SlideShare a Scribd company logo
1 of 30
Fortinet Corporate Presentation Joe Sarno Country Manager - Fortinet
Agenda Fortinet at a Glance Security Market Dynamics Industry Recognition Fortinet Solutions
Fortinet Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Market-Leading Provider of End-to-End IT Security Solutions
Financial Highlights Profitable ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fortinet’s End-to-End IT Security Portfolio Taking security beyond UTM End to end IT security Endpoints Content & Applications Networks UTM FortiGate Endpoint Security Email Security   Web, Database, App Management & Analysis
UTM Competitive Landscape FortiGate   NetScreen  OneSecure Neoteris   Perabit 65xx blade MARS   VPN-1 with SmartDefense UTM-1  ASA (Trend for AV) SSG (Trend, Kaspersky, Symantec, SurfControl) Zone Labs   “ Homegrown” products Acquired / OEM products IronPort   FW/ VPN IPS AV Web filtering Anti-spam Access Control WAN Opt.
Fortinet Global Services Vancouver,  Canada Sophia Antipolis,  France Bangalore,  India Beijing,  China Tokyo, Japan Kuala Lumpur, Malaysia ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fortinet Differentiation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda Fortinet at a Glance Security Market Dynamics Industry Recognition Fortinet Solutions
Recent Industry Recognition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UTM Leadership & Growth By 2011 UTM will be the largest single market with a CAGR of 26.2% I n 2008  UTM has already  surpassed firewall market
Agenda Fortinet at a Glance Security Market Dynamics Industry Recognition Fortinet Solutions
Threatscape Evolution Connection Based Attacks Layer 2/3/4 Mobile Devices and Crossover Web 2.0 Inappropriate Content Denial of  Service  Attacks Spam, Phishing Pharming Virus, Spyware, Adware, Trojan, Worm Peer to Peer Botnets Identity Theft Application  and System  Vulnerabilities
Top concerns in IT Security ,[object Object],[object Object],[object Object],[object Object],[object Object],Dynamic Threat Landscape IT Budget: Do more with less ,[object Object],[object Object],Footprint Reduction ,[object Object],[object Object],Business Continuity
Navigating the Security Landscape Virtual Private Network (VPN) “ Secure” private traffic across public networks Network Security Firewall “ External” threat protection Application Security Application Firewall Protection for WebServices Applications Data Leak Prevention Preventing unautorized documents  leaving the network  Antivirus / Antimalware Detection and removal of malicious application content Content Security Web filtering Protection from harmful web sites and web content  DataBase Security Protecting DBs from internal Threats Intrusion Prevention System (IPS) Monitoring and active protection from malicious traffic  Messaging security Detection and protection from malicious email Fortinet Confidential   Application Control Regardless the protocol or port being used
The Point Solution Syndrome ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Difficult to manage Lack of integration ,[object Object],Performance challenges ,[object Object],[object Object],Expensive to deploy & maintain
A Comprehensive Security Approach Is Required ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda Fortinet at a Glance Security Market Dynamics Industry Recognition Fortinet Solutions
The New Generation of Security Gateway ,[object Object],[object Object],[object Object],[object Object],FortiGate Appliances
FortiOS 4.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],FortiOS 4.0 introduces four major new technologies into the existing comprehensive network security offering:
Custom ASICs for Unmatched Performance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The FortiASIC™ Family Application ASIC (CP)
Comprehensive, Integrated Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],FortiGate Appliances
Network Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Integrated Application and Content Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Application Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Content Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],FortiMail high-performance multi-layered email security platforms provide maximum protection for email threats and facilitate regulatory compliance
Application Security Scan for Vulnerabilities ,[object Object],[object Object],[object Object],Monitoring & Auditing ,[object Object],[object Object],[object Object],[object Object],[object Object],FortiPartner Program: IPLocks Japan Assures the  confidentiality,  integrity and  availability of critical enterprise data
Endpoint Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],for PCs , Laptops and Mobile phones
Summary Industry-leading security vendor End-to-end IT Security portfolio Strong Financials Global Customer Base Experienced Management Team
Questions

More Related Content

What's hot

Business Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityBusiness Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityF-Secure Corporation
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Corporation
 
Best corporate end-point protection 2013
Best corporate end-point protection 2013Best corporate end-point protection 2013
Best corporate end-point protection 2013F-Secure Corporation
 
Threat Landscape for Education
Threat Landscape for EducationThreat Landscape for Education
Threat Landscape for EducationColloqueRISQ
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Novosco
 
My Final Year Project PPT
My Final Year Project PPTMy Final Year Project PPT
My Final Year Project PPTMOHAMMEDELALAM1
 
Panda Security - Gatedefender
Panda Security - GatedefenderPanda Security - Gatedefender
Panda Security - GatedefenderPanda Security
 
Presentatie F-Secure 26062015
Presentatie F-Secure 26062015Presentatie F-Secure 26062015
Presentatie F-Secure 26062015SLBdiensten
 
Acctive Milestone Husky Overview
Acctive Milestone Husky OverviewAcctive Milestone Husky Overview
Acctive Milestone Husky OverviewRic Vezza
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012Agora Group
 
5 star technology advertising 2015
5 star technology advertising 20155 star technology advertising 2015
5 star technology advertising 2015leopoldgiterson
 
G snap security-solution
G snap security-solutionG snap security-solution
G snap security-solutionKevin Mayo
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystemMark Oakton
 

What's hot (20)

Inside forti os-v524-r5
Inside forti os-v524-r5Inside forti os-v524-r5
Inside forti os-v524-r5
 
Business Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityBusiness Suite - Gain control of your IT security
Business Suite - Gain control of your IT security
 
Fortinet av
Fortinet avFortinet av
Fortinet av
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior control
 
Best corporate end-point protection 2013
Best corporate end-point protection 2013Best corporate end-point protection 2013
Best corporate end-point protection 2013
 
Threat Landscape for Education
Threat Landscape for EducationThreat Landscape for Education
Threat Landscape for Education
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
My Final Year Project PPT
My Final Year Project PPTMy Final Year Project PPT
My Final Year Project PPT
 
Product Overview Nov 2010 V1
Product Overview Nov 2010 V1Product Overview Nov 2010 V1
Product Overview Nov 2010 V1
 
Panda Security - Gatedefender
Panda Security - GatedefenderPanda Security - Gatedefender
Panda Security - Gatedefender
 
Presentatie F-Secure 26062015
Presentatie F-Secure 26062015Presentatie F-Secure 26062015
Presentatie F-Secure 26062015
 
FortiGate-200B
FortiGate-200BFortiGate-200B
FortiGate-200B
 
Acctive Milestone Husky Overview
Acctive Milestone Husky OverviewAcctive Milestone Husky Overview
Acctive Milestone Husky Overview
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012
 
5 star technology advertising 2015
5 star technology advertising 20155 star technology advertising 2015
5 star technology advertising 2015
 
G snap security-solution
G snap security-solutionG snap security-solution
G snap security-solution
 
Fortinet Perspectiva Coporativa
Fortinet Perspectiva CoporativaFortinet Perspectiva Coporativa
Fortinet Perspectiva Coporativa
 
Wireless Network Security Palo Alto Networks / Aruba Networks Integration
Wireless Network Security Palo Alto Networks / Aruba Networks IntegrationWireless Network Security Palo Alto Networks / Aruba Networks Integration
Wireless Network Security Palo Alto Networks / Aruba Networks Integration
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystem
 
FortiGate-80C
FortiGate-80CFortiGate-80C
FortiGate-80C
 

Similar to Emea Corporate Presentation 0709 Lin

Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Haris Khan
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinetinternetbrasil
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityZymbian
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurrezkellahhichem
 
Brochure-FortiGuard-Security-Services
Brochure-FortiGuard-Security-ServicesBrochure-FortiGuard-Security-Services
Brochure-FortiGuard-Security-ServicesDavid Maciejak
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platformcostigaj
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureExclusive Networks ME
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 

Similar to Emea Corporate Presentation 0709 Lin (20)

Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 security
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
 
Information Security
Information SecurityInformation Security
Information Security
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
Brochure-FortiGuard-Security-Services
Brochure-FortiGuard-Security-ServicesBrochure-FortiGuard-Security-Services
Brochure-FortiGuard-Security-Services
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Fortinet k
Fortinet kFortinet k
Fortinet k
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platform
 
Forti os ngfw
Forti os ngfwForti os ngfw
Forti os ngfw
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 

Emea Corporate Presentation 0709 Lin

  • 1. Fortinet Corporate Presentation Joe Sarno Country Manager - Fortinet
  • 2. Agenda Fortinet at a Glance Security Market Dynamics Industry Recognition Fortinet Solutions
  • 3.
  • 4.
  • 5. Fortinet’s End-to-End IT Security Portfolio Taking security beyond UTM End to end IT security Endpoints Content & Applications Networks UTM FortiGate Endpoint Security Email Security Web, Database, App Management & Analysis
  • 6. UTM Competitive Landscape FortiGate NetScreen OneSecure Neoteris Perabit 65xx blade MARS VPN-1 with SmartDefense UTM-1 ASA (Trend for AV) SSG (Trend, Kaspersky, Symantec, SurfControl) Zone Labs “ Homegrown” products Acquired / OEM products IronPort FW/ VPN IPS AV Web filtering Anti-spam Access Control WAN Opt.
  • 7.
  • 8.
  • 9. Agenda Fortinet at a Glance Security Market Dynamics Industry Recognition Fortinet Solutions
  • 10.
  • 11. UTM Leadership & Growth By 2011 UTM will be the largest single market with a CAGR of 26.2% I n 2008 UTM has already surpassed firewall market
  • 12. Agenda Fortinet at a Glance Security Market Dynamics Industry Recognition Fortinet Solutions
  • 13. Threatscape Evolution Connection Based Attacks Layer 2/3/4 Mobile Devices and Crossover Web 2.0 Inappropriate Content Denial of Service Attacks Spam, Phishing Pharming Virus, Spyware, Adware, Trojan, Worm Peer to Peer Botnets Identity Theft Application and System Vulnerabilities
  • 14.
  • 15. Navigating the Security Landscape Virtual Private Network (VPN) “ Secure” private traffic across public networks Network Security Firewall “ External” threat protection Application Security Application Firewall Protection for WebServices Applications Data Leak Prevention Preventing unautorized documents leaving the network Antivirus / Antimalware Detection and removal of malicious application content Content Security Web filtering Protection from harmful web sites and web content DataBase Security Protecting DBs from internal Threats Intrusion Prevention System (IPS) Monitoring and active protection from malicious traffic Messaging security Detection and protection from malicious email Fortinet Confidential Application Control Regardless the protocol or port being used
  • 16.
  • 17.
  • 18. Agenda Fortinet at a Glance Security Market Dynamics Industry Recognition Fortinet Solutions
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Summary Industry-leading security vendor End-to-end IT Security portfolio Strong Financials Global Customer Base Experienced Management Team