SlideShare a Scribd company logo
1 of 37
© Copyright Fortinet Inc. All rights reserved.
SD-WAN Introduction
2
CONFIDENTIAL
Agenda
 SD-WAN Introduction
 Used Cases
 Competitive
 Customer Stories
 Discussion
SD-WAN Introduction
4
CONFIDENTIAL
SDN vs SD-WAN
5
CONFIDENTIAL
Forecasts
The benefits of SD-WAN include cost-effective delivery of business applications, meeting the
evolving operational requirements of the modern branch/remote site, optimizing software-as-a-
service (SaaS) and cloud-based services such as UC&C, and improving branch-IT efficiency through
automation. These benefits have resonated across the spectrum of enterprise IT and service
providers alike, ensuring a broad-based uptake for this new paradigm in WAN architectures.
https://www.idc.com/getdoc.jsp?containerId=prUS42925117
6
CONFIDENTIAL
Traditional MPLS vs SDWAN - Comparative
MPLS
Average delivery time
Performance
Resilience
Tools/Reporting
Difficulty to install
Link Estimated Cost 10Mb – $700/month
3x 30Mbps (3 ISP Providers)
90Mbps – $100,00/month
45 days
3 days
Medium
High
Low
High
SNMP, ICMP
Netflow Based, Orchestrators, Solution
Controllers, Advanced Application Reporting
BGP, OSPF, BFD, QoS (CBWFQ, PQ)
Architecture...
And convergence does not always work!
(Complex Routing, Asymmetry)
No tools for application traffic analysis
ZTD, Probes, Visibility, SLA,
Alarm, Graphs, GUI,
Easy convergence
7
CONFIDENTIAL
SD-WAN Delivers Instant ROI Benefits
Traditional WAN vs Secure SD-WAN
WAN Circuit Cost Total Bandwidth Cloud App Perf Security & Compliance TCO
50% to 70%
OpEx Savings
Reduce
Complexity
5x better Cloud
App Performance
8
CONFIDENTIAL
What Today’s Customers are looking for
 I need to turn up locations quickly
» Temporary pop-up retail locations
» Time to provision Leased Lines / MPLS too high
» Reduce the on-prem footprint (power, space)
» Global supply chain
 I need scalability and resilience in the move
to the cloud
» Prioritize my business critical apps in the cloud (local
breakout)
» Back up for my MPLS (IPSec Overlay)
» Use cheaper, high-bandwidth public internet circuits
» Maintain same User Experience
 Whatever the solution, it needs to be easy
to manage
» Zero touch provisioning
» Central management
Security?
9
CONFIDENTIAL
Enterprise Branch Going Through Evolution
70%
Of customers mentioned
existing WAN is brittle, slow,
expensive and not effective
for cloud adoption2 due to
back-haul
62
Average number of
cloud applications
shows rapid growth of
SaaS and IaaS3
DX Transformation Inefficient Traditional WAN Security is “MUST”
90%
Of SD-WAN vendors do
no provide security. With
direct internet access,
security becomes critical
at every branch
Today’s Enterprise Branch WAN traffic is back-hauled to data-center which
degrades SaaS Applications Performance
10
Key capabilities of SD-WAN
A lightweight
replacement for
traditional WAN routers.
Dynamically distributes
traffic across multiple WAN
connections
Secure Direct Internet
Connectivity
Dramatically simplifies
traditional WAN complexity
SD-WAN Functionality
Simplicity
11
Race to Secure SD-WAN
WAN Optimization
Security Vendors
Pure-play
Secure
SD-WAN
$6B Market
Network & Wireless Vendors
12
CONFIDENTIAL
Four architectures to secure SD-WAN by Gartner
MPLS
Internet
SD-WAN with Embedded Firewall Firewall with Embedded SD-WAN
SD-WAN with 3rd-Party NG Firewall SD-WAN with Cloud-Based Security
Enterprise
Branch
MPLS
Internet
Enterprise
Branch
MPLS
Internet
Enterprise
Branch
+
MPLS
Internet
Enterprise
Branch
13
CONFIDENTIAL
FortiGate Next Generation Firewalls with Integrated SD-WAN
+ + + + + + + +
SD-WAN
NGFW
Secure SD-WAN
Scalable and Easy to Deploy
SD-WAN App
Control
Intrusion
Prevention
Antivirus URL
Filtering
Sandboxing SSL Inspection
Traffic
Shaping
VPN
SD-WAN requires direct internet access which requires better security at every branch
90% of the SD-WAN vendors only offer stateful firewalls which is not enough
Unprecedented Integration and visibility
14
CONFIDENTIAL
FOS 6.0 - Enable Best of Breed SD-WAN
Visibility into 3000+
applications
Application-level
transaction for better
SLA
Dynamic WAN link
selection using SLA
strategies
Automated fail-over
capabilities
High-level monitoring of
SD-WAN devices on a
map
Detailed application
monitoring
Application
Aware
Multi-Path
Intelligence
Simplified
Monitoring
Certified
Security
Multi
Broadband
Supported
Transport independent
with support for
Ethernet, 3G/4G
Aggregate multiple
interfaces into single
SD-WAN interface
Most Certified Security
such as NSS Labs
High Performance
powered by Security
Processor technology
15
CONFIDENTIAL
Control Application Performance using Strategized SLA
TOP
CRITICAL
HIGH
MEDIUM
LOW
Best Quality
Minimum
Quality
16
CONFIDENTIAL
Performance SLA (For high priority applications)
Application-Level
Transaction
Latency < 200ms
Latency < 100ms
AND
Packet Loss < 1%
AND
Jitter < 30ms
Multiple
Measurement
Techniques
 Ping
 HTTP
 TCP Echo
 UDP Echo
 TWAMP
Failover
Parameters
Check Interval
Success before restore
Failure before inactive
17
CONFIDENTIAL
Fortinet Secure SD-WAN Architecture
FortiOS
Security & SD-WAN
Enforcement
FortiCloud
AutoDeploy
FortiManager
Security & SD-WAN
Controller/Manager
North-bound
APIs
18
CONFIDENTIAL
FortiOS Secure SD-WAN
Management & Visibility – Zero Touch Provisioning
CONNECT
Connect Device
CONTACT
Contact made with
FortiDeploy
service within FortiCloud
CONFIGURE
Full Device Configuration
from FortiManager
FORTIMANAGER
BRANCH OFFICE
FORTICLOUD
FORTIDEPLOY
1
2
3
19
CONFIDENTIAL
FortiOS Secure SD-WAN
Traffic Shaping
 Traffic Shaping
» Pre-configured Traffic Shapers
» L7 Analysis for QoS rules based on
Users, Apps, URLs…
» Use App Classification to control,
bandwidth reservation, limitation,
Diffserv marking and prioritization
20
CONFIDENTIAL
FortiManager - Single Pane of Glass Management
 VPN Visibility and Management on FMG
 NOC Dashboard and simple central
monitoring
 Zero-Touch deployment with FortiDeploy
21
CONFIDENTIAL
FortiOS Secure SD-WAN
Management & Visibility – FortiManager
SD-WAN Use Cases
23
CONFIDENTIAL
Enterprise SD-WAN Use Cases
Internet SaaS – Application Aware + Path Awareness Intelligence
Internet
ISP-B
Internet
ISP-A
Critical Apps
Best path is chosen depending
on latency, jitter & packet loss
Critical Apps
Redirected to a new link in case the
WAN conditions are better than the
threshold
Office
Not Business App
Less priority. QoS
24
CONFIDENTIAL
Enterprise SD-WAN Use Cases
MPLS backup with local breakout
MPLS
Branch
HQ
MPLS Dependency
Inflexible, expensive, good
QoS
Critical Apps & Secure access
Redundant path through IPSec
VPN
Direct secure access to Internet,
SaaS and IaaS content
NGFW + SSL Inspection
Internet
25
CONFIDENTIAL
Enterprise SD-WAN Use Cases
MPLS replacement
Branch
HQ
Critical Apps
Best path is chosen depending
on latency, jitter & packet loss
Critical Apps & Secure access
Redundant path through IPSec
VPN
Internet
Internet
Direct secure access to Internet,
SaaS and IaaS content
Load balanced across different
lines so bandwidth is optimized.
26
CONFIDENTIAL
Enterprise SD-WAN Use Cases
Centralized Internet Management
Retail
Retail
MPLS
Internet
Internet
Internet
Internet
Internet
Central Traffic Management
Route all the traffic through HQ
HQ
Secure access to Internet, SaaS
and IaaS content
NGFW + SSL Inspection – Load
balance if needed.
27
CONFIDENTIAL
ISP SD-WAN Use Cases
Redundant Internet access through Branch
MPLS
Internet
MPLS
Internet
Branch
Branch
Data Center
Health-Check
Link Fail Detected
Health-Check
Link Fail Detected
Intelligent Path
Selection
28
CONFIDENTIAL
Enterprise SD-WAN Use Cases
Redundant Public Cloud access
Branch
Internet
MPLS
Public Cloud
Internet
Health-Check
Link Fail Detected
Redundant Access
Traffic through HQ
HQ
Dynamic
Routing
Competitive
30
CONFIDENTIAL
Gartner Recognize Fortinet Secure SD-WAN
 By year-end 2018, more than 50% of WAN edge
infrastructure refresh initiatives will be based
on SD-WAN software/appliances versus
traditional routers (up from less than 5% today)
 SD-WAN products now incorporate internet
perimeter security, but more than 90% of SD-
WAN vendors are not traditional security
vendors, which causes clients to question
whether they can rely on embedded security
alone.
“Fortinet has a strong and focused
SD-WAN Strategy”
10th December 2017
“Fortinet has enhanced their
firewalls and integrated advanced
SD-WAN requirements ”
6th October 2017
31
CONFIDENTIAL
Take Advantage Today
SD-WAN Ready
Proven NGFW
 FortiGate provides best of breed SD-WAN features in base platform
 Make your branch application aware with our WAN Path Controller
 Consistent application performance with automated fail-over
 90% of SD-WAN vendors do not offer NGFW security
 Fortinet is the industry leader in Security Effectiveness and Performance
 Simple to manage integrated NGFW And SD-WAN in single offering
SD WAN
NGFW
32
“NSS Labs, Inc. is recognized globally as the most trusted source for
independent, fact-based cybersecurity guidance. Our mission is to
advance transparency and accountability within the cybersecurity industry.
We empower enterprises by providing them with timely, relevant information
on which to base their decisions.
Our unmatched foundation in security testing, along with our extensive
research and global threat analysis capabilities, provide the basis for our
CAWS Continuous Security Validation Platform. CAWS measures the ongoing
effectiveness of security controls, providing a real-time score card to help
business leaders substantiate their security investments.”
NSS Labs
33
Recommended by NSS labs
 Fortinet is the only vendor with Security Capabilities to Receive
SD-WAN Recommended Rating in the First NSS Labs Software-
Defined Wide Area Networking Test Report
 Highest quality of experience for VoIP
(4.38 out of 4.41)
 Lowest total cost of ownership (TCO)
$5@749Mbps
 Native NGFW Security
Blocked 100% Evasions
34
Vendor Video
Quality
(4.53)
VoIP
Quality
(4.41)
Value
(cost/Mbps)
Fortinet 4.26 4.38 $5
VMware 4.21 4.27 $97
Talari
Networks
4.47 4.37 $197
SD-WAN Test Report, August 2018
Customer Stories
36
Global Adoption of Fortinet Secure SD-WAN
 10,000+ Branches
 Zero touch deployment
 $10,000,000 deal
Fortune 500
Financial
Institute
 100+ distributed global call
centers
 Achieve no voice call drop
off while reduce WAN OpEx
 $4,500,000 deal
INTERNATIONAL
CALL CENTER
COMPANY
 140 locations
 MPLS replacement
 QoS functionality with
Performance SLAs
 $2,800,000 deal
LARGE
AUTOMOTIVE
SUPPLIER
 1500 branches
 DX to the branch
 IoT & Security
 $3,000,000 deal
LARGE
SUPERMARKET
CHAINE
SDWAN Introduction presentation & Public Speaking

More Related Content

Similar to SDWAN Introduction presentation & Public Speaking

CenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily PechalCenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily PechalEmily Pechal
 
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...DATA SECURITY SOLUTIONS
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanDATA SECURITY SOLUTIONS
 
Barracuda ng firewall
Barracuda ng firewallBarracuda ng firewall
Barracuda ng firewallKappa Data
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksArticulate Marketing
 
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloudMaximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloudVeloCloud Networks, Inc.
 
PLNOG 22 - Denis Zotov - SD-WAN - typowe i nietypowe zastosowania
PLNOG 22 - Denis Zotov - SD-WAN - typowe i nietypowe zastosowaniaPLNOG 22 - Denis Zotov - SD-WAN - typowe i nietypowe zastosowania
PLNOG 22 - Denis Zotov - SD-WAN - typowe i nietypowe zastosowaniaPROIDEA
 
Visualizing Application & Delivery Flows to Make Data-Driven Decisions
Visualizing Application & Delivery Flows to Make Data-Driven DecisionsVisualizing Application & Delivery Flows to Make Data-Driven Decisions
Visualizing Application & Delivery Flows to Make Data-Driven DecisionsCA Technologies
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkNetpluz Asia Pte Ltd
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
 
Cascade 10.5: Visibility & Control
Cascade 10.5: Visibility & ControlCascade 10.5: Visibility & Control
Cascade 10.5: Visibility & ControlRiverbed Technology
 
Under the Hood of Cloud-Delivered SD-WAN - VeloCloud
Under the Hood of Cloud-Delivered SD-WAN - VeloCloudUnder the Hood of Cloud-Delivered SD-WAN - VeloCloud
Under the Hood of Cloud-Delivered SD-WAN - VeloCloudVeloCloud Networks, Inc.
 
SD-WAN PROTOCOLS
SD-WAN PROTOCOLSSD-WAN PROTOCOLS
SD-WAN PROTOCOLSbilal anjum
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayCisco Canada
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANRobb Boyd
 
SD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WANSD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WANADVA
 
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17Scott Logan
 

Similar to SDWAN Introduction presentation & Public Speaking (20)

CenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily PechalCenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily Pechal
 
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
Barracuda ng firewall
Barracuda ng firewallBarracuda ng firewall
Barracuda ng firewall
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
 
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloudMaximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
 
SDWAN.pdf
SDWAN.pdfSDWAN.pdf
SDWAN.pdf
 
PLNOG 22 - Denis Zotov - SD-WAN - typowe i nietypowe zastosowania
PLNOG 22 - Denis Zotov - SD-WAN - typowe i nietypowe zastosowaniaPLNOG 22 - Denis Zotov - SD-WAN - typowe i nietypowe zastosowania
PLNOG 22 - Denis Zotov - SD-WAN - typowe i nietypowe zastosowania
 
Visualizing Application & Delivery Flows to Make Data-Driven Decisions
Visualizing Application & Delivery Flows to Make Data-Driven DecisionsVisualizing Application & Delivery Flows to Make Data-Driven Decisions
Visualizing Application & Delivery Flows to Make Data-Driven Decisions
 
SD-WAN
SD-WANSD-WAN
SD-WAN
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business network
 
SD-WAN iFLX-Brochure
SD-WAN iFLX-BrochureSD-WAN iFLX-Brochure
SD-WAN iFLX-Brochure
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
Cascade 10.5: Visibility & Control
Cascade 10.5: Visibility & ControlCascade 10.5: Visibility & Control
Cascade 10.5: Visibility & Control
 
Under the Hood of Cloud-Delivered SD-WAN - VeloCloud
Under the Hood of Cloud-Delivered SD-WAN - VeloCloudUnder the Hood of Cloud-Delivered SD-WAN - VeloCloud
Under the Hood of Cloud-Delivered SD-WAN - VeloCloud
 
SD-WAN PROTOCOLS
SD-WAN PROTOCOLSSD-WAN PROTOCOLS
SD-WAN PROTOCOLS
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
SD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WANSD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WAN
 
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
 

Recently uploaded

Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20rejz122017
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.thamaeteboho94
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...ZurliaSoop
 
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNtntlai16
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityHung Le
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathphntsoaki
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxthusosetemere
 
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiCall Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiPriya Reddy
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESfuthumetsaneliswa
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfMahamudul Hasan
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...David Celestin
 
Lions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptxLions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptxlionnarsimharajumjf
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 

Recently uploaded (20)

Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth death
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
 
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiCall Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
Lions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptxLions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptx
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 

SDWAN Introduction presentation & Public Speaking

  • 1. © Copyright Fortinet Inc. All rights reserved. SD-WAN Introduction
  • 2. 2 CONFIDENTIAL Agenda  SD-WAN Introduction  Used Cases  Competitive  Customer Stories  Discussion
  • 5. 5 CONFIDENTIAL Forecasts The benefits of SD-WAN include cost-effective delivery of business applications, meeting the evolving operational requirements of the modern branch/remote site, optimizing software-as-a- service (SaaS) and cloud-based services such as UC&C, and improving branch-IT efficiency through automation. These benefits have resonated across the spectrum of enterprise IT and service providers alike, ensuring a broad-based uptake for this new paradigm in WAN architectures. https://www.idc.com/getdoc.jsp?containerId=prUS42925117
  • 6. 6 CONFIDENTIAL Traditional MPLS vs SDWAN - Comparative MPLS Average delivery time Performance Resilience Tools/Reporting Difficulty to install Link Estimated Cost 10Mb – $700/month 3x 30Mbps (3 ISP Providers) 90Mbps – $100,00/month 45 days 3 days Medium High Low High SNMP, ICMP Netflow Based, Orchestrators, Solution Controllers, Advanced Application Reporting BGP, OSPF, BFD, QoS (CBWFQ, PQ) Architecture... And convergence does not always work! (Complex Routing, Asymmetry) No tools for application traffic analysis ZTD, Probes, Visibility, SLA, Alarm, Graphs, GUI, Easy convergence
  • 7. 7 CONFIDENTIAL SD-WAN Delivers Instant ROI Benefits Traditional WAN vs Secure SD-WAN WAN Circuit Cost Total Bandwidth Cloud App Perf Security & Compliance TCO 50% to 70% OpEx Savings Reduce Complexity 5x better Cloud App Performance
  • 8. 8 CONFIDENTIAL What Today’s Customers are looking for  I need to turn up locations quickly » Temporary pop-up retail locations » Time to provision Leased Lines / MPLS too high » Reduce the on-prem footprint (power, space) » Global supply chain  I need scalability and resilience in the move to the cloud » Prioritize my business critical apps in the cloud (local breakout) » Back up for my MPLS (IPSec Overlay) » Use cheaper, high-bandwidth public internet circuits » Maintain same User Experience  Whatever the solution, it needs to be easy to manage » Zero touch provisioning » Central management Security?
  • 9. 9 CONFIDENTIAL Enterprise Branch Going Through Evolution 70% Of customers mentioned existing WAN is brittle, slow, expensive and not effective for cloud adoption2 due to back-haul 62 Average number of cloud applications shows rapid growth of SaaS and IaaS3 DX Transformation Inefficient Traditional WAN Security is “MUST” 90% Of SD-WAN vendors do no provide security. With direct internet access, security becomes critical at every branch Today’s Enterprise Branch WAN traffic is back-hauled to data-center which degrades SaaS Applications Performance
  • 10. 10 Key capabilities of SD-WAN A lightweight replacement for traditional WAN routers. Dynamically distributes traffic across multiple WAN connections Secure Direct Internet Connectivity Dramatically simplifies traditional WAN complexity SD-WAN Functionality Simplicity
  • 11. 11 Race to Secure SD-WAN WAN Optimization Security Vendors Pure-play Secure SD-WAN $6B Market Network & Wireless Vendors
  • 12. 12 CONFIDENTIAL Four architectures to secure SD-WAN by Gartner MPLS Internet SD-WAN with Embedded Firewall Firewall with Embedded SD-WAN SD-WAN with 3rd-Party NG Firewall SD-WAN with Cloud-Based Security Enterprise Branch MPLS Internet Enterprise Branch MPLS Internet Enterprise Branch + MPLS Internet Enterprise Branch
  • 13. 13 CONFIDENTIAL FortiGate Next Generation Firewalls with Integrated SD-WAN + + + + + + + + SD-WAN NGFW Secure SD-WAN Scalable and Easy to Deploy SD-WAN App Control Intrusion Prevention Antivirus URL Filtering Sandboxing SSL Inspection Traffic Shaping VPN SD-WAN requires direct internet access which requires better security at every branch 90% of the SD-WAN vendors only offer stateful firewalls which is not enough Unprecedented Integration and visibility
  • 14. 14 CONFIDENTIAL FOS 6.0 - Enable Best of Breed SD-WAN Visibility into 3000+ applications Application-level transaction for better SLA Dynamic WAN link selection using SLA strategies Automated fail-over capabilities High-level monitoring of SD-WAN devices on a map Detailed application monitoring Application Aware Multi-Path Intelligence Simplified Monitoring Certified Security Multi Broadband Supported Transport independent with support for Ethernet, 3G/4G Aggregate multiple interfaces into single SD-WAN interface Most Certified Security such as NSS Labs High Performance powered by Security Processor technology
  • 15. 15 CONFIDENTIAL Control Application Performance using Strategized SLA TOP CRITICAL HIGH MEDIUM LOW Best Quality Minimum Quality
  • 16. 16 CONFIDENTIAL Performance SLA (For high priority applications) Application-Level Transaction Latency < 200ms Latency < 100ms AND Packet Loss < 1% AND Jitter < 30ms Multiple Measurement Techniques  Ping  HTTP  TCP Echo  UDP Echo  TWAMP Failover Parameters Check Interval Success before restore Failure before inactive
  • 17. 17 CONFIDENTIAL Fortinet Secure SD-WAN Architecture FortiOS Security & SD-WAN Enforcement FortiCloud AutoDeploy FortiManager Security & SD-WAN Controller/Manager North-bound APIs
  • 18. 18 CONFIDENTIAL FortiOS Secure SD-WAN Management & Visibility – Zero Touch Provisioning CONNECT Connect Device CONTACT Contact made with FortiDeploy service within FortiCloud CONFIGURE Full Device Configuration from FortiManager FORTIMANAGER BRANCH OFFICE FORTICLOUD FORTIDEPLOY 1 2 3
  • 19. 19 CONFIDENTIAL FortiOS Secure SD-WAN Traffic Shaping  Traffic Shaping » Pre-configured Traffic Shapers » L7 Analysis for QoS rules based on Users, Apps, URLs… » Use App Classification to control, bandwidth reservation, limitation, Diffserv marking and prioritization
  • 20. 20 CONFIDENTIAL FortiManager - Single Pane of Glass Management  VPN Visibility and Management on FMG  NOC Dashboard and simple central monitoring  Zero-Touch deployment with FortiDeploy
  • 21. 21 CONFIDENTIAL FortiOS Secure SD-WAN Management & Visibility – FortiManager
  • 23. 23 CONFIDENTIAL Enterprise SD-WAN Use Cases Internet SaaS – Application Aware + Path Awareness Intelligence Internet ISP-B Internet ISP-A Critical Apps Best path is chosen depending on latency, jitter & packet loss Critical Apps Redirected to a new link in case the WAN conditions are better than the threshold Office Not Business App Less priority. QoS
  • 24. 24 CONFIDENTIAL Enterprise SD-WAN Use Cases MPLS backup with local breakout MPLS Branch HQ MPLS Dependency Inflexible, expensive, good QoS Critical Apps & Secure access Redundant path through IPSec VPN Direct secure access to Internet, SaaS and IaaS content NGFW + SSL Inspection Internet
  • 25. 25 CONFIDENTIAL Enterprise SD-WAN Use Cases MPLS replacement Branch HQ Critical Apps Best path is chosen depending on latency, jitter & packet loss Critical Apps & Secure access Redundant path through IPSec VPN Internet Internet Direct secure access to Internet, SaaS and IaaS content Load balanced across different lines so bandwidth is optimized.
  • 26. 26 CONFIDENTIAL Enterprise SD-WAN Use Cases Centralized Internet Management Retail Retail MPLS Internet Internet Internet Internet Internet Central Traffic Management Route all the traffic through HQ HQ Secure access to Internet, SaaS and IaaS content NGFW + SSL Inspection – Load balance if needed.
  • 27. 27 CONFIDENTIAL ISP SD-WAN Use Cases Redundant Internet access through Branch MPLS Internet MPLS Internet Branch Branch Data Center Health-Check Link Fail Detected Health-Check Link Fail Detected Intelligent Path Selection
  • 28. 28 CONFIDENTIAL Enterprise SD-WAN Use Cases Redundant Public Cloud access Branch Internet MPLS Public Cloud Internet Health-Check Link Fail Detected Redundant Access Traffic through HQ HQ Dynamic Routing
  • 30. 30 CONFIDENTIAL Gartner Recognize Fortinet Secure SD-WAN  By year-end 2018, more than 50% of WAN edge infrastructure refresh initiatives will be based on SD-WAN software/appliances versus traditional routers (up from less than 5% today)  SD-WAN products now incorporate internet perimeter security, but more than 90% of SD- WAN vendors are not traditional security vendors, which causes clients to question whether they can rely on embedded security alone. “Fortinet has a strong and focused SD-WAN Strategy” 10th December 2017 “Fortinet has enhanced their firewalls and integrated advanced SD-WAN requirements ” 6th October 2017
  • 31. 31 CONFIDENTIAL Take Advantage Today SD-WAN Ready Proven NGFW  FortiGate provides best of breed SD-WAN features in base platform  Make your branch application aware with our WAN Path Controller  Consistent application performance with automated fail-over  90% of SD-WAN vendors do not offer NGFW security  Fortinet is the industry leader in Security Effectiveness and Performance  Simple to manage integrated NGFW And SD-WAN in single offering SD WAN NGFW
  • 32. 32 “NSS Labs, Inc. is recognized globally as the most trusted source for independent, fact-based cybersecurity guidance. Our mission is to advance transparency and accountability within the cybersecurity industry. We empower enterprises by providing them with timely, relevant information on which to base their decisions. Our unmatched foundation in security testing, along with our extensive research and global threat analysis capabilities, provide the basis for our CAWS Continuous Security Validation Platform. CAWS measures the ongoing effectiveness of security controls, providing a real-time score card to help business leaders substantiate their security investments.” NSS Labs
  • 33. 33 Recommended by NSS labs  Fortinet is the only vendor with Security Capabilities to Receive SD-WAN Recommended Rating in the First NSS Labs Software- Defined Wide Area Networking Test Report  Highest quality of experience for VoIP (4.38 out of 4.41)  Lowest total cost of ownership (TCO) $5@749Mbps  Native NGFW Security Blocked 100% Evasions
  • 34. 34 Vendor Video Quality (4.53) VoIP Quality (4.41) Value (cost/Mbps) Fortinet 4.26 4.38 $5 VMware 4.21 4.27 $97 Talari Networks 4.47 4.37 $197 SD-WAN Test Report, August 2018
  • 36. 36 Global Adoption of Fortinet Secure SD-WAN  10,000+ Branches  Zero touch deployment  $10,000,000 deal Fortune 500 Financial Institute  100+ distributed global call centers  Achieve no voice call drop off while reduce WAN OpEx  $4,500,000 deal INTERNATIONAL CALL CENTER COMPANY  140 locations  MPLS replacement  QoS functionality with Performance SLAs  $2,800,000 deal LARGE AUTOMOTIVE SUPPLIER  1500 branches  DX to the branch  IoT & Security  $3,000,000 deal LARGE SUPERMARKET CHAINE