Fortinet Confidential End-to-End Strategic Security Bryan Wood Manager – Western Channel Sales October 14th, 2009.

Slides:



Advertisements
Similar presentations
Summary of Forrester Wave
Advertisements

THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Agenda 2 The customer One platform for all customers Enables small businesses around the world, powers many of the worlds largest data centers, and.
Innovative, Best-in-Class Technologies and Products
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
1 © Copyright 2013 Fortinet Inc. All rights reserved. Комплексная экосистема безопасности Мирослав Мищенко Менеджер по работе с ключевыми клиентами.
1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
SAS® Data Integration Solution
MSIT 458: Information Security & Assurance By Curtis Pethley.
National Symposium for Command & Control and Cyber Security
Introduction to Fortinet Unified Threat Management
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
Nate Olson-Daniel Director of Strategic Development & Principal Engineer The Inevitable Attack.
Selling Fortinet to financial sector Kanwar Loyal Finance Specialist Date.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Barracuda Networks Steve Scheidegger Commercial Account Manager
1. 2 Oracle + Hyperion Integrated Enterprise Performance Management System Provides industry’s first EPM System Align operational intelligence with strategy:
Unstructured org looking to improve project management? Portal Enterprise Content Management Collaborative Workspaces Collaborative Workspaces Business.
It’s Not Your Father’s NAC: Next-generation NAC
Private vs. Public: What’s Your Risk? San Diego’s 3 rd Annual Cloud Computing Conference September 22, 2011.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Fortinet Confidential Bangalore 4 th December 2009 Vishak Raman Regional Director – SAARC & KSA “Security Virtualization”
Protecting Customer Websites and Web Applications Web Application Security.
Microsoft Confidential2 3 Paul Hamerman, China Martens, Forrester Research Inc., May 2011 ”Microsoft Commits to ERP in the Cloud” 4 Product-centric.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
WELCOME!. Page: 2 Agenda One is impressive – two make a powerful team! Networking solutions, the Extreme way Coffee Break Security solutions, the NetScreen.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Fortinet An Introduction
Fortinet An Introduction
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Rafael Hiciano Business Development Manager, Applications Platform, Enterprise & Partner Group, Microsoft Corporation Deb Mukhopadhyay Specialized Business.
Joseph Ferracin Director IT Security Solutions Managing Security.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
My Sites (2003) Blogs & Wikis (2007) Kits (2008+)
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
The Changing World of Endpoint Protection
Teradata Overview. Teradata Highlights Teradata Corporation >Global Leader in Enterprise Data Warehousing and Analytics –EDW/ADW Database Technology –Analytic.
2015 Security Conference Dave Gill Intel Security.
Threat Landscape Ryan Kane – SWAT Specialist - Secure Wireless, & Access Technologies Data Connectors ABQ December 2015.
“HP has best-in-class capabilities across the board.” “HP’s functional testing solution…turned in the best scores in four of our five major evaluation.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Microsoft Dynamics AX Redmond, July Online Services for Microsoft Dynamics ERP Connect Payment Services Commerce Services Sites Services Partner-hosted.
Microsoft Unified Communications Partner Business Value 1.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
1 ©2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice SIMPLIFY command of the data center.
Enterprise Linux Servers Solution Overview Kerry Kim Enterprise Linux Servers Solution Manager.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
BI and EPM Market Leadership Slides
2017 Security Predictions from FortiGuard Labs
Fortinet Unified Threat Management ProCurve Open Network Ecosystem
Fortinet Overview Consolidated Security
Cloud Firewall.
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Data Center Firewall.
Analytical Software for Fraud Detection
NetApp © 2018 NetApp, Inc. All rights reserved NETAPP CONFIDENTIAL ---
Introduction to the 3rd Gen Fortinet Security Fabric
Presentation transcript:

Fortinet Confidential End-to-End Strategic Security Bryan Wood Manager – Western Channel Sales October 14th, 2009

Fortinet Confidential Hackers Breach Heartland Payment Credit Card System (1/20/2009) “Heartland Payment Systems (HPY) disclosed that intruders hacked into thecomputers it uses to process 100 million payment card transactions per month for 175,000 merchants…” Exponential Growth in Malware Threats in thousands U.S. DoD Reported Incidents of Malicious Cyber Activity in thousands Electricity Grid in U.S. Penetrated by Spies (4/8/2009) “Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials...” U.S. South Korea Investigate Possible North Korean Cyber Attack (7/8/2009) “A series of coordinated attacks on government and financial websites startedaround the same time North Korea tested new missiles and faced fresh sanctions…”  Coordinated and blended attacks are now a common practice  Increased processing power required  Motive and intent has moved from notoriety to financial gain  Cyber security is critical IT Threats Are Increasing

Fortinet Confidential Business Requirements Are Increasing Network Throughput of Enterprise Data Center 10MB 100MB 1GB Multi-GB 10GB  Industries demanding greater IT compliance (FISMA, PCI DSS, etc.)  Compliance needs coming from government regulations as well as business partners / industry mandates  IT budgets shrinking  Security spend increasing  Network requirements / demands accelerating  Security demands must co-exist SOX 404 FISMA HIPPA Change in External IT Services Spending From FY09 to FY10 %

Fortinet Confidential Real-World Consequences ChoicePoint 163K Consumers $15M fine largest in FTC history Major Retailers incl. TJ Maxx Hacked 41M cards, $118 Million 2008 Biggest Breach In British History 4.5M Monster.co.uk users 2009 Heartland Data Breach: MasterCard, Visa Impose Hefty Fines Processor says it Has Already Spent $12.5 Million… 2009 Billions Lost

Fortinet Confidential We Have Pioneered a New Approach to IT Security 5 The Fortinet Solution Traditional Network Security Solutions

Fortinet Confidential Layers of protection Requires an integrated security strategy Allow but don’t trust any application Examine all application content Comprehensive, integrated inspection Overlapping, complementary layers of protection 6

Fortinet Confidential Real Threat Protection in Action 7 “Innocent” Video Link: Redirects to malicious Website Integrated Web Filtering Blocks access to malicious Website Network Antivirus Blocks download of virus Intrusion Protection Blocks the spread of the worm Solution: Error message: “Drops” copy of itself on system and attempts to propagate “Out of date” Flash player error: “Download” malware file Problem:

Fortinet Confidential Prioritize Defer non-essential projects What projects can wait? What can’t wait?

Fortinet Confidential Thinking Strategically About Security Future-proof your security infrastructure Anticipate change Look for opportunities to consolidate without compromise Reduce complexity Increase protection Decrease risk Lower capex & opex Move beyond tactical responses to threats By 2010, only 10% of emerging security threats will require tactical point solutions, compared with 80% in Source: Gartner “ “ “ “ *Gartner: Cost Cutting While Improving IT Security, March 20, 2008

Fortinet Confidential Unified Threat Management  IDC definition: UTM security appliance products which provide multiple security features integrated into one device  By 2011 UTM will be the largest single market, with a CAGR of 26.2%  UTM has already surpassed firewall market $3.5B $2.0B $1.3B $1.2B $1.5B Unified Threat Management UTM Intrusion Detection & Prevention Firewall & VPN Antispam Antivirus Antispyware Web Filtering IDS IPS Firewall VPN IDS IPS Firewall VPN CAGR % 25% 0% -25% In 2008, UTM surpassed Firewall market Source: IDC

Fortinet Confidential Do More with Less Reduce complexity Expand protection Consolidate without compromise Reduce cost

Fortinet Confidential A Reliable Partner Proven Industry Leadership Since 2000, Fortinet has received more than 100 product & company awards IDC: Overall leader in UTM factory revenue for all of 2008 Frost & Sullivan: 2008 Award for Market Leadership in Unified Threat Management (UTM) Frost & Sullivan: 2008 "Global Competitive Strategy Leadership of the Year" SC Magazine: 2008 Readers' Trust Award for "Best Integrated Security Solution". Certified security Six ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL, VPN, Anti-Spam) Government Certifications (FIPS-2, Common Criteria EAL4+) ISO 9001 certification

Fortinet Confidential Top 4 Network Security Appliance Vendor Note: Market shares are based on IDC’s Quarterly Appliance Tracker. (Source: IDC, June 2009)

Fortinet Confidential #1 in Unified Threat Management (UTM) SonicWALL Cisco Juniper McAfee Checkpoint Crossbeam Other Worldwide UTM Revenue Share by Vendor, Q Note: Market shares are based on IDC’s Quarterly Appliance Tracker. Source: IDC, June 2009

Fortinet Confidential Leader in Gartner Multi-Function Firewall Magic Quadrant 2H09 Source: Gartner, Inc., “1H09 MultiFunction Firewall Magic Quadrant” by G. Young and A. Hils, June X, This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Fortinet. The Magic Quadrant is copyrighted June X, 2009 by Gartner, Inc., and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Fortinet Confidential Core Value Proposition Traditional Network Security Solutions The Fortinet Solution

Fortinet Confidential Fortinet Brings Networking and Security DNA

Fortinet Confidential Case Study: Distributed Enterprise  US Distributed Retail Auto Service Chain Fortune 500 company 800+ Remote retail locations 18  Challenge PCI compliance Efficient management Physical footprint  Why We Won Ease of management Robust network security functionality Lower TCO vs. peers  Who We Beat Cisco, Juniper  Features: Firewall, VPN, Web Filtering

Fortinet Confidential Case Study: Enterprise 19  Leading Financial Institution Multi-billion dollar transaction platform customers Thousands of daily transactions  Challenge Large operating / IT costs Point product complexity Auditing  Why We Won Raw performance Consolidated features Effective security  Who We Beat Cisco, Juniper  Features: Firewall, VPN, Antivirus, Antispam

Fortinet Confidential FortiGate Product Lineup Application Security FortiGate Network Security Platform FortiMail Security FortiWeb XML & Web Application Secur ity FortiDB Database Security FortiManager Centralized Mgmt FortiAnalyzer Logging & Reporting Security Services FortiGuard Real time Security Services Host Security FortiClient Host Security Solution FortiScan Asset Vulnerability Mgmt UTM Security Data Security Management

Fortinet Confidential 21 Purpose-Built Hardware Specialized OS Firewall Real Time Protection Flexible Capabilities High Performance Hardened Platform Traffic Shaping VPNAVIPSAntispamWF SSL Insp DLP WANopt In today’s sophisticated threatscape, network security requires overlapping, complementary technologies; Fortinet’s security PLATFORM provides both flexibility & defense-in-depth capabilities. AppCtrl FortiGuard Updates FortiGate Multi-Threat Security Platform

Fortinet Confidential FortiGate UTM Lineup ASIC-based multi-threat security platform Common OS across all platforms Single management interface FortiGuard Services Antivirus, IPS, Antispam, Web content filtering EnterpriseService Provider & Large Enterprise SMB & Remote Office

Fortinet Confidential Product Portfolio Application Security FortiGate Network Security Platform Security Services FortiGuard Real time Security Services FortiMail Security FortiWeb XML & Web Application Secur ity Host Security FortiClient Host Security Solution FortiScan Asset Vulnerability Mgmt FortiDB Database Security FortiManager Centralized Mgmt FortiAnalyzer Logging & Reporting UTM Security Data Security Management

Fortinet Confidential FortiGuard Services Network Real-time updates “Push” / “pull” updates for Fortinet customers Tied to FortiCare registration system Distributed infrastructure Multiple servers deployed globally Approximately 16 data center locations Hierarchical deployment strategy Main server update pushes secondary updates Gather feedback from worldwide installed base 24

Fortinet Confidential The Fortinet Solution FortiGate Appliance FortiGateServices Consolidate Security Disruptive Technology Platform Low Total Cost of Ownership  Provides broad array of best-in-class security functions  Global Threat Research Team provides real-time updates  FortiASIC and FortiOS deliver faster network performance  Network and content level functions are integrated  Eliminates expense of purchasing and integrating separate single-function products from multiple vendors

Fortinet Confidential Fortinet’s End-to-End IT Security Portfolio Content & App Security FortiDB FortiScan UTM FortiGate Security Management & Analysis FortiManager FortiAnalyzer & Web Security FortiMail FortiWeb Endpoint Security FortiClient FortiMobile

Fortinet Confidential Summary Comprehensive solution From a single vendor Lower TCO Less complexity and easier management Real-time security 24/7 global updates Strategic flexibility Fit your timeline and budget

Fortinet Confidential Thank You Bryan Wood Fortinet Manager Western Channel Sales O C E