Emea Corporate Presentation 0709 Lin

1,095 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,095
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Emea Corporate Presentation 0709 Lin

  1. 1. Fortinet Corporate Presentation Joe Sarno Country Manager - Fortinet
  2. 2. Agenda Fortinet at a Glance Security Market Dynamics Industry Recognition Fortinet Solutions
  3. 3. Fortinet Overview <ul><li>Company Stats </li></ul><ul><li>Founded in 2000 </li></ul><ul><li>Silicon Valley-based, strong global presence with 30+ offices worldwide </li></ul><ul><li>Seasoned and proven executive management team </li></ul><ul><li>1,100+ employees / 700+ engineers </li></ul><ul><li>425,000+ FortiGate devices shipped worldwide </li></ul><ul><li>Innovative, Best-in-Class Technologies and Products </li></ul><ul><li>Six ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam) </li></ul><ul><li>Strong IP portfolio – 20+ patents; 80+ pending </li></ul><ul><li>Government Certifications (FIPS-2, Common Criteria EAL4+, NIST) </li></ul><ul><li>Consistent Antivirus Validation – (Virus Bulletin 100 approved; 2005, 2006, 2007, 2008, 2009) </li></ul>Market-Leading Provider of End-to-End IT Security Solutions
  4. 4. Financial Highlights Profitable <ul><li>Balanced across product market segments </li></ul><ul><ul><li>SMB, Enterprise, & Service Provider </li></ul></ul><ul><ul><li>High-end is fastest-growing product segment </li></ul></ul><ul><li>Balanced geographic global presence </li></ul><ul><ul><li>65% of revenue generated outside of Americas </li></ul></ul><ul><li>Strong growth in services & recurring revenues </li></ul><ul><ul><li>50% of revenue from services </li></ul></ul><ul><li>Consistently strong growth year over year </li></ul><ul><ul><li>36% growth in revenue 2008 vs. 2007 </li></ul></ul>
  5. 5. Fortinet’s End-to-End IT Security Portfolio Taking security beyond UTM End to end IT security Endpoints Content & Applications Networks UTM FortiGate Endpoint Security Email Security Web, Database, App Management & Analysis
  6. 6. UTM Competitive Landscape FortiGate NetScreen OneSecure Neoteris Perabit 65xx blade MARS VPN-1 with SmartDefense UTM-1 ASA (Trend for AV) SSG (Trend, Kaspersky, Symantec, SurfControl) Zone Labs “ Homegrown” products Acquired / OEM products IronPort FW/ VPN IPS AV Web filtering Anti-spam Access Control WAN Opt.
  7. 7. Fortinet Global Services Vancouver, Canada Sophia Antipolis, France Bangalore, India Beijing, China Tokyo, Japan Kuala Lumpur, Malaysia <ul><li>FortiGuard Global Research Team: original security intelligence via FortiGuard subscriptions </li></ul><ul><ul><li>Antivirus </li></ul></ul><ul><ul><li>Intrusion Prevention </li></ul></ul><ul><ul><li>Web Filtering </li></ul></ul><ul><ul><li>Antispam </li></ul></ul><ul><li>FortiCare Support services provides ongoing technical assistance, anywhere </li></ul><ul><ul><li>Multiple service levels to meet customer requirements </li></ul></ul>
  8. 8. Fortinet Differentiation <ul><li>Broad technology platform </li></ul><ul><li>Home-grown security functions AV, IPS, WCF, FW, VPN, Anti-spam/Spyware </li></ul><ul><li>Powerful operating system and custom ASICs </li></ul><ul><li>First ATCA security vendor </li></ul><ul><li>Broad product line and global channel </li></ul><ul><li>End-to-end IT security portfolio </li></ul><ul><li>100% channel based </li></ul><ul><li>Broad security subscription </li></ul><ul><li>Coverage via global infrastructure </li></ul><ul><li>>100 researchers WW </li></ul>
  9. 9. Agenda Fortinet at a Glance Security Market Dynamics Industry Recognition Fortinet Solutions
  10. 10. Recent Industry Recognition <ul><li>IDC: Top 4 Security Appliance Vendor; #1 UTM Vendor </li></ul><ul><li>Gartner : Strong Positive in Multi-function Firewall Marketscope </li></ul><ul><li>Frost & Sullivan: Global Market Leadership Award for UTM Best Practices & Award for enabling profitable network-based Managed Security Services </li></ul><ul><li>Radicati Group: “Top Player” in Email Security Quadrant </li></ul><ul><li>Current Analysis: Tier-1 Enterprise Security Vendor </li></ul><ul><li>Computer Business Review: Top Ten Most Influential Security Companies </li></ul><ul><li>Deloitte Technology Fast 50 for Silicon Valley </li></ul><ul><li>Inc. Magazine 5,000 Fastest Growing Companies </li></ul><ul><li>#10 - Silicon Valley Business Journal Fast 50 </li></ul>
  11. 11. UTM Leadership & Growth By 2011 UTM will be the largest single market with a CAGR of 26.2% I n 2008 UTM has already surpassed firewall market
  12. 12. Agenda Fortinet at a Glance Security Market Dynamics Industry Recognition Fortinet Solutions
  13. 13. Threatscape Evolution Connection Based Attacks Layer 2/3/4 Mobile Devices and Crossover Web 2.0 Inappropriate Content Denial of Service Attacks Spam, Phishing Pharming Virus, Spyware, Adware, Trojan, Worm Peer to Peer Botnets Identity Theft Application and System Vulnerabilities
  14. 14. Top concerns in IT Security <ul><li>Continued sophistication and prevalence of threats, requiring multiple security protections </li></ul><ul><li>Regulatory compliance pressures (SOX, PCI, etc.) </li></ul><ul><li>Impact of security breaches on business </li></ul><ul><li>Higher performance to cope with evolution of business applications </li></ul><ul><li>Distributed networks & mobile users </li></ul>Dynamic Threat Landscape IT Budget: Do more with less <ul><li>Complexity and cost of managing multiple security solutions </li></ul><ul><li>Increased pressure to improve security service while reducing TCO </li></ul>Footprint Reduction <ul><li>Multiple Physical / Data Center </li></ul><ul><li>Carbon </li></ul>Business Continuity
  15. 15. Navigating the Security Landscape Virtual Private Network (VPN) “ Secure” private traffic across public networks Network Security Firewall “ External” threat protection Application Security Application Firewall Protection for WebServices Applications Data Leak Prevention Preventing unautorized documents leaving the network Antivirus / Antimalware Detection and removal of malicious application content Content Security Web filtering Protection from harmful web sites and web content DataBase Security Protecting DBs from internal Threats Intrusion Prevention System (IPS) Monitoring and active protection from malicious traffic Messaging security Detection and protection from malicious email Fortinet Confidential Application Control Regardless the protocol or port being used
  16. 16. The Point Solution Syndrome <ul><li>Multiple management interfaces </li></ul><ul><li>No integration between vendors </li></ul><ul><li>No single vendor for issue resolution </li></ul><ul><li>Multiple vendor contracts </li></ul><ul><li>Costly support licensing </li></ul><ul><li>Data resource allocation (power, rack space, cooling) </li></ul>Difficult to manage Lack of integration <ul><li>Leads to reduced security </li></ul>Performance challenges <ul><li>Multiple inspection steps tax network performance </li></ul><ul><li>Software only solutions further reduce performance </li></ul>Expensive to deploy & maintain
  17. 17. A Comprehensive Security Approach Is Required <ul><li>Network Security </li></ul><ul><li>FortiGate </li></ul><ul><li>Multi-Threat Security </li></ul><ul><li>End Point Security </li></ul><ul><li>FortiClient Multi-Threat Security </li></ul><ul><li>Enterprise Management </li></ul><ul><li>FortiAnalyzer Appliances </li></ul><ul><li>FortiManager Appliances </li></ul><ul><li>Application Security </li></ul><ul><li>FortiMail Email Security </li></ul><ul><li>FortiDB Database Security </li></ul><ul><li>FortiWeb Application Security </li></ul>
  18. 18. Agenda Fortinet at a Glance Security Market Dynamics Industry Recognition Fortinet Solutions
  19. 19. The New Generation of Security Gateway <ul><li>Multi-Threat protection </li></ul><ul><li>Comprehensive security solution </li></ul><ul><li>High-Performance security </li></ul><ul><li>Custom ASICs for real-time, high performance network protection </li></ul>FortiGate Appliances
  20. 20. FortiOS 4.0 <ul><ul><li>WAN Optimization and Caching </li></ul></ul><ul><ul><ul><li>Accelerate applications over WAN connections while ensuring multi-threat security enforcement </li></ul></ul></ul><ul><ul><li>Application Control </li></ul></ul><ul><ul><ul><li>Recognize traffic based on the application generating it, instead of port or protocol </li></ul></ul></ul><ul><ul><li>SSL Inspection </li></ul></ul><ul><ul><ul><li>to increase security and policy control among encrypted traffic streams </li></ul></ul></ul><ul><ul><li>Data Leakage Prevention (DLP) </li></ul></ul><ul><ul><ul><li>to identify and prevent the communication of sensitive information outside of the network boundaries </li></ul></ul></ul>FortiOS 4.0 introduces four major new technologies into the existing comprehensive network security offering:
  21. 21. Custom ASICs for Unmatched Performance <ul><li>Network ASIC (NP) </li></ul><ul><ul><ul><li>Firewall acceleration </li></ul></ul></ul><ul><ul><ul><li>VPN (IPSEC and SSL) </li></ul></ul></ul><ul><ul><ul><li>IPS anomaly acceleration </li></ul></ul></ul><ul><ul><ul><li>Accelerated Antivirus (+Antispyware) analysis </li></ul></ul></ul><ul><ul><ul><li>Web Filtering and Antispam Advantage from Accelerated AV scanning </li></ul></ul></ul><ul><ul><ul><li>Traffic Shaping </li></ul></ul></ul>The FortiASIC™ Family Application ASIC (CP)
  22. 22. Comprehensive, Integrated Security <ul><li>Reduces number of vendors and appliance </li></ul><ul><li>Provides comprehensive security </li></ul><ul><li>Minimizes down-time from individual threats </li></ul><ul><li>Simplifies security management </li></ul><ul><li>Coordinates security alerting, logging, and reporting </li></ul><ul><li>Improves detection capabilities </li></ul>FortiGate Appliances
  23. 23. Network Security <ul><li>Firewall </li></ul><ul><ul><li>Prevent unauthorized access </li></ul></ul><ul><ul><li>Establish security perimeters / implement segmentation </li></ul></ul><ul><li>IPSec & SSL VPN </li></ul><ul><ul><li>Provide remote access to privileged resources </li></ul></ul>
  24. 24. Integrated Application and Content Security <ul><li>Intrusion Prevention </li></ul><ul><ul><li>Prevents exploitation of vulnerabilities </li></ul></ul><ul><ul><li>Protocol awareness allows application awareness </li></ul></ul><ul><li>Antivirus / Antispyware </li></ul><ul><ul><li>Prevents malicious content from propagating </li></ul></ul>
  25. 25. Application Security <ul><li>Web Filtering </li></ul><ul><ul><li>Prevents access to known malicious and spam/phishing sites </li></ul></ul><ul><ul><li>Prevents any policy violating content </li></ul></ul><ul><li>Antispam </li></ul><ul><ul><li>Filters unsolicited bulk mail </li></ul></ul><ul><li>Application Control </li></ul><ul><ul><li>Prevents/Limits communication of common network applications (IM, P2P, etc.) </li></ul></ul><ul><ul><li>Shapes traffic to guarantee/restrict bandwidth for a given application </li></ul></ul>
  26. 26. Content Security <ul><li>Ideal for: </li></ul><ul><ul><li>SMBs, Enterprises (Small to Large), Service Providers </li></ul></ul><ul><li>Primary Benefits: </li></ul><ul><ul><li>Comprehensive protection eliminating threats and attacks from emails </li></ul></ul><ul><ul><li>Avoids mail system resource consumption </li></ul></ul><ul><ul><li>Preserves internal network bandwidth </li></ul></ul><ul><ul><li>Aids compliance with advanced content archiving </li></ul></ul><ul><ul><li>Increases employee productivity </li></ul></ul><ul><ul><li>Protect, quarantine and archive all-in-one </li></ul></ul>FortiMail high-performance multi-layered email security platforms provide maximum protection for email threats and facilitate regulatory compliance
  27. 27. Application Security Scan for Vulnerabilities <ul><li>Scans for security problems – provides advice to fix </li></ul><ul><li>Built-in best practices and/or your own standards </li></ul><ul><li>Ongoing scan of every DB in your enterprise </li></ul>Monitoring & Auditing <ul><li>Automatically create baselines of normal behavior </li></ul><ul><li>Continuously scan for suspicious end-user behavior </li></ul><ul><li>Alert on suspicious data access patterns </li></ul><ul><li>Full history of user privilege and object / schema design changes, incl. data access / data update events </li></ul><ul><li>Audit/Compliance reports for use by DBA team, infosec or audit team </li></ul>FortiPartner Program: IPLocks Japan Assures the confidentiality, integrity and availability of critical enterprise data
  28. 28. Endpoint Security <ul><li>FortiClient PC & FortiClient Mobile for multi-layered , dynamic endpoint security: </li></ul><ul><li>For personal computers, laptops and smartphones </li></ul><ul><li>Powered by FortiGuard subscription services </li></ul><ul><li>FortiClient lightweight software agents available for Microsoft Windows XP, MS Vista, MS Mobile and Symbian™ operating systems </li></ul><ul><li>Comprehensive FW, AV, AS, SSL & IPSec VPN and antispyware protection, WAN Opt. & Application control </li></ul><ul><li>Web content filtering for Windows-based PCs and incoming call filtering for mobile devices </li></ul><ul><li>Mobile contacts and SMS encryption </li></ul>for PCs , Laptops and Mobile phones
  29. 29. Summary Industry-leading security vendor End-to-end IT Security portfolio Strong Financials Global Customer Base Experienced Management Team
  30. 30. Questions

×