Presentation is loading. Please wait.

Presentation is loading. Please wait.

Innovative, Best-in-Class Technologies and Products

Similar presentations


Presentation on theme: "Innovative, Best-in-Class Technologies and Products"— Presentation transcript:

1

2 Innovative, Best-in-Class Technologies and Products
Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based, strong global presence with offices worldwide $325M+ in revenues (2010) Seasoned and proven executive management team (NASDAQ: FTNT) 1,350+ employees / engineers 500,000+ FortiGate devices shipped worldwide Innovative, Best-in-Class Technologies and Products Six ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam) Strong IP portfolio – 20+ patents; 80+ pending Government Certifications (FIPS-2, Common Criteria EAL4+, NIST) Consistent Antivirus Validation – (Virus Bulletin 100 approved; 2005, 2006, 2007, 2008, 2009, 2010) 2 2 2

3 Security TODAY: Blended Threats Leverage Multiple Threat Vectors
Malicious threats lead to Data loss Identify theft Database espionage Network downtime Bad publicity Regulatory fines The motive has changed From notoriety to criminal intent More malicious in nature Global in reach Predatory behaviors Threat Vectors Application Blended Threats: Designed to maximize damage and speed of infection Fast spreading network-based threat with multiple attack vectors: Combination of virus, worm, and exploits vulnerabilities Many leverage to spread with a malicious payload attachment Can self replicate acting as a hybrid virus/worm Remote execution, DoS, Backdoor applications Examples: Zotob, NetSky, Nimda, CodeRed, Blaster, MyDoom, DeadHat, DoomJuice, Bugbear, etc Spam was originally a nuisance but is now a corporate security concern Threat Vectors Network

4 You Have to Do More with Less
Increase access to backend data and systems Decrease risk of unauthorized access Increase effectiveness of existing resources and investments Reduce complexity of security infrastructure Lower operating and capital costs We know that on a daily basis, you’re having make hard choices on how to do more without spending more. You are under pressure to open up more of your data to employees, customers, partners, and vendors; at the same time you’re expected to reduce the potential of unauthorized access to your data and backend systems. You’re also expected to make your existing staff and security technologies more effective, and to do it while spending less And, we know you’re expected to lower your expenses

5 Fortinet – Consolidated Security
Deliver comprehensive solutions for the largest global networks and organizations Improve performance Increase protection Reduce complexity Continually raising the performance bar with purpose-built hardware and software Custom processors and latest generation general purpose processors Convert stand-alone products into features Simplify the network and improve visibility Reduce Total Cost of ownership

6 We Pioneered a New Approach
Traditional Network Security Solutions The Fortinet Solution Stand-alone, non-integrated security Mix of off the shelf systems and applications Higher total cost of ownership Difficult to deploy / manage / use Real-time, integrated security intelligence ASIC-accelerated performance Lower total cost of ownership Easy to deploy / manage / use

7 UTM Surpassing Traditional Network Security
$ in billions 13.8% CAGR $1.7 $3.2 $2.2 Firewall & VPN (-0.5%) CAGR $2.1 UTM Source: IDC “Worldwide Network Security Forecast and 2007 Vendor Shares: Transitions – Appliances Are More Than Meets the Eye” 7

8 Market Leadership Across the Board
Worldwide UTM Market Share Q (1) Magic Quadrant for Unified Threat Management (2) UTM Market Competitive Landscape, 2009(3) Rank Company Market Share (%) (2) 1 16.4 2 Cisco 9.8 3 Juniper 9.0 4 SonicWALL 8.1 5 Check Point 7.2 6 McAfee 5.5 7 WatchGuard 4.9 8 Crossbeam 2.6 9 Other 41.4 Total 100.0 High Ability to Deliver Low Low Market Penetration High Niche Participant Specialist Contender Challenger Market Leader Notes IDC Worldwide Security Appliances Tracker, September (market share based on factory revenue) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, October 2010 Frost & Sullivan, “World Unified Threat Management, Products Market 2009”, 2010 8 8

9 Unified Threat Management
Fortinet Solutions Unified Threat Management Centralized Management FortiManager Centralized Device Management FortiAnalyzer Centralized Logging and Reporting Application Security FortiMail Messaging Security FortiWeb Web & XML Application Firewall FortiGate Network Security Platform FortiAP Network Security Platform FortiToken 2-factor Authentication Application Delivery Host Security FortiClient Endpoint Security FortiScan Asset Vulnerability Management FortiGuard Real time Security Services FortiBalancer Application Delivery Controller

10 Fortinet's Approach to Consolidated Security
Complete Content Protection Antispam WAN Optimization Antivirus/ Antispyware Data Loss Prevention Endpoint Protection/ NAC VLANs, VDOMs, Virtual Appliances VPN Web Filtering Strong Authenti-cation Firewall IPS App Control Wireless LAN SSL Inspection Vulnerability Mgmt IPv6, Dynamic Routing VoIP

11 Application Evolution
“Application” has evolved to include web browser, web server, application server, operating system Delivery can be on-premise or hosted in the cloud, or some combination Regardless of delivery model, most data now browser-based Well known port numbers Port 80 (HTTP) / Port 443 (HTTPS)

12 Beyond Application Identification
Today’s Network Security Requires Application Detection, Monitoring, and Control Allowing access to Web 2.0 applications has made enforcing data security policies far more complex User-created content embeds threats in content, pages, links, comments to blogs… Protection against effects of social media applications Data loss Threat propagation Bandwidth consumption Inappropriate use Endpoint to the Core “Single pane of glass” management for visibility & control

13 Identification Over 1,500 applications More added every week Category
IM, P2P, Remote Access, Video, etc. Ranked on popularity & risk Impendent of port, protocol, IP address Decrypt encrypted traffic Including HTTPS, POP3S, SMTPS and IMAPS protocols

14 Granular control of behavior
Apps & features within apps Categories of apps Individual apps Actions within apps Users Domain, groups, individual users Traffic Prioritize Limit access by groups or users Time of day Day of week

15 Integrated security appliance
FortiGate ASIC FIREWALL APPLICATION CONTROL WIRELESS DATABASE ANTISPAM VPN FORTIOS FORTIASIC WEB FILTERING DLP ROUTING WAN OPTIMIZATION ANTIVIRUS IPS Integrated security appliance Network threat detection Application-aware screening Accelerated performance Custom ASIC Platforms for every market segment Non-user licensing Performance-based models Firewall Virtualization

16 Integrated Threat Protection in Action
Problem: PORT 80 Error message: “Drops” copy of itself on system and attempts to propagate “Innocent” Video Link: Redirects to malicious Website “Out of date” Flash player error: “Download” malware file Solution: Integrated Web Filtering Blocks access to malicious Website FIREWALL Network Antivirus Blocks download of virus WEB FILTERING ANTIVIRUS Intrusion Protection Blocks the spread of the worm INTRUSION PROTECTION

17 Disruptive Technology Platform
FortiASIC FortiOS Custom built operating system Architected for security and networking demands Leverages custom hardware platform Mature OS - At version 4.0 MR2 today ASICs accelerate FortiOS security and network functions Enables faster performance against competitors Multiple ASICs targeting key functions Mature design across FortiASICs

18 FortiASIC Specialized Processors
FortiASIC Content Processor (CP) Series Pattern-Match Acceleration Encryption / Decryption (e.g. IPSec, SSL-TLS) FortiASIC Network Processor (NP) Series Firewall Acceleration IPSec VPN Acceleration FortiASIC Security Processor (SP) Series Additional IPS Acceleration Flow based AV Acceleration Unicast , Multicast Acceleration

19 Fully Integrated Technologies
FortiOS Fully Integrated Technologies Manage all policy enforcement from a single console Single Inspection of Packets Delivers greater efficiency and intelligence Deployment Ease & Flexibility Single console for all FortiGate platforms, all technologies Ability to deploy technologies where needed IPv6 Ready

20 FortiGuard Subscription Services
Real-Time Security Protection Global Distributed Network Global software updates Large knowledgebase of security 8 million antivirus signatures, 90 million URLs for Web filtering 100+ threat research professionals Eight global locations Automated updates to Fortinet customers Robust 24 x 7 x 365 Real-Time Global Intelligence

21 FortiGate UTM Lineup ASIC-based multi-threat security platform
Common OS across all platforms Single management interface FortiGuard Services Antivirus, IPS, Antispam, Web content filtering, Application control SMB & Remote Office Enterprise Service Provider & Large Enterprise

22 Fortinet Virtual Appliances
FortiGate Virtual Appliances Combine with traditional FortiGate appliances for maximum network visibility and security controls. Utilize Virtual Domain (VDOM) and Virtual LAN (VLAN) technologies to enforce security between zones Released w/ FortiOS 4.2 (MR2) FG Availability / Licensing Available Now Licensed by # of vCPU: 2 / 4 / 8 30-Day evaluation license available Hypervisor Support VMware ESXi/ESX 3.5/4.0/4.1 Delivered in OVF format

23 Virtualized Data Center Security
Logical Security Zones are used to isolate hosts with differing security requirements Servers Desktops DMZ/Private Zone Public Zone Virtualized Data Center Server Servers / DMZ Desktops / Private Primary security goal: separation of logical zones Virtual perimeters Firewalling between zones

24 A Reliable Partner Proven Industry Leadership Certified security
Since 2000, Fortinet has received more than 100 product & company awards. IDC: Overall leader in UTM factory revenue for all of 2009 Gartner: Leader in Multi-Function Firewall Magic Quadrant Frost & Sullivan: 2010 "Fortinet is the established and undisputed leader" of worldwide UTM market SC Magazine: 2009 Readers' Trust Award for "Best Integrated Security Solution" Certified security Five ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam) Government Certifications (FIPS-2, Common Criteria EAL4+, JITC IPv6, SCAP) ISO 9001 certification 24

25 Summary Comprehensive High Performance Real Time
FortiOS Operating System FortiASIC Network Processor FortiGuard Threat Research FIREWALL IPS VPN ANTIVIRUS/ ANTISPYWARE WEB FILTERING Fortinet built and owns all 3 key components— Integrated security technologies, High speed processors Global update and support services Our FortiOS operating system enables us to efficiently deliver consolidated security without compromise. We can add additional technologies without suffering a performance breakdown. Our FortiASICs add significant processing advantage over a other approaches delivering accelerated performance Our FortiGuard and FortiCare infrastructure delivers product updates and customer support around the world Some of our competitors, whether they are NGFW or UTM, cannot deliver the complete solution: Security vendors offer a broad set of features, but do a poor job of integrating them and pay a performance penalty Networking vendors may deliver better performance, but their security technology does not have the compressive range of technologies, and doesn’t provide complete content protection There are many who claim leadership in the market, but Fortinet had delivered for 10 years. DLP APPLICATION CONTROL WAN OPTIMIZATION ANTISPAM Consolidated Security FortiASIC Content Processor FortiCare Customer Support

26 Thank You


Download ppt "Innovative, Best-in-Class Technologies and Products"

Similar presentations


Ads by Google