Innovative, Best-in-Class Technologies and Products

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated.
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Govern the Flow of Data: Moving from Chaos to Control
Intrusion Prevention anno 2012: Widening the IPS concept.
Palo Alto Networks Jay Flanyak Channel Business Manager
Enabling business beyond the corporate network.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
1 © Copyright 2013 Fortinet Inc. All rights reserved. Комплексная экосистема безопасности Мирослав Мищенко Менеджер по работе с ключевыми клиентами.
1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
True Unified Threat Management
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
National Symposium for Command & Control and Cyber Security
Unified Logs and Reporting for Hybrid Centralized Management
Introduction to Fortinet Unified Threat Management
Citrix Partner Update The Citrix Delivery Centre.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
Information Security in Real Business
MIGRATION FROM SCREENOS TO JUNOS based firewall
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Barracuda Networks Steve Scheidegger Commercial Account Manager
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Fortinet Confidential Bangalore 4 th December 2009 Vishak Raman Regional Director – SAARC & KSA “Security Virtualization”
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Fortinet An Introduction
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
Fortinet An Introduction
ShareTech 2015 Next-Gen UTM.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
Threat Landscape Ryan Kane – SWAT Specialist - Secure Wireless, & Access Technologies Data Connectors ABQ December 2015.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Fortinet Confidential End-to-End Strategic Security Bryan Wood Manager – Western Channel Sales October 14th, 2009.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Web Content Security Unlock the Power of the Web
Barracuda NG Firewall ™
Fortinet Unified Threat Management ProCurve Open Network Ecosystem
Barracuda Firewall The Next-Generation Firewall for Everyone
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
MICROSOFT AZURE ISV PROFILE: BMC SOFTWARE
Fortinet Overview Consolidated Security
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
A10 Networks vThunder Leverages the Powerful Microsoft Azure Cloud Platform to Offer Advanced Layer 4-7 Networking, Security on a Global Scale MICROSOFT.
Threat Management Gateway
Virtualization & Security real solutions
Introducing ProxyClient
The Only Digital Asset Management System on Microsoft Azure, MediaValet Is Uniquely Equipped to Meet Any Company’s Needs MICROSOFT AZURE ISV PROFILE: MEDIAVALET.
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
Check Point Connectra NGX R60
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
Introduction to the 3rd Gen Fortinet Security Fabric
Hosted Security.
Presentation transcript:

Innovative, Best-in-Class Technologies and Products Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based, strong global presence with 30+ offices worldwide $325M+ in revenues (2010) Seasoned and proven executive management team (NASDAQ: FTNT) 1,350+ employees / 600+ engineers 500,000+ FortiGate devices shipped worldwide Innovative, Best-in-Class Technologies and Products Six ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam) Strong IP portfolio – 20+ patents; 80+ pending Government Certifications (FIPS-2, Common Criteria EAL4+, NIST) Consistent Antivirus Validation – (Virus Bulletin 100 approved; 2005, 2006, 2007, 2008, 2009, 2010) 2 2 2

Security TODAY: Blended Threats Leverage Multiple Threat Vectors Malicious threats lead to Data loss Identify theft Database espionage Network downtime Bad publicity Regulatory fines The motive has changed From notoriety to criminal intent More malicious in nature Global in reach Predatory behaviors Threat Vectors Application Blended Threats: Designed to maximize damage and speed of infection Fast spreading network-based threat with multiple attack vectors: Combination of virus, worm, and exploits vulnerabilities Many leverage email to spread with a malicious payload attachment Can self replicate acting as a hybrid virus/worm Remote execution, DoS, Backdoor applications Examples: Zotob, NetSky, Nimda, CodeRed, Blaster, MyDoom, DeadHat, DoomJuice, Bugbear, etc Spam was originally a nuisance but is now a corporate security concern Threat Vectors Network

You Have to Do More with Less Increase access to backend data and systems Decrease risk of unauthorized access Increase effectiveness of existing resources and investments Reduce complexity of security infrastructure Lower operating and capital costs We know that on a daily basis, you’re having make hard choices on how to do more without spending more. You are under pressure to open up more of your data to employees, customers, partners, and vendors; at the same time you’re expected to reduce the potential of unauthorized access to your data and backend systems. You’re also expected to make your existing staff and security technologies more effective, and to do it while spending less And, we know you’re expected to lower your expenses

Fortinet – Consolidated Security Deliver comprehensive solutions for the largest global networks and organizations Improve performance Increase protection Reduce complexity Continually raising the performance bar with purpose-built hardware and software Custom processors and latest generation general purpose processors Convert stand-alone products into features Simplify the network and improve visibility Reduce Total Cost of ownership

We Pioneered a New Approach Traditional Network Security Solutions The Fortinet Solution Stand-alone, non-integrated security Mix of off the shelf systems and applications Higher total cost of ownership Difficult to deploy / manage / use Real-time, integrated security intelligence ASIC-accelerated performance Lower total cost of ownership Easy to deploy / manage / use

UTM Surpassing Traditional Network Security $ in billions 13.8% CAGR $1.7 $3.2 $2.2 Firewall & VPN (-0.5%) CAGR $2.1 UTM 2008 2009 2010 2011 2012 2013 Source: IDC “Worldwide Network Security 2008-2012 Forecast and 2007 Vendor Shares: Transitions – Appliances Are More Than Meets the Eye” 7

Market Leadership Across the Board Worldwide UTM Market Share Q2 2010 (1) Magic Quadrant for Unified Threat Management (2) UTM Market Competitive Landscape, 2009(3) Rank Company Market Share (%) (2) 1 16.4 2 Cisco 9.8 3 Juniper 9.0 4 SonicWALL 8.1 5 Check Point 7.2 6 McAfee 5.5 7 WatchGuard 4.9 8 Crossbeam 2.6 9 Other 41.4 Total 100.0 High Ability to Deliver Low Low Market Penetration High Niche Participant Specialist Contender Challenger Market Leader Notes IDC Worldwide Security Appliances Tracker, September 2010 (market share based on factory revenue) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, October 2010 Frost & Sullivan, “World Unified Threat Management, Products Market 2009”, 2010 8 8

Unified Threat Management Fortinet Solutions Unified Threat Management Centralized Management FortiManager Centralized Device Management FortiAnalyzer Centralized Logging and Reporting Application Security FortiMail Messaging Security FortiWeb Web & XML Application Firewall FortiGate Network Security Platform FortiAP Network Security Platform FortiToken 2-factor Authentication Application Delivery Host Security FortiClient Endpoint Security FortiScan Asset Vulnerability Management FortiGuard Real time Security Services FortiBalancer Application Delivery Controller

Fortinet's Approach to Consolidated Security Complete Content Protection Antispam WAN Optimization Antivirus/ Antispyware Data Loss Prevention Endpoint Protection/ NAC VLANs, VDOMs, Virtual Appliances VPN Web Filtering Strong Authenti-cation Firewall IPS App Control Wireless LAN SSL Inspection Vulnerability Mgmt IPv6, Dynamic Routing VoIP

Application Evolution “Application” has evolved to include web browser, web server, application server, operating system Delivery can be on-premise or hosted in the cloud, or some combination Regardless of delivery model, most data now browser-based Well known port numbers Port 80 (HTTP) / Port 443 (HTTPS)

Beyond Application Identification Today’s Network Security Requires Application Detection, Monitoring, and Control Allowing access to Web 2.0 applications has made enforcing data security policies far more complex User-created content embeds threats in content, pages, links, comments to blogs… Protection against effects of social media applications Data loss Threat propagation Bandwidth consumption Inappropriate use Endpoint to the Core “Single pane of glass” management for visibility & control

Identification Over 1,500 applications More added every week Category IM, P2P, Remote Access, Video, etc. Ranked on popularity & risk Impendent of port, protocol, IP address Decrypt encrypted traffic Including HTTPS, POP3S, SMTPS and IMAPS protocols

Granular control of behavior Apps & features within apps Categories of apps Individual apps Actions within apps Users Domain, groups, individual users Traffic Prioritize Limit access by groups or users Time of day Day of week

Integrated security appliance FortiGate ASIC FIREWALL APPLICATION CONTROL WIRELESS DATABASE ANTISPAM VPN FORTIOS FORTIASIC WEB FILTERING DLP ROUTING WAN OPTIMIZATION ANTIVIRUS IPS Integrated security appliance Network threat detection Application-aware screening Accelerated performance Custom ASIC Platforms for every market segment Non-user licensing Performance-based models Firewall Virtualization

Integrated Threat Protection in Action Problem: PORT 80 Error message: “Drops” copy of itself on system and attempts to propagate “Innocent” Video Link: Redirects to malicious Website “Out of date” Flash player error: “Download” malware file Solution: Integrated Web Filtering Blocks access to malicious Website FIREWALL Network Antivirus Blocks download of virus WEB FILTERING ANTIVIRUS Intrusion Protection Blocks the spread of the worm INTRUSION PROTECTION

Disruptive Technology Platform FortiASIC FortiOS Custom built operating system Architected for security and networking demands Leverages custom hardware platform Mature OS - At version 4.0 MR2 today ASICs accelerate FortiOS security and network functions Enables faster performance against competitors Multiple ASICs targeting key functions Mature design across FortiASICs

FortiASIC Specialized Processors FortiASIC Content Processor (CP) Series Pattern-Match Acceleration Encryption / Decryption (e.g. IPSec, SSL-TLS) FortiASIC Network Processor (NP) Series Firewall Acceleration IPSec VPN Acceleration FortiASIC Security Processor (SP) Series Additional IPS Acceleration Flow based AV Acceleration Unicast , Multicast Acceleration

Fully Integrated Technologies FortiOS Fully Integrated Technologies Manage all policy enforcement from a single console Single Inspection of Packets Delivers greater efficiency and intelligence Deployment Ease & Flexibility Single console for all FortiGate platforms, all technologies Ability to deploy technologies where needed IPv6 Ready

FortiGuard Subscription Services Real-Time Security Protection Global Distributed Network Global software updates Large knowledgebase of security 8 million antivirus signatures, 90 million URLs for Web filtering 100+ threat research professionals Eight global locations Automated updates to Fortinet customers Robust 24 x 7 x 365 Real-Time Global Intelligence

FortiGate UTM Lineup ASIC-based multi-threat security platform Common OS across all platforms Single management interface FortiGuard Services Antivirus, IPS, Antispam, Web content filtering, Application control SMB & Remote Office Enterprise Service Provider & Large Enterprise

Fortinet Virtual Appliances FortiGate Virtual Appliances Combine with traditional FortiGate appliances for maximum network visibility and security controls. Utilize Virtual Domain (VDOM) and Virtual LAN (VLAN) technologies to enforce security between zones Released w/ FortiOS 4.2 (MR2) FG Availability / Licensing Available Now Licensed by # of vCPU: 2 / 4 / 8 30-Day evaluation license available Hypervisor Support VMware ESXi/ESX 3.5/4.0/4.1 Delivered in OVF format

Virtualized Data Center Security Logical Security Zones are used to isolate hosts with differing security requirements Servers Desktops DMZ/Private Zone Public Zone Virtualized Data Center Server Servers / DMZ Desktops / Private Primary security goal: separation of logical zones Virtual perimeters Firewalling between zones

A Reliable Partner Proven Industry Leadership Certified security Since 2000, Fortinet has received more than 100 product & company awards. IDC: Overall leader in UTM factory revenue for all of 2009 Gartner: Leader in Multi-Function Firewall Magic Quadrant Frost & Sullivan: 2010 "Fortinet is the established and undisputed leader" of worldwide UTM market SC Magazine: 2009 Readers' Trust Award for "Best Integrated Security Solution" Certified security Five ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam) Government Certifications (FIPS-2, Common Criteria EAL4+, JITC IPv6, SCAP) ISO 9001 certification 24

Summary Comprehensive High Performance Real Time FortiOS Operating System FortiASIC Network Processor FortiGuard Threat Research FIREWALL IPS VPN ANTIVIRUS/ ANTISPYWARE WEB FILTERING Fortinet built and owns all 3 key components— Integrated security technologies, High speed processors Global update and support services Our FortiOS operating system enables us to efficiently deliver consolidated security without compromise. We can add additional technologies without suffering a performance breakdown. Our FortiASICs add significant processing advantage over a other approaches delivering accelerated performance Our FortiGuard and FortiCare infrastructure delivers product updates and customer support around the world Some of our competitors, whether they are NGFW or UTM, cannot deliver the complete solution: Security vendors offer a broad set of features, but do a poor job of integrating them and pay a performance penalty Networking vendors may deliver better performance, but their security technology does not have the compressive range of technologies, and doesn’t provide complete content protection There are many who claim leadership in the market, but Fortinet had delivered for 10 years. DLP APPLICATION CONTROL WAN OPTIMIZATION ANTISPAM Consolidated Security FortiASIC Content Processor FortiCare Customer Support

Thank You