Presentation is loading. Please wait.

Presentation is loading. Please wait.

True Unified Threat Management

Similar presentations


Presentation on theme: "True Unified Threat Management"— Presentation transcript:

1 True Unified Threat Management
Fortigate Technology Positioning

2 Agenda The legacy network security approach & multi-party UTM
The Fortinet approach Maximizing the Fortinet opportunity Summary

3 Multiple point solutions & multi-party UTM
The legacy network security approach Multiple point solutions & multi-party UTM

4 Resilient architecture Key Points: Main drawbacks
Gateway Corporate LAN DLP IPS Anti-Virus Firewall Anti-Spam Web Filter SSL VPN DLP IPS IPS Anti-Virus Anti-Spam Web Filter SSL VPN DLP Firewall Anti-Virus Firewall Anti-Spam Web Filter SSL VPN Multi-Party UTM Resilient architecture Key Points: Main drawbacks Consolidated hardware 100% increase in hardware sprawl Inefficient multiple point solutions = latency & vulnerabilities Legacy firewall Cost savings from reduced utility overheads, training etc First network security technology Very low utilisation of investment – Under 50% A set of individuals, not a team BUT! Considerable sprawl in appliances End result is underperforming, over expensive security posture Limited functionality – Port & Protocol, Allow & Block Similar performance issues due to multiple scanning engines Time consuming environment to administer, multiple consoles Insufficient protection against a multitude of threats Reliance on updates from 3rd party databases Sizeable total cost of ownership… Technical training, power & cooling, costly license programs More advanced protection required No major improvement in efficacy

5 An integrated network security platform
The Fortinet approach An integrated network security platform

6 Inside Fortigate Advanced Networking Services
Virtualisation WAN Opt DLP Wireless App Control Traffic Shaping Advanced Networking Services Firewall SSL VPN Anti-Spam Anti-Virus Web Filter IPS Proprietary Unified Threat Management FortiOS Purpose built Operating System Network ASIC Content ASIC General Purpose CPU Purpose built hardware

7 Maximising the Fortinet opportunity
The unified access layer

8 Fortigate: Integrated security platform
Gateway Corporate LAN WLAN IPS Anti-Virus Anti-Spam Web Filter SSL VPN DLP Firewall Fortigate: Integrated security platform FortiAP: Secure wireless access Fortigate: Secure site to site connectivity FortiToken: Strong authentication for mobile workers The Unified Access Layer

9 Summary Legacy security
Multiple point solutions are inefficient with a high total cost of ownership Leave gaps in the network security posture Multi-party UTM offer similar problems with very little improvement in performance Fortinet Fortinet offers a different approach with purpose built, accelerated hardware High performance at a low price Complimentary Fortinet technologies provide a ‘unified access layer’ for secure connectivity regardless of location or network type True Unified Threat Management


Download ppt "True Unified Threat Management"

Similar presentations


Ads by Google