? (base: of those that are involved in Security investments) The traditional approach of having different devices for different security functions is adding to the problem – not solving it. Reducing complexity is CRITICAL. According to this survey done by Infoworld, the complexity of security solutions is a bigger problem than mobile clients, regulatory issues, bandwidth or employee misuse of data. Source: Navigating IT: Objective & Obstacles Infoworld, May, 2011

8 Fortinet Breaks The Cycle
New Threat Update Firmware App Control, Data Leakage, SSL Inspection Update Firmware: Web Filtering One platform, one provider, one solution…. The Fortinet model has proved durable for over 10 years. Customers don’t have to ‘rip and replace’. Breaks cycle of customer adding more vendors, maintains account control, builds customer loyalty. Fortinet Milestones FortiOS 3.0: Until FortiOS 3.0 (2006), addressing the Instant Messaging security problem required that enterprises either purchase and manage separate "point" solutions or settle for weak security processes like simply blocking or allowing the traffic. Fortinet is the first vendor to integrate complete content protection - including full antivirus (AV) scanning, blocking and quarantining of IM traffic and file attachments, intrusion prevention (IPS) signature updates, and URL filtering -- for IM applications into an existing multi-threat security system. FortiOS 4.0 (2009): Application Control, Data Leakage Prevention, WAN Optimization, SSL Inspection was introduced. New Threat New Threat Update Firmware: IM & P2P Protection

9 The Benefit Of Integration: Continuous Updates
New Threat Antispam & Web Filtering Continuous Anti-Virus: 4x each day And, while periodic Firmware updates address the response to changes in the overall security threat landscape – continous updates from FortiGuard provide protection against new threats on a daily basis. Fortinet maintains its own threat response organization – which we’ll discuss in detail later in the presentation. New Threat New Threat IPS: 2x each day

10 Followed The Internet Evolution
Security: Followed The Internet Evolution APP LAYER ATTACKS APP CONTROL SPYWARE ANTI-SPYWARE WORMS ANTI-SPAM SPAM Performance - Damage BANNED CONTENT WEB FILTER TROJANS ANTI-VIRUS Many new companies have come up with point security solutions to address each new application and attack as the threat landscape has evolved, and the network vendor players like Cisco and Juniper keep buying more point products to add on top of their firewall and VPN, resulting in more and more complex, costly deployments for customers. VIRUSES INTRUSIONS IPS CONTENT-BASED VPN CONNECTION-BASED FIREWALL HARDWARE THEFT HARDWARE THEFT HARDWARE THEFT LOCK & KEY PHYSICAL 1980s 1990s 2000s Today

11 The Fortinet Solution CONTENT-BASED CONNECTION-BASED PHYSICAL
APP LAYER ATTACKS APP CONTROL SPYWARE ANTI-SPYWARE WORMS ANTI-SPAM SPAM Performance - Damage BANNED CONTENT WEB FILTER TROJANS ANTI-VIRUS Fortinet’s approach was to create Unified Threat Management. The UTM solution, which tightly integrates many functions and point products together into a single platform. UTM is defined as a device that “Unifies” multiple security features, including firewall/VPN, Intrusion Detection/Prevention and gateway antivirus, at a minimum, Fortinet offer s all these plus much more features. We also leverage our FortiASIC to accelerate performance, and, as we discussed, we utilize our FortiGuard Labs for real-time global update service, this solution effectively protects our customers in today’s challenging network environment VIRUSES INTRUSIONS IPS CONTENT-BASED VPN CONNECTION-BASED FIREWALL HARDWARE THEFT LOCK & KEY PHYSICAL 1980s 1990s 2000s Today

12 Fortinet: A New Approach
TRADITIONAL SOLUTIONS Cumbersome and costly THE FORTINET SOLUTION Simple and cost-effective Traditional Solutions are: - Non-integrated - Mix of off the shelf systems and applications Have a higher total cost of ownership And, are difficult to deploy, manage and use The Fortinet approach provides the same technologies without the complexity. With added benefits of: Real-time integrated security intelligence ASIC-accelerated performance Lower total cost of ownership While being easier to deploy, manage and use 12

13 FortiGate: Integrated Architecture
Real-Time Protection FortiGuard™ Updates Fully Integrated Security & Networking Technologies AV IPS Web Filter Antispam App Ctrl VM Firewall VPN DLP WAN Opt Traffic Shaping WLAN VoIP SSL Insp HA Load Balancing • We control all components which leads to a rich, comprehensive architecture. • Integration of variety of technologies allows organizations to choose which technologies they require • One company, one architecture No other vendor provides such a rich, integrated suite of security technologies. Fortinet Offers…… Purpose-built software and hardware acceleration through ASICs Specific processors and hardware to handle various security functions to optimize performance and perform SSL decryption on thousands of simultaneous connections Options for stream-based, flow-based or complete content protection Acceleration for specific security functions like Ipv6, multicast routing, IPS, application control and flow anti-virus inspection. Clusters, sub-second failover, uninterruptable upgrades Management System HA & geographical redundancy WAN optimization and caching to accelerate web applications/servers by reducing bandwidth usage, server load, and perceived latency The Result: low latency, high performance and resiliency, increased flexibility Hardened Platform Specialized OS High Performance Purpose-Built Hardware Support and Services FortiCare™ FortiGuard Labs Purpose-built to deliver overlapping, complementary security Provides both flexibility & defense-in-depth capabilities 13

14 Unmatched Solution Spectrum
COVERAGE Domain Network Data Center/Cloud SOHO/CPE Enterprise Carrier And, no other vendor offers solution across such a wide spectrum. From small office and CPE solutions – up to the Fastest Firewall In The World. And – we offer coverage from the individual device level up to complete network and domain-level solutions. The breadth of our solutions and devices plus the richness of our integrated security offering is unmatched in the industry. Simply put, Fortinet provides the most complete security offering in the market. SIZE Content Device

15 The Result: Market Leadership
Worldwide UTM Market Share Q Magic Quadrant for Unified Threat Management2 Rank Company Market Share (%) 1 18.0 2 Check Point 14.0 3 SonicWALL 8.3 4 Juniper 7.9 5 Cisco 6.5 6 WatchGuard 4.7 7 McAfee 4.0 8 Crossbeam 3.0 9 Other 33.6 Total 100.0 And – our strategy is paying off! Numerous awards and industry recognition for our success. IDC Worldwide Security Appliances Tracker, Sept 2011 (market share based on factory revenue) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012 15


Download ppt "Fortinet An Introduction"

Similar presentations


Ads by Google