David Maman Security Virtualization Idc

1,388 views
1,324 views

Published on

A lecture I gave at the IDC IT Security Road show, last June, 2008. Talked about Information Security virtualization, I was still at Fortinet at the time.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,388
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
92
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

David Maman Security Virtualization Idc

  1. 1. Security Virtualization and Value Added Services IDC IT Security Roadshow, June 03, 2008 Securing Your Business: Technology Meets People David Maman, Fortinet
  2. 2. What is Virtualization? The act of abstracting the (physical and logical) boundaries of a technology.
  3. 3. Many ways to Virtualization Servers Desktops Applications Networks Storage Fortinet Confidential
  4. 4. Why Virtualize? Consolidate Physical Resources • Logical resources may remain the same! Reduce Power Consumption Streamline System Recovery Control and Provide Growth Simplify system maintenance Optimize Resource Utilization Maintain OS Versions and updates nd The Economist, May 22 2008 Testing and Development Training Fortinet Confidential
  5. 5. Consolidated security MSSP - Managed Security Service Provider Fortinet
  6. 6. Centralized (Virtualized) Security (Consolidated security)
  7. 7. Information Security Over head. High availability solutions Separated management Interfaces Troubleshooting madness Training period Updates and upgrades Support ?! Who and for what? Logging a reporting Hardware coasts Fortinet Confidential
  8. 8. Virtualized Security must feel with, Without. Of course it’s not Performance running in a Virtual….. Management Flexibility Content Security Reliability / Density Logging / Reporting Fortinet Confidential
  9. 9. Centralized Internal Security Consolidation Department A Department B HA security solution Internet Access with Virtual Solutions Back Bone Department C Switching Server Farm Project A INTERNET Out of Project B Project C Band Centralized Logging and Reporting Management
  10. 10. = Virtual Security Entity
  11. 11. Consolidated security MSSP - Managed Security Service Provider Fortinet
  12. 12. MSSP Solution Managed Security Service Provider Managed Security Solutions
  13. 13. Managed Security Services • Customer Premises Provider independent Affordable quality of security Low cost of entry & operations Enforcing Internal information security • Centralized ‘In the cloud’ Provider dependent High availability & Controlled environment Simple logistics “Clean Pipe” to the customer Centralized upgrade Fortinet Confidential
  14. 14. Centralized services Customer C Customer D INTERNET Customer Network MPLS, Frame, Leased Line Customer A Customer B NOC / SOC Centralized Centralized Logging Management and Reporting Customer Portal
  15. 15. Customer Premises COMPANY B COMPANY A COMPANY C INTERNET I COMPANY D NOC INTERNET II COMPANY E Centralized Centralized Logging Management and Reporting Customer Portal Fortinet Confidential
  16. 16. Managed Security Services • Customer Premises Provider independent Affordable quality of security Low cost of entry & operations Enforcing Internal information security • Centralized ‘In the cloud’ Provider dependent High availability & Controlled environment Simple logistics “Clean Pipe” to the customer Centralized upgrade Fortinet Confidential
  17. 17. Central Management • Centralizes functions for: Product Deployments Real-time Monitoring Device/Policy Maintenance Device/Security Updates Central Logging / Reporting • Central Logging • Event Correlation • Network data statistics • Per customer Reporting • Report scheduler • Automated report distribution by Fortinet Confidential
  18. 18. Consolidated security MSSP - Managed Security Service Provider About Fortinet
  19. 19. Company Overview • First Multi-Layered Security Platform provider that leverages ASIC technology • Largest private network security company ~ 1100 employees / > 650 R&D 320,000 + FortiGate devices WW Founded in 2000 Largest Privately Held Security Company Global Operations in U.S., EMEA & Asia Pac • Independent certifications 8 ICSA certifications (only vendor) Government Certifications (FIPS-2, C C EAL4+) 60+ industry awards 11 patents; 80+ pending Virus Bulletin 100 approved (2005, 06,07) and NSS Certifications Fortinet Confidential
  20. 20. Israel Customer Base Fortinet products are used by: • 7500 + Installations • MSSP: Bezeq international, Netvision, 012 Smile, BEZEQ • Strongest ever Market penetration in Israel 5000 + Customers < 4 years • Major penetration: Enterprise, Finance, IDF, government, Telecom, etc
  21. 21. Flexible Multi-Layered Security Platform The FortiASIC™ Family Network ASIC (NP) Powerful Centralized Firewall acceleration Management & Reporting Carrier, MSSP & VPN (IPSEC and SSL) Large Enterprise IPS anomaly Enterprise Application ASIC (CP) Antivirus (+Antispyware) Acceleration Web Filtering and SMB & Remote Office Antispam Advantage from Accelerated AV scanning Traffic Shaping FortiGate-50B – FortiGate-100A Secure E-Mail & Client Software E- ROBO/SOHO Perimeter Core Data Center Future Multiple Threat Types Various Application Entry Points Different Functions Threat Payload Intent Varies Broad Range of Propagation Techniques Application Threat Vector Viruses & Spyware Spam & Directory Harvest Attacks Web Phishing IM and P2P file transfers Network Threat Vector Network Worms DDOS/DOS IP Packet Capture Spoofing & Man-In-The-Middle 10/100 Mbps 1 Gbps 10 Gbps
  22. 22. Fortinet is the Only: • Only complete solution with custom ASICs • Only complete solution from remote office to core and service providers with consistent code/hardware base. • Only complete solution that can do deep packet inspection • Only company with internal research on WCF, AS, AV, IPS • Only complete solution that does layer three routing • Only True virtualized solution for MSSP and enterprise • Only Security solution with Virtual solutions in Route and Transparent over the same Hardware!!! • Only solution with complete layer two switching • Only solution with real centralized Management interface • Only solution with real reporting and logging interface
  23. 23. Fortinet MSSP Customers Success …rely on protection from Fortinet Fortinet Confidential
  24. 24. Thank You! For more information please visit http://www.fortinet.com

×