Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

2019 06-26 effective multi-vendor management -fortinet algo sec webinar final

175 views

Published on

In today’s complex and dynamic environment with growing digital business demands, IT often struggles to gain adequate visibility and control, and to ensure compliance with security policies and regulatory guidelines. Effective security policy management that accommodates the dynamic nature of today’s organizations is a key challenge for many IT departments.

Published in: Technology
  • DOWNLOAD FULL BOOKS, INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... ,DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ,DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ,DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ,DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ,DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ,DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • DOWNLOAD FULL BOOKS, INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... ,DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ,DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ,DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ,DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ,DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ,DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • SECRET: Men usually out of emotion, not logic. Take advantage of this and get your Ex back today! See how at: ■■■ http://t.cn/R50e5nn
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

2019 06-26 effective multi-vendor management -fortinet algo sec webinar final

  1. 1. EFFECTIVE MULTI-VENDOR MANAGEMENT FORTINET & ALGOSEC JOINT WEBINAR Yoav Karnibad Product Manager AlgoSec Satish Veerapuneni Director of Products & Solutions Fortinet
  2. 2. WELCOME Have a question? Submit it via the chat tab or email us: This webinar is being recorded! The recording will be emailed to you after the webinar And the slides will be available in the attachments tab Follow us online ! 2 marketing@algosec.com
  3. 3. AGENDA Fortinet - Intro & Customer Challenges 01 AlgoSec - Intro & Customer Challenges 02 Customer Story 03 3 04 Summary
  4. 4. 4 Fortinet: Network Security Leader Fortinet is among the top 4 public cybersecurity companies in the world. Its broad portfolio of solutions spans Network, Infrastructure, Cloud, and IoT Security. $14.3B Mkt Cap ~$1.8B - 2018 (revenue) * As of March 31, 2019 400,000+ Customers 4.6M+ Appliances Shipments Worldwide (+30% units WW)
  5. 5. 5 90% of F100Are Fortinet Customers Telco Financials/ Banking Technology Retail Aerospace/ Defense 10 of 12 Healthcare 12 of 15 Transportation 3 of 5 9 of 11 3 of 5 9 of 104 of 4 11 of 13 3 of 54 of 5 Financials/Ins Food/Bev Energy
  6. 6. 6 Fortinet: Key Customer Challenges Requires Visibility and Intent-Based Segmentation Attack Surface BROAD Requires Orchestration, Automation, and Response Vendor Complexity AUTOMATED Requires AI-Based Prevention Across Devices, Networks, and Applications Advanced Threats INTEGRATED
  7. 7. 7 Solution: Fortinet Security Fabric Network Security Network Operations Q1FY19 v1.4.3 Security Operations FortiAnalyzer: Analytics-Powered Security & Log Management Advanced Threat Detection Compliance Workflow Optimization FortiManager: Automation-Driven Network Management Single Pane- Of-Glass Management Compliance Workflow Optimization
  8. 8. 8 Human Errors and Misconfigurations is one of the leading cause of security breaches and/or network outages CHALLENGE Centralized security management and visibility helps reduce multiple complex management consoles and enables true Single Pane with: • Configuration Management • Single Console Visibility • Multi-Factor Authentication • High Availability • Flexible Deployment / Pricing • Zero-Touch Deployment SOLUTION 1# Single Pane of Glass Management Branch Office Branch Office Branch Office FortiAnalyzer HA Cluster FortiManager HA Cluster IOC HQ Internet FortiGuard Security Services
  9. 9. 9 CHALLENGE Regulation: Compliance Management is usually a very manual and inefficient process that involves multiple full-time staff and involves months to get right. 2# Audit & Compliance SOLUTION Simple Reporting and Compliance Controls Management to enables proving Compliance proactively • NIST, CIS Frameworks • Reports on PCI DSS, SAR etc. • Audit Logging & RBAC • Integrated Workflow for Security & Operations JAN FEBMARAPRMAYJUN JUL AUGSEPOCTNOVDEC 28% 55% 89%89%
  10. 10. 10 Staff Shortage - Enterprises don’t have the resources to staff the detection and response of Anomalies CHALLENGE Leverage Workflow Optimization technology to reduce the time to detect and respond to threats or operational anomalies • Incident Detection & Response • ITSM Workflow Applications • SIEM Integration • Webhook Integration • Automation Stitches SOLUTION 3# Workflow Optimization FortiManager HA Cluster 3rd Party Tools Response Actions FortiAnalyzer HA Cluster (Collector) 1 2 3 3 Response Actions Collect Events Detect Anomalies
  11. 11. 11 CHALLENGE Advanced Threats: Attacks are getting complex and very hard to detect and that coupled with lack of skilled staff – it’s challenging to protect the modern enterprise 4# Advanced Threat Detection SOLUTION Analytics Driven threat detection that can detect any threats and identify them as High, Med or Low risks for the enterprise • IoC Detection & Correlation • Fabric Integrated Detection • SIEM Integration FortiGate – Remote Offices FortiAnalyzer HA Cluster FortiAnalyzer HA Collector Cluster
  12. 12. 12 Single-Pane Orchestration: SD-WAN SLA Monitoring
  13. 13. 13 Single-Pane Orchestration: Single Pane NOC & SOC
  14. 14. 14 Single-Pane Orchestration: Zero Touch Provisioning
  15. 15. 15 Automation: IncidentAnalysis – History Scan
  16. 16. 16 Automation: Compliance Reports Situational Awareness Report  New report helps with addressing the most critical needs for compliance preparedness  Assists in readiness for auditing  Helps to Prepare, Protect, Detect, Respond & Recover for a Strong Security Posture
  17. 17. 17 Response : Advanced Incident Containment Incident FMG API FGT FGT FGTFGT
  18. 18. 18 Response: Best Practice Compliance
  19. 19. Founded 2004 1800+ Enterprise Customers Serving 20 of the Fortune 50 24/7 Support via 3 Global Centers Passionate about Customer Satisfaction 19 CORPORATE OVERVIEW 19
  20. 20. HELPING OVER 1,800 CUSTOMERS WORLDWIDE ALIGN SECURITY WITH BUSINESS PROCESSES
  21. 21. AlgoSec enables companies to align security with their business processes Business-driven Agility Business-driven Visibility Business-driven Security BUSINESS DRIVEN SECURITY MANAGEMENT 19
  22. 22. ALGOSEC: KEY CUSTOMER CHALLENGES Keep System Secure Network Visibility Maintain Compliance Visibility of complex networks Across on-premise, cloud & SDN Frequent change requests Applications migration to the cloud Staff shortage Allow ease of compliance and auditing of the changes 22 And other leading security vendors SECURITY SHOULD NOT DELAY THE BUSINESS
  23. 23. POLL #1 How many firewall vendors do you have in your organization?  1  2  3 or more Please vote using the “Votes“ tab 23
  24. 24. ALGOSEC: KEY CUSTOMER CHALLENGES Visibility of complex networks Across on-premise, cloud & SDN Network Visibility 24 And other leading security vendors
  25. 25. MANAGING THE HETEROGENEOUS ENVIRONMENT And other leading security vendors
  26. 26. VISIBILITY ACROSS THE ENTIRE HETEROGENEOUS ENVIRONMENT Native Cloud Security ModelsVirtual appliance in the cloud NGFW on-prem Private cloud SDN – distributed FW 26
  27. 27. POLL #2 How many policy changes do you have each week on average? Each line you add to a firewall is counted as a change  0-10  10-50  50-100  100 or more Please vote using the “Votes“ tab 27
  28. 28. ALGOSEC: KEY CUSTOMER CHALLENGES Keep System Secure Frequent change requests Applications migration to the cloud Staff shortage 28
  29. 29. Automatically detects blocking devices and changes their policy MULTI-VENDOR CHANGE ANALYSIS Rose_Other Rose_Other DC_82 Router DC_42 Router DC_82 Router DC_42 Router DC_42 Router
  30. 30. MULTI-VENDOR CHANGE ANALYSIS
  31. 31. IDENTIFYING RISKS & SEVERITY ON EACH DEVICE
  32. 32. Based on policy analysis & on network traffic analysis POLICY OPTIMIZATION
  33. 33. POLL #3 How many regulations are you obligated to report? Each line you add to a firewall is counted as a change  None  1  2 - 4  More than 4 Please vote using the “Votes“ tab 33
  34. 34. ALGOSEC: KEY CUSTOMER CHALLENGES Maintain Compliance Allow ease of compliance and auditing of the changes 34
  35. 35. REGULATORY COMPLIANCE REPORT
  36. 36. REGULATORY COMPLIANCE REPORT
  37. 37. 37 Customer Story
  38. 38. Request a network change Check for risks involved And approve Plan the changes (objects & rules) Implement the change on the devices Validate the change Identify Devices in the flow path CUSTOMER STORY 38
  39. 39. Validate the change Identify Devices in the flow path Check for risks involved Plan the Rules Implement the change on the devices Request a network change CUSTOMER STORY AlgoSec can push changes automatically 39
  40. 40. ENABLING TRAFFIC POLICY CHANGES • Is the traffic from source to destination enabled? • Routing • Firewall rules 40 Cloud
  41. 41. Rose_Other Rose_Other DC_82 Router DC_82 Router DC_42 Router DC_42 Router
  42. 42. Rose_Other Rose_Other
  43. 43. NETWORK ADMINISTRATOR – CONFIRM DEVICES Rose_Other Rose_Other Rose_Other
  44. 44. SECURITY ADMINISTRATOR – APPROVE CHANGES FireFlow –Security Administrator sees the risks – Approve changes Rose_Other
  45. 45. NETWORK ADMINISTRATOR – PUSH CHANGES TO DEVICES Rose_Other
  46. 46. NETWORK ADMINISTRATOR – PUSH CHANGES TO DEVICES Rose_Other
  47. 47. SUMMARY & BENEFITS Fortinet provides unparalleled broad, automated and integrated security protection across segments 01 AlgoSec enables Multi-Vendor Firewall Management across heterogeneous and hybrid enterprises 02 100s of Enterprise Customers find Fortinet & AlgoSec best together in their Multi-Vendor Environment 03 47
  48. 48. Prof. Wool Video Courses https://www.algosec.com/resources 48 Solution Brief Whitepaper Webinar Slides
  49. 49. © Fortinet Inc. All Rights Reserved. eBook https://www.fortinet.com/products/management.html FortiManager Data Sheet FortiAnalyzer Data Sheet
  50. 50. Q & A Submit your questions via the chat Request a Free Evaluation: marketing@algosec.com
  51. 51. 51 JOIN OUR COMMUNITY Follow us for the latest on security policy management trends, tips & tricks, best practices, thought leadership, fun stuff, prizes and much more! Subscribe to our YouTube channel for a wide range of educational videos presented by Professor Wool youtube.com/user/AlgoSeclinkedin.com/company/AlgoSec facebook.com/AlgoSec twitter.com/AlgoSec www.AlgoSec.com/blog
  52. 52. ALGOSUMMIT THE PREMIER EVENT FOR ALGOSEC CUSTOMERS & CHANNEL PARTNERS 52 Dallas October 21-24 2019 www.algosec.com/algosummit UPCOMING WEBINARS July 10 Change Automation July 30 Managing Cisco ACI
  53. 53. THANK YOU! Questions & Request for Demo: marketing@algosec.com

×