Fortinet An Introduction

Slides:



Advertisements
Similar presentations
Fortinet and Hawaiian Telcom
Advertisements

Palo Alto Networks Jay Flanyak Channel Business Manager
Innovative, Best-in-Class Technologies and Products
1 © Copyright 2013 Fortinet Inc. All rights reserved. Комплексная экосистема безопасности Мирослав Мищенко Менеджер по работе с ключевыми клиентами.
1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager.
Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font to be used by customers and partners : Arial Copyright©2011.
True Unified Threat Management
This presentation is designed to act as an introduction to Fortinet
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
B&Data Solutions Day 2008 Think Beyond a Virtualized Infrastructure The Network Security Consolidation Imperatives - Protect, Preserve and Reduce Flora.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Lisa Farmer, Cedo Vicente, Eric Ahlm
MSIT 458: Information Security & Assurance By Curtis Pethley.
National Symposium for Command & Control and Cyber Security
Unified Logs and Reporting for Hybrid Centralized Management
Blue Coat: Your partner to sales success Nigel Hawthorn VP EMEA Marketing
MIGRATION FROM SCREENOS TO JUNOS based firewall
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Our Products © Copyright 2013 Cyberoam Technologies.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
WatchGuard: Your Security Partner of Choice Your Name Here.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Fortinet Confidential Bangalore 4 th December 2009 Vishak Raman Regional Director – SAARC & KSA “Security Virtualization”
Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008.
WELCOME!. Page: 2 Agenda One is impressive – two make a powerful team! Networking solutions, the Extreme way Coffee Break Security solutions, the NetScreen.
[Name / Title] [Date] Effective Threat Protection Strategies.
Fortinet An Introduction
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
F5’s BIG-IP Blade Controller - The Essential Software for Blade Server Systems May 2002 John Bigelow Vice President & General Manager, Software Business.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Mail-Filters The Global Leader in OEM Anti-Spam Solutions.
2015 Security Conference Dave Gill Intel Security.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Threat Landscape Ryan Kane – SWAT Specialist - Secure Wireless, & Access Technologies Data Connectors ABQ December 2015.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Investor Presentation May Safe Harbor Disclaimer This presentation may contain forward-looking information with respect to plans, projections, or.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
F5 Networks Inc. Nasdaq: FFIV Analysts Amey Dargude | Mihir Londhe Rahul Gohil | Shruti Shah Vanditha Mysore Ravindranath Presented on 31 st March 2016.
Fortinet Confidential End-to-End Strategic Security Bryan Wood Manager – Western Channel Sales October 14th, 2009.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
©2014 Check Point Software Technologies Ltd. 1 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr.
Reach us at Call: | Visit:
HCNA-Security Huawei Certified Network Associate Security (HCNA-Security) validates the basics of network security knowledge and skills to support the.
Fortinet Unified Threat Management ProCurve Open Network Ecosystem
Fortinet Overview Consolidated Security
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
AT&T Premises-Based Firewall Enhanced SBS Solution
Intrusion Prevention Systems
Present By:- Company Name: Global Market Forecastes Tel: / Web:
Check Point Connectra NGX R60
Introduction to the 3rd Gen Fortinet Security Fabric
Hosted Security.
Fortinet Real Time Network Protection ComputerLinks University
Presentation transcript:

Fortinet An Introduction This presentation is designed to act as an introduction to Fortinet.Typical audience is business and technical decision makers in Mid to large enterprise customers. Appropriate for Executive Briefing type situations lasting about an hour.

The power to Control verify visualize simplify consolidate manage The strength of Fortinet is our ability to provide organizations with the power they need to manage and gain control over their IT infrastructure using our Security technologies. protect secure accelerate enable enforce

Agenda Fortinet Introduction Strategic Solutions Technology Overview First, we’ll provide a brief overview of Fortinet and why our approach is different from other security technology vendors. Next, we’ll show how our technologies can provide solutions to your most pressing business problems. And finally, we provide a brief overview of Fortinet technologies and products.

Fortinet Corporate Overview Market Leader UTM - Fast-growth security segment Advanced technology and products 80+ patents; 115+ pending Strong global footprint 1,500+ employees; 30 offices worldwide Blue chip customer base 100,000 customers (incl. majority of Global 100) Exceptional financial model FY11 revenues: $434M (34% YoY growth) Q411 revenues: $121M (29% YoY growth) Strong balance sheet: $500M+ in cash; no debt IPO - November 2009 $434 FORTINET REVENUE ($MM) 48% CAGR $325 $252 First, a brief overview of Fortinet. $212 $155 $123 $80 $39 $13 03 04 05 06 07 08 09 10 11 4

A VICIOUS CIRCLE Network Security: The Traditional Approach New Threat Intercepts New Device: ‘Next Generation’ Firewall New Device: VPN Termination A VICIOUS CIRCLE The traditional approach to security doesn’t work. E.g., VPN for secure remote access in 97 as market moved from Frame Relay/Dedicated line, to remote access over PSTN . Encrypted VPN Tunnels became critical technology. Same thing happened as new threats arose – Spam led to Spam filtering devices App layer attacks led to need for app control and app layer inspection. Management, visibility, control all suffer Best of breed lasts about 18 months, then other vendors pile into market Buying the new shiny toy doesn’t work in the long run – Silicon Valley is littered with companies that last a few years after introducing a new technology. New Threat App Layer Attacks New Threat Spam New Device: Spam Filtering

More Expense, Less Security, Less Control The Result: More Expense, Less Security, Less Control “I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks.” “Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey New York Times 6/22/11 Your network might look something like this… It’s too complicated. And – it leads to security holes. Expensive, complex, lack of control, chase new box in 12-18 months Are you really more secure?? Here’s what was said in a recent NY Times article….. “I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks.” “Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey - New York Times 6/22/11

Reducing Complexity Is Critical Q: What are the top security-related challenges your organization is facing? (base: of those that are involved in Security investments) The traditional approach of having different devices for different security functions is adding to the problem – not solving it. Reducing complexity is CRITICAL. According to this survey done by Infoworld, the complexity of security solutions is a bigger problem than mobile clients, regulatory issues, bandwidth or employee misuse of data. Source: Navigating IT: Objective & Obstacles Infoworld, May, 2011

Fortinet Breaks The Cycle New Threat Update Firmware App Control, Data Leakage, SSL Inspection Update Firmware: Web Filtering One platform, one provider, one solution…. The Fortinet model has proved durable for over 10 years. Customers don’t have to ‘rip and replace’. Breaks cycle of customer adding more vendors, maintains account control, builds customer loyalty. Fortinet Milestones FortiOS 3.0: Until FortiOS 3.0 (2006), addressing the Instant Messaging security problem required that enterprises either purchase and manage separate "point" solutions or settle for weak security processes like simply blocking or allowing the traffic. Fortinet is the first vendor to integrate complete content protection - including full antivirus (AV) scanning, blocking and quarantining of IM traffic and file attachments, intrusion prevention (IPS) signature updates, and URL filtering -- for IM applications into an existing multi-threat security system. FortiOS 4.0 (2009): Application Control, Data Leakage Prevention, WAN Optimization, SSL Inspection was introduced. New Threat New Threat Update Firmware: IM & P2P Protection

The Benefit Of Integration: Continuous Updates New Threat Antispam & Web Filtering Continuous Anti-Virus: 4x each day And, while periodic Firmware updates address the response to changes in the overall security threat landscape – continous updates from FortiGuard provide protection against new threats on a daily basis. Fortinet maintains its own threat response organization – which we’ll discuss in detail later in the presentation. New Threat New Threat IPS: 2x each day

Followed The Internet Evolution Security: Followed The Internet Evolution APP LAYER ATTACKS APP CONTROL SPYWARE ANTI-SPYWARE WORMS ANTI-SPAM SPAM Performance - Damage BANNED CONTENT WEB FILTER TROJANS ANTI-VIRUS Many new companies have come up with point security solutions to address each new application and attack as the threat landscape has evolved, and the network vendor players like Cisco and Juniper keep buying more point products to add on top of their firewall and VPN, resulting in more and more complex, costly deployments for customers. VIRUSES INTRUSIONS IPS CONTENT-BASED VPN CONNECTION-BASED FIREWALL HARDWARE THEFT HARDWARE THEFT HARDWARE THEFT LOCK & KEY PHYSICAL 1980s 1990s 2000s Today

The Fortinet Solution CONTENT-BASED CONNECTION-BASED PHYSICAL APP LAYER ATTACKS APP CONTROL SPYWARE ANTI-SPYWARE WORMS ANTI-SPAM SPAM Performance - Damage BANNED CONTENT WEB FILTER TROJANS ANTI-VIRUS Fortinet’s approach was to create Unified Threat Management. The UTM solution, which tightly integrates many functions and point products together into a single platform. UTM is defined as a device that “Unifies” multiple security features, including firewall/VPN, Intrusion Detection/Prevention and gateway antivirus, at a minimum, Fortinet offer s all these plus much more features. We also leverage our FortiASIC to accelerate performance, and, as we discussed, we utilize our FortiGuard Labs for real-time global update service, this solution effectively protects our customers in today’s challenging network environment VIRUSES INTRUSIONS IPS CONTENT-BASED VPN CONNECTION-BASED FIREWALL HARDWARE THEFT LOCK & KEY PHYSICAL 1980s 1990s 2000s Today

Fortinet: A New Approach TRADITIONAL SOLUTIONS Cumbersome and costly THE FORTINET SOLUTION Simple and cost-effective Traditional Solutions are: - Non-integrated - Mix of off the shelf systems and applications Have a higher total cost of ownership And, are difficult to deploy, manage and use The Fortinet approach provides the same technologies without the complexity. With added benefits of: Real-time integrated security intelligence ASIC-accelerated performance Lower total cost of ownership While being easier to deploy, manage and use 12

FortiGate: Integrated Architecture Real-Time Protection FortiGuard™ Updates Fully Integrated Security & Networking Technologies AV IPS Web Filter Antispam App Ctrl VM Firewall VPN DLP WAN Opt Traffic Shaping WLAN VoIP SSL Insp HA Load Balancing • We control all components which leads to a rich, comprehensive architecture. • Integration of variety of technologies allows organizations to choose which technologies they require • One company, one architecture No other vendor provides such a rich, integrated suite of security technologies. Fortinet Offers…… Purpose-built software and hardware acceleration through ASICs Specific processors and hardware to handle various security functions to optimize performance and perform SSL decryption on thousands of simultaneous connections Options for stream-based, flow-based or complete content protection Acceleration for specific security functions like Ipv6, multicast routing, IPS, application control and flow anti-virus inspection. Clusters, sub-second failover, uninterruptable upgrades Management System HA & geographical redundancy WAN optimization and caching to accelerate web applications/servers by reducing bandwidth usage, server load, and perceived latency The Result: low latency, high performance and resiliency, increased flexibility Hardened Platform Specialized OS High Performance Purpose-Built Hardware Support and Services FortiCare™ FortiGuard Labs Purpose-built to deliver overlapping, complementary security Provides both flexibility & defense-in-depth capabilities 13

Unmatched Solution Spectrum COVERAGE Domain Network Data Center/Cloud SOHO/CPE Enterprise Carrier And, no other vendor offers solution across such a wide spectrum. From small office and CPE solutions – up to the Fastest Firewall In The World. And – we offer coverage from the individual device level up to complete network and domain-level solutions. The breadth of our solutions and devices plus the richness of our integrated security offering is unmatched in the industry. Simply put, Fortinet provides the most complete security offering in the market. SIZE Content Device

The Result: Market Leadership Worldwide UTM Market Share Q3 20111 Magic Quadrant for Unified Threat Management2 Rank Company Market Share (%) 1 18.0 2 Check Point 14.0 3 SonicWALL 8.3 4 Juniper 7.9 5 Cisco 6.5 6 WatchGuard 4.7 7 McAfee 4.0 8 Crossbeam 3.0 9 Other 33.6 Total 100.0 And – our strategy is paying off! Numerous awards and industry recognition for our success. IDC Worldwide Security Appliances Tracker, Sept 2011 (market share based on factory revenue) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012 15