Download presentation
1
True Unified Threat Management
Fortigate Technology Positioning
2
Agenda The legacy network security approach & multi-party UTM
The Fortinet approach Maximizing the Fortinet opportunity Summary
3
Multiple point solutions & multi-party UTM
The legacy network security approach Multiple point solutions & multi-party UTM
4
Resilient architecture Key Points: Main drawbacks
Gateway Corporate LAN DLP IPS Anti-Virus Firewall Anti-Spam Web Filter SSL VPN DLP IPS IPS Anti-Virus Anti-Spam Web Filter SSL VPN DLP Firewall Anti-Virus Firewall Anti-Spam Web Filter SSL VPN Multi-Party UTM Resilient architecture Key Points: Main drawbacks Consolidated hardware 100% increase in hardware sprawl Inefficient multiple point solutions = latency & vulnerabilities Legacy firewall Cost savings from reduced utility overheads, training etc First network security technology Very low utilisation of investment – Under 50% A set of individuals, not a team BUT! Considerable sprawl in appliances End result is underperforming, over expensive security posture Limited functionality – Port & Protocol, Allow & Block Similar performance issues due to multiple scanning engines Time consuming environment to administer, multiple consoles Insufficient protection against a multitude of threats Reliance on updates from 3rd party databases Sizeable total cost of ownership… Technical training, power & cooling, costly license programs More advanced protection required No major improvement in efficacy
5
An integrated network security platform
The Fortinet approach An integrated network security platform
6
Inside Fortigate Advanced Networking Services
Virtualisation WAN Opt DLP Wireless App Control Traffic Shaping Advanced Networking Services Firewall SSL VPN Anti-Spam Anti-Virus Web Filter IPS Proprietary Unified Threat Management FortiOS Purpose built Operating System Network ASIC Content ASIC General Purpose CPU Purpose built hardware
7
Maximising the Fortinet opportunity
The unified access layer
8
Fortigate: Integrated security platform
Gateway Corporate LAN WLAN IPS Anti-Virus Anti-Spam Web Filter SSL VPN DLP Firewall Fortigate: Integrated security platform FortiAP: Secure wireless access Fortigate: Secure site to site connectivity FortiToken: Strong authentication for mobile workers The Unified Access Layer
9
Summary Legacy security
Multiple point solutions are inefficient with a high total cost of ownership Leave gaps in the network security posture Multi-party UTM offer similar problems with very little improvement in performance Fortinet Fortinet offers a different approach with purpose built, accelerated hardware High performance at a low price Complimentary Fortinet technologies provide a ‘unified access layer’ for secure connectivity regardless of location or network type True Unified Threat Management
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.