Fortinet Perspectiva Coporativa

1,442 views
1,245 views

Published on

Fortinet perspectiva corporativa 2011,Fortinet corporate overview 2011

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,442
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
82
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • First, a brief overview of Fortinet.
  • Our focus has always been on consolidating stand-alone security and networking technologies to improve performance, increase protection, and reduce costs
  • As firewalls have evolved, additional technologies have been added to the core firewall technology to provide additional functionality and protect against new threats.FortiGate consolidated security platforms have been at the forefront of this evolutionary process. We have led the market with our ability to anticipate changes to the threat landscape by adding new functionality and technologies into our UTM platform. For example, FortiGate platforms have had the ability to identify applications independent of port or protocol since FortiOS 3.0, well ahead of other vendors. There has been a lot of noise in the market around ‘next generation’ firewalls. NGFWs are a subset of UTM, as they provide a limited feature set compared with the FortiGate UTM platform. This slide highlights the difference between the limited feature-set of NGFWs and the FortiGate UTM platform.
  • We continue to focus on leading the market with advanced technology and products.Currently have 50+ patents awarded; 100+ pending
  • We know that on a daily basis, you’re having make hard choices on how to do more without spending more. You are under pressure to open up more of your data to employees, customers, partners, and vendors; at the same time you’re expected to reduce the potential of unauthorized access to your data and backend systems. You’re also expected to make your existing staff and security technologies more effective, and to do it while spending lessAnd, we know you’re expected to lower your expenses
  • Increase access to data and systemsDecrease risk of unauthorized accessIncrease effectiveness of existing resources and investmentsReduce complexity of security infrastructureLower operating and capital costsYou also need to make sure you’re prepared for what’s coming next month or next year. You are looking into the future: Identify and close the gaps in your security strategy Measure the positive change in your security posture Ensure that you can respond quickly to changes in the threatscape or actual attacksLeverage the expertise of your vendorsLast but not least, ensure that the worst case scenario doesn’t happen.
  • Complete content protection enables you to keep up with the changing threatscape without having to purchase more technology. More than simply identifying applications and allowing or denying the traffic. It is application control coupled with content-based policy enforcement. The criminals are using sophisticated techniques to evade traditional countermeasures. By relying on a single platform with multiple technologies, you get the benefit of layers of security without the performance penalty. You also get the benefit of our global threat research team’s expertise, which means less reliance on your IT staff’s ability to configure the technology to anticipate new threats. Fortinet continuously updates our inspection engines to ensure that our customers are fully protected against the latest threats automatically.
  • FortiASIC CPContent Processor – System Level acceleration. Main functions include VPN key generation, SSL offload.Accelerates pattern matching FortiASIC NPNetwork Processor – Accelerates security services at the network interface LevelMain functions include forwarding and IPSec processingDelivers wire-rate offloading , with switch-type latency for 64 byte packets. FortiASIC SPSecurity Processor – Interface/System LevelProvides interface level IPS Engine and multicast accelerationIPS Engine has additional support for Flow-AV and Application Control functions
  • IPv6:Content protection, routing, management in place
  • FORTINET BUILT AND OWNS ALL 3 KEY UTM COMPONENTS – INTEGRATED SECURITY TECHNOLOGIES, HIGH-SPEED ASICS, AND GLOBAL SUBSCRIPTION UPDATE SERVICES -- WHICH PROVIDES US WITH A COMPETITIVE ADVANTAGE. WE BELIEVE THAT NONE OF OUR COMPETITORS PROVIDE A SOLUTION THAT INCORPORATES ALL THESE 3 UTM KEY COMPONENTS. OUR FORTIOS OPERATING SYSTEM ENABLES US TO EFFICIENTLY DELIVER MULTI-THREAT, COMPREHENSIVE SECURITY.OUR FORTIASICs ADD SIGNIFICANT PROCESSING POWER ADVANTAGE OVER THE SOFTWARE APPROACH, ACCELERATING FORTIGATE UTM PERFORMANCE.OUR FORTIGUARD INFRASTRUCTURE PROVIDES PROTECTION IN REAL-TIME - ESSENTIALLY PROVIDING A RECURRING, SUBSCRIPTION BUSINESS ON TOP OF OUR FORTIGATE APPLIANCES.SOME OF OUR COMPETITORS MAY BE ABLE COMPETE WITH INDIVIDUAL ELEMENTS OF OUR UTM SOLUTION - BUT IN OUR VIEW NO ONE CAN DELIVER THE ENTIRE SOLUTION AS WE ARE DOING TODAY. FOR EXAMPLE:SECURITY VENDORS SUCH AS CHECK POINT AND MCAFEE OFFER A BROAD SET OF FEATURES, BUT DO A POOR JOB OF INTEGRATING THEM, AND DON’T COME CLOSE ON PERFORMANCE NETWORKING VENDORS SUCH AS CISCO AND JUNIPER ARE OK ON PERFORMANCE, BUT THEIR FIREWALL AND VPNS MISS ALL THE VIRUS AND BAD CONTENT-BASED ATTACKS.WE BELIEVE WE HAVE THE BEST TECHNOLOGY COVERING ALL THE KEY UTM FUNCTIONS, AND FROM A PERFORMANCE AND INTEGRATION PERSPECTIVE, NO ONE EVEN COMES CLOSE TO FORTINET.
  • Now let’s look at our broader market opportunity and Growth strategies.First, as I mentioned before, the UTM market is expected to grow from $1.3Billion in 2007 to $3.5Billion by 2012 -- one of the highest growth billion dollar markets in the IT security space – nearly 22.3% CAGR through 2012. Fortinet already has the leading UTM market position and a large technology advantage here, which we believe will enable us to keep gaining UTM market share from our existing 15.4% today.Second, as we continue to innovate into additional technologies such as Application Control, DLP and WAN Acceleration, it allows us to not only continue our UTM market leadership, but also to further enhance the UTM value proposition and encroach on the traditional network security market. Our leadership in UTM can uniquely positions us to take advantage of opportunities in the broader network security market as customers who are purchasing traditional VPN, IDP or Firewall/VPN products migrate to a UTM solution. In the broader $6.8 security market, we also have an opportunity to grow within existing market segments that we play in today to a lesser degree. Thus, this provides us with a broader $10.5Bn network security market opportunity to go after. We plan to do this through a growth strategy that includes : Continuing to invest in R&D to deliver innovation that will both extends our UTM market leadership and help us expand into new security markets , if we choose.Grow our sales force and channel to capture new customers and share of the enterprise, government and service provider markets.
  • Fortinet Perspectiva Coporativa

    1. 1. Consolidated Security<br />
    2. 2. Fortinet Corporate Overview<br /><ul><li>Founded in 2000
    3. 3. Global presence with 30+ offices worldwide & 1,300+ employees
    4. 4. 5,000+ channel partners
    5. 5. 100,000+ customers
    6. 6. Majority of the Fortune Global 100
    7. 7. IPO Nov 2009
    8. 8. NASDAQ: FTNT
    9. 9. 2010 revenue of $325 Million
    10. 10. 29% YoY growth
    11. 11. World class management team</li></ul>2<br />Fortinet Revenue ($MM)<br />58.4% CAGR<br />
    12. 12. Clear, Continuous Focus Since 2000<br />Proven Leadership<br />Security consolidation<br />Industry-leading performance<br />Reduce TCO<br />Vision That Drives Us Today<br />Anticipate & innovate<br />Push the performance envelope<br />Make the competition follow our lead<br />3<br />
    13. 13. 4<br />The Fortinet Solution<br />Traditional Network Security Solutions<br />Stand-alone, non-integrated security <br />Mix of off the shelf systems and applications<br />Higher total cost of ownership<br />Difficult to deploy / manage / use<br />Real-time, integrated security intelligence<br />ASIC-accelerated performance<br />Lower total cost of ownership<br />Easy to deploy / manage / use<br />We Pioneered a New Approach<br />
    14. 14. Consolidated Security<br />5<br />The Evolution of the Firewall<br />Fortinet Delivers Complete Protection<br />SSL <br />Inspection<br />Real-Time Threat Updates<br />Endpoint Protection/<br />NAC<br />Data Loss Prevention<br />Antispam/<br />Antivirus<br />Vulnerability Mgmt<br />Virtual Appliance/ Virtual Domains<br />Web Filtering<br />VPN<br />Application Control<br />IPS<br />Firewall<br />WAN Optimization/ Traffic Shaping<br />Wireless Controller/Wireless LAN<br />SSL Inspection<br />VoIP<br />IPv6, Dynamic Routing<br />
    15. 15. Market Leadership Across the Board<br />Magic Quadrant for Unified Threat Management (2)<br />UTM Market Competitive Landscape, 2009(3)<br />Worldwide UTM Market Share<br />Q4 2010 (1)<br />High<br />AbilitytoDeliver<br />Low<br />Low<br />Market Penetration<br />High<br />Market Leader<br />Contender<br />Niche Participant<br />Challenger<br />Specialist<br />Notes<br />IDC Worldwide Security Appliances Tracker, March 2011 (market share based on factory revenue)<br />Gartner, Inc., “Magic Quadrant for Unified Threat Management”, October 2010<br />Frost & Sullivan, “World Unified Threat Management, Products Market 2009”, 2010<br />6<br />
    16. 16. Results of Singular Focus<br />Delivering Effective, Consolidated Security<br />Best in class protection in a single device<br />Complete content protection<br />Leading the Market<br />Performance<br />Depth of services<br />Ensuring Flexibility<br />Integrated technologies<br />Simple pricing model<br />Protecting All Segments<br />From carrier to SOHO<br />7<br />
    17. 17. Do More with Less<br />Increase access to data and systems<br />Decrease risk of unauthorized access<br />Increase effectiveness of existing resources and investments<br />Reduce complexity of security infrastructure<br />Lower operating and capital costs<br />8<br />
    18. 18. Prepare for the Next Threat<br />9<br />Eliminate potential blind spots <br />Demonstrate policy compliance<br />Lower response time<br />Accelerate adoption of best practices and expert systems<br />Reduce the potential for significant loss to reputation and revenue<br />
    19. 19. Thinking Strategically<br />Make your security infrastructure future-ready<br />Anticipate change in threat landscape and technology<br />Look for opportunities to consolidate without compromise<br />Reduce complexity <br />Increase protection and performance<br />Centralized management and control<br />Single pane of glass <br />10<br />
    20. 20. Unified Threat Management<br />Centralized Management<br />Application Security<br />Fortinet Product Portfolio - Security<br />11<br />FortiGate<br />Network Security<br />Platform<br />FortiManager<br />Centralized Device<br />Management<br />FortiMail<br />Messaging Security<br />FortiAnalyzer<br />Centralized Logging<br />and Reporting<br />FortiWeb<br />Web Application Firewall<br />FortiAP<br />Secure Wireless Access<br />Data & System Security<br />Endpoint Security<br />Security Services<br />FortiClient<br />Endpoint Security<br />FortiDB<br />Database Security<br />FortiGuard<br />Real time Security Services<br />FortiScan<br />Vulnerability Management<br />FortiAuthenticator<br />Remote Access Management<br />
    21. 21. Failover Protection<br />Application Load Balancing<br />Web Caching<br />Fortinet Product Portfolio – Network<br />12<br />FortiBridge<br />Fail-to-Wire Bypass <br />FortiBalancer<br />Application Delivery <br />Controllers<br />FortiCache<br />ISP & Enterprise-Class Content Caching<br />VoIP & Analog Telephony<br />Ethernet Switches<br />FortiSwitch<br />Gigabit Ethernet Switches<br />
    22. 22. <ul><li>Application control, Identity-based policy enforcement, Defense in depth
    23. 23. Allow but don’t trust any application
    24. 24. Examine all content
    25. 25. Continuously enforce policies</li></ul>UNAUTHORIZED APPLICATION<br />AUTHORIZED APPLICATION<br />VIRUS<br />WEB APPLICATION<br />WORM<br />13<br />PORT 80<br />FIREWALL<br />APPLICATION CONTROL<br />ANTIVIRUS/ANTISPYWARE<br />INTRUSION PREVENTION<br />Complete Content Protection<br />
    26. 26. FortiASIC<br /><ul><li>ASICs accelerate FortiOS security and network functions
    27. 27. Enables faster performance against competitors
    28. 28. Multiple ASICs (CP and NP) targeting key functions
    29. 29. Mature design across CP and NP
    30. 30. Custom built operating system
    31. 31. Architected for security and networking demands
    32. 32. Leverages custom hardware platform
    33. 33. Mature OS - at version 4.0 today</li></ul>Disruptive Technology Platform<br />14<br />FortiOS<br />
    34. 34. FortiASIC Specialized Processors<br />FortiASIC Content Processor (CP) Series<br />Pattern-Match Acceleration<br />Encryption / Decryption (e.g. IPSec, SSL-TLS)<br />FortiASIC Network Processor (NP) Series<br />Firewall Acceleration<br />IPSec VPN Acceleration<br />FortiASIC Security Processor (SP) Series<br />Additional IPS Acceleration<br />Unicast , Multicast Acceleration<br />15<br />
    35. 35. Performance Advantage<br />OTHER VENDORS<br />High Performance Multiple Processing Engines<br />Slow PerformanceSingle Processing Engine<br />Multi-Core<br />CPU<br />Multi-Core<br />CPU<br />16<br />
    36. 36. FortiOS<br />Fully Integrated Technologies<br />Manage all policy enforcement from a central console<br />Single Inspection of Packets<br />Delivers greater efficiency and intelligence<br />Deployment Ease & Flexibility<br />Same console for all FortiGate platforms, all technologies<br />Ability to deploy technologies where needed<br />IPv6 Ready<br />17<br />
    37. 37. FortiGate Appliances<br />Integrated security appliance<br /><ul><li>Block network & content threats</li></ul>Accelerated performance<br />10 GbE support<br /><ul><li> Up to 120 Gbps</li></ul>Platforms for every market segment<br /><ul><li>Carrier to SOHO
    38. 38. No per-user licensing </li></ul>18<br />
    39. 39. Real-time<br />FortiGuard subscription service<br />Competitive Advantages<br />19<br />Comprehensive<br />High-performance <br />FortiASIC network processor<br />FortiOS operating system<br />CP 7<br />NP 4<br />SOC<br />FortiCare customer support<br />FortiASIC content processor<br />
    40. 40. Customers Worldwide<br />7 of the top 10 Fortune companies in Americas <br />8 of the top 10 Fortune companies in EMEA <br />9 of the top 10 Fortune companies in APAC <br />10 of the top 10 Fortune Telecommunications companies<br />9 of the top 10 Fortune Retail & Commercial Banks<br /> 7 of top 10 Fortune Aerospace & Defense<br />20<br />
    41. 41. A Proven Partner<br />Proven Industry Leadership<br />Since 2000, Fortinet has received more than 100 product & company awards.<br />IDC: Overall leader in UTM factory revenue for all of 2009<br />Gartner: Leader in Unified Threat Management Magic Quadrant<br />Frost & Sullivan: 2010 "Fortinet is the established and undisputed leader" of worldwide UTM market<br />SC Magazine: 2009 Readers' Trust Award for "Best Integrated Security Solution”<br />Certified security<br />Seven ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam, WAF)<br />Government Certifications (FIPS-2, Common Criteria EAL4+, JITC IPv6, SCAP) <br />ISO 9001 certification<br />21<br />
    42. 42. Delivering the Vision<br />Scalable<br />Unique<br />Extensive<br />Complete<br /><ul><li>Provide dedicated application security platforms to target new technology innovations and deliver specialized protection to help our customers implement the most complete security infrastructure.
    43. 43. Drive our highly scalable FortiASIC architecture to continue to provide the highest performance our customers demand.
    44. 44. Deliver a unique set of tightly integrated security solutions offering the most comprehensive feature set to protect against current and predict new security threats.
    45. 45. Continue to merge point solutions in to our FortiOS architecture delivering both increased value and security.</li></li></ul><li>Thank You<br />23<br />
    46. 46. Backup Content<br />
    47. 47. FortiGuard Subscription Services<br />Real-Time Security Protection<br />Global Distributed Network<br /><ul><li>Global software updates
    48. 48. Large knowledgebase of security
    49. 49. 8 million antivirus signatures, 90 million URLs for Web filtering
    50. 50. 100+ threat research professionals
    51. 51. Eight global locations
    52. 52. Automated updates to Fortinet customers</li></ul>Robust 24 x 7 x 365 Real-Time Global Intelligence<br />Note<br />Data as of September 30, 2009<br />25<br />
    53. 53. Fortinet’s Growth Strategy<br />Application Control<br />Growth Strategy<br />DLP<br />$10.5 Billion<br />Extend UTM leadership with new technology<br />WAN Acceleration<br />VPN<br />Continue our security focus in the broader network security market<br />WiFi <br />$6.8 Billion<br />IDP<br />VPN<br />Firewall/VPN<br />IDP<br />$3.5 Billion<br />UTM<br />Firewall/VPN<br />$1.3 Billion<br />UTM<br />FortiGate<br />2007<br />2012<br />Source: IDC “Worldwide Network Security 2008-2012 Forecast and 2007 Vendor Shares: Transitions – Appliances Are More Than Meets the Eye”<br />
    54. 54. Cloud Security<br />Benefits<br />Flexible Deployment Options<br />Management<br /><ul><li>Evaluations
    55. 55. FortiManager, FortiAnalyzer
    56. 56. FortiWeb, FortiMail
    57. 57. Different sizes for different customers
    58. 58. Small business vs. Amazon/Netflix
    59. 59. Options:
    60. 60. Physical Device
    61. 61. Physical VDOM
    62. 62. Virtual Device
    63. 63. Virtual VDOM
    64. 64. Single management console for both physical & virtual
    65. 65. Operator Independence</li></li></ul><li>FortiGuard™ Updates<br />Real-Time Protection<br />Fully Integrated <br />Security & <br />Networking <br />Technologies<br />Antispam<br />Web Filter<br />App Ctrl<br />VM<br />AV<br />IPS<br />Firewall<br />Traffic Shaping<br />VPN<br />DLP<br />WAN Opt<br />SSL Insp<br />WLAN<br />Load Balancing<br />VoIP<br />HA<br />SpecializedOS<br />Hardened Platform<br />Purpose-Built Hardware<br />High Performance<br />FortiCare™<br />FortiGuard Labs<br />Support and Services<br /><ul><li>Purpose-built to deliver overlapping, complementary security
    66. 66. Provides both flexibility & defense-in-depth capabilities</li></ul>28<br />FortiGate Consolidated Security Platform<br />
    67. 67. Summary<br />Consolidated Security<br />Complete content protection<br />Unmatched Performance<br />Purpose-built hardware and software<br />Lower TCO<br />Less complexity, faster deployment, easier management<br />Real-time security <br />24/7 global updates deliver security expertise<br />

    ×