True Unified Threat Management

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

Innovative, Best-in-Class Technologies and Products
Business Solutions Network Security Solutions Gateway Security
Introducing Quick Heal Terminator.
Stonesoft Roadmap WHAT FEATURES WILL COME IN
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Simon Garcia Jaramillo Network Administrator ATS Automation Tooling Systems.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
MSIT 458: Information Security & Assurance By Curtis Pethley.
Introduction to Fortinet Unified Threat Management
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
MIGRATION FROM SCREENOS TO JUNOS based firewall
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Our Products © Copyright 2013 Cyberoam Technologies.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
TOSIBOX LOCK security options 1 1.
Access · management security · performance XTM eXtensible Threat Management eX  ten  si  ble Threat Man  age  ment Ik-sten-si-bĕl thret man-ij-mĕnt.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
Basic Networking Components
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Networking Components Mike Yardley LTEC 4550 Assignment 3
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
Fortinet An Introduction
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
APPLICATION PERFORMANCE MANAGEMENT The Next Generation.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
UTM ( Unified Threat Management) Firewalls  Firewall Throughput: 150 Mbps  VPN Performance: 45 Mbps (3DES/AES)  1 x 10/100/1000 Ethernet WAN Port 
Secure WAN Acceleration Michael Favinsky Senior Systems Engineer
Operating Systems FreeBSD and Monowall Joel Jaeggli For AIT Wireless and Security Workshop.
Barracuda NG Firewall ™
Barracuda SSL VPN 2012.
Fortinet Unified Threat Management ProCurve Open Network Ecosystem
Cisco ISA500 Series Competitive Selling Against Fortinet
Security Unit 1 Business skills for e-commerce
Grow Your Business with the Security Leader
Hybrid Cloud Web Filtering Platform
Web Content Security Unlock the Power of the Web
Network Security Solution
Fortinet Overview Consolidated Security
UTM Content Security Gateway
Barracuda Firewall The Next-Generation Firewall for Everyone
Grow Your Business with the Security Leader
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
UTM (Unified Threat Management) Firewalls
Introduction to Computers
Forefront Security ISA
Threat Management Gateway
NSE4-5.4 Dumps
Check Point Connectra NGX R60
Virtual Private Network
Implementing Client Security on Windows 2000 and Windows XP Level 150
Networking for Home and Small Businesses – Chapter 8
By Seferash B Asfa Wossen Strayer University 3rd December 2003
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Cybercrime & Effective Gateway Anti-Malware Protection
Hosted Security.
Presentation transcript:

True Unified Threat Management Fortigate Technology Positioning

Agenda The legacy network security approach & multi-party UTM The Fortinet approach Maximizing the Fortinet opportunity Summary

Multiple point solutions & multi-party UTM The legacy network security approach Multiple point solutions & multi-party UTM

Resilient architecture Key Points: Main drawbacks Gateway Corporate LAN DLP IPS Anti-Virus Firewall Anti-Spam Web Filter SSL VPN DLP IPS IPS Anti-Virus Anti-Spam Web Filter SSL VPN DLP Firewall Anti-Virus Firewall Anti-Spam Web Filter SSL VPN Multi-Party UTM Resilient architecture Key Points: Main drawbacks Consolidated hardware 100% increase in hardware sprawl Inefficient multiple point solutions = latency & vulnerabilities Legacy firewall Cost savings from reduced utility overheads, training etc First network security technology Very low utilisation of investment – Under 50% A set of individuals, not a team BUT! Considerable sprawl in appliances End result is underperforming, over expensive security posture Limited functionality – Port & Protocol, Allow & Block Similar performance issues due to multiple scanning engines Time consuming environment to administer, multiple consoles Insufficient protection against a multitude of threats Reliance on updates from 3rd party databases Sizeable total cost of ownership… Technical training, power & cooling, costly license programs More advanced protection required No major improvement in efficacy

An integrated network security platform The Fortinet approach An integrated network security platform

Inside Fortigate Advanced Networking Services Virtualisation WAN Opt DLP Wireless App Control Traffic Shaping Advanced Networking Services Firewall SSL VPN Anti-Spam Anti-Virus Web Filter IPS Proprietary Unified Threat Management FortiOS Purpose built Operating System Network ASIC Content ASIC General Purpose CPU Purpose built hardware

Maximising the Fortinet opportunity The unified access layer

Fortigate: Integrated security platform Gateway Corporate LAN WLAN IPS Anti-Virus Anti-Spam Web Filter SSL VPN DLP Firewall Fortigate: Integrated security platform FortiAP: Secure wireless access Fortigate: Secure site to site connectivity FortiToken: Strong authentication for mobile workers The Unified Access Layer

Summary Legacy security Multiple point solutions are inefficient with a high total cost of ownership Leave gaps in the network security posture Multi-party UTM offer similar problems with very little improvement in performance Fortinet Fortinet offers a different approach with purpose built, accelerated hardware High performance at a low price Complimentary Fortinet technologies provide a ‘unified access layer’ for secure connectivity regardless of location or network type True Unified Threat Management