Presentation is loading. Please wait.

Presentation is loading. Please wait.

Fortinet An Introduction

Similar presentations


Presentation on theme: "Fortinet An Introduction"— Presentation transcript:

1 Fortinet An Introduction
This presentation is designed to act as an introduction to Fortinet.Typical audience is business and technical decision makers in Mid to large enterprise customers. Appropriate for Executive Briefing type situations lasting about an hour.

2 The power to Control verify visualize simplify consolidate manage
The strength of Fortinet is our ability to provide organizations with the power they need to manage and gain control over their IT infrastructure using our Security technologies. protect secure accelerate enable enforce

3 Agenda Fortinet Introduction Strategic Solutions Technology Overview
First, we’ll provide a brief overview of Fortinet and why our approach is different from other security technology vendors. Next, we’ll show how our technologies can provide solutions to your most pressing business problems. And finally, we provide a brief overview of Fortinet technologies and products.

4 Fortinet Corporate Overview
Market Leader UTM - Fast-growth security segment Advanced technology and products 101+ patents; 113+ pending Strong global footprint 1,700+ employees; 40 offices worldwide Blue chip customer base Over 125,000 customers (incl. majority of Global 100) Exceptional financial model FY11 revenues: $434M (34% YoY growth) Q1/12 revenues: $117M (26% YoY growth) Strong balance sheet: $600M+ in cash; no debt IPO - November 2009 $434 FORTINET REVENUE ($MM) $325 $252 First, a brief overview of Fortinet. $212 $155 $123 $80 $39 $13 4

5 A VICIOUS CIRCLE Network Security: The Traditional Approach
New Threat Intercepts New Device: ‘Next Generation’ Firewall New Device: VPN Termination A VICIOUS CIRCLE The traditional approach to security doesn’t work. E.g., VPN for secure remote access in 97 as market moved from Frame Relay/Dedicated line, to remote access over PSTN . Encrypted VPN Tunnels became critical technology. Same thing happened as new threats arose – Spam led to Spam filtering devices App layer attacks led to need for app control and app layer inspection. Management, visibility, control all suffer Best of breed lasts about 18 months, then other vendors pile into market Buying the new shiny toy doesn’t work in the long run – Silicon Valley is littered with companies that last a few years after introducing a new technology. New Threat App Layer Attacks New Threat Spam New Device: Spam Filtering

6 More Expense, Less Security, Less Control
The Result: More Expense, Less Security, Less Control “I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks.” “Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey New York Times 6/22/11 Your network might look something like this… It’s too complicated. And – it leads to security holes. Expensive, complex, lack of control, chase new box in months Are you really more secure?? Here’s what was said in a recent NY Times article….. “I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks.” “Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey - New York Times 6/22/11

7 Reducing Complexity Is Critical
Q: What are the top security-related challenges your organization is facing? (base: of those that are involved in Security investments) The traditional approach of having different devices for different security functions is adding to the problem – not solving it. Reducing complexity is CRITICAL. According to this survey done by Infoworld, the complexity of security solutions is a bigger problem than mobile clients, regulatory issues, bandwidth or employee misuse of data. Source: Navigating IT: Objective & Obstacles Infoworld, May, 2011

8 Fortinet Breaks The Cycle
New Threat Update Firmware App Control, Data Leakage, SSL Inspection Update Firmware: Web Filtering One platform, one provider, one solution…. The Fortinet model has proved durable for over 10 years. Customers don’t have to ‘rip and replace’. Breaks cycle of customer adding more vendors, maintains account control, builds customer loyalty. Fortinet Milestones FortiOS 3.0: Until FortiOS 3.0 (2006), addressing the Instant Messaging security problem required that enterprises either purchase and manage separate "point" solutions or settle for weak security processes like simply blocking or allowing the traffic. Fortinet is the first vendor to integrate complete content protection - including full antivirus (AV) scanning, blocking and quarantining of IM traffic and file attachments, intrusion prevention (IPS) signature updates, and URL filtering -- for IM applications into an existing multi-threat security system. FortiOS 4.0 (2009): Application Control, Data Leakage Prevention, WAN Optimization, SSL Inspection was introduced. New Threat New Threat Update Firmware: IM & P2P Protection

9 The Benefit Of Integration: Continuous Updates
New Threat Antispam & Web Filtering Continuous Anti-Virus: 4x each day And, while periodic Firmware updates address the response to changes in the overall security threat landscape – continous updates from FortiGuard provide protection against new threats on a daily basis. Fortinet maintains its own threat response organization – which we’ll discuss in detail later in the presentation. New Threat New Threat IPS: 2x each day

10 Followed The Internet Evolution
Security: Followed The Internet Evolution APP LAYER ATTACKS APP CONTROL SPYWARE ANTI-SPYWARE WORMS ANTI-SPAM SPAM Performance - Damage BANNED CONTENT WEB FILTER TROJANS ANTI-VIRUS Many new companies have come up with point security solutions to address each new application and attack as the threat landscape has evolved, and the network vendor players like Cisco and Juniper keep buying more point products to add on top of their firewall and VPN, resulting in more and more complex, costly deployments for customers. VIRUSES INTRUSIONS IPS CONTENT-BASED VPN CONNECTION-BASED FIREWALL HARDWARE THEFT HARDWARE THEFT HARDWARE THEFT LOCK & KEY PHYSICAL 1980s 1990s 2000s Today

11 The Fortinet Solution CONTENT-BASED CONNECTION-BASED PHYSICAL
APP LAYER ATTACKS APP CONTROL SPYWARE ANTI-SPYWARE WORMS ANTI-SPAM SPAM Performance - Damage BANNED CONTENT WEB FILTER TROJANS ANTI-VIRUS Fortinet’s approach was to create Unified Threat Management. The UTM solution, which tightly integrates many functions and point products together into a single platform. UTM is defined as a device that “Unifies” multiple security features, including firewall/VPN, Intrusion Detection/Prevention and gateway antivirus, at a minimum, Fortinet offer s all these plus much more features. We also leverage our FortiASIC to accelerate performance, and, as we discussed, we utilize our FortiGuard Labs for real-time global update service, this solution effectively protects our customers in today’s challenging network environment VIRUSES INTRUSIONS IPS CONTENT-BASED VPN CONNECTION-BASED FIREWALL HARDWARE THEFT LOCK & KEY PHYSICAL 1980s 1990s 2000s Today

12 Fortinet: A New Approach
TRADITIONAL SOLUTIONS Cumbersome and costly THE FORTINET SOLUTION Simple and cost-effective Traditional Solutions are: - Non-integrated - Mix of off the shelf systems and applications Have a higher total cost of ownership And, are difficult to deploy, manage and use The Fortinet approach provides the same technologies without the complexity. With added benefits of: Real-time integrated security intelligence ASIC-accelerated performance Lower total cost of ownership While being easier to deploy, manage and use 12

13 FortiGate: Integrated Architecture
Real-Time Protection FortiGuard™ Updates Fully Integrated Security & Networking Technologies AV IPS Web Filter Antispam App Ctrl VM Firewall VPN DLP WAN Opt Traffic Shaping WLAN VoIP SSL Insp HA Load Balancing • We control all components which leads to a rich, comprehensive architecture. • Integration of variety of technologies allows organizations to choose which technologies they require • One company, one architecture No other vendor provides such a rich, integrated suite of security technologies. Fortinet Offers…… Purpose-built software and hardware acceleration through ASICs Specific processors and hardware to handle various security functions to optimize performance and perform SSL decryption on thousands of simultaneous connections Options for stream-based, flow-based or complete content protection Acceleration for specific security functions like Ipv6, multicast routing, IPS, application control and flow anti-virus inspection. Clusters, sub-second failover, uninterruptable upgrades Management System HA & geographical redundancy WAN optimization and caching to accelerate web applications/servers by reducing bandwidth usage, server load, and perceived latency The Result: low latency, high performance and resiliency, increased flexibility Hardened Platform Specialized OS High Performance Purpose-Built Hardware Support and Services FortiCare™ FortiGuard Labs Purpose-built to deliver overlapping, complementary security Provides both flexibility & defense-in-depth capabilities 13

14 Unmatched Solution Spectrum
COVERAGE Domain Network Data Center/Cloud SOHO/CPE Enterprise Carrier And, no other vendor offers solution across such a wide spectrum. From small office and CPE solutions – up to the Fastest Firewall In The World. And – we offer coverage from the individual device level up to complete network and domain-level solutions. The breadth of our solutions and devices plus the richness of our integrated security offering is unmatched in the industry. Simply put, Fortinet provides the most complete security offering in the market. SIZE Content Device

15 The Result: Market Leadership
IDC Worldwide UTM Market Share Q (1) IDC Worldwide Network Security Revenue 2011 (2) Magic Quadrant for Unified Threat Management (3) Rank Company Market Share (%) 1 18.9 2 Check Point 17.8 3 SonicWALL 9.3 4 Juniper 5.8 5 Cisco 5.4 6 WatchGuard 5.1 7 McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total 100% Market Size $2.2B Rank Company Market Share (%) 1 Cisco 18.2 2 Check Point 14.5 3 Juniper 8.9 4 5.1 5 McAfee 4.5 6 Microsoft 3.5 7 IBM 3.4 8 HP 2.7 9 Others 31.2 Total 100% Market Size $7.4B And – our strategy is paying off! Numerous awards and industry recognition for our success. Fortinet has been the leading vendor in IDC’s UTM security appliance market for 24 consecutive quarters (1) IDC Worldwide Security Appliances Tracker, June 2012 market share based on factory revenue (2) IDC Worldwide Network Security Forecast and 2011 Vendor Share, July 2012 (3) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012 15

16 Agenda Fortinet Introduction Strategic Solutions Technology Overview

17 Reacting To Change Mergers & Acquisitions Social Media Strategies
Mission Critical Applications New Business Processes Security technologies should be put in the context of an organization’s overall strategy. The technologies we’ve been discussing are a key enabler to solving critical business issues. As you look at these issues (and think of other similar issues in your organization) they have a central theme – and that’s ‘Control’. Gaining control of your IT infrastructure is key to solving business problems and implementing strategies. Use these (and the next page) as examples to begin a discussion of the particular strategic issues a customer needs to deal with. - Social Media Strategies The insurance company creating a social-media strategy needs to restrict Facebook/YouTube access to certain individuals New Business Processes The manufacturer improving its off-shore supply chain by implementing a secure private cloud Improving Productivity The hospital needing to restrict nursing staff eBay/shopping site access to their lunch hour Compliance The retail chain meeting PCI-DSS regulations and needing WiFi and application control in their remote locations Mergers & Acquisitions New acquisition brings hundreds of new users, dozens of new locations,consolidated data centers New Mission Critical Applications Enforcing appropriate use, protecting bandwidth Partnering - Selective access to information on a shared infrastructure with multiple partners - Employee IT Usage Policies Safe deployment of ‘Bring Your Own Device’ policy Productivity Improvements Partnering Compliance ‘Bring Your Own Device’

18 The Problems PROTECTION POLICY PROCESS Protect Assets
Guard Against Threats PROTECTION Improve Employee Productivity Meet Regulatory Requirements POLICY Enable Business Growth Increase Efficiencies PROCESS Many of the problems facing organization’s can be summarized as ones of: • Protection – protecting assets and guarding against threats. Preventing personnel from doing things that can lead to security exposure (ex downloading malware, visiting dangerous websites) • Implementing and enforcing policies – these policies can be designed to increase employee productivity (ex – limiting online shopping to lunch hours) or meeting regulatory requirements such as HIPAA or PCI. Fortinet provides ability to craft a detailed, enforceable policy. Of course, such policies should be consistent with the corporate culture and regulatory requirements of an organization • Improving business processes – securely deploying new strategies (ex. Cloud Computing, BYOD etc…) that enable business growth and increasing overall efficiencies by making the most of your infrastructure (ex Bandwidth Management) Solving these problems becomes more difficult as threats evolve. Increased targeted attacks such as APTs, the rise of insider threats leveraging social engineering and social networking, the emergence of mobile botnets, and an easier access to crimeware tools and providers, all pose new security challenges. In parallel, as technology advancements help drive business innovation, they also make the current enterprise environment more complex with: Multiple media: networks are not just cables anymore. Businesses are now relying on public/private wireless and 3G/4G networks for communication, Multiple data locations: data is stored in and transmitted from and to various locations including endpoints, servers, mobile devices, and the cloud, Multiple devices: users access corporate resources from inside and outside the corporate network with an ever-growing range of corporate and personal devices that include PCs, laptops, smartphones and tablets,  Multiple productivity tools: business has become more reliant on online applications, inherent to Web 2.0 and social media for instance, but also new delivery models, such as cloud services. Multiple audit/compliance requirements Instant connectivity, IT consumerization, user mobility and cloud computing are all trends driving continuous evolution of the enterprise environment. To support that new environment while protecting it, organizations must address a new security landscape in which threat penetration points proliferate, traffic gets undistinguishable, bandwidth demand increases and management issues multiply. In this context, a new approach towards IT security is required. 18

19 WHY WHAT HOW The Power To Control CONTROL? TO CONTROL? TO CONTROL?
Improve Protection Improve Policy Compliance Increase Efficiency of People/Process es Users Applications Data Devices Multiple Points of Contact Diverse Toolset Consolidation of Functions Given the enterprise security landscape, IT professionals must regain the Power of Control. Why: IT must support business functions and processes What: To do so, IT organizations must gain precise control over users, applications, data and devices How: They must adopt an IT security strategy that will allow consolidation on the operations, management and view of their IT security architecture • But this comprehensive control requires MULTIPLE points of contact. It’s difficult to accomplish by just one device or one technology. A diversity of tools is necessary. We’ve seen how today’s threat landscape requires multiple technologies for mitigation. And, this comprehensive control requires the consolidation of multiple different functions. As we discussed earlier, point product solutions can be counterproductive in the long run……they lead to complexity, extra expense, management headaches and opens up the possibility of security breaches. Remember the earlier quote - “I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks.” “Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey - New York Times 6/22/11 19

20 The Power To Control Controlling Apps & Features Within Apps
Categories of Apps Individual Apps Actions Within Apps Defining User Behavior By Domain By Groups By Individual Users Controlling Data Prioritize Limit Access By Groups or Users - Time of Day - Day of Week Control must be VERY granular and VERY easy to manage. Fortinet allows VERY precise control of users, applications and traffic. And, our ‘single-pane-of-glass’ management of our wealth of technologies and devices allows for easier development and deployment or policies. Fortinet: At the application level Identifies traffic by application source – on all ports – even applications ‘hiding’ behind proxies, remote access and encrypted tunnels Identifies which applications run on endpoints, including IM/P2P/etc running over port 80 Detects applications inside of applications: Decryption, scanning and control of outbound SSL traffic (including HTTPS, POP3S, SMTPS and IMAPS protocols); Tunneling P2P/IM/etc inside http Classification of applications (over 1,900 applications categorized), change monitoring and policy check Rate shaping on an application basis instead of just a port number Policy definition for unknown traffic At the user level User-level control inside and outside enterprise network User policy definition based on location and device Reputation through activity tracking which includes intelligent policy definition based on device recognition and dynamic reputation

21 The Power To: Solve Everyday Problems
Emily, a financial trader, installed Skype on her company laptop to talk with family. Endpoint Control Bill works for a Fortune 100 company and shares company details on Facebook. Identity-Based Policies Here are some real world examples of how a variety of Fortinet technologies can solve everyday problems. Again, the breadth of our solution offers you the customer the most complete approach. Emily – application policy checking via FortiClient Bill: Identity-based policies + DLP, app control. Bill (the CFO) might authorized to post to the Corporate Facebook page while others might not Jill: Setting up a VPN – with 2 factor authentication and WAN optimization for improved app performance. Ed: Detect content with sensitive data 2-Factor Authentication VPN Tunneling WAN Optimization Jill is at Starbucks and needs to communicate and be protected as if she was at HQ. Ed shared a company presentation via his personal Gmail account. Data Leak Protection 2121

22 The Power To: Improve Productivity – Limiting Web Access
Here’s an example of how Fortinet technologies allows precise control of how people use your IT infrastructure. Of course, this type of control can be modified for different classes of users. For instances at a hospital, nurses might be limited in how much time they can spend on non-work related sites – while Doctors would have no limits. “Your daily quota for this category of webpage has expired… URL: beach-camera.store.buy.com Category: Shopping and Auction”

23 Fortinet Delivers The Power To Control Business Benefits
Over the entire network, end-to- end Users Behavior Data Devices Operating Systems Applications With the broadest base of solutions Endpoint to Datacenter Solution Integrated Stack Security Consolidated Functionality Simplified Management Real-time Threat Protection Business Benefits Increased Protection Improved Policy Compliance Lower TCO Enhanced Productivity (end users & operations) Fortinet provides you with the power to control your network from end-to-end – with solutions that range from endpoints to the cloud with consolidated functionality, simplified management and real-time update. The benefits of Fortinet’s approach accrue to both business and technical decision makers in mid to large enterprises. Technology Benefits End to end security High uptime/availability Easy management Proactive protection 23

24 Agenda Fortinet Introduction Strategic Solutions Technology Overview
Now let’s take a deeper look at Fortinet technology

25 Broad Product Portfolio
FortiASIC FortiOS FortiDDoS FortiVoice FortiAuthenticator FortiSwitch SMALL/MEDIUM ENTERPRISE Fortinet has a wide range of devices. Besides the flagship FortiGate line of devices. In addition to FortiGate – there is a wide range of additional devices including management and analytics, wireless access points, virtual machine deployments for cloud deployments and mail, web and database among others. Six ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL, VPN, Anti-Spam) Government Certifications (FIPS-2, Common Criteria EAL4+) ISO 9001 certification Fortinet offers: End-to-end IT security including security and WAF Complete portfolio to protect different layers of the network/communications Integrated protection of wired and wireless networks Virtual appliances to secure virtual datacenters: hypervisor independent inter-VM and Inter-Zone security; XML API to ease provisioning of appliance policies The Result: security of the extended enterprise - from endpoints, to the perimeter and the core, including DB infrastructure, messaging servers and content systems SERVICE PROVIDER FortiGate Series FortiGate Series FortiBalancer FortiScan LARGE ENTERPRISE FortiGate Series FortiCache FortiDB FortiManager FortiWeb FortiAnalyzer FortiMail

26 Significant Competitive Advantages
High Performance Real Time Comprehensive FortiOS Operating System Multi-Threat Security FortiASIC Network ASIC FortiASIC Network Processor FortiGuard Subscription Service FortiCare Customer Support FIREWALL APPLICATION CONTROL ANTISPAM VPN WEB FILTERING DLP WAN OPTIMIZATION ANTIVIRUS/ ANTISPYWARE IPS Web security security Anti- malware FortiASIC System-on-a-Chip FortiASIC Content Processor FORTINET BUILT AND OWNS ALL 3 KEY UTM COMPONENTS – INTEGRATED SECURITY TECHNOLOGIES, HIGH-SPEED ASICS, AND GLOBAL SUBSCRIPTION UPDATE SERVICES -- WHICH PROVIDES US WITH A COMPETITIVE ADVANTAGE. WE BELIEVE THAT NONE OF OUR COMPETITORS PROVIDE A SOLUTION THAT INCORPORATES ALL THESE 3 UTM KEY COMPONENTS. OUR FORTIOS OPERATING SYSTEM ENABLES US TO EFFICIENTLY DELIVER MULTI-THREAT, COMPREHENSIVE SECURITY. OUR FORTIASICs ADD SIGNIFICANT PROCESSING POWER ADVANTAGE OVER THE SOFTWARE APPROACH, ACCELERATING FORTIGATE UTM PERFORMANCE. OUR FORTIGUARD INFRASTRUCTURE PROVIDES PROTECTION IN REAL-TIME - ESSENTIALLY PROVIDING A RECURRING, SUBSCRIPTION BUSINESS ON TOP OF OUR FORTIGATE APPLIANCES. SOME OF OUR COMPETITORS MAY BE ABLE COMPETE WITH INDIVIDUAL ELEMENTS OF OUR UTM SOLUTION - BUT IN OUR VIEW NO ONE CAN DELIVER THE ENTIRE SOLUTION AS WE ARE DOING TODAY. FOR EXAMPLE: SECURITY VENDORS SUCH AS CHECK POINT AND MCAFEE OFFER A BROAD SET OF FEATURES, BUT DO A POOR JOB OF INTEGRATING THEM, AND DON’T COME CLOSE ON PERFORMANCE NETWORKING VENDORS SUCH AS CISCO AND JUNIPER ARE OK ON PERFORMANCE, BUT THEIR FIREWALL AND VPNS MISS ALL THE VIRUS AND BAD CONTENT-BASED ATTACKS. WE BELIEVE WE HAVE THE BEST TECHNOLOGY COVERING ALL THE KEY UTM FUNCTIONS, AND FROM A PERFORMANCE AND INTEGRATION PERSPECTIVE, NO ONE EVEN COMES CLOSE TO FORTINET.

27 The Power To: Centralize Management & Analysis
Single Pane of Glass Management Global policy enforcement across 5 or 5,000 devices Increased flexibility with granular role-based administration Simplified configuration of Firewall, IPS, Application Control and other protections Fortinet provides for the consolidation of management and analysis functions. No other vendor allows for the management of such a wide range of devices that implement such a wide range of security technologies. This ‘Single-pane-of-glass’ management helps reduce operational costs, improves overall management and can improve reaction to security incidents as operators are able to view a variety of different security technologies on one screen. Centralized Analysis and Reporting Continuous monitoring across the enterprise Greater visibility into real-time incidents Monitor activity by users identity Automate compliance reporting

28 Custom ASICs: Foundation For Unmatched Performance
Custom Designed Hardware Dedicated Security functions coupled with powerful CPUs Content Processor (ASIC) Accelerates computationally intensive tasks Network Processor (ASIC) Heart of the hardware accelerated firewall Operates at interface level, providing low latency data path Security Processor (Hybrid) Multi-core, multi-threaded processor combined with content processor ASIC logic Operates at interface level, adding additional packet processing Integrated Switch Fabric Integrated Switch Fabric FortiASIC Security Processor Network Processor Content Processor Network Interfaces General Purpose CPU Our FortiGate appliance family, is based on our FortiASIC chips and FortiOS operating system. We have invested 100’s of millions dollars and 100s of R&D engineers dedicated to developing and advancing these technologies over the past 10 years. FortiASICs accelerate the security and networking functions like content scanning, encryption and network package processing. FortiASIC can process these functions hundreds of times faster compared to running software on PCs and servers. Content Processor (ASIC) Designed to accelerate computationally intensive tasks Network Processor (ASIC) The heart of the hardware accelerated firewall Operates at the interface level to provide a low latency data path Security Processor (Hybrid) A multi-core, multi-threaded processor combined with content processor ASIC logic Operates at the interface level and adds additional packet processing and acceleration options For each of the many rich functions in FortiGate, we always keep the best security and highest quality in mind – as evidenced by many certifications We are the only vendor with five ICSA certifications to cover all the major security functions, plus the highest government certifications such as Common Criteria and FIPS, as well as ISO and NEBS certifications for quality process and reliability.

29 Disruptive Technology Platform
FortiOS Custom built operating system Architected for security and networking demands Leverages custom hardware platform Mature OS - at version 4.0 today Core to our differentiation is our truly disruptive technology platform FortiOS Custom operating system built from the group up to deliver accelerated security functionality Implements Fortinet’s suite of security features, routing and switching functions, integration of new appliances and system virtualization Having one OS for a full spectrum of devices is critical to deploying and managing your security infrastructure. 2929

30 Research, Updates, Services
FortiGuard Research, Updates, Services FortiGuard Research: Rootkits: Kernel Hooks Botnets: Dynamic Monitoring, Spambots, New Malware Protocols Malware: Code Techniques-PDF/Flash/Doc Security: Exploits & Vulnerabilities, Zero Day Detection Packer Research: Unpacking, Generic Detection FortiGuard Services: AV Signatures – 4x Daily IPS Signatures – 2x Daily Antispam/Web Content Filtering – Real Time Sample Collection Signature Creation Alerts & Escalation Our FortiGuard labs operate around the clock and around the world. Over 200 professionals are constantly tracking the threat landscape and provide continuous updates. AND, the fact the we don’t rely on third parties for our updates ensures that these updates are current and will work seamlessly on our devices. Global Distribution Network: Application Control Vulnerability Management Antispam Web Filtering Intrusion Prevention Antivirus

31 Fortinet in Action: BYOD
Web 2.0 Error message: Installs on system and attempts to propagate “Innocent” Video Link: Redirects to malicious Website Here’s an example of how the variety of Fortinet Security technologies are used to prevent an a mobile device from either getting infected and spreading an infection. The FortiWiFi device depicted in this scenario acts as both a wireless access point and unified threat management device – with integrated web filtering, network antivirus and intrusion prevention. A FortiToken device provides two factor authentication. “Out of date” Flash player Download malware file Integrated Web Filtering Blocks access to malicious Website FIREWALL Network Antivirus Blocks download of virus WEB FILTERING ANTIVIRUS Intrusion Prevention Blocks the spread of the worm Authentication & Encryption INTRUSION PREVENTION

32 Thank You


Download ppt "Fortinet An Introduction"

Similar presentations


Ads by Google