Presentation is loading. Please wait.

Presentation is loading. Please wait.

Fortinet Confidential End-to-End Strategic Security Bryan Wood Manager – Western Channel Sales October 14th, 2009.

Similar presentations


Presentation on theme: "Fortinet Confidential End-to-End Strategic Security Bryan Wood Manager – Western Channel Sales October 14th, 2009."— Presentation transcript:

1 Fortinet Confidential End-to-End Strategic Security Bryan Wood Manager – Western Channel Sales October 14th, 2009

2 Fortinet Confidential Hackers Breach Heartland Payment Credit Card System (1/20/2009) “Heartland Payment Systems (HPY) disclosed that intruders hacked into thecomputers it uses to process 100 million payment card transactions per month for 175,000 merchants…” Exponential Growth in Malware Threats in thousands U.S. DoD Reported Incidents of Malicious Cyber Activity in thousands Electricity Grid in U.S. Penetrated by Spies (4/8/2009) “Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials...” U.S. South Korea Investigate Possible North Korean Cyber Attack (7/8/2009) “A series of coordinated attacks on government and financial websites startedaround the same time North Korea tested new missiles and faced fresh sanctions…”  Coordinated and blended attacks are now a common practice  Increased processing power required  Motive and intent has moved from notoriety to financial gain  Cyber security is critical IT Threats Are Increasing

3 Fortinet Confidential Business Requirements Are Increasing Network Throughput of Enterprise Data Center 10MB 100MB 1GB Multi-GB 10GB  Industries demanding greater IT compliance (FISMA, PCI DSS, etc.)  Compliance needs coming from government regulations as well as business partners / industry mandates  IT budgets shrinking  Security spend increasing  Network requirements / demands accelerating  Security demands must co-exist SOX 404 FISMA HIPPA Change in External IT Services Spending From FY09 to FY10 %

4 Fortinet Confidential Real-World Consequences ChoicePoint 163K Consumers $15M fine largest in FTC history 2006 9 Major Retailers incl. TJ Maxx Hacked 41M cards, $118 Million 2008 Biggest Breach In British History 4.5M Monster.co.uk users 2009 Heartland Data Breach: MasterCard, Visa Impose Hefty Fines Processor says it Has Already Spent $12.5 Million… 2009 Billions Lost

5 Fortinet Confidential We Have Pioneered a New Approach to IT Security 5 The Fortinet Solution Traditional Network Security Solutions

6 Fortinet Confidential Layers of protection Requires an integrated security strategy Allow but don’t trust any application Examine all application content Comprehensive, integrated inspection Overlapping, complementary layers of protection 6

7 Fortinet Confidential Real Threat Protection in Action 7 “Innocent” Video Link: Redirects to malicious Website Integrated Web Filtering Blocks access to malicious Website Network Antivirus Blocks download of virus Intrusion Protection Blocks the spread of the worm Solution: Error message: “Drops” copy of itself on system and attempts to propagate “Out of date” Flash player error: “Download” malware file Problem:

8 Fortinet Confidential Prioritize Defer non-essential projects What projects can wait? What can’t wait?

9 Fortinet Confidential Thinking Strategically About Security Future-proof your security infrastructure Anticipate change Look for opportunities to consolidate without compromise Reduce complexity Increase protection Decrease risk Lower capex & opex Move beyond tactical responses to threats By 2010, only 10% of emerging security threats will require tactical point solutions, compared with 80% in 2005. Source: Gartner “ “ “ “ *Gartner: Cost Cutting While Improving IT Security, March 20, 2008

10 Fortinet Confidential Unified Threat Management  IDC definition: UTM security appliance products which provide multiple security features integrated into one device  By 2011 UTM will be the largest single market, with a CAGR of 26.2%  UTM has already surpassed firewall market $3.5B $2.0B $1.3B $1.2B $1.5B Unified Threat Management UTM Intrusion Detection & Prevention Firewall & VPN Antispam Antivirus Antispyware Web Filtering IDS IPS Firewall VPN IDS IPS Firewall VPN CAGR 2007-2012 50% 25% 0% -25% In 2008, UTM surpassed Firewall market Source: IDC

11 Fortinet Confidential Do More with Less Reduce complexity Expand protection Consolidate without compromise Reduce cost

12 Fortinet Confidential A Reliable Partner Proven Industry Leadership Since 2000, Fortinet has received more than 100 product & company awards IDC: Overall leader in UTM factory revenue for all of 2008 Frost & Sullivan: 2008 Award for Market Leadership in Unified Threat Management (UTM) Frost & Sullivan: 2008 "Global Competitive Strategy Leadership of the Year" SC Magazine: 2008 Readers' Trust Award for "Best Integrated Security Solution". Certified security Six ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL, VPN, Anti-Spam) Government Certifications (FIPS-2, Common Criteria EAL4+) ISO 9001 certification

13 Fortinet Confidential Top 4 Network Security Appliance Vendor Note: Market shares are based on IDC’s Quarterly Appliance Tracker. (Source: IDC, June 2009)

14 Fortinet Confidential #1 in Unified Threat Management (UTM) SonicWALL Cisco Juniper McAfee Checkpoint Crossbeam Other Worldwide UTM Revenue Share by Vendor, Q1 2009 Note: Market shares are based on IDC’s Quarterly Appliance Tracker. Source: IDC, June 2009

15 Fortinet Confidential Leader in Gartner Multi-Function Firewall Magic Quadrant 2H09 Source: Gartner, Inc., “1H09 MultiFunction Firewall Magic Quadrant” by G. Young and A. Hils, June X, 2009. This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Fortinet. The Magic Quadrant is copyrighted June X, 2009 by Gartner, Inc., and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

16 Fortinet Confidential Core Value Proposition Traditional Network Security Solutions The Fortinet Solution

17 Fortinet Confidential Fortinet Brings Networking and Security DNA

18 Fortinet Confidential Case Study: Distributed Enterprise  US Distributed Retail Auto Service Chain Fortune 500 company 800+ Remote retail locations 18  Challenge PCI compliance Efficient management Physical footprint  Why We Won Ease of management Robust network security functionality Lower TCO vs. peers  Who We Beat Cisco, Juniper  Features: Firewall, VPN, Web Filtering

19 Fortinet Confidential Case Study: Enterprise 19  Leading Financial Institution Multi-billion dollar transaction platform 1200+ customers Thousands of daily transactions  Challenge Large operating / IT costs Point product complexity Auditing  Why We Won Raw performance Consolidated features Effective security  Who We Beat Cisco, Juniper  Features: Firewall, VPN, Antivirus, Antispam

20 Fortinet Confidential FortiGate Product Lineup Application Security FortiGate Network Security Platform FortiMail Email Security FortiWeb XML & Web Application Secur ity FortiDB Database Security FortiManager Centralized Mgmt FortiAnalyzer Logging & Reporting Security Services FortiGuard Real time Security Services Host Security FortiClient Host Security Solution FortiScan Asset Vulnerability Mgmt UTM Security Data Security Management

21 Fortinet Confidential 21 Purpose-Built Hardware Specialized OS Firewall Real Time Protection Flexible Capabilities High Performance Hardened Platform Traffic Shaping VPNAVIPSAntispamWF SSL Insp DLP WANopt In today’s sophisticated threatscape, network security requires overlapping, complementary technologies; Fortinet’s security PLATFORM provides both flexibility & defense-in-depth capabilities. AppCtrl FortiGuard Updates FortiGate Multi-Threat Security Platform

22 Fortinet Confidential FortiGate UTM Lineup ASIC-based multi-threat security platform Common OS across all platforms Single management interface FortiGuard Services Antivirus, IPS, Antispam, Web content filtering EnterpriseService Provider & Large Enterprise SMB & Remote Office

23 Fortinet Confidential Product Portfolio Application Security FortiGate Network Security Platform Security Services FortiGuard Real time Security Services FortiMail Email Security FortiWeb XML & Web Application Secur ity Host Security FortiClient Host Security Solution FortiScan Asset Vulnerability Mgmt FortiDB Database Security FortiManager Centralized Mgmt FortiAnalyzer Logging & Reporting UTM Security Data Security Management

24 Fortinet Confidential FortiGuard Services Network Real-time updates “Push” / “pull” updates for Fortinet customers Tied to FortiCare registration system Distributed infrastructure Multiple servers deployed globally Approximately 16 data center locations Hierarchical deployment strategy Main server update pushes secondary updates Gather feedback from worldwide installed base 24

25 Fortinet Confidential The Fortinet Solution FortiGate Appliance FortiGateServices Consolidate Security Disruptive Technology Platform Low Total Cost of Ownership  Provides broad array of best-in-class security functions  Global Threat Research Team provides real-time updates  FortiASIC and FortiOS deliver faster network performance  Network and content level functions are integrated  Eliminates expense of purchasing and integrating separate single-function products from multiple vendors

26 Fortinet Confidential Fortinet’s End-to-End IT Security Portfolio Content & App Security FortiDB FortiScan UTM FortiGate Security Management & Analysis FortiManager FortiAnalyzer Email & Web Security FortiMail FortiWeb Endpoint Security FortiClient FortiMobile

27 Fortinet Confidential Summary Comprehensive solution From a single vendor Lower TCO Less complexity and easier management Real-time security 24/7 global updates Strategic flexibility Fit your timeline and budget

28 Fortinet Confidential Thank You Bryan Wood Fortinet Manager Western Channel Sales O 949-713-5690 C 949-394-1036 E bwood@fortinet.com


Download ppt "Fortinet Confidential End-to-End Strategic Security Bryan Wood Manager – Western Channel Sales October 14th, 2009."

Similar presentations


Ads by Google