1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager.

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

Stonesoft Roadmap WHAT FEATURES WILL COME IN
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
1 © Copyright 2013 Fortinet Inc. All rights reserved. Комплексная экосистема безопасности Мирослав Мищенко Менеджер по работе с ключевыми клиентами.
Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font to be used by customers and partners : Arial Copyright©2011.
The Threat Landscape Jan Threat Report 2.
True Unified Threat Management
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
This presentation is designed to act as an introduction to Fortinet
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Simon Garcia Jaramillo Network Administrator ATS Automation Tooling Systems.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Lisa Farmer, Cedo Vicente, Eric Ahlm
MSIT 458: Information Security & Assurance By Curtis Pethley.
National Symposium for Command & Control and Cyber Security
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
LittleOrange Internet Security an Endpoint Security Appliance.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Nate Olson-Daniel Director of Strategic Development & Principal Engineer The Inevitable Attack.
Course 201 – Administration, Content Inspection and SSL VPN
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Our Products © Copyright 2013 Cyberoam Technologies.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
WatchGuard: Your Security Partner of Choice Your Name Here.
Barracuda Networks Steve Scheidegger Commercial Account Manager
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Fortinet An Introduction
Fortinet An Introduction
ShareTech 2015 Next-Gen UTM.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
The Changing World of Endpoint Protection
Chapter 5: Implementing Intrusion Prevention
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Threat Landscape Ryan Kane – SWAT Specialist - Secure Wireless, & Access Technologies Data Connectors ABQ December 2015.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
ClearswiftCorporate Overview Copyright © Clearswift About Clearswift HQ in the UK with offices in Australia, Germany, Japan, Spain and USA.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Copyright © Clearswift Clearswift Corporate Overview 2016.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
0 中文 NSS Tested Industry Leading DC Firewall “NSS is happy to see Huawei proactively seeking to subject its security platforms to independent evaluation.
Barracuda NG Firewall ™
Threat Landscape Ryan Kane – SWAT Specialist - Secure Wireless, & Access Technologies Data Connectors ABQ December 2015.
2017 Security Predictions from FortiGuard Labs
Fortinet Unified Threat Management ProCurve Open Network Ecosystem
Trend Micro Consumer 2010 Easy. Fast. Smart.
Fortinet Overview Consolidated Security
Cost-Effective Strategies for Countering Security Threats:  IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Real-time protection for web sites and web apps against ATTACKS
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Firewall as a Service Market to grow at 25% CAGR from 2017 to 2024: Global.
Hybrid IT is Here. Security: First.
Intrusion Prevention Systems
Threat Management Gateway
Introduction to the 3rd Gen Fortinet Security Fabric
Hosted Security.
Presentation transcript:

1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager Systems Engineering 1/23/2014

2 Company Introduction A Leader in Network Security One of the 3 Largest Network Security Vendors Worldwide Leader in Unified Threat Management (UTM) MQ Since 2009 Year Founded: Oct 2000 Fortinet IPO: Nov 2009 NASDAQ: FTNT Headquarters: Sunnyvale, California FY 2012 Revenue: $534M Q Revenue: $155M+ $841M+ cash and no debt Profitable First Product Release: May 2002 Units Shipped to Date: 1.3+ Million Customers: 170,0000+ Patents: 143 patents issued 108 patents pending

3 Feature & Certification Comparison No One Comes Close

4 IXIA/BreakingPoint Testing World’s Fastest Firewall & Resiliency Score

5 World’s Fastest IPv4 and IPv6 Firewall Tests Using BreakingPoint™ FireStorm Prove FortiGate-5140B to be the World's Fastest Firewall Real-World Testing FortiGate-5101C FortiGate-5001B IPv4IPv6 559 Gbps of UDP traffic 526 Gbps of mix application traffic 2.6 Million new connections/sec 536 Gbps of UDP traffic 514 Gbps of mix application traffic 1.4 Million new connections/sec

6 NSS Security Value Map for Firewall

7 Gartner Magic Quadrant Unified Threat Management

8 Fortinet Security = Global Success Billings by Region Revenue by Segment

9 Global Customers Top 10 Fortune 500 Top 10 Global 500 Banks Top 5 Global Carriers

10 Fortinet 3 rd Largest Network Security Vendor (1) IDC Worldwide Security Appliances Tracker, September 2013 (market share based on factory revenue) Notes Worldwide Security Appliance Market Share Q (1) Worldwide Security Appliance Market Share Q (1) RankCompany Market Share (%) Growth Y/Y 1Cisco % 2Check Point % % 4Juniper 5.5 (19%) 5Blue Coat % 6McAfee % Market Size $8.5 Bil.

11 Today‘s Requirements NGFW FW/VPN IPS/App Control Web Filtering/Botnet Intelligence Advanced Threat Protection Security Updates High Capacity/Speed 1 to 10G NGFW Throughput IPS AV SSL 1G/10G Ports Compact Appliance Power Efficient Space Saving Flexible HA options Cloud Ready Directory Integration Actionable Reporting 3 rd Party Eco System ATP Solution Description Next Generation/Edge Firewall For the Enterprise

12 Fortinet Advantage: Performance GbpsMbps Firewall VPN NGFW UTM Policy Security

13 Fortinet Advantage: Security Layer 1-2: PHYSICAL Layer 3-4: CONNECTION Layer 5-7: CONTENT & APPLICATION APPLICATION CONTROL WEB FILTER ANTI-SPAM ANTIVIRUS VPN IPS FIREWALL LOCK & KEY MALICIOUS APPS MALICIOUS SITES SPAM BOTNETS BANNED CONTENT TROJANS VIRUSES & SPYWARE INTRUSIONS & WORMS HARDWARE THEFT 1980s1990s2000s2010s ADVANCED TARGETED ATTACKS ADVANCED THREAT PROTECTION Today Performance / Damage Method

14 Fortinet Advantage: Consolidation

15 FortiGuard Services FORTIGUARD ANTIVIRUS SERVICE FORTIGUARD ANTISPAM SECURITY SERVICE FORTIGUARD WEB SECURITY SERVICE FORTIGUARD DATABASE SECURITY SERVICE FORTIGUARD IP REPUTATION SERVICE FORTIGUARD VULNERABILITY MANAGEMENT SERVICE FORTIGUARD WEB FILTERING SERVICE FORTIGUARD INTRUSION PREVENTION SERVICE FORTIGUARD APPLICATION CONTROL SERVICE What is FortiGuard?

16 Threat Intelligence & Response 400+ Researchers Millions of sensors Collaboration »Threat Monitoring Fortinet’s Own

17 Spam s intercepted Malware programs neutralized Network intrusion attempts resisted Attempts to access malicious websites blocked Botnet command and control attempts thwarted Website categorization requests 2,500 Application control signatures 70 Terabytes Of Threat Samples 12,000 Vulnerability management signatures 250 Million Rated websites in 78 categories 900 Web application firewall attack signatures 70 Intrusion prevention signatures 8,000 Hours of research in labs around the globe 190,000 New and updated antivirus definitions 66 Million New and updated antispam signatures 600,000 URL ratings for web filtering Threat Intelligence and Response

18 The Threat Landscape What are APTs? Defining Advanced Persistent Threats – D.S.I. D ISGUISE Advanced threats focus on disguise to slip past security detection D ISGUISE Advanced threats focus on disguise to slip past security detection S URVIVABILITY Persistent threats aim to survive on systems as long as possible S URVIVABILITY Persistent threats aim to survive on systems as long as possible I MPACT Hard drive killers Stolen IP, customer data Blackmail & Ransom Critical infrastructure I MPACT Hard drive killers Stolen IP, customer data Blackmail & Ransom Critical infrastructure Detect Disguise, Kill the Chain Reduce Survivability, Break Impact

19 KNOW Defend Against Malware Families Real Time Sandbox Research Intelligence Identify New Malware Research Team Analysis Cloud Based Sandbox Industry Partnerships Update Devices Industry Conferences Raise awareness SUSPECT LEARN SHARE FortiGuard: Continuous Protection

20 Deep AV Scan & RTS 96% RAP before Sandbox No need toSandbox if caught Deep AV Scan & RTS 96% RAP before Sandbox No need toSandbox if caught FortiSandbox Solving the Sandbox Problem Look first for what we know, then inspect suspicious Cloud Check Real time check on latest malware rating Cloud Check Real time check on latest malware rating Full Sandbox Catch anything not caught by signature detection Full Sandbox Catch anything not caught by signature detection Forensics Behavior Report Forensics Behavior Report Downloaded & Dropped Files Recursively Scanned Downloaded & Dropped Files Recursively Scanned

21 MSSP Carrier Data Center Core Enterprise Distributed Enterprise SMB Series Series 1000 Series 3000 Series 5000 Series HardwareDesktopMid RangeHigh End Security Applications UTMFirewall, IPS, NGFW, UTM Recommended Product- FortiGate Series Next Generation/Edge Firewall For the Enterprise

22 Thank You