Your SlideShare is downloading. ×
0
Fortinet ConfidentialStrategic Security
Fortinet ConfidentialFortinet Corporate Overview• Founded in 2000• Global presence with 30+ offices worldwide& 1,200+ empl...
Fortinet Confidential21 19 69 113 1416241,6562002 2003 2004 2005 2006 2007 2008The Threats You Face Continue to Grow3Expon...
Fortinet ConfidentialWe Pioneered a New Approach4The Fortinet SolutionTraditional Network Security Solutions• Real-time, i...
Fortinet ConfidentialIntegrated Protection Against Today’s Threats5• Overlapping, complementary layers of protection• Comp...
Fortinet ConfidentialCustomers WorldwideSeven of Top 10 Fortune 500Eight of Top 10 Global 500 in EMEAEight of Top 10 Globa...
Fortinet ConfidentialA Reliable Partner• Proven Industry Leadership• Since 2000, Fortinet has received more than 100 produ...
Fortinet ConfidentialSummary• Comprehensive solution• Integrated, strategic security• Lower TCO• Less complexity, faster d...
Fortinet ConfidentialFortinet Product OverviewJune 26, 2013
Fortinet ConfidentialProduct PortfolioApplication SecurityFortiGateNetwork SecurityPlatformSecurity ServicesFortiGuardReal...
Fortinet ConfidentialFortiGate Product LineupApplication SecurityFortiGateNetwork SecurityPlatformFortiMailEmail SecurityF...
Fortinet ConfidentialO ResultadoLíder de Mercado(1) IDC Worldwide Security Appliances Tracker, March, 2012 market share ba...
Fortinet ConfidentialFortiGate• Integrated security appliance• Network threat detection• Application-aware screening• Acce...
Fortinet ConfidentialFortiGate UTM Lineup• ASIC-based multi-threat security platform• Common OS across all platforms• Sing...
Fortinet Confidential15Purpose-Built HardwareSpecialized OSFirewallFlexible CapabilitiesHardened PlatformHigh PerformanceR...
FortiOSHardwareEspecíficoPesquisadeAmeaçasAnatomia da Solução FortiGateFortiOS é o sistemaoperacional seguro eblindado que...
Introduzindo o FortiOS 4.0Principais benefícios: Acesso a inovadora tecnologia de segurança, antesdisponivel somente em p...
Novo no FortiOS FortiOS 4.0 introduz quatro principais novastecnologias na segurança de rede atualmenteoferecida: Otimiz...
Otimização de WAN Aumenta o desempenho da rede Reduz dados transmitidos atraves da WAN Reduz exigencias de banda e recu...
Otimização de WAN em ação Caching Integrado Bi-direcional Integrado com VDOMs Aplicações comuns Compartilhamento deAr...
Controle de Aplicação Facilita a inspeção de aplicações usando portas não-padrões, port-hopping, ou tuneiscom aplicações ...
Lista de Controle de AplicaçõesMultiple Applications canbe defined with differentactions and loggingoptions
Categorias e AplicaçõesThousands ofApplications Supported
Inspeção de Tráfego SSL Inspeciona comunicação oculta Melhora proteção para servidoresweb/app seguros Melhora a visibil...
Aplica a politica tradicional de filtroWEB ao tráfego HTTPSFiltrando o tráfego HTTPSCorporateLANCliente inicia a conexão H...
CorporateLANEmail(POP3S, IMAPS, SMTPS)Web(HTTPS)ClientProtegendo o servidor SSLFiltra o trafego SSL-encrypted para preveni...
Prevenção de Vazamento deDados (DLP) Sensor DLP Usado para definir a detecção deconjunto de regras Sensor aplicado no p...
Features adicionais do FortiOS 4.0 Politica baseada em Indentidade FortiOS 4.0 permite aos administradores a capacidade ...
Fortinet ConfidentialApplication SecurityFortiGateNetwork SecurityPlatformFortiMailEmail SecurityFortiWebXML & WebApplicat...
Fortinet ConfidentialFortiAnalyzer and FortiManager• Tightly integrates together to provide core of centralized securityse...
Fortinet ConfidentialFortiGuard Management and Analysis Architecture31FortiGuard DistributionNetworkCustomer FortiGate Inf...
Fortinet ConfidentialApplication SecurityFortiMailEmail SecurityFortiWebXML & WebApplication SecurityProduct PortfolioFort...
Fortinet ConfidentialFortiDBComprehensive Database Security• Database discovery and classification• Vulnerability assessme...
Fortinet ConfidentialProduct PortfolioApplication SecurityFortiGateNetwork SecurityPlatformFortiMailEmail SecurityFortiWeb...
Fortinet ConfidentialFortiMail• Dedicated antispam appliance• High-performance mail processing with antispam detection• Co...
Fortinet ConfidentialFortiWeb – Web Application Firewall• Web application firewall• Secures web-based applications with we...
Fortinet ConfidentialFortiWeb• Three deployment modes to easily integrate FortiWeb• Transparent inline• Reverse proxy• Non...
Fortinet ConfidentialSecure Web applicationsProtect Web ServicesEnsure Application AvailabilityWeb Application Platform W...
Fortinet ConfidentialProduct PortfolioApplication SecurityFortiGateNetwork SecurityPlatformFortiMailEmail SecurityFortiWeb...
Fortinet ConfidentialFortiClient• Host-based security• Antivirus / antimalware client• Personal firewall• Web content filt...
Fortinet ConfidentialFortiScan-1000B• Endpoint Vulnerability Assessment and Remediation• Identifies security vulnerabiliti...
Fortinet ConfidentialProduct PortfolioUTM Security Data SecurityApplication SecurityFortiGateNetwork SecurityPlatformSecur...
Fortinet ConfidentialFortiGuard Services Network• Real-time updates• “Push” / “pull” updates for Fortinet customers• Tied ...
Fortinet ConfidentialFortiCare Support Services• FortiCare Knowledge Center• Around the clock self-service portal• Technic...
Fortinet ConfidentialNew Products
Fortinet ConfidentialFortiGate Voice Overview• Integrated Multi Service Business Gateway• Combines multiple services into ...
Fortinet Confidentiala b g n
Fortinet ConfidentialIntroducing FortiAP™ Secure Thin Access PointsSecure Wireless Networks Rogue Access Point (AP) Dete...
Fortinet Confidential49FortiAP™ Secure Access Points are Small-to-Medium Enterprise(SME) Small-to-Medium Retail Financi...
Fortinet Confidential50Multi-ThreatNetwork SecurityL7 ApplicationControlRogue APDetectionUser and DeviceAuthenticationHigh...
Fortinet Confidential51Building a Secured Wireless LAN SolutionSecure WirelessAccess PointsMulti-Threat Securitywith Integ...
Fortinet ConfidentialFloorWiring ClosetAggregationFortiGate ControllerData CenterThinAP tunnels all trafficto FortiGate Co...
Fortinet ConfidentialFortiGate Scalability MatrixNote *: calculatedFortiGate Platform Number of ThinAP’s supportedFortiWiF...
Fortinet ConfidentialCompetitive Summary
Fortinet ConfidentialIndustry Leadership55AntivirusIPSApplication ControlWAN OptimizationData Loss PreventionFirewall / VP...
Fortinet ConfidentialAdditional Technology Comparison56Wireless ControllerWeb ApplicationFirewallEmail SecurityContent/ We...
Fortinet ConfidentialFortinet’s Comprehensive Solutions57
Fortinet ConfidentialAppendix
Fortinet ConfidentialUTM Surpassing Traditional Network Security2008 2009 2010 2011 2012 2013Firewall & VPNUTM$2.2$2.1$ in...
Upcoming SlideShare
Loading in...5
×

Apresentação fortinet

668

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
668
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
31
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Apresentação fortinet"

  1. 1. Fortinet ConfidentialStrategic Security
  2. 2. Fortinet ConfidentialFortinet Corporate Overview• Founded in 2000• Global presence with 30+ offices worldwide& 1,200+ employees– 5,000+ channel partners– 125,000+ customers– Majority of the Fortune Global 100• IPO Nov 2009• NASDAQ: FTNT• 2009 revenue of $252 Million– 19% YoY growth• World class management team2$434$39$80$123$155$212$252$325RECEITA FORTINET ($MM)55% CAGR$1303 04 05 06 07 08 09 10 11
  3. 3. Fortinet Confidential21 19 69 113 1416241,6562002 2003 2004 2005 2006 2007 2008The Threats You Face Continue to Grow3Exponential Growth in Malware Threats(000)Broad New Hacking AttackDetected (2/8/2010)“Hackers in Europe and China successfullybroke into computers at nearly 2,500companies and government agencies over thelast 18 months in a coordinated global attackthat exposed vast amounts of personal andcorporate secrets to theft..”.Google Hack Attack WasUltra Sophisticated, NewDetails Show (1/14/2010)“Hackers seeking source code from Google,Adobe and dozens of other high-profilecompanies used unprecedented tactics thatcombined encryption, stealth programmingand an unknown hole in Internet Explorer,according to new details..”In Number In severity Coordinated and blended attacksare now a common practice Increased processing powerrequiredIn Complexity Motive and intent has movedfrom notoriety to financial gain Cyber security is critical3.7 4.49.916.12330.21,65654.687.62001 2003 2005 2007 2009U.S. DoD Reported Incidents of MaliciousCyber Activity (000)
  4. 4. Fortinet ConfidentialWe Pioneered a New Approach4The Fortinet SolutionTraditional Network Security Solutions• Real-time, integrated security intelligence• ASIC-accelerated performance• Lower total cost of ownership• Easy to deploy / manage / use• Stand-alone, non-integrated security• Mix of off the shelf systems and applications• Higher total cost of ownership• Difficult to deploy / manage / use
  5. 5. Fortinet ConfidentialIntegrated Protection Against Today’s Threats5• Overlapping, complementary layers of protection• Comprehensive, integrated inspection• Allow but don’t trust any application• Examine all application content
  6. 6. Fortinet ConfidentialCustomers WorldwideSeven of Top 10 Fortune 500Eight of Top 10 Global 500 in EMEAEight of Top 10 Global 500 in APACNine of Top 10 Global 500 Commercial & Savings BanksSeven of Top 10 Global 500 Aerospace & DefenseTwo of Top 5 Global 500 Telecommunications
  7. 7. Fortinet ConfidentialA Reliable Partner• Proven Industry Leadership• Since 2000, Fortinet has received more than 100 product & company awards.• IDC: Overall leader in UTM factory revenue for all of 2009• Gartner: Leader in Multi-Function Firewall Magic Quadrant• Frost & Sullivan: 2010 "Fortinet is the established and undisputed leader" of worldwide UTM market• SC Magazine: 2009 Readers Trust Award for "Best Integrated Security Solution"• Certified security• Five ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam)• Government Certifications (FIPS-2, Common Criteria EAL4+, JITC IPv6, SCAP)• ISO 9001 certification
  8. 8. Fortinet ConfidentialSummary• Comprehensive solution• Integrated, strategic security• Lower TCO• Less complexity, faster deployment,easier management• Real-time security• 24/7 global updates deliver securityexpertise• Unmatched flexibility• Deploy the technology you need, whereand when you need it
  9. 9. Fortinet ConfidentialFortinet Product OverviewJune 26, 2013
  10. 10. Fortinet ConfidentialProduct PortfolioApplication SecurityFortiGateNetwork SecurityPlatformSecurity ServicesFortiGuardReal time SecurityServicesFortiMailEmail SecurityFortiWebXML & WebApplication SecurityHost SecurityFortiClientHost Security SolutionFortiScanAsset Vulnerability MgmtFortiDBDatabase SecurityFortiManagerCentralized MgmtFortiAnalyzerLogging & ReportingUTM Security Data SecurityManagement
  11. 11. Fortinet ConfidentialFortiGate Product LineupApplication SecurityFortiGateNetwork SecurityPlatformFortiMailEmail SecurityFortiWebXML & WebApplication SecurityFortiDBDatabase SecurityFortiManagerCentralized MgmtFortiAnalyzerLogging & ReportingSecurity ServicesFortiGuardReal time SecurityServicesHost SecurityFortiClientHost Security SolutionFortiScanAsset Vulnerability MgmtUTM Security Data SecurityManagement
  12. 12. Fortinet ConfidentialO ResultadoLíder de Mercado(1) IDC Worldwide Security Appliances Tracker, March, 2012 market share based on factory revenue)(2) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012Quadrante Mágico paraUnified Threat Management2Market Share de UTM MundialQ4 20111Rank EmpresaMarketShare (%)1 17.82 Check Point 15.13 SonicWALL 8.24 Juniper 8.05 Cisco 7.56 WatchGuard 5.07 McAfee 4.48 Astaro 2.39 Others 31.7Total 100%Market Size $2.2B
  13. 13. Fortinet ConfidentialFortiGate• Integrated security appliance• Network threat detection• Application-aware screening• Accelerated performance• Custom ASIC• Platforms for every market segment• Non-user licensing• Performance-based models13ASICFIREWALLAPPLICATIONCONTROLWIRELESS DATABASEANTISPAM VPNFORTIOS FORTIASICWEBFILTERINGDLP ROUTINGWANOPTIMIZATIONANTIVIRUSIPS
  14. 14. Fortinet ConfidentialFortiGate UTM Lineup• ASIC-based multi-threat security platform• Common OS across all platforms• Single management interface• FortiGuard Services• Antivirus, IPS, Antispam, Web content filtering,Application control14Enterprise Service Provider & Large EnterpriseSMB & Remote Office
  15. 15. Fortinet Confidential15Purpose-Built HardwareSpecialized OSFirewallFlexible CapabilitiesHardened PlatformHigh PerformanceReal-Time ProtectionTraffic ShapingVPNAV IPS AntispamWeb FilterSSL InspDLP WAN OptApp CtrlFortiGate Multi-Threat Security PlatformFortiGuard Updates• Purpose-built to deliver overlapping, complementary security• Provides both flexibility & defense-in-depth capabilities
  16. 16. FortiOSHardwareEspecíficoPesquisadeAmeaçasAnatomia da Solução FortiGateFortiOS é o sistemaoperacional seguro eblindado que integra todosos FortiGate multi-threatsecurity systems.
  17. 17. Introduzindo o FortiOS 4.0Principais benefícios: Acesso a inovadora tecnologia de segurança, antesdisponivel somente em produtos independentes. Melhora a segurança através da integração dastecnologias de segurança. Consolidação simplifica gerenciamento, economizatempo e dinheiro.Com o lançamento do FortiOS4.0, a Fortinet está redefinindonovamente a segurança de redeatravés da estensão do escopodas capacidades da segurançaconsolidada com o Fortigatemulti-threat security system
  18. 18. Novo no FortiOS FortiOS 4.0 introduz quatro principais novastecnologias na segurança de rede atualmenteoferecida: Otimização de WAN Acelera aplicações sobre conexões de WAN e ao mesmo tempogarante segurança multi-threat Controle de Applicação Reconhece trafego baseado na aplicação que está gerando o mesmoao invés de se basear em port ou protocol. Inspeção de SSL Aumenta o controle de segurança e politica nos trafegoscriptografados. Prevenção contra vazamento de dados (DLP) Para identificar e prevenir comunicação de informação sensitiva parafora das fronteiras da rede
  19. 19. Otimização de WAN Aumenta o desempenho da rede Reduz dados transmitidos atraves da WAN Reduz exigencias de banda e recurso de servidores Melhora a produtividade dos usiários Reduz custos de redeAumenta a performance da rede reduzindo a quantidadede comunicação de dados transmitido entre aplicações eservidores na WAN
  20. 20. Otimização de WAN em ação Caching Integrado Bi-direcional Integrado com VDOMs Aplicações comuns Compartilhamento deArquivo (CIFS, FTP) Email (MAPI with MSExchange / MS Outlook) Web (HTTP / HTTPS) Genérico (TCP) Integração comFortiClient Usuários Remotos /móveis sem FortiGatelocal
  21. 21. Controle de Aplicação Facilita a inspeção de aplicações usando portas não-padrões, port-hopping, ou tuneiscom aplicações seguras Controle de politica mais flexivel and bem-granuladas Aumenta a segurança Visibilidade mais aprofundada do trafego de redeReforça a política de segurança para mais de 1000aplicações, independente da porta ou protocolousado para a comunicação.
  22. 22. Lista de Controle de AplicaçõesMultiple Applications canbe defined with differentactions and loggingoptions
  23. 23. Categorias e AplicaçõesThousands ofApplications Supported
  24. 24. Inspeção de Tráfego SSL Inspeciona comunicação oculta Melhora proteção para servidoresweb/app seguros Melhora a visibilidade no trafego derede Suporta os protocolos HTTPS, POP3S,SMTPS, e IMAPSFaz proxy do trafego SSL criptografado,inspecionando ameaças e aplicando politica paratrafego que é invisivel para outros dispositivos desegurança.
  25. 25. Aplica a politica tradicional de filtroWEB ao tráfego HTTPSFiltrando o tráfego HTTPSCorporateLANCliente inicia a conexão HTTPSao servidorInterceptada pelo FortiGateFGT estabelece conexão aoservidor e faz proxy dacomunicaçãoFiltro WEB é aplicado notrafego criptografado
  26. 26. CorporateLANEmail(POP3S, IMAPS, SMTPS)Web(HTTPS)ClientProtegendo o servidor SSLFiltra o trafego SSL-encrypted para prevenir contra intrusos / ataques Utiliza o mesmo mecanismo parainterceptar & descriptografar otrafego SSL Aplica perfil de proteção padrão notráfego criptografado.
  27. 27. Prevenção de Vazamento deDados (DLP) Sensor DLP Usado para definir a detecção deconjunto de regras Sensor aplicado no perfil de proteção Ações DLP Logar, bloquear, arquivar (FortiAnalyzer) Banir ou quarenternar o usuário Tipos de arquivos suportados Texto, PDF, MS Word (até a versão2007, incluindo) Tipos adicionais inclusos futuramente
  28. 28. Features adicionais do FortiOS 4.0 Politica baseada em Indentidade FortiOS 4.0 permite aos administradores a capacidade de definir politicade seguranca para usuários individuais, grupos, endereço IP, rede, ouprotocolo. Melhorias na Prevenção de Intrusos Com a detecção passiva de intrusos, suporte ao IPv6, ações debloqueios multiplos, e opção de logging para tráfego de ameacas, aFortinet levou esta função para um nivel ainda mais efetivo. Controle e Conformidade de Endpoint FortiOS 4.0 permite o FortiGate checar a instalação dos agentes desegurança de endpoint ForitClient. Integridade do HOST (atualizacao deAV, firewall habilitado, etc.) Pode ser verficado antes de permiter odispositivo na rede.
  29. 29. Fortinet ConfidentialApplication SecurityFortiGateNetwork SecurityPlatformFortiMailEmail SecurityFortiWebXML & WebApplication SecurityFortiDBDatabase SecurityFortiManagerCentralized MgmtFortiAnalyzerLogging & ReportingProduct PortfolioSecurity ServicesFortiGuardReal time SecurityServicesHost SecurityFortiClientHost Security SolutionFortiScanAsset Vulnerability MgmtUTM Security Data SecurityManagement
  30. 30. Fortinet ConfidentialFortiAnalyzer and FortiManager• Tightly integrates together to provide core of centralized securityservices• FortiAnalyzer• Log Analysis• Reporting• Content Archiving / Data Mining• Network Analyzer• Log Browser / Real-Time LogViewer• Central File Quarantine• Vulnerability AssessmentScanner• Forensic Analysis• FortiManager• Policy / Device Management• Update Manager(Firmware / SecurityContent)• VPN Manager• Script Manager
  31. 31. Fortinet ConfidentialFortiGuard Management and Analysis Architecture31FortiGuard DistributionNetworkCustomer FortiGate InfrastructureFortiGuardAnalysis &ManagementPortalSecure SSL tunnelsFortiGateFortiGateFortiGate FortiGateFortiGateFortiGateHosted Support for:• Management• Configuration• Logging and Reporting• Analysis and Forensics
  32. 32. Fortinet ConfidentialApplication SecurityFortiMailEmail SecurityFortiWebXML & WebApplication SecurityProduct PortfolioFortiGateNetwork SecurityPlatformFortiManagerCentralized MgmtFortiAnalyzerLogging & ReportingSecurity ServicesFortiGuardReal time SecurityServicesHost SecurityFortiClientHost Security SolutionFortiScanAsset Vulnerability MgmtUTM Security Management Data SecurityFortiDBDatabase Security
  33. 33. Fortinet ConfidentialFortiDBComprehensive Database Security• Database discovery and classification• Vulnerability assessment with remediation advice• Database activity monitoring (DAM)• Data loss prevention• Automation of auditing and compliance• Change control for metadata changes (DDL) and user privilegechanges (DCL)• Support for heterogeneous, virtualized environments
  34. 34. Fortinet ConfidentialProduct PortfolioApplication SecurityFortiGateNetwork SecurityPlatformFortiMailEmail SecurityFortiWebXML & WebApplication SecurityFortiDBDatabase SecurityFortiManagerCentralized MgmtFortiAnalyzerLogging & ReportingSecurity ServicesFortiGuardReal time SecurityServicesHost SecurityFortiClientHost Security SolutionFortiScanAsset Vulnerability MgmtUTM Security Data SecurityManagement
  35. 35. Fortinet ConfidentialFortiMail• Dedicated antispam appliance• High-performance mail processing with antispam detection• Complements antispam/antivirus features in FortiGate• Flexible deployments• Transparent, Gateway, or Server modes• Integrated multi-threat detection• Antispam, Antivirus, Antispyware, Antimalware• Preserves productivity, ensures policy compliance, andprotects domain reputation• Email quarantining and archiving• User-based quarantine capabilities• Archiving for analysis and compliance support• ,
  36. 36. Fortinet ConfidentialFortiWeb – Web Application Firewall• Web application firewall• Secures web-based applications with web application and XML firewalls• Accelerates web applications through XML/SSL acceleration, sessionoffloading, and load balancing• Simplifies deployment and management of web applications with a centralsecurity appliance• Assists in compliance with industry or government mandates, such as PCIDSS
  37. 37. Fortinet ConfidentialFortiWeb• Three deployment modes to easily integrate FortiWeb• Transparent inline• Reverse proxy• Non-inline• Web application scanner for PCI DSS 6.5 and 6.6• Additional layers of protection:• Protocol enforcement• Anti web defacement• Brute force login robot protection• Authentication offload to accelerate applications• Advanced URL rewriting capabilities37
  38. 38. Fortinet ConfidentialSecure Web applicationsProtect Web ServicesEnsure Application AvailabilityWeb Application Platform Web Application Firewall – secures web applications to help customersmeet compliance requirements XML Firewall – Secures and prevents exploits against XML based webservices Application Acceleration – Accelerates and ensures timely delivery of webbased content utilizing Fortinet’s ASIC technology38FortiWeb – Web Application Firewall
  39. 39. Fortinet ConfidentialProduct PortfolioApplication SecurityFortiGateNetwork SecurityPlatformFortiMailEmail SecurityFortiWebXML & WebApplication SecurityHost SecurityFortiClientHost Security SolutionFortiScanAsset Vulnerability MgmtFortiDBDatabase SecurityFortiManagerCentralized MgmtFortiAnalyzerLogging & ReportingSecurity ServicesFortiGuardReal time SecurityServices FortiScanAsset Vulnerability MgmtUTM Security Data SecurityManagement
  40. 40. Fortinet ConfidentialFortiClient• Host-based security• Antivirus / antimalware client• Personal firewall• Web content filter• Antispam filtering• FortiGate integration• WAN optimization• IPSec VPN• Data loss prevention40AntivirusWebFiltering AntispamFortiGuard Services
  41. 41. Fortinet ConfidentialFortiScan-1000B• Endpoint Vulnerability Assessment and Remediation• Identifies security vulnerabilities and finds compliance exposures on hostsand servers• Audits and monitors across heterogeneous systems• Delivers patch management with ready to deploy remediation andenforcement actions• Aides compliance for regulatory mandates with compliance reports
  42. 42. Fortinet ConfidentialProduct PortfolioUTM Security Data SecurityApplication SecurityFortiGateNetwork SecurityPlatformSecurity ServicesFortiGuardReal time Security ServicesFortiMailEmail SecurityFortiWebXML & WebApplication SecurityFortiDBDatabase SecurityFortiManagerCentralized MgmtFortiAnalyzerLogging & ReportingHost SecurityFortiClientHost Security SolutionFortiScanAsset Vulnerability MgmtManagement
  43. 43. Fortinet ConfidentialFortiGuard Services Network• Real-time updates• “Push” / “pull” updates for Fortinet customers• Tied to FortiCare registration system• Distributed infrastructure• Multiple servers deployed globally• Approximately 16 data center locations• Hierarchical deployment strategy• Main server update pushes secondary updates• Gather feedback from worldwide installed base43
  44. 44. Fortinet ConfidentialFortiCare Support Services• FortiCare Knowledge Center• Around the clock self-service portal• Technical articles & documentation• Firmware/software updates• Technical Support• 8x5 – Business Hours Support Local Time• 24x7 – Around the clock coverage forPriority 1 events• Online Tracking/Management of Tickets• Premium Support• Hardware Repair• Return to Factory (Return & replace services)• Advanced Replacement (24 hr return)• Premium-RMA (4-Hour and Next Day)Available in Key Geographic Areas
  45. 45. Fortinet ConfidentialNew Products
  46. 46. Fortinet ConfidentialFortiGate Voice Overview• Integrated Multi Service Business Gateway• Combines multiple services into a single, integrated business gatewaydevice, managed by a single console:• Multi-threat UTM security gateway• IP Router• Ethernet Switch• IP PBX• Wireless LAN• VPN with strong encryption
  47. 47. Fortinet Confidentiala b g n
  48. 48. Fortinet ConfidentialIntroducing FortiAP™ Secure Thin Access PointsSecure Wireless Networks Rogue Access Point (AP) Detection andRemediation (for PCI compliance) Granular Endpoint ControlSpeedy 802.11n Performance 300 Mbps-600Mbps throughputSimplify Your Administration Use existing FortiGate devices for WLAN Control Turnkey Audit Reports make compliance easierSave Over Competitive Solutions Lower Total Cost of Ownership (TCO)48Integrated wireless security and access solutiona b g n
  49. 49. Fortinet Confidential49FortiAP™ Secure Access Points are Small-to-Medium Enterprise(SME) Small-to-Medium Retail Financial Services Government Agencies Hospitality Professional Services Offices(i.e. Law, Accounting) Education (K-12, Higher Ed)Targeted market
  50. 50. Fortinet Confidential50Multi-ThreatNetwork SecurityL7 ApplicationControlRogue APDetectionUser and DeviceAuthenticationHigh PerformanceWifi RadioFortified Wireless SpaceHigh-PerformanceWirelessNetworkingAdvancedNetwork-BasedSecurity
  51. 51. Fortinet Confidential51Building a Secured Wireless LAN SolutionSecure WirelessAccess PointsMulti-Threat Securitywith IntegratedWireless ControllerFortified WirelessSpace
  52. 52. Fortinet ConfidentialFloorWiring ClosetAggregationFortiGate ControllerData CenterThinAP tunnels all trafficto FortiGate ControllerThin AP architecture tunnels all traffic to the FortiGateController for added security and ease of management52
  53. 53. Fortinet ConfidentialFortiGate Scalability MatrixNote *: calculatedFortiGate Platform Number of ThinAP’s supportedFortiWiFi-xx 0FortiGate- 60B/C 4FortiGate-80C 16FortiGate -110C32FortiGate-200BFortiGate-310FortiGate -800 64FortiGate -620B128FortiGate-1240FortiGate- 3600A 256FortiGate-3810 512FortiGate-5140 6144*Note2: there is no software limit on this value.
  54. 54. Fortinet ConfidentialCompetitive Summary
  55. 55. Fortinet ConfidentialIndustry Leadership55AntivirusIPSApplication ControlWAN OptimizationData Loss PreventionFirewall / VPNPartner SuppliedInternally Developed Not available
  56. 56. Fortinet ConfidentialAdditional Technology Comparison56Wireless ControllerWeb ApplicationFirewallEmail SecurityContent/ Web FilteringVulnerabilityAssessmentDatabase SecurityPartner SuppliedInternally Developed Not available
  57. 57. Fortinet ConfidentialFortinet’s Comprehensive Solutions57
  58. 58. Fortinet ConfidentialAppendix
  59. 59. Fortinet ConfidentialUTM Surpassing Traditional Network Security2008 2009 2010 2011 2012 2013Firewall & VPNUTM$2.2$2.1$ in billions$1.7$3.2Source: IDC “Worldwide Network Security 2008-2012 Forecast Vendor Shares: Transitions – Appliances Are More Than Meets the Eye”
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×