SlideShare a Scribd company logo
1 of 54
Q1 2023
3
© Fortinet Inc. All Rights Reserved.
Founded: October 2000
Founded by: Ken Xie and Michael Xie
Headquarters: Sunnyvale, CA
Fortinet IPO (FTNT): November 2009
Listed in both: NASDAQ 100 and S&P 500
Member of: Dow Jones Sustainability Index
Security Investment Grade Rating: BBB+ Baa1
Securing people, devices, and data everywhere.
For over 20 years, Fortinet has been a driving force in the
evolution of cybersecurity and the convergence of networking
and security. Our security solutions are among the most
deployed, most patented, and most validated in the industry.
Global Customer Base
600,000+
Customers
2021 Billings
$4.1B+
(as of Dec 31, 2021)
Market Capitalization
$38.3B
(as of Sept 30, 2022)
Broad, Integrated Portfolio of
50+
Enterprise Cybersecurity
Products
Strong Analyst Validation
33
Enterprise Analyst Report
Inclusions
Vertical Integration
$1B+
Investment in ASIC
Design & Development
4
© Fortinet Inc. All Rights Reserved.
Strong investment in our
supply chain
Investment in scale of threat
intelligence and AI/ML
Organic R&D investment
across our portfolio
Investing in Innovation for Our Customers
200B
Threat Events Neutralized Daily
~50%
of All Next-Gen Firewall Shipments
1,285
Global Industry Patents
0 100 200 300 400 500 600 700 800 900 1000
U.S. Patents
Palo Alto Networks
Zscaler
Crowdstrike
Check Point
925
0.0%
10.0%
20.0%
30.0%
40.0%
50.0%
60.0%
2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 Q3
2022
Global Firewall Shipments
0
20000
40000
60000
80000
100000
120000
140000
160000
180000
200000
Advanced Threats – Global CVE
1990-
1999
2000-
2001
2002-
2003
2004-
2005
2006-
2007
2008-
2009
2010-
2011
2012-
2014
2015-
2017
2018-
2019 2021 2022 2023+
Source: IDC, Worldwide Security Appliance Tracker, December 2022 (based on shipments of
UTM appliances) Source: U.S. Patent Office, as of September 30, 2022
5
© Fortinet Inc. All Rights Reserved.
Sunnyvale
US
Burnaby
Canada
Ottawa
Canada
Concord
US
Bangalore
India
Uberlandia
Brazil
Herzliya
Israel
Sophia
France
Chicago
US
Kawasaki
Japan
Majority of our R&D is based in North America
Global Reach and Support 12,090+
Employees Worldwide
Engineers
Hardware
One Third
Software
Two-Thirds
Support Centers
Centers of Excellence
Headquarters
Dev Centers
Fortinet Dev & Support
Operation Centers
6
© Fortinet Inc. All Rights Reserved.
9
MAGIC
QUADRANTS
MARKET
GUIDES
#1 IN CRITICAL
CAPABILITIES
PEER INSIGHTS
CUSTOMERS’
CHOICE
RADARS MARKETSCAPES
PLATFORM
NAVIGATOR
COMPASSES
NOWTECHS
WAVES
GIGAOM
RADAR
Fortinet is one of the most validated
enterprise cybersecurity companies in the
world ranking in leadership positions across
dozens of analyst reports highlighting the
broad application of the Fortinet Security
Fabric.
33
Enterprise Analyst
Reports Validate
Fortinet Across
Networking and Security
9 6 4
5 6 6 4
1 5 6
7
© Fortinet Inc. All Rights Reserved.
Fortinet secures over half a million enterprises, service providers,
and government organizations around the world.
Fortinet Secures Over Half a Million
Organizations Worldwide
8
© Fortinet Inc. All Rights Reserved.
Achieving a
Sustainable Society
Fortinet Stands for More than Just Technology Innovation
Up To
16X
Higher Power Efficiency
Carbon Neutral
by 2030*
Sunnyvale HQ Building
Carbon Neutral Already
Closing the
Cybersecurity Skills Gap
Future Pledge:
1 Million People Trained
In Cybersecurity By 2026
1M+
NSE Certifications Issued to Date
Cybersecurity Learning Hub
31
Education Outreach Partners
498
Academies Partners
Disrupting
Cyber Adversaries
Global Leadership & Collaboration:
480+
Threat Intelligence, Detection,
Enforcement, & Remediation Partners
Trends and Market Drivers
10
© Fortinet Inc. All Rights Reserved.
Cybersecurity Market and Industry Drivers
Ransom as
a Service
Kaseya
VSA
REvil
AI-enabled OT
SolarWinds | Log4j
Growing Attack
Surface
Cloud
Swarmbot Wipers |
Colonial
Pipeline
Hermetic
Wiper
Nation
Sponsored
Work from Anywhere
Operational Technology
Connectivity
Digital Acceleration
Application Journey
How we interact with customers, suppliers,
infrastructure, and employees is changing
Cybercriminals are adopting APT-like tactics to
develop and scale attacks faster than ever
Driving Infrastructure Evolution Evolving Threat Landscape
11
© Fortinet Inc. All Rights Reserved.
Travel Factory
Edge Compute
Public Cloud Internet SaaS
Data Center
Users and Device Security
Home Campus
Complexity is Slowing Digital Initiatives
Network Security Cloud Security Security Operations
Branch
+ + + +
Users and Devices
Today’s
Challenges
• Applications are
distributed
• Users are working from
anywhere
• More devices are
attaching to applications
• Too many IT and
security stacks
• Too many vendors
• Cybersecurity skills
shortage
12
© Fortinet Inc. All Rights Reserved.
Consolidation Reduces Complexity
and Accelerates Outcomes
ASIC Appliance Virtual Cloud Native As-a Service Container
Convergence:
Secure Networking
Convergence of networking and
security across WLAN, LAN, SD-WAN,
ZTNA, SASE, and network firewall.
Cybersecurity
Platform
Broad, integrated, and automated
platform connecting users and devices,
networks, cloud and data center
applications, and NOC/SOC.
Threat Intelligence &
Security Services
Real-time threat intelligence, AI-
powered security services, &
expert services
13
© Fortinet Inc. All Rights Reserved.
• Reduced complexity
eliminating multiple products
• Efficient operations with
single console
• End-to-end digital experience
measurement
• Cost savings from product
and vendor reduction
Convergence
Benefits
FortiOS Everywhere
Cybersecurity
Services
Enterprise
Networking
Secure
Networking
Network Firewall
Secure SD-WAN
Universal ZTNA
SASE
NAC
Secure AP
Secure Switch
Application Content
Location Identity
Switch WiFi
5G Router
Lacks Awareness
Across the Network
Software Delivers
Network Awareness
Secure
Networking
Convergence of Networking & Security
14
© Fortinet Inc. All Rights Reserved.
Secure Networking
Fortinet Secure SD-WAN
CASB
ZTNA
SWG
SD-WAN
NGFW
LAN Edge
Convergence of Networking & Security
Reduce complexity to close security gaps, improve operational
efficiency, optimize user experience
ROI
300%
Reduction in the number
of network disruptions
65%
Payback
8 Months
Increase in productivity of
security and network teams
50%
Secure
Networking
Total Economic™ Impact of Fortinet Secure SD-WAN study
15
© Fortinet Inc. All Rights Reserved.
Enterprise “Best of Breed” & “Platform”
Are Not Mutually Exclusive
Sept. 2022 Magic Quadrant for
SD-WAN
Dec. 2022 Magic Quadrant for
Network Firewalls
Fortinet Recognized as a Leader Fortinet Recognized as a Leader
Network Firewall SD-WAN Wired and Wireless LAN
Nov. 2022 Magic Quadrant for
Wired and Wireless LAN
Fortinet Recognized as a Visionary
Internal Use Only
Secure
Networking
FortiOS Operating System
16
© Fortinet Inc. All Rights Reserved.
ASIC Appliance Virtual Cloud Native As-a Service Container
Convergence:
Secure Networking
Convergence of networking and
security across WLAN, LAN, SD-WAN,
Zero Trust, SASE, and network
firewall.
Threat Intelligence &
Security Services
Real-time threat intelligence, AI-
powered security services, & expert
services
Cybersecurity
Platform
Consolidation Reduces Complexity
and Accelerates Outcomes
Cybersecurity
Platform
Broad, integrated, and automated
platform connecting users and devices,
networks, cloud and data center
applications, and NOC/SOC.
17
© Fortinet Inc. All Rights Reserved.
Cybersecurity Platform Journey
10 Vendors
30+ Vendors
Your Journey to SOC Automation Maturity
Network Operations
Network Security
Security Operations
Endpoint Security Cloud Security
Ecosystem
Network
Endpoint Application
NoC SoC
Ecosystem
Network
Endpoint Application
NOC
SOC
Ecosystem
2-3 Platforms
Cybersecurity
Platform
18
© Fortinet Inc. All Rights Reserved.
Network
Endpoint Application
NoC SoC
Ecosystem
Cost/budgeting/to
save money
Increase effectiveness by allowing
broader reach and visibility
Increase efficacy by integrating
multiple components
Easier management by reducing
the number of separate tools
Primary Reasons Organizations are
Pursuing Security Vendor Consolidation:
35%
55% 55%
43%
Cybersecurity
Platform
Gartner, Cybersecurity Market Insight: Convey Business Outcomes When Marketing Security Solutions Published 11 January 2023
Gartner, Infographic: Top Trends in Cybersecurity 2022 — Vendor Consolidation Published 19 August 2022
75% of large organizations are
actively pursuing a vendor
consolidation strategy
Consolidate Point Products & Vendors into a
Cybersecurity Platform
19
© Fortinet Inc. All Rights Reserved.
Enterprise “Best of Breed” & “Platform”
Are Not Mutually Exclusive
IDC MarketScape Worldwide Modern Endpoint
Security for Enterprises Vendor Assessment
Fortinet Recognized as a Major Player
Endpoint Protection SOAR
2021 GigaOm Radar for Security Orchestration,
Automation, and Response
Fortinet Recognized as a Leader
Internal Use Only
Cybersecurity
Platform
The Fortinet Security Fabric
2022 Gartner Magic Quadrant
for SIEM
Fortinet Recognized as a Challenger
SIEM
20
© Fortinet Inc. All Rights Reserved.
ASIC Appliance Virtual Cloud Native As-a Service Container
Convergence:
Secure Networking
Convergence of networking and
security across WLAN, LAN, SD-WAN,
Zero Trust, SASE, and network
firewall.
Threat Intelligence &
Security Services
Real-time threat intelligence, AI-
powered security services,
& expert services
Security
Services
Consolidation Reduces Complexity
and Accelerates Outcomes
Cybersecurity
Platform
Broad, integrated, and automated
platform connecting users and devices,
networks, cloud and data center
applications, and NOC/SOC.
21
© Fortinet Inc. All Rights Reserved.
FortiGuard
AI-Powered
Security Services
FortiGuard Labs
Real-Time
Threat Intelligence
FortiGuard
Expert
Services
FortiGuard Labs: Threat Intelligence & Security Services
Founded in 2002, FortiGuard
Labs is Fortinet’s elite
cybersecurity threat intelligence
and research organization. We
develop and utilize leading-edge
machine learning and AI
technologies to provide
customers with timely and
consistently top-rated protection
and actionable threat
intelligence.
Global Leadership &
Collaboration:
FortiGuard Labs Global Threat
Hunters and Researchers
500+ Hours of Threat
Research a Year
600K+ 480+ TI, detection, enforcement and
remediation partners
22
© Fortinet Inc. All Rights Reserved.
Public
Cloud
Internet
SaaS
Data Center
Travel
Plant
Home
Campus
Branch
User and
Device
Security
Cloud
Security
Open
Ecosystem
Secure
Networking
FortiGuard
Threat
Intelligence
Network
Operations
Security
Operations
Edge
Compute
Fortinet
Security
Fabric
Broad
visibility and protection of the entire
digital attack surface to better
manage risk
Integrated
solution that reduces management
complexity and shares threat
intelligence
Automated
self-healing networks with AI-driven
security for fast and efficient
operations
23
© Fortinet Inc. All Rights Reserved.
Fortinet Security Fabric Expansion
Entities
Anywhere
Users and Devices
Public Cloud
SaaS
Internet
Edge
Applications
Resources
Everywhere
Data Center
FortiClient ZTNA
NOC FortiGuard
FortiWeb
Branch
Campus
OT
WFH
Employees
Contractors
FortiGate VM
FortiMail
FortiManager
FortiMonitor
FortiAIOps
FortiPolicy
FortiGuard
Web
Security
Content
Security
Device
Security
SD-WAN
FortiAP/
FortiSwitch
Networks
FortiGate
Securing the Digital Experience
FortiProxy
SOC
FortiAnalyzer
FortiSSIEM /
FortiSOAR
FortiGuard
SoCaaS / IR
FortiNAC
FortiAuthenticator
FortiToken
FortiExtender
Remote
Access/VPN
FortiDDoS
FortiADC
FortiCASB
Control and Protect Everyone and
Everything on or off the Network
Secure Any Application
Journey on Any Cloud
Speed Operations, with
AI-powered Automation
Counter Threats, with
Coordinated Protection
FortiEDR /
FortiMDR
FortiDeceptor
FortiRecon
FortiNDR
FortiSASE
FortiGate
Cloud
Linksys
HomeWRK
Application
Security
SOC
Services
24
© Fortinet Inc. All Rights Reserved.
Fortinet integrates with 500+ security and networking solutions
Maximize your existing investments
Figures as of Dec 1, 2022
Note: Logos are a representative subset of the Security Fabric Ecosystem
Fabric
Connectors
Fortinet-developed deep
integration automating
security operations and
policies
Fabric
APIs
Partner-developed
integration using Fabric
APIs providing broad
visibility with end-to-end
solutions
Community-driven DevOps
scripts automating network
and security provisioning,
configuration, and
orchestration
Fabric
DevOps
Extended
Ecosystem
Integrations with other
vendor technologies
& open systems
OT/ IoT FinServ Healthcare/
Life Sciences & Pharma
Retail SLED
+300
other
Fabric-
Ready
Partners
25
© Fortinet Inc. All Rights Reserved.
FortiCare Services help thousands of customers every year maximize their investments in Fortinet solutions.
1400+
EXPERTS
24x7
TECHNICAL
SUPPORT
23
GLOBAL SUPPORT
CENTERS
Design
Business Alignment
Deploy
Accelerated Implementation
Operate
Reliable Assistance
Optimize
Performance Excellence
Evolve
Personalized Care
FortiCare – Expertise At Your Service When Needed
Fortinet has our customers covered every step of the way, freeing up your resources to focus on your business.
26
© Fortinet Inc. All Rights Reserved.
Global Partners
300+ partners supporting global
2000 customers
Focus Partners
5,000+ partners with technical
certifications supporting enterprise,
mid-market & SMB customers
Over 90,000 partners that customers can rely on
System Integrator
1,000+ SIs with deep industry
experience driving secure digital
transformation
Large Global Network of Trusted Advisors
Service Provider
1,700+ partners delivering managed
security and networking services
Cloud Providers
650+ cloud partners, with support
across all major cloud providers
Distributors
300 distributors worldwide
ensuring partner success
Security Fabric Solutions
29
© Fortinet Inc. All Rights Reserved.
Fortinet Security
Fabric Solutions
Access and Endpoint
Security
Secure Networking Automated SOC
Secure Application
Journey
OT Security
Over 50 products and services, along with
hundreds of partners integrate within the
Fortinet Security Fabric.
End
Click on any of these solutions in
presentation mode to learn more.
Access and Endpoint Security
31
© Fortinet Inc. All Rights Reserved.
Lack of consistent security for users/devices independent of location
Challenge: Securing Users and Devices
Lack of security for remote users and inability
to maintain consistent security posture for
users anywhere
Traditional VPN based access lacks
necessary granular access control
Siloed point products and agents lead to
complex operations, and lack of
comprehensive visibility
With employees often working from
anywhere, their devices need strong security
even outside the network
Go Back End
32
© Fortinet Inc. All Rights Reserved.
The Industry Analyst Recommendations
Market Guide for Single-Vendor SASE
Published September 2022
"Network operations and network security leaders
looking to support the anywhere, anytime access
requirements of a distributed, hybrid workforce
should consider an integrated, cloud-centric solution"
Gartner Market Guide for Single-Vendor SASE, September 2022
Secure Access
"The shift from implicit trust to zero trust is a
response to the rising incidents and costs of
cybercrime. A robust implementation of zero-trust
solutions can reduce the likelihood of attack."
Gartner The state of Zero-Trust Report, January 2022
Anywhere, Anytime Secure
access for users
Securing
Endpoints
"Organizations are looking to integrate the endpoint
protection platform (EPP)/EDR with network and
cloud security technologies and make use of
managed detection and response service"
Gartner How to Choose the Best EPP/EDR for Your
Organization, June 2021
Zero Trust
Zero-trust Mindset is the answer Move towards endpoint security
convergence
Go Back End
33
© Fortinet Inc. All Rights Reserved.
Fabric Solution: Access and Endpoint Security
Zero Trust Everywhere
Universal application access policies
enforced in all locations delivered as a
feature instead of point products
Cloud-Delivered Security
Extend enterprise-grade security from
the cloud for strong protection of
remote users
Modern Endpoint Security
Behavior-based endpoint protection,
detection and response to stop the
most sophisticated cyber-attacks
Vendor Consolidation
4 to 1
Reduction in security risk
65%
Encrypted Tunnel Usage
Payback Period
~3 months
100%
Compliance
Go Back End
34
© Fortinet Inc. All Rights Reserved.
Fabric Solution: Access and Endpoint Security
Universal ZTNA
Explicit application access with continuous
verification for secure connectivity
Secure Access Services Edge (SASE)
Cloud-delivered convergence to secure
remote users with better user experience
Identity & Access Management (IAM)
Authenticate and authorize user identities to
securely access corporate resources
Endpoint Detection & Response (EDR)
Modern endpoint security to stop
ransomware and advanced cyber-attacks
AI-powered Security Services
Counter threats in real-time with AI-powered
protection natively integrated into the Fabric
Go Back End
Secure Networking
36
© Fortinet Inc. All Rights Reserved.
Challenge: Securing Network Edges
Architectural complexity leads to weak security
posture – disjointed security & networking
solutions lead to multiple management consoles
and inconsistent security policies
Poor user experience – slow inspection
of encrypted traffic and an inability to steer traffic
intelligently impacts users
Difficult to troubleshoot – fractured visibility for
traffic, devices, and applications leaves finding root
cause time consuming
Expensive to support – no network- and security-
wide visibility, analytics and orchestration increases
daily operational costs
Go Back End
37
© Fortinet Inc. All Rights Reserved.
The Industry Analyst Recommendations
Network
Modernization
Hybrid Workplace
Enablement
In conjunction with hybrid or all-internet
WAN topologies, SD-WAN improves
availability, agility, cost-effectiveness and
performance for enterprise WANs.
Gartner Hype Cycle for Enterprise Networking, 2022
I&O networking leaders are being asked to
deliver secure networks with automation as
organizations digitally transform.
Gartner Hype Cycle for Enterprise Networking, 2022
Security leaders must adopt a unified
security approach to protect their assets
and users in any location.
Gartner Hype Cycle for Network Security, 2022
Cyberthreat Protection,
Securing Infrastructure
Secure Cloud Connectivity,
Ensure Better User Experience
Secure Hybrid Workforce,
Consistent Security
Security
Transformation
Go Back End
38
© Fortinet Inc. All Rights Reserved.
Fabric Solution: Secure Networking
Improved Business Continuity
Consistent security for every edge with AI-powered
security services and flexible deployment across
your network for reduced risk and business
interruptions
Reduced TCO
Simplified architecture and management with
converged network and security at any scale that
streamline processes and save resources
Optimized User Experience
Automation and AI/ML help operational efficiency
and keep employees productive
300%
ROI
Reduction in the number
of network disruptions
65%
Increase in productivity of
security and network teams
50%
Faster Branch Setup
60%
Forrester Total Economic™ Impact of Fortinet Secure SD-WAN study Go Back End
39
© Fortinet Inc. All Rights Reserved.
Fabric Solution: Secure Networking
Network Firewall
Comprehensive, integrated, and automated
cybersecurity solution
Secure SD-WAN & 5G
Transform and secure WAN, enhancing user
experience and mitigating risk.
Secure Wireless & Wired LAN
Wi-Fi and Ethernet network equipment
secured by a cybersecurity mesh
Secure Access Services Edge (SASE)
Cloud-delivered security and superior user
experience for remote users
AI-powered Security Services
Counter threats in real-time with AI-powered
protection natively integrated into the Fabric
Go Back End
Automated Security Operations
41
© Fortinet Inc. All Rights Reserved.
Expanded Attack Surface: Digital innovation
(including WFA, cloud, and supply chain)- has
expanded the attack surface and cyber exposure
Evolving and Evasive Attacks: Increasingly
sophisticated multi-stage campaigns mimicking
legitimate activities often evade security.
Security Complexity: Large number of security
products & consoles, slow identification and
response, exacerbated by the cyber skills shortage
Challenge: Security Operations
Keeping pace with evolving threat landscape across an expanded attack surface
Go Back End
42
© Fortinet Inc. All Rights Reserved.
Industry Analyst Insight
Market Guide for Single-Vendor SASE
Published September 2022
"The #1 reason organizations believe security
operations are more difficult than they were two
years ago is that the threat landscape is evolving and
changing rapidly."
ESG. SOC Modernization and the Role of XDR, ESG
Published October 2022
Threat Landscape
"Rapid response of only minutes at best
is required…This forces organizations to reduce the
time to respond, typically by delegating more tasks
to machines."
Gartner TBD, January 2022
Sophisticated cyber attacks
require AI-powered detection
Security Complexity
"Cybersecurity product consolidation is
transforming security buying. 75% of organizations
are currently pursuing a security vendor
consolidation — only 29% did so in 2020."
Gartner How SASE, XDR and Security Vendor Consolidation
Are Shaping Your Security Strategy, June 2022
Increased Impact
Automated Security
Operations are Critical
Move towards consolidated
cyber security platforms
Go Back End
43
© Fortinet Inc. All Rights Reserved.
Fabric Solution: Automated SOC
AI-driven coordinated protection across an expanded attack surface
Integration with distributed security controls
across network, endpoint, application and
cloud covers the expanded digital attack surface
Artificial Intelligence applied across the cyber
kill chain detects components and activity
designed to bypass traditional security and hide
among legitimate operations
Automation and Augmentation speed a
comprehensive, coordinated response and ease
the burden on in-house security teams
-54 days
Faster Mean time to Detect
-20 days
Faster Mean time to Contain
Lower Average Breach Cost
-$3.05M
Ponemon. 2022 Cost of a Data Breach Survey. Use of AI and Automation.
Go Back End
44
© Fortinet Inc. All Rights Reserved.
Fabric Solution: Automated SOC
AI-driven coordinated protection across an expanded attack surface
Early Detection (EDR | NDR | Deception | Recon)
Endpoint and other behavior-based sensors to
detect and stop attacks along the kill chain
SIEM/FAZ
Normalized data analytics with ML to detect
incidents across the attack surface
SOAR
Orchestration / automation for faster, synergistic
response
SOC Augmentation Services
Specialized skills (IR), attack assessment and
training supplement in-house teams
AI-powered Security Services
Intelligence and engines to detect and respond
faster
Go Back End
Secure Application Journey
46
© Fortinet Inc. All Rights Reserved.
Challenge: Securing the Application Journey
Applications can live anywhere from the data
center to multi-cloud to edge compute.
Organizations are still dealing with aftermath of
forced acceleration to cloud – amplified security
risks, operational complexity, misconfigurations,
and loss of visibility.
Edge compute emerging to bring applications
and data closer to users / devices
Misconfiguration of cloud security, insecure
interfaces/APIs, exfiltration of sensitive data, and
unauthorized access continue to be top cloud
threats
Organizational preferences, processes, and/or
technical requirements result in too many tools,
solutions, and platforms
Go Back End
47
© Fortinet Inc. All Rights Reserved.
The Industry Agrees…
“The number of data center and edge sites will
increase to 3.5 million by 2024.”
Gartner, Forecast Analysis: Data Center Sites, Worldwide
published 13 April 2022
Data Center
Lack of visibility (49%), not enough control
(42%), and lack of staff resources or expertise
(40%) remain to be top challenges for
organizations
2022 Cloud Security Report
Cybersecurity Insiders
Cloud Challenges
“Misconfiguration of cloud security remains the
biggest cloud security risk according to 62% of
cybersecurity professionals…followed by
exfiltration of sensitive data (51%), unauthorized
access (50%), and insecure interfaces/APIs
(52%). “
2022 Cloud Security Report
Cybersecurity Insiders
Cybersecurity Mesh
“78% of cybersecurity professionals want a single
cloud security platform for consistent security
policy across all cloud environments.”
2022 Cloud Security Report
Cybersecurity Insiders
Cloud Threats
“By 2026, adoption of edge computing
applications for new use cases will represent
more than 50% of the infrastructure opportunity,
up from 15% in 2021.”
Gartner, Emerging Tech Impact Radar: Edge Computing
published 30, September 2022
76% of organizations are using two or more clouds
for integration of multiple services, scalability or
business continuity reasons.
2022 Cloud Security Report
Cybersecurity Insiders
Hybrid / Multi-clouds
Edge Computing
Go Back End
48
© Fortinet Inc. All Rights Reserved.
Fabric Solution: Secure Application Journey
Consistent Security Everywhere
Gain consistent security and
centralized visibility and management,
everywhere applications live
Broad Use Case Coverage
Comprehensive, scalable, and flexible
solutions for securing application
journeys of today and tomorrow
Cloud-native Security
Reduced friction across clouds and
simplified operations with cloud-native
integrations
Platforms
1
Reduction in cost
Up to 50%
Protected Web Applications
>4200
Go Back End
49
© Fortinet Inc. All Rights Reserved.
Fabric Solution: Secure Application Journey
Hybrid Security
Protect and connect networks across clouds,
data centers, hybrid clouds, and edge compute
Web Application & API Protection
Simplify securing applications and APIs with
AI/ML and automation
Cloud-native Protection
Reduce friction across cloud deployments with
security that integrates with and works natively
with cloud services
Workload Protection
Seamlessly protect critical workloads
FortiGuard Services
Real-time protection for applications and
workloads no matter where they live
Consistent, secured, and optimized experience to build, deploy, and run cloud applications across all
cloud and hybrid deployments.
Go Back End
Operational Technology (OT)
Security
51
© Fortinet Inc. All Rights Reserved.
Challenge: Securing Operational Technology
Most industrial control systems lack security by
design and are sensitive to change.
The attack surface for cyber-physical assets is
expanding as a dependence on air-gap
protection diminishes with Digital Transformation
initiatives driving IT-OT network convergence.
Increasing adoption of new technologies, such
as 5G, IoT, and Cloud.
Remote access requirements for third-parties
and employees causing additional risks.
Asset owners’ reliance on OEMs and SIs
exposes critical systems to additional risks.
Asset owners must comply with industry-specific
regulations
Go Back End
52
© Fortinet Inc. All Rights Reserved.
IT / OT Convergence
“OT environments that were traditionally
separated are no longer completely
isolated. They now have direct connections
for business, OEMs and other third parties.”
Gartner, Reduce Risk to Human Life by
Implementing This OT Security Control Framework
published 17 June 2021
Long Lifespan
“The automation hardware in a process
automation system is often capable of running 20
to 30 years.”
Automation’s Life Cycle Management of Processing
Automation Control Systems, published April 2021
Incidents
Underreported
“15% of survey respondents have experienced
a security incident last year that crippled
operational or mission-critical systems.”
Gartner, Emerging Technologies: Critical Insights
for Operational Technology Security
published November 10, 2021
Compromises in IT
drive ICS/OT incidents
Mixing legacy and
modern tech
Ransomware is the
highest concern
The Industry Agrees…
“Survey participants cite a compromise in IT
allowing threats into the ICS/OT control
networks as the highest-ranking threat
vectors involved in control system incidents.”
SANS 2022 Survey: OT/ICS Cybersecurity,
published October 2022
“Technical integration of legacy and aging OT
technology with modern IT systems is the biggest
challenge facing securing OT technology and
process.”
SANS 2022 Survey: OT/ICS Cybersecurity,
published October 2022
“Ransomware, extortion, or other financially
motivated crimes rank as number one threat
vector of concern.”
SANS 2022 Survey: OT/ICS Cybersecurity,
published October 2022
Go Back End
53
© Fortinet Inc. All Rights Reserved.
Fabric Solution: Operational Technology Security Solution
Secure Connectivity
Digital Transformation requires secure data
exfiltration from OT to Data Centers and Cloud
Secure Remote Access
Zero-trust access for authorized remote
technicians and third-parties
Converged Security Operations
Synergistically manage OT and IT networks in a
converged SOC.
AI-powered Security Services
OT Security services enable Industrial Control
System security to stay ahead of evolving threats
Go Back End
56
© Fortinet Inc. All Rights Reserved.
9
MAGIC
QUADRANTS
MARKET
GUIDES
#1 IN CRITICAL
CAPABILITIES
PEER INSIGHTS
CUSTOMERS’
CHOICE
RADARS MARKETSCAPES
PLATFORM
NAVIGATOR
COMPASSES
NOWTECHS
WAVES
GIGAOM
RADAR
Fortinet is one of the most validated enterprise
cybersecurity companies in the world ranking
in leadership positions across dozens of
analyst reports highlighting the broad
coverage of the Fortinet Security Fabric:
• Network Security and Access Control
• Wired and Wireless Access
• Identity and Access Management
• Email and Application Security
• Hybrid Cloud Security
• Endpoint Security
• Early and Advanced Detection
• Central Analytics and Response Workflow
33
Enterprise Analyst
Reports Validate
Fortinet Across
Networking and Security
9 6 4
5 6 6 4
1 5 6

More Related Content

What's hot

Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallCisco Canada
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Priyanka Aash
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security SolutionsThe TNS Group
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architectureBirendra Negi ☁️
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdfJoniGarcia9
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedSounil Yu
 
Aligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWSAligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWSAmazon Web Services
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptxDESTROYER39
 

What's hot (20)

Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdf
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
 
Aligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWSAligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWS
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 

Similar to Fortinet Corporate Overview Deck.pptx

Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview PresentationBlock Armour
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxssuser365526
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureExclusive Networks ME
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetHarry Gunns
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTWitekio
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - ciscoMITEF México
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Rafael Maranon
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 convertedemmaelice
 
FTNT_Icon-Library-External-February-2023.pptx
FTNT_Icon-Library-External-February-2023.pptxFTNT_Icon-Library-External-February-2023.pptx
FTNT_Icon-Library-External-February-2023.pptxenriquecordova21
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityShane Glenn
 

Similar to Fortinet Corporate Overview Deck.pptx (20)

Fortinet_for_SAP
Fortinet_for_SAPFortinet_for_SAP
Fortinet_for_SAP
 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview Presentation
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
Fortinet Perspectiva Coporativa
Fortinet Perspectiva CoporativaFortinet Perspectiva Coporativa
Fortinet Perspectiva Coporativa
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
 
PSOIOT-1151.pdf
PSOIOT-1151.pdfPSOIOT-1151.pdf
PSOIOT-1151.pdf
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform  SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
 
FTNT_Icon-Library-External-February-2023.pptx
FTNT_Icon-Library-External-February-2023.pptxFTNT_Icon-Library-External-February-2023.pptx
FTNT_Icon-Library-External-February-2023.pptx
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 

Recently uploaded

Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 

Recently uploaded (20)

Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 

Fortinet Corporate Overview Deck.pptx

  • 2. 3 © Fortinet Inc. All Rights Reserved. Founded: October 2000 Founded by: Ken Xie and Michael Xie Headquarters: Sunnyvale, CA Fortinet IPO (FTNT): November 2009 Listed in both: NASDAQ 100 and S&P 500 Member of: Dow Jones Sustainability Index Security Investment Grade Rating: BBB+ Baa1 Securing people, devices, and data everywhere. For over 20 years, Fortinet has been a driving force in the evolution of cybersecurity and the convergence of networking and security. Our security solutions are among the most deployed, most patented, and most validated in the industry. Global Customer Base 600,000+ Customers 2021 Billings $4.1B+ (as of Dec 31, 2021) Market Capitalization $38.3B (as of Sept 30, 2022) Broad, Integrated Portfolio of 50+ Enterprise Cybersecurity Products Strong Analyst Validation 33 Enterprise Analyst Report Inclusions Vertical Integration $1B+ Investment in ASIC Design & Development
  • 3. 4 © Fortinet Inc. All Rights Reserved. Strong investment in our supply chain Investment in scale of threat intelligence and AI/ML Organic R&D investment across our portfolio Investing in Innovation for Our Customers 200B Threat Events Neutralized Daily ~50% of All Next-Gen Firewall Shipments 1,285 Global Industry Patents 0 100 200 300 400 500 600 700 800 900 1000 U.S. Patents Palo Alto Networks Zscaler Crowdstrike Check Point 925 0.0% 10.0% 20.0% 30.0% 40.0% 50.0% 60.0% 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 Q3 2022 Global Firewall Shipments 0 20000 40000 60000 80000 100000 120000 140000 160000 180000 200000 Advanced Threats – Global CVE 1990- 1999 2000- 2001 2002- 2003 2004- 2005 2006- 2007 2008- 2009 2010- 2011 2012- 2014 2015- 2017 2018- 2019 2021 2022 2023+ Source: IDC, Worldwide Security Appliance Tracker, December 2022 (based on shipments of UTM appliances) Source: U.S. Patent Office, as of September 30, 2022
  • 4. 5 © Fortinet Inc. All Rights Reserved. Sunnyvale US Burnaby Canada Ottawa Canada Concord US Bangalore India Uberlandia Brazil Herzliya Israel Sophia France Chicago US Kawasaki Japan Majority of our R&D is based in North America Global Reach and Support 12,090+ Employees Worldwide Engineers Hardware One Third Software Two-Thirds Support Centers Centers of Excellence Headquarters Dev Centers Fortinet Dev & Support Operation Centers
  • 5. 6 © Fortinet Inc. All Rights Reserved. 9 MAGIC QUADRANTS MARKET GUIDES #1 IN CRITICAL CAPABILITIES PEER INSIGHTS CUSTOMERS’ CHOICE RADARS MARKETSCAPES PLATFORM NAVIGATOR COMPASSES NOWTECHS WAVES GIGAOM RADAR Fortinet is one of the most validated enterprise cybersecurity companies in the world ranking in leadership positions across dozens of analyst reports highlighting the broad application of the Fortinet Security Fabric. 33 Enterprise Analyst Reports Validate Fortinet Across Networking and Security 9 6 4 5 6 6 4 1 5 6
  • 6. 7 © Fortinet Inc. All Rights Reserved. Fortinet secures over half a million enterprises, service providers, and government organizations around the world. Fortinet Secures Over Half a Million Organizations Worldwide
  • 7. 8 © Fortinet Inc. All Rights Reserved. Achieving a Sustainable Society Fortinet Stands for More than Just Technology Innovation Up To 16X Higher Power Efficiency Carbon Neutral by 2030* Sunnyvale HQ Building Carbon Neutral Already Closing the Cybersecurity Skills Gap Future Pledge: 1 Million People Trained In Cybersecurity By 2026 1M+ NSE Certifications Issued to Date Cybersecurity Learning Hub 31 Education Outreach Partners 498 Academies Partners Disrupting Cyber Adversaries Global Leadership & Collaboration: 480+ Threat Intelligence, Detection, Enforcement, & Remediation Partners
  • 9. 10 © Fortinet Inc. All Rights Reserved. Cybersecurity Market and Industry Drivers Ransom as a Service Kaseya VSA REvil AI-enabled OT SolarWinds | Log4j Growing Attack Surface Cloud Swarmbot Wipers | Colonial Pipeline Hermetic Wiper Nation Sponsored Work from Anywhere Operational Technology Connectivity Digital Acceleration Application Journey How we interact with customers, suppliers, infrastructure, and employees is changing Cybercriminals are adopting APT-like tactics to develop and scale attacks faster than ever Driving Infrastructure Evolution Evolving Threat Landscape
  • 10. 11 © Fortinet Inc. All Rights Reserved. Travel Factory Edge Compute Public Cloud Internet SaaS Data Center Users and Device Security Home Campus Complexity is Slowing Digital Initiatives Network Security Cloud Security Security Operations Branch + + + + Users and Devices Today’s Challenges • Applications are distributed • Users are working from anywhere • More devices are attaching to applications • Too many IT and security stacks • Too many vendors • Cybersecurity skills shortage
  • 11. 12 © Fortinet Inc. All Rights Reserved. Consolidation Reduces Complexity and Accelerates Outcomes ASIC Appliance Virtual Cloud Native As-a Service Container Convergence: Secure Networking Convergence of networking and security across WLAN, LAN, SD-WAN, ZTNA, SASE, and network firewall. Cybersecurity Platform Broad, integrated, and automated platform connecting users and devices, networks, cloud and data center applications, and NOC/SOC. Threat Intelligence & Security Services Real-time threat intelligence, AI- powered security services, & expert services
  • 12. 13 © Fortinet Inc. All Rights Reserved. • Reduced complexity eliminating multiple products • Efficient operations with single console • End-to-end digital experience measurement • Cost savings from product and vendor reduction Convergence Benefits FortiOS Everywhere Cybersecurity Services Enterprise Networking Secure Networking Network Firewall Secure SD-WAN Universal ZTNA SASE NAC Secure AP Secure Switch Application Content Location Identity Switch WiFi 5G Router Lacks Awareness Across the Network Software Delivers Network Awareness Secure Networking Convergence of Networking & Security
  • 13. 14 © Fortinet Inc. All Rights Reserved. Secure Networking Fortinet Secure SD-WAN CASB ZTNA SWG SD-WAN NGFW LAN Edge Convergence of Networking & Security Reduce complexity to close security gaps, improve operational efficiency, optimize user experience ROI 300% Reduction in the number of network disruptions 65% Payback 8 Months Increase in productivity of security and network teams 50% Secure Networking Total Economic™ Impact of Fortinet Secure SD-WAN study
  • 14. 15 © Fortinet Inc. All Rights Reserved. Enterprise “Best of Breed” & “Platform” Are Not Mutually Exclusive Sept. 2022 Magic Quadrant for SD-WAN Dec. 2022 Magic Quadrant for Network Firewalls Fortinet Recognized as a Leader Fortinet Recognized as a Leader Network Firewall SD-WAN Wired and Wireless LAN Nov. 2022 Magic Quadrant for Wired and Wireless LAN Fortinet Recognized as a Visionary Internal Use Only Secure Networking FortiOS Operating System
  • 15. 16 © Fortinet Inc. All Rights Reserved. ASIC Appliance Virtual Cloud Native As-a Service Container Convergence: Secure Networking Convergence of networking and security across WLAN, LAN, SD-WAN, Zero Trust, SASE, and network firewall. Threat Intelligence & Security Services Real-time threat intelligence, AI- powered security services, & expert services Cybersecurity Platform Consolidation Reduces Complexity and Accelerates Outcomes Cybersecurity Platform Broad, integrated, and automated platform connecting users and devices, networks, cloud and data center applications, and NOC/SOC.
  • 16. 17 © Fortinet Inc. All Rights Reserved. Cybersecurity Platform Journey 10 Vendors 30+ Vendors Your Journey to SOC Automation Maturity Network Operations Network Security Security Operations Endpoint Security Cloud Security Ecosystem Network Endpoint Application NoC SoC Ecosystem Network Endpoint Application NOC SOC Ecosystem 2-3 Platforms Cybersecurity Platform
  • 17. 18 © Fortinet Inc. All Rights Reserved. Network Endpoint Application NoC SoC Ecosystem Cost/budgeting/to save money Increase effectiveness by allowing broader reach and visibility Increase efficacy by integrating multiple components Easier management by reducing the number of separate tools Primary Reasons Organizations are Pursuing Security Vendor Consolidation: 35% 55% 55% 43% Cybersecurity Platform Gartner, Cybersecurity Market Insight: Convey Business Outcomes When Marketing Security Solutions Published 11 January 2023 Gartner, Infographic: Top Trends in Cybersecurity 2022 — Vendor Consolidation Published 19 August 2022 75% of large organizations are actively pursuing a vendor consolidation strategy Consolidate Point Products & Vendors into a Cybersecurity Platform
  • 18. 19 © Fortinet Inc. All Rights Reserved. Enterprise “Best of Breed” & “Platform” Are Not Mutually Exclusive IDC MarketScape Worldwide Modern Endpoint Security for Enterprises Vendor Assessment Fortinet Recognized as a Major Player Endpoint Protection SOAR 2021 GigaOm Radar for Security Orchestration, Automation, and Response Fortinet Recognized as a Leader Internal Use Only Cybersecurity Platform The Fortinet Security Fabric 2022 Gartner Magic Quadrant for SIEM Fortinet Recognized as a Challenger SIEM
  • 19. 20 © Fortinet Inc. All Rights Reserved. ASIC Appliance Virtual Cloud Native As-a Service Container Convergence: Secure Networking Convergence of networking and security across WLAN, LAN, SD-WAN, Zero Trust, SASE, and network firewall. Threat Intelligence & Security Services Real-time threat intelligence, AI- powered security services, & expert services Security Services Consolidation Reduces Complexity and Accelerates Outcomes Cybersecurity Platform Broad, integrated, and automated platform connecting users and devices, networks, cloud and data center applications, and NOC/SOC.
  • 20. 21 © Fortinet Inc. All Rights Reserved. FortiGuard AI-Powered Security Services FortiGuard Labs Real-Time Threat Intelligence FortiGuard Expert Services FortiGuard Labs: Threat Intelligence & Security Services Founded in 2002, FortiGuard Labs is Fortinet’s elite cybersecurity threat intelligence and research organization. We develop and utilize leading-edge machine learning and AI technologies to provide customers with timely and consistently top-rated protection and actionable threat intelligence. Global Leadership & Collaboration: FortiGuard Labs Global Threat Hunters and Researchers 500+ Hours of Threat Research a Year 600K+ 480+ TI, detection, enforcement and remediation partners
  • 21. 22 © Fortinet Inc. All Rights Reserved. Public Cloud Internet SaaS Data Center Travel Plant Home Campus Branch User and Device Security Cloud Security Open Ecosystem Secure Networking FortiGuard Threat Intelligence Network Operations Security Operations Edge Compute Fortinet Security Fabric Broad visibility and protection of the entire digital attack surface to better manage risk Integrated solution that reduces management complexity and shares threat intelligence Automated self-healing networks with AI-driven security for fast and efficient operations
  • 22. 23 © Fortinet Inc. All Rights Reserved. Fortinet Security Fabric Expansion Entities Anywhere Users and Devices Public Cloud SaaS Internet Edge Applications Resources Everywhere Data Center FortiClient ZTNA NOC FortiGuard FortiWeb Branch Campus OT WFH Employees Contractors FortiGate VM FortiMail FortiManager FortiMonitor FortiAIOps FortiPolicy FortiGuard Web Security Content Security Device Security SD-WAN FortiAP/ FortiSwitch Networks FortiGate Securing the Digital Experience FortiProxy SOC FortiAnalyzer FortiSSIEM / FortiSOAR FortiGuard SoCaaS / IR FortiNAC FortiAuthenticator FortiToken FortiExtender Remote Access/VPN FortiDDoS FortiADC FortiCASB Control and Protect Everyone and Everything on or off the Network Secure Any Application Journey on Any Cloud Speed Operations, with AI-powered Automation Counter Threats, with Coordinated Protection FortiEDR / FortiMDR FortiDeceptor FortiRecon FortiNDR FortiSASE FortiGate Cloud Linksys HomeWRK Application Security SOC Services
  • 23. 24 © Fortinet Inc. All Rights Reserved. Fortinet integrates with 500+ security and networking solutions Maximize your existing investments Figures as of Dec 1, 2022 Note: Logos are a representative subset of the Security Fabric Ecosystem Fabric Connectors Fortinet-developed deep integration automating security operations and policies Fabric APIs Partner-developed integration using Fabric APIs providing broad visibility with end-to-end solutions Community-driven DevOps scripts automating network and security provisioning, configuration, and orchestration Fabric DevOps Extended Ecosystem Integrations with other vendor technologies & open systems OT/ IoT FinServ Healthcare/ Life Sciences & Pharma Retail SLED +300 other Fabric- Ready Partners
  • 24. 25 © Fortinet Inc. All Rights Reserved. FortiCare Services help thousands of customers every year maximize their investments in Fortinet solutions. 1400+ EXPERTS 24x7 TECHNICAL SUPPORT 23 GLOBAL SUPPORT CENTERS Design Business Alignment Deploy Accelerated Implementation Operate Reliable Assistance Optimize Performance Excellence Evolve Personalized Care FortiCare – Expertise At Your Service When Needed Fortinet has our customers covered every step of the way, freeing up your resources to focus on your business.
  • 25. 26 © Fortinet Inc. All Rights Reserved. Global Partners 300+ partners supporting global 2000 customers Focus Partners 5,000+ partners with technical certifications supporting enterprise, mid-market & SMB customers Over 90,000 partners that customers can rely on System Integrator 1,000+ SIs with deep industry experience driving secure digital transformation Large Global Network of Trusted Advisors Service Provider 1,700+ partners delivering managed security and networking services Cloud Providers 650+ cloud partners, with support across all major cloud providers Distributors 300 distributors worldwide ensuring partner success
  • 26.
  • 28. 29 © Fortinet Inc. All Rights Reserved. Fortinet Security Fabric Solutions Access and Endpoint Security Secure Networking Automated SOC Secure Application Journey OT Security Over 50 products and services, along with hundreds of partners integrate within the Fortinet Security Fabric. End Click on any of these solutions in presentation mode to learn more.
  • 30. 31 © Fortinet Inc. All Rights Reserved. Lack of consistent security for users/devices independent of location Challenge: Securing Users and Devices Lack of security for remote users and inability to maintain consistent security posture for users anywhere Traditional VPN based access lacks necessary granular access control Siloed point products and agents lead to complex operations, and lack of comprehensive visibility With employees often working from anywhere, their devices need strong security even outside the network Go Back End
  • 31. 32 © Fortinet Inc. All Rights Reserved. The Industry Analyst Recommendations Market Guide for Single-Vendor SASE Published September 2022 "Network operations and network security leaders looking to support the anywhere, anytime access requirements of a distributed, hybrid workforce should consider an integrated, cloud-centric solution" Gartner Market Guide for Single-Vendor SASE, September 2022 Secure Access "The shift from implicit trust to zero trust is a response to the rising incidents and costs of cybercrime. A robust implementation of zero-trust solutions can reduce the likelihood of attack." Gartner The state of Zero-Trust Report, January 2022 Anywhere, Anytime Secure access for users Securing Endpoints "Organizations are looking to integrate the endpoint protection platform (EPP)/EDR with network and cloud security technologies and make use of managed detection and response service" Gartner How to Choose the Best EPP/EDR for Your Organization, June 2021 Zero Trust Zero-trust Mindset is the answer Move towards endpoint security convergence Go Back End
  • 32. 33 © Fortinet Inc. All Rights Reserved. Fabric Solution: Access and Endpoint Security Zero Trust Everywhere Universal application access policies enforced in all locations delivered as a feature instead of point products Cloud-Delivered Security Extend enterprise-grade security from the cloud for strong protection of remote users Modern Endpoint Security Behavior-based endpoint protection, detection and response to stop the most sophisticated cyber-attacks Vendor Consolidation 4 to 1 Reduction in security risk 65% Encrypted Tunnel Usage Payback Period ~3 months 100% Compliance Go Back End
  • 33. 34 © Fortinet Inc. All Rights Reserved. Fabric Solution: Access and Endpoint Security Universal ZTNA Explicit application access with continuous verification for secure connectivity Secure Access Services Edge (SASE) Cloud-delivered convergence to secure remote users with better user experience Identity & Access Management (IAM) Authenticate and authorize user identities to securely access corporate resources Endpoint Detection & Response (EDR) Modern endpoint security to stop ransomware and advanced cyber-attacks AI-powered Security Services Counter threats in real-time with AI-powered protection natively integrated into the Fabric Go Back End
  • 35. 36 © Fortinet Inc. All Rights Reserved. Challenge: Securing Network Edges Architectural complexity leads to weak security posture – disjointed security & networking solutions lead to multiple management consoles and inconsistent security policies Poor user experience – slow inspection of encrypted traffic and an inability to steer traffic intelligently impacts users Difficult to troubleshoot – fractured visibility for traffic, devices, and applications leaves finding root cause time consuming Expensive to support – no network- and security- wide visibility, analytics and orchestration increases daily operational costs Go Back End
  • 36. 37 © Fortinet Inc. All Rights Reserved. The Industry Analyst Recommendations Network Modernization Hybrid Workplace Enablement In conjunction with hybrid or all-internet WAN topologies, SD-WAN improves availability, agility, cost-effectiveness and performance for enterprise WANs. Gartner Hype Cycle for Enterprise Networking, 2022 I&O networking leaders are being asked to deliver secure networks with automation as organizations digitally transform. Gartner Hype Cycle for Enterprise Networking, 2022 Security leaders must adopt a unified security approach to protect their assets and users in any location. Gartner Hype Cycle for Network Security, 2022 Cyberthreat Protection, Securing Infrastructure Secure Cloud Connectivity, Ensure Better User Experience Secure Hybrid Workforce, Consistent Security Security Transformation Go Back End
  • 37. 38 © Fortinet Inc. All Rights Reserved. Fabric Solution: Secure Networking Improved Business Continuity Consistent security for every edge with AI-powered security services and flexible deployment across your network for reduced risk and business interruptions Reduced TCO Simplified architecture and management with converged network and security at any scale that streamline processes and save resources Optimized User Experience Automation and AI/ML help operational efficiency and keep employees productive 300% ROI Reduction in the number of network disruptions 65% Increase in productivity of security and network teams 50% Faster Branch Setup 60% Forrester Total Economic™ Impact of Fortinet Secure SD-WAN study Go Back End
  • 38. 39 © Fortinet Inc. All Rights Reserved. Fabric Solution: Secure Networking Network Firewall Comprehensive, integrated, and automated cybersecurity solution Secure SD-WAN & 5G Transform and secure WAN, enhancing user experience and mitigating risk. Secure Wireless & Wired LAN Wi-Fi and Ethernet network equipment secured by a cybersecurity mesh Secure Access Services Edge (SASE) Cloud-delivered security and superior user experience for remote users AI-powered Security Services Counter threats in real-time with AI-powered protection natively integrated into the Fabric Go Back End
  • 40. 41 © Fortinet Inc. All Rights Reserved. Expanded Attack Surface: Digital innovation (including WFA, cloud, and supply chain)- has expanded the attack surface and cyber exposure Evolving and Evasive Attacks: Increasingly sophisticated multi-stage campaigns mimicking legitimate activities often evade security. Security Complexity: Large number of security products & consoles, slow identification and response, exacerbated by the cyber skills shortage Challenge: Security Operations Keeping pace with evolving threat landscape across an expanded attack surface Go Back End
  • 41. 42 © Fortinet Inc. All Rights Reserved. Industry Analyst Insight Market Guide for Single-Vendor SASE Published September 2022 "The #1 reason organizations believe security operations are more difficult than they were two years ago is that the threat landscape is evolving and changing rapidly." ESG. SOC Modernization and the Role of XDR, ESG Published October 2022 Threat Landscape "Rapid response of only minutes at best is required…This forces organizations to reduce the time to respond, typically by delegating more tasks to machines." Gartner TBD, January 2022 Sophisticated cyber attacks require AI-powered detection Security Complexity "Cybersecurity product consolidation is transforming security buying. 75% of organizations are currently pursuing a security vendor consolidation — only 29% did so in 2020." Gartner How SASE, XDR and Security Vendor Consolidation Are Shaping Your Security Strategy, June 2022 Increased Impact Automated Security Operations are Critical Move towards consolidated cyber security platforms Go Back End
  • 42. 43 © Fortinet Inc. All Rights Reserved. Fabric Solution: Automated SOC AI-driven coordinated protection across an expanded attack surface Integration with distributed security controls across network, endpoint, application and cloud covers the expanded digital attack surface Artificial Intelligence applied across the cyber kill chain detects components and activity designed to bypass traditional security and hide among legitimate operations Automation and Augmentation speed a comprehensive, coordinated response and ease the burden on in-house security teams -54 days Faster Mean time to Detect -20 days Faster Mean time to Contain Lower Average Breach Cost -$3.05M Ponemon. 2022 Cost of a Data Breach Survey. Use of AI and Automation. Go Back End
  • 43. 44 © Fortinet Inc. All Rights Reserved. Fabric Solution: Automated SOC AI-driven coordinated protection across an expanded attack surface Early Detection (EDR | NDR | Deception | Recon) Endpoint and other behavior-based sensors to detect and stop attacks along the kill chain SIEM/FAZ Normalized data analytics with ML to detect incidents across the attack surface SOAR Orchestration / automation for faster, synergistic response SOC Augmentation Services Specialized skills (IR), attack assessment and training supplement in-house teams AI-powered Security Services Intelligence and engines to detect and respond faster Go Back End
  • 45. 46 © Fortinet Inc. All Rights Reserved. Challenge: Securing the Application Journey Applications can live anywhere from the data center to multi-cloud to edge compute. Organizations are still dealing with aftermath of forced acceleration to cloud – amplified security risks, operational complexity, misconfigurations, and loss of visibility. Edge compute emerging to bring applications and data closer to users / devices Misconfiguration of cloud security, insecure interfaces/APIs, exfiltration of sensitive data, and unauthorized access continue to be top cloud threats Organizational preferences, processes, and/or technical requirements result in too many tools, solutions, and platforms Go Back End
  • 46. 47 © Fortinet Inc. All Rights Reserved. The Industry Agrees… “The number of data center and edge sites will increase to 3.5 million by 2024.” Gartner, Forecast Analysis: Data Center Sites, Worldwide published 13 April 2022 Data Center Lack of visibility (49%), not enough control (42%), and lack of staff resources or expertise (40%) remain to be top challenges for organizations 2022 Cloud Security Report Cybersecurity Insiders Cloud Challenges “Misconfiguration of cloud security remains the biggest cloud security risk according to 62% of cybersecurity professionals…followed by exfiltration of sensitive data (51%), unauthorized access (50%), and insecure interfaces/APIs (52%). “ 2022 Cloud Security Report Cybersecurity Insiders Cybersecurity Mesh “78% of cybersecurity professionals want a single cloud security platform for consistent security policy across all cloud environments.” 2022 Cloud Security Report Cybersecurity Insiders Cloud Threats “By 2026, adoption of edge computing applications for new use cases will represent more than 50% of the infrastructure opportunity, up from 15% in 2021.” Gartner, Emerging Tech Impact Radar: Edge Computing published 30, September 2022 76% of organizations are using two or more clouds for integration of multiple services, scalability or business continuity reasons. 2022 Cloud Security Report Cybersecurity Insiders Hybrid / Multi-clouds Edge Computing Go Back End
  • 47. 48 © Fortinet Inc. All Rights Reserved. Fabric Solution: Secure Application Journey Consistent Security Everywhere Gain consistent security and centralized visibility and management, everywhere applications live Broad Use Case Coverage Comprehensive, scalable, and flexible solutions for securing application journeys of today and tomorrow Cloud-native Security Reduced friction across clouds and simplified operations with cloud-native integrations Platforms 1 Reduction in cost Up to 50% Protected Web Applications >4200 Go Back End
  • 48. 49 © Fortinet Inc. All Rights Reserved. Fabric Solution: Secure Application Journey Hybrid Security Protect and connect networks across clouds, data centers, hybrid clouds, and edge compute Web Application & API Protection Simplify securing applications and APIs with AI/ML and automation Cloud-native Protection Reduce friction across cloud deployments with security that integrates with and works natively with cloud services Workload Protection Seamlessly protect critical workloads FortiGuard Services Real-time protection for applications and workloads no matter where they live Consistent, secured, and optimized experience to build, deploy, and run cloud applications across all cloud and hybrid deployments. Go Back End
  • 50. 51 © Fortinet Inc. All Rights Reserved. Challenge: Securing Operational Technology Most industrial control systems lack security by design and are sensitive to change. The attack surface for cyber-physical assets is expanding as a dependence on air-gap protection diminishes with Digital Transformation initiatives driving IT-OT network convergence. Increasing adoption of new technologies, such as 5G, IoT, and Cloud. Remote access requirements for third-parties and employees causing additional risks. Asset owners’ reliance on OEMs and SIs exposes critical systems to additional risks. Asset owners must comply with industry-specific regulations Go Back End
  • 51. 52 © Fortinet Inc. All Rights Reserved. IT / OT Convergence “OT environments that were traditionally separated are no longer completely isolated. They now have direct connections for business, OEMs and other third parties.” Gartner, Reduce Risk to Human Life by Implementing This OT Security Control Framework published 17 June 2021 Long Lifespan “The automation hardware in a process automation system is often capable of running 20 to 30 years.” Automation’s Life Cycle Management of Processing Automation Control Systems, published April 2021 Incidents Underreported “15% of survey respondents have experienced a security incident last year that crippled operational or mission-critical systems.” Gartner, Emerging Technologies: Critical Insights for Operational Technology Security published November 10, 2021 Compromises in IT drive ICS/OT incidents Mixing legacy and modern tech Ransomware is the highest concern The Industry Agrees… “Survey participants cite a compromise in IT allowing threats into the ICS/OT control networks as the highest-ranking threat vectors involved in control system incidents.” SANS 2022 Survey: OT/ICS Cybersecurity, published October 2022 “Technical integration of legacy and aging OT technology with modern IT systems is the biggest challenge facing securing OT technology and process.” SANS 2022 Survey: OT/ICS Cybersecurity, published October 2022 “Ransomware, extortion, or other financially motivated crimes rank as number one threat vector of concern.” SANS 2022 Survey: OT/ICS Cybersecurity, published October 2022 Go Back End
  • 52. 53 © Fortinet Inc. All Rights Reserved. Fabric Solution: Operational Technology Security Solution Secure Connectivity Digital Transformation requires secure data exfiltration from OT to Data Centers and Cloud Secure Remote Access Zero-trust access for authorized remote technicians and third-parties Converged Security Operations Synergistically manage OT and IT networks in a converged SOC. AI-powered Security Services OT Security services enable Industrial Control System security to stay ahead of evolving threats Go Back End
  • 53.
  • 54. 56 © Fortinet Inc. All Rights Reserved. 9 MAGIC QUADRANTS MARKET GUIDES #1 IN CRITICAL CAPABILITIES PEER INSIGHTS CUSTOMERS’ CHOICE RADARS MARKETSCAPES PLATFORM NAVIGATOR COMPASSES NOWTECHS WAVES GIGAOM RADAR Fortinet is one of the most validated enterprise cybersecurity companies in the world ranking in leadership positions across dozens of analyst reports highlighting the broad coverage of the Fortinet Security Fabric: • Network Security and Access Control • Wired and Wireless Access • Identity and Access Management • Email and Application Security • Hybrid Cloud Security • Endpoint Security • Early and Advanced Detection • Central Analytics and Response Workflow 33 Enterprise Analyst Reports Validate Fortinet Across Networking and Security 9 6 4 5 6 6 4 1 5 6