SlideShare a Scribd company logo
1 of 19
Fortinet
Fortinet 2022 Cloud Security Report
Fortinet 2022 Cloud Security Report
•
•
•
•
•
•
•
企业加速出海面临的挑战
互联网不是为高性能安全传输设计的
云上的工作负载越来越多,
但是对云的管理和云连接组
网能力没有跟上业务的需求
• 本地-云,云-云组网
• 云实例配置管理
工作负载
全面连接后带来了更多的安
全风险,同时地缘政治带来
的合规新需求,以及行业特
有的安全风险
• 数据安全
• 应用安全
• 网络安全
安全
开展全球业务需要触达到当
地的用户,甚至需要在当地
开设分支机构,如何在大陆
可以统管全球IT
• 远程访问
• 有线无线统一管理
• 全球加速
分支组网与远程访问
Branch
Campus OT
WFH
Agent
Agentless
Agent
Agentless
SD-WAN
加速数字化
69% 52%
随时随地办公
67%
勒索软件攻击
亟需提升的用户体验 大量不安全的接入设备 降低业务在线时间及生产力
•

 SaaS

•
• 远程工作的用户是“一个分支机构”
• 分支机构就是在同一时间同一地点的人员和设
备的集合
• 你的家庭网络就像一个人和设备争夺带宽的分
支机构
• 风电机组的边缘位置就像是物联网/OT设备的
分支机构
• 所有这些实体都需要安全访问功能
SD-WAN
亚马逊云科技 Cloud WAN
Region 1 Region 2 Region 3
VPC VPC VPC
亚马逊云科技 Cloud WAN
SD-WAN
IPSec
VPN
SSL
VPN
Transit
Gateway
FortiGate-VM
VPC VPC VPC VPC
SD-WAN
IPSec
VPN
Transit
Gateway
Remote
Users
Data
Center
Branch HQ Data
Center
DX
FortiGate-VM
Branch HQ Data
Center
DX
Remote
Users
Branch Data
Center
Cloud WAN SD-WAN
• Transit Gateway:
• Cloud WAN
•
Fortinet SD-WAN
• SD-WAN
Zenlayer POP
•
亚马逊云科技
VPC与Region连接
全球“最后一公里”
网络与计算
基础设施覆盖
全球“最后一公里”
连接覆盖;
SD-WAN组网
安全能力覆盖;
• Marketplace: FortiGate (BYOL, PAYG) Zenlayer
• Direct Connect
• Marketplace: FortiGate (BYOL, PAYG)
Fortinet与Zenlayer
产品灵活采购
Top访问源 用户数据流 带宽消耗 延迟 抖动 丢包 报表 逻辑拓扑 告警 SaaS访问
优化
01001000110100100
010
入侵检测与防御 加密流量检测
可扩展VPN IP与URL信誉
零信任访问
内容过滤
合规 秒级故障切换
VPN
Routing
Proxy
WLAN Switch
Device
Application
Location
User Content
Secure
SD-WAN& 5G
SWG
ZTNA
Network Firewall
Secure
LAN/WLAN
Fortinet
Fortinet Recognized as a Leader 2021 is
12th time included in this Magic Quadrant
Fortinet Recognized as a Leader Positioned
Highest for Ability to Execute
November 2021 Magic Quadrant™
for Network Firewalls
September 2022 Magic Quadrant™
for SD-WAN
SD-WAN与网络防火墙魔力象限双料领导者
融合管理
一个平台
Gartner Magic Quadrant for Network Firewalls, Ajpreet Kaur, Jeremy D'Hoinne, Nat Smith, Adam Hils, 1 November 2021. Gartner Magic Quadrant for WAN Edge Infrastructure, Jonathan Forest, Naresh Singh, Andrew Lerner, Evan Zeng, 20 September
2021. Gartner and Magic Quadrant are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. This graphic was published by Gartner, Inc. as part of a larger
research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Fortinet. Gartner does not endorse any vendor, product or service depicted in its research publications, and does
not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner
disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Ranked #1
Security-Sensitive Use-Case
Ranked #1
Small Branch WAN Use-Case
Ranked #1
Remote Worker Use-Case
Gartner, Magic Quadrant for WAN Edge Infrastructure, Jonathan Forest, Naresh Singh, Andrew Lerner, Evan Zeng, 20 September 2021.
“Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation.
Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with
respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Gartner and Magic Quadrant are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Fortinet.
总结
Cloud Formation Terraform
Cloud WAN EC2 Fortinet FortiGate
Zenlayer
Markeplace
基于Cloud WAN构建的
全球安全SD-WAN
AWS Graviton Ready Partner
AWS Graviton FortiGate-VM
EC2
NGFW SD-WAN Graviton2
灵活的订阅方式,并支持性价比更高的实例
PAYG BYOL ARM64/Graviton2
Marketplace
PAYG
Thank you!
岑义涛
18610598207
ycen@fortinet.com

More Related Content

What's hot

Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Joan Figueras Tugas
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security OverviewAllen Brokken
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud SecurityAlert Logic
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...TI Safe
 
The Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureThe Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureAptera Inc
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security OverviewAlert Logic
 
Azure Arc - Managing Hybrid and Multi-Cloud Platforms
Azure Arc - Managing Hybrid and Multi-Cloud PlatformsAzure Arc - Managing Hybrid and Multi-Cloud Platforms
Azure Arc - Managing Hybrid and Multi-Cloud PlatformsWinWire Technologies Inc
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability ManagementMarcelo Martins
 
Azure Site Recovery Bootcamp
Azure Site Recovery BootcampAzure Site Recovery Bootcamp
Azure Site Recovery BootcampAsaf Nakash
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to HeroKasun Rajapakse
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architectureVladimir Jirasek
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
Cloud computing seminar
Cloud computing seminarCloud computing seminar
Cloud computing seminarANKIT KUMAR
 

What's hot (20)

Crowdstrike .pptx
Crowdstrike .pptxCrowdstrike .pptx
Crowdstrike .pptx
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
 
The Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureThe Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft Azure
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Azure Arc - Managing Hybrid and Multi-Cloud Platforms
Azure Arc - Managing Hybrid and Multi-Cloud PlatformsAzure Arc - Managing Hybrid and Multi-Cloud Platforms
Azure Arc - Managing Hybrid and Multi-Cloud Platforms
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability Management
 
Azure Site Recovery Bootcamp
Azure Site Recovery BootcampAzure Site Recovery Bootcamp
Azure Site Recovery Bootcamp
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to Hero
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Cloud computing seminar
Cloud computing seminarCloud computing seminar
Cloud computing seminar
 

Similar to Fortinet 2022 Cloud Security Report Highlights Challenges of Securing Cloud Workloads

Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...Open Networking Summits
 
Market Guide for Zero Trust Network AccessPublished 29 Apri.docx
Market Guide for Zero Trust Network AccessPublished 29 Apri.docxMarket Guide for Zero Trust Network AccessPublished 29 Apri.docx
Market Guide for Zero Trust Network AccessPublished 29 Apri.docxendawalling
 
Market Guide for Zero Trust Network AccessPublished 29 Apri.docx
Market Guide for Zero Trust Network AccessPublished 29 Apri.docxMarket Guide for Zero Trust Network AccessPublished 29 Apri.docx
Market Guide for Zero Trust Network AccessPublished 29 Apri.docxalfredacavx97
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecurity Gen
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecurity Gen
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...SecurityGen1
 
Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...
Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...
Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...CA API Management
 
Leaders of Gartner Magic Quadrant 2014 for Secure Web Gateways
Leaders of Gartner Magic Quadrant 2014 for Secure Web GatewaysLeaders of Gartner Magic Quadrant 2014 for Secure Web Gateways
Leaders of Gartner Magic Quadrant 2014 for Secure Web GatewaysTarek Nader
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edgeitnewsafrica
 
Hr. David Simon (Juniper Networks, Inc.)
Hr. David Simon (Juniper Networks, Inc.)Hr. David Simon (Juniper Networks, Inc.)
Hr. David Simon (Juniper Networks, Inc.)Praxistage
 
Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?Elasticsearch
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to RealityPriyanka Aash
 
The Top Strategic Technology Trends for 2021.pdf
The Top Strategic Technology Trends for 2021.pdfThe Top Strategic Technology Trends for 2021.pdf
The Top Strategic Technology Trends for 2021.pdfAydinAdrianBahar1
 
Orchestration in Action
Orchestration in ActionOrchestration in Action
Orchestration in ActionEricsson
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT SpendingKokLeong Ong
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalWendy Murphy
 
Summary : 5G adoption plans
Summary : 5G adoption plansSummary : 5G adoption plans
Summary : 5G adoption plansTuan Anh Nguyen
 

Similar to Fortinet 2022 Cloud Security Report Highlights Challenges of Securing Cloud Workloads (20)

Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...
 
Market Guide for Zero Trust Network AccessPublished 29 Apri.docx
Market Guide for Zero Trust Network AccessPublished 29 Apri.docxMarket Guide for Zero Trust Network AccessPublished 29 Apri.docx
Market Guide for Zero Trust Network AccessPublished 29 Apri.docx
 
Market Guide for Zero Trust Network AccessPublished 29 Apri.docx
Market Guide for Zero Trust Network AccessPublished 29 Apri.docxMarket Guide for Zero Trust Network AccessPublished 29 Apri.docx
Market Guide for Zero Trust Network AccessPublished 29 Apri.docx
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
 
Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...
Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...
Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile...
 
Leaders of Gartner Magic Quadrant 2014 for Secure Web Gateways
Leaders of Gartner Magic Quadrant 2014 for Secure Web GatewaysLeaders of Gartner Magic Quadrant 2014 for Secure Web Gateways
Leaders of Gartner Magic Quadrant 2014 for Secure Web Gateways
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edge
 
Vz scrubbed sample_2
Vz scrubbed sample_2Vz scrubbed sample_2
Vz scrubbed sample_2
 
Hr. David Simon (Juniper Networks, Inc.)
Hr. David Simon (Juniper Networks, Inc.)Hr. David Simon (Juniper Networks, Inc.)
Hr. David Simon (Juniper Networks, Inc.)
 
Fortinet_for_SAP
Fortinet_for_SAPFortinet_for_SAP
Fortinet_for_SAP
 
Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
 
The Top Strategic Technology Trends for 2021.pdf
The Top Strategic Technology Trends for 2021.pdfThe Top Strategic Technology Trends for 2021.pdf
The Top Strategic Technology Trends for 2021.pdf
 
Orchestration in Action
Orchestration in ActionOrchestration in Action
Orchestration in Action
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT Spending
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
Summary : 5G adoption plans
Summary : 5G adoption plansSummary : 5G adoption plans
Summary : 5G adoption plans
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 

Fortinet 2022 Cloud Security Report Highlights Challenges of Securing Cloud Workloads

  • 2. Fortinet 2022 Cloud Security Report
  • 3. Fortinet 2022 Cloud Security Report • • • • • • •
  • 4. 企业加速出海面临的挑战 互联网不是为高性能安全传输设计的 云上的工作负载越来越多, 但是对云的管理和云连接组 网能力没有跟上业务的需求 • 本地-云,云-云组网 • 云实例配置管理 工作负载 全面连接后带来了更多的安 全风险,同时地缘政治带来 的合规新需求,以及行业特 有的安全风险 • 数据安全 • 应用安全 • 网络安全 安全 开展全球业务需要触达到当 地的用户,甚至需要在当地 开设分支机构,如何在大陆 可以统管全球IT • 远程访问 • 有线无线统一管理 • 全球加速 分支组网与远程访问
  • 7. •   SaaS  • • 远程工作的用户是“一个分支机构” • 分支机构就是在同一时间同一地点的人员和设 备的集合 • 你的家庭网络就像一个人和设备争夺带宽的分 支机构 • 风电机组的边缘位置就像是物联网/OT设备的 分支机构 • 所有这些实体都需要安全访问功能 SD-WAN
  • 8.
  • 10. Region 1 Region 2 Region 3 VPC VPC VPC 亚马逊云科技 Cloud WAN SD-WAN IPSec VPN SSL VPN Transit Gateway FortiGate-VM VPC VPC VPC VPC SD-WAN IPSec VPN Transit Gateway Remote Users Data Center Branch HQ Data Center DX FortiGate-VM Branch HQ Data Center DX Remote Users Branch Data Center Cloud WAN SD-WAN
  • 11.
  • 12. • Transit Gateway: • Cloud WAN • Fortinet SD-WAN • SD-WAN Zenlayer POP • 亚马逊云科技 VPC与Region连接 全球“最后一公里” 网络与计算 基础设施覆盖 全球“最后一公里” 连接覆盖; SD-WAN组网 安全能力覆盖; • Marketplace: FortiGate (BYOL, PAYG) Zenlayer • Direct Connect • Marketplace: FortiGate (BYOL, PAYG) Fortinet与Zenlayer 产品灵活采购
  • 13. Top访问源 用户数据流 带宽消耗 延迟 抖动 丢包 报表 逻辑拓扑 告警 SaaS访问 优化 01001000110100100 010 入侵检测与防御 加密流量检测 可扩展VPN IP与URL信誉 零信任访问 内容过滤 合规 秒级故障切换
  • 14. VPN Routing Proxy WLAN Switch Device Application Location User Content Secure SD-WAN& 5G SWG ZTNA Network Firewall Secure LAN/WLAN Fortinet
  • 15. Fortinet Recognized as a Leader 2021 is 12th time included in this Magic Quadrant Fortinet Recognized as a Leader Positioned Highest for Ability to Execute November 2021 Magic Quadrant™ for Network Firewalls September 2022 Magic Quadrant™ for SD-WAN SD-WAN与网络防火墙魔力象限双料领导者 融合管理 一个平台 Gartner Magic Quadrant for Network Firewalls, Ajpreet Kaur, Jeremy D'Hoinne, Nat Smith, Adam Hils, 1 November 2021. Gartner Magic Quadrant for WAN Edge Infrastructure, Jonathan Forest, Naresh Singh, Andrew Lerner, Evan Zeng, 20 September 2021. Gartner and Magic Quadrant are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Fortinet. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
  • 16. Ranked #1 Security-Sensitive Use-Case Ranked #1 Small Branch WAN Use-Case Ranked #1 Remote Worker Use-Case Gartner, Magic Quadrant for WAN Edge Infrastructure, Jonathan Forest, Naresh Singh, Andrew Lerner, Evan Zeng, 20 September 2021. “Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Gartner and Magic Quadrant are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Fortinet.
  • 17. 总结 Cloud Formation Terraform Cloud WAN EC2 Fortinet FortiGate Zenlayer Markeplace 基于Cloud WAN构建的 全球安全SD-WAN
  • 18. AWS Graviton Ready Partner AWS Graviton FortiGate-VM EC2 NGFW SD-WAN Graviton2 灵活的订阅方式,并支持性价比更高的实例 PAYG BYOL ARM64/Graviton2 Marketplace PAYG

Editor's Notes

  1. 69% of boards responded to post COVID-19 with digital business acceleration.” Top Priorities for IT: Leadership Vision for 2021; Gartner “The shift to remote work is expected to persist even after the pandemic. 52% of CIOs expect work from home to increase in 2021.” Top Priorities for IT: Leadership Vision for 2021; Gartner “67% of organizations reported having been a ransomware target, half more than once. Ransomware is shifting to aggressive tactics including destructive system wipers, raising the level of risk. Volume is up roughly 11x.” Global Ransomware Survey 2021 / FortiGuard Threat Landscape Report.1H21
  2. John
  3. Recognized As a Leader in the 2021 Gartner® Magic Quadrants™ for Network Firewalls and WAN Edge Infrastructure Convergence of Security and Networking Using Common OS, and Management