SlideShare a Scribd company logo
Cassie Vorster – Africa BDM SDWAN
2
© Fortinet Inc. All Rights Reserved.
Megatrends driving Today’s IT Transformation
Digital Acceleration
69%
52%
Work from Anywhere
67%
Ransomware Target
3
© Fortinet Inc. All Rights Reserved.
Your Imperatives driving your IT Transformation
4
© Fortinet Inc. All Rights Reserved.
Embarking on an SD-WAN journey
means more than
just the selection of an SD-WAN Product.
LAN
Wireless LAN
WAN Wireless WAN
Remote Workers Path to Zero Trust
6
© Fortinet Inc. All Rights Reserved.
SD-WAN
Firewall Segmentation SWG
Router
Ethernet
Controller
SSL
5G
AP
Controller
IPS
ZTNA Proxy
NAC
Appliance Virtual Container SaaS
Actionable Threat
Intelligence
Management
Networking Security
The Foundation of Fortinet’s Vision:
Convergence of Networking and Security
Security
Driven
Networking
7
© Fortinet Inc. All Rights Reserved.
Was all about network
transformation replacing
routers
SD-WAN
Adding security services
Secure
SD-WAN
Gartner: Two Most Topics Discussed with SD-WAN in 2021 – Security and Cloud
Evolution of SD-WAN from Point Product to The Platform
• Build out SD-Branch with
LAN integration
• Build out WAN with 5G
SD-Branch ZTNA & SASE
• ZTNA and SASE
integration
• Multi-cloud and cloud
on-ramp
AIOps
Advanced AIOps & DEM
services
8
© Fortinet Inc. All Rights Reserved.
Transition to Support SD-Branch,
SASE and Zero Trust Edge
Only vendor integrates and manages all
functions with a single management
console
Designed for ALL
WAN Architectures
Only vendor with built-in SD-WAN
ASIC, unrestricted WAN BW
consumption
Transform and
Secure WAN
1st vendor to organically deliver
SD-WAN, NGFW, advanced routing,
ZTNA proxy in one WAN edge
Innovations That Transform Network Edges
Converged Networking and
Security Powered by One OS
Massive Scale,
Performance and App ID
Tight LAN, Wireless LAN,
Wireless WAN, and ZTNA
Integration
9
© Fortinet Inc. All Rights Reserved.
NGFW
Fortinet Secure SD-WAN Powered by One OS, One Management
Manage
Monitor
Analyze
Fabric
Management
Center
FortiManager FortiAnalyzer
First vendor to organically deliver SD-WAN, NGFW, Advanced Routing, ZTNA Enforcement
in One WAN Edge
Converged Networking and Security Powered by One OS
Advanced Routing
SD-WAN ZTNA
Enforcement
Transform
& Secure
WAN
Fortinet Secure SD-WAN
10
© Fortinet Inc. All Rights Reserved.
M
P
L
S
WWAN
From SD-WAN to SD-Branch
Data Center
Campus
Branch
Cloud
SD-WAN
Secure
SD-Branch
Security Driven - Branch
FortiManager
11
© Fortinet Inc. All Rights Reserved.
Content
• Inline AI Sandbox & EDR Behavior
• Polymorphic Anti-Malware | Antivirus
• Mobile Malware
• Credential-stuffing defense
Web
• URL Filtering
• DNS security
• Secure Web Gateway
• Phishing
• Geo-location
• In-line CASB
• Anti-spam
Device (IT | OT | IoT)
• Exploit Protection
• Vulnerability Detection
& Patching
• IPS Known and Zero-Days
• Botnet & C2
Application Security
• Secure Email Gateway
• WAF signatures
• DDOS
• CASB – SaaS Security
• ADC
NOC/SOC
• Decoys
• IOC Ingestion and Search
• Advanced Forensics & Threat Hunting
• AI-powered investigation & Automated
Integrative IR
• Outbreak Detection services (FAZ, FCT, FOS)
• Automated playbooks and remediation
• Fabric Rating Proactive Assessments
and Simplified Migration
Introduction to FortiGuard AI-Powered Security Services
FortiGuard Labs
• Real-Time Security update
• AI & Machine Learning models
developments on both local
and large-scale Cloud-driven
data lakes
• Zero-Day discovery
• Outbreak Alerts
• Threat Monitoring and
Communications
• Industry Alliances
13
© Fortinet Inc. All Rights Reserved.
Fortinet Recognized as a Leader 2021,
12th time, included in this Magic Quadrant
Fortinet Recognized as a Leader Positioned
Highest for Ability to Execute
November 2021 Magic Quadrant™
for Network Firewalls
August 2022 Magic Quadrant™ for
SD-WAN Infrastructure
Bringing 12 years of Security Leadership to Networking Excellence
Same
Management
Same OS
14
© Fortinet Inc. All Rights Reserved.
Gartner’s SDWAN MQ
15
© Fortinet Inc. All Rights Reserved.
Why Fortinet Ranked #1 ?
What is Security-Sensitive WAN Use-case ?
A security-sensitive WAN typical in some
mid- to large-scale organizations focused on
securing branch offices as the main priority,
where network and security procurements
are increasingly converging.
DEFINITION
• Networking and security are integrated
in the same appliance
• Advanced security: IPS, URL
filtering/SWG, SSL inspection, anti
malware, sandboxing & ZTNA
WHY RANKED #1
Data Center
Campus
Branch
Home
Cloud
SaaS
WAN
16
© Fortinet Inc. All Rights Reserved.
Why Fortinet Ranked # 1
What is Remote Worker Use-case ?
Remote workers connecting to the
enterprise network and cloud resources
from remote locations such as their
homes, instead of solely connecting
from the branch.
DEFINITION
• Integrated Zero Trust Network
Access (ZTNA) access proxy
• Lightweight hardware solution for
power users
• Integrated management, visibility and
orchestration with branch network
solutions
WHY RANKED #1
ZTNA
Enforcement
Policy Engine
User Identity and Device Posture ENFORCEMENT
User Identity
Access Specific Applications
Continuous Trust Check
User Contextual Rule Set
Applications Can Be Anywhere
Users Can Be Anywhere
Data Center
Cloud
SaaS
ZTNA
Campus
Branch
Home
Travel
User
17
© Fortinet Inc. All Rights Reserved.
Why Fortinet Ranked # 1
What is Small Branch Use-case ?
Small branch WAN that requires simple and
secure branch networking solutions with ease
of use as a main driver. This use case can be
any number of sites with branch locations,
typically with fewer than 10 people.
Branch Infrastructure Convergence
Switching
Wireless
4G/5G Backhaul
SD-WAN
NGFW
NAC
One Console
One Config file
DEFINITION
• Support for integrated Wi-Fi in a single
orchestration platform
• Integrated orchestration of LAN, WLAN,
WAN and security to simplify
management
• Ensuring service continuity in handling
LTE connections
WHY RANKED #1
19
© Fortinet Inc. All Rights Reserved.
Secure Edge
Connectivity
1
NGFW
Optimize Application
Experience
2
SD-WAN
Secure Remote
Users
3
SASE
With Fortinet’s convergence of security & networking everywhere
Pragmatic Journey to SASE
20
© Fortinet Inc. All Rights Reserved.
Travel Factory
Home Campus
Secure SD-WAN : Flexible Application Steering at Edge
Branch
Edge Compute
Public Cloud
Internet SaaS Data Center
SD
WAN
Network Firewall
Secure SD-WAN
SD-Branch
Application Aware
Intrusion Prevention
Web Filtering
DNS Protection
Sandboxing
In-Line Sandboxing
In-Line CASB
OT and IoT Security
Consistent
Security
Convergence
21
© Fortinet Inc. All Rights Reserved.
Travel Factory
Home Campus
Secure Remote Access – Securely connect remote users
Branch
Edge Compute
Public Cloud
Internet SaaS Data Center
SSE
SD
WAN
Network Firewall
Secure SD-WAN
SD-Branch
SASE
Application Aware
Intrusion Prevention
Web Filtering
DNS Protection
Sandboxing
In-Line Sandboxing
In-Line CASB
OT and IoT Security
Consistent
Security
Convergence
22
© Fortinet Inc. All Rights Reserved.
Travel Factory
Home Campus
Universal ZTNA – Secure user access to applications
Branch
Edge Compute
Public Cloud
Internet SaaS Data Center
SSE
SD
WAN
Network Firewall
Secure SD-WAN
SD-Branch
SASE
Universal ZTNA
Application Aware
Intrusion Prevention
Web Filtering
DNS Protection
Sandboxing
In-Line Sandboxing
Network Access
Control (NAC)
OT and IoT Security
Consistent
Security
Convergence
23
© Fortinet Inc. All Rights Reserved.
Travel Factory
Home Campus Branch
Edge Compute
Public Cloud
Internet SaaS Data Center
SD
WAN
Secure
Services
Edge
Network Firewall
Secure SD-WAN
SD-Branch
SASE
Universal ZTNA
Application Aware
Intrusion Prevention
Web Filtering
DNS Protection
Sandboxing
In-Line Sandboxing
Network Access
Control (NAC)
OT and IoT Security
Consistent
Security
Convergence
“Single Vendor SASE”
Unified SSE Solution
24
© Fortinet Inc. All Rights Reserved.
Transition to support SD-Branch, SASE and Zero Trust Edge
Tight Integration With LAN, WLAN, WWAN, ZTNA
Wireless WAN
Only Vendor Integrates & Manages All Functions with a Single Management
SD-WAN
NGFW
LAN
Wireless LAN
ZTNA
Enhance Operations
and Lower TCO
Accelerate
Troubleshooting
Accelerate Transition to Zero
Trust Edge & SD-Branch
Simplify Architecture
and Management
Extending Security to EVERY Edge

More Related Content

What's hot

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
Cloudflare
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
Cisco Canada
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
QOS Networks
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
Gowdhaman Jothilingam
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
Er. Ajay Sirsat
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
Cloud Distribution
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma Access
Haris Chughtai
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
Cheah Eng Soon
 
SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?
Phani Kumar
 
Track SD-WAN.pdf
Track SD-WAN.pdfTrack SD-WAN.pdf
Track SD-WAN.pdf
MarceloTuxSP
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
Simplex
 
Software-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StorySoftware-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success Story
Cisco Enterprise Networks
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
rtp2009
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
Moti Sagey מוטי שגיא
 
Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
Haris Chughtai
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN Technology
Cisco Canada
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise Management Associates
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
ssuser5824cf
 

What's hot (20)

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma Access
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
 
SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?
 
Track SD-WAN.pdf
Track SD-WAN.pdfTrack SD-WAN.pdf
Track SD-WAN.pdf
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Software-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StorySoftware-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success Story
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN Technology
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
 
SD WAN
SD WANSD WAN
SD WAN
 

Similar to Extending Security to EVERY Edge

Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
DATA SECURITY SOLUTIONS
 
SDWAN Introduction presentation & Public Speaking
SDWAN Introduction presentation & Public SpeakingSDWAN Introduction presentation & Public Speaking
SDWAN Introduction presentation & Public Speaking
datnc09
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
Robb Boyd
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
Robb Boyd
 
Fortinet_for_SAP
Fortinet_for_SAPFortinet_for_SAP
Fortinet_for_SAP
Roland Wartenberg
 
Secure Your Network for Scale & the Cloud
Secure Your Network for Scale & the CloudSecure Your Network for Scale & the Cloud
Secure Your Network for Scale & the Cloud
VeloCloud Networks, Inc.
 
Unravelling Managed SD-WAN Services
Unravelling Managed SD-WAN ServicesUnravelling Managed SD-WAN Services
Unravelling Managed SD-WAN Services
Ralph Santitoro
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
Cisco Canada
 
Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV
Digital Transformation EXPO Event Series
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
rezkellahhichem
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
YounesChafi1
 
Secure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptxSecure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptx
Yitao Cen
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
bayusch
 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
Nur Shiqim Chok
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
Articulate Marketing
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_final
Lan & Wan Solutions
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
Advanced Technology Consulting (ATC)
 
Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...
Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...
Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...
Amazon Web Services
 
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Canada
 

Similar to Extending Security to EVERY Edge (20)

Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
SDWAN Introduction presentation & Public Speaking
SDWAN Introduction presentation & Public SpeakingSDWAN Introduction presentation & Public Speaking
SDWAN Introduction presentation & Public Speaking
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
Fortinet_for_SAP
Fortinet_for_SAPFortinet_for_SAP
Fortinet_for_SAP
 
Secure Your Network for Scale & the Cloud
Secure Your Network for Scale & the CloudSecure Your Network for Scale & the Cloud
Secure Your Network for Scale & the Cloud
 
Unravelling Managed SD-WAN Services
Unravelling Managed SD-WAN ServicesUnravelling Managed SD-WAN Services
Unravelling Managed SD-WAN Services
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
 
Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
 
Secure sd wan
Secure sd wanSecure sd wan
Secure sd wan
 
Secure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptxSecure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptx
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_final
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...
Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...
Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...
 
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
 

More from itnewsafrica

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
itnewsafrica
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
itnewsafrica
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
itnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
itnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
itnewsafrica
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
itnewsafrica
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omni
itnewsafrica
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023
itnewsafrica
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retail
itnewsafrica
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
itnewsafrica
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...
itnewsafrica
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
itnewsafrica
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcare
itnewsafrica
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcare
itnewsafrica
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
itnewsafrica
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platform
itnewsafrica
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Better
itnewsafrica
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
itnewsafrica
 

More from itnewsafrica (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omni
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retail
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcare
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcare
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platform
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Better
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
 

Recently uploaded

Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 

Recently uploaded (20)

Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 

Extending Security to EVERY Edge

  • 1. Cassie Vorster – Africa BDM SDWAN
  • 2. 2 © Fortinet Inc. All Rights Reserved. Megatrends driving Today’s IT Transformation Digital Acceleration 69% 52% Work from Anywhere 67% Ransomware Target
  • 3. 3 © Fortinet Inc. All Rights Reserved. Your Imperatives driving your IT Transformation
  • 4. 4 © Fortinet Inc. All Rights Reserved. Embarking on an SD-WAN journey means more than just the selection of an SD-WAN Product. LAN Wireless LAN WAN Wireless WAN Remote Workers Path to Zero Trust
  • 5.
  • 6. 6 © Fortinet Inc. All Rights Reserved. SD-WAN Firewall Segmentation SWG Router Ethernet Controller SSL 5G AP Controller IPS ZTNA Proxy NAC Appliance Virtual Container SaaS Actionable Threat Intelligence Management Networking Security The Foundation of Fortinet’s Vision: Convergence of Networking and Security Security Driven Networking
  • 7. 7 © Fortinet Inc. All Rights Reserved. Was all about network transformation replacing routers SD-WAN Adding security services Secure SD-WAN Gartner: Two Most Topics Discussed with SD-WAN in 2021 – Security and Cloud Evolution of SD-WAN from Point Product to The Platform • Build out SD-Branch with LAN integration • Build out WAN with 5G SD-Branch ZTNA & SASE • ZTNA and SASE integration • Multi-cloud and cloud on-ramp AIOps Advanced AIOps & DEM services
  • 8. 8 © Fortinet Inc. All Rights Reserved. Transition to Support SD-Branch, SASE and Zero Trust Edge Only vendor integrates and manages all functions with a single management console Designed for ALL WAN Architectures Only vendor with built-in SD-WAN ASIC, unrestricted WAN BW consumption Transform and Secure WAN 1st vendor to organically deliver SD-WAN, NGFW, advanced routing, ZTNA proxy in one WAN edge Innovations That Transform Network Edges Converged Networking and Security Powered by One OS Massive Scale, Performance and App ID Tight LAN, Wireless LAN, Wireless WAN, and ZTNA Integration
  • 9. 9 © Fortinet Inc. All Rights Reserved. NGFW Fortinet Secure SD-WAN Powered by One OS, One Management Manage Monitor Analyze Fabric Management Center FortiManager FortiAnalyzer First vendor to organically deliver SD-WAN, NGFW, Advanced Routing, ZTNA Enforcement in One WAN Edge Converged Networking and Security Powered by One OS Advanced Routing SD-WAN ZTNA Enforcement Transform & Secure WAN Fortinet Secure SD-WAN
  • 10. 10 © Fortinet Inc. All Rights Reserved. M P L S WWAN From SD-WAN to SD-Branch Data Center Campus Branch Cloud SD-WAN Secure SD-Branch Security Driven - Branch FortiManager
  • 11. 11 © Fortinet Inc. All Rights Reserved. Content • Inline AI Sandbox & EDR Behavior • Polymorphic Anti-Malware | Antivirus • Mobile Malware • Credential-stuffing defense Web • URL Filtering • DNS security • Secure Web Gateway • Phishing • Geo-location • In-line CASB • Anti-spam Device (IT | OT | IoT) • Exploit Protection • Vulnerability Detection & Patching • IPS Known and Zero-Days • Botnet & C2 Application Security • Secure Email Gateway • WAF signatures • DDOS • CASB – SaaS Security • ADC NOC/SOC • Decoys • IOC Ingestion and Search • Advanced Forensics & Threat Hunting • AI-powered investigation & Automated Integrative IR • Outbreak Detection services (FAZ, FCT, FOS) • Automated playbooks and remediation • Fabric Rating Proactive Assessments and Simplified Migration Introduction to FortiGuard AI-Powered Security Services FortiGuard Labs • Real-Time Security update • AI & Machine Learning models developments on both local and large-scale Cloud-driven data lakes • Zero-Day discovery • Outbreak Alerts • Threat Monitoring and Communications • Industry Alliances
  • 12.
  • 13. 13 © Fortinet Inc. All Rights Reserved. Fortinet Recognized as a Leader 2021, 12th time, included in this Magic Quadrant Fortinet Recognized as a Leader Positioned Highest for Ability to Execute November 2021 Magic Quadrant™ for Network Firewalls August 2022 Magic Quadrant™ for SD-WAN Infrastructure Bringing 12 years of Security Leadership to Networking Excellence Same Management Same OS
  • 14. 14 © Fortinet Inc. All Rights Reserved. Gartner’s SDWAN MQ
  • 15. 15 © Fortinet Inc. All Rights Reserved. Why Fortinet Ranked #1 ? What is Security-Sensitive WAN Use-case ? A security-sensitive WAN typical in some mid- to large-scale organizations focused on securing branch offices as the main priority, where network and security procurements are increasingly converging. DEFINITION • Networking and security are integrated in the same appliance • Advanced security: IPS, URL filtering/SWG, SSL inspection, anti malware, sandboxing & ZTNA WHY RANKED #1 Data Center Campus Branch Home Cloud SaaS WAN
  • 16. 16 © Fortinet Inc. All Rights Reserved. Why Fortinet Ranked # 1 What is Remote Worker Use-case ? Remote workers connecting to the enterprise network and cloud resources from remote locations such as their homes, instead of solely connecting from the branch. DEFINITION • Integrated Zero Trust Network Access (ZTNA) access proxy • Lightweight hardware solution for power users • Integrated management, visibility and orchestration with branch network solutions WHY RANKED #1 ZTNA Enforcement Policy Engine User Identity and Device Posture ENFORCEMENT User Identity Access Specific Applications Continuous Trust Check User Contextual Rule Set Applications Can Be Anywhere Users Can Be Anywhere Data Center Cloud SaaS ZTNA Campus Branch Home Travel User
  • 17. 17 © Fortinet Inc. All Rights Reserved. Why Fortinet Ranked # 1 What is Small Branch Use-case ? Small branch WAN that requires simple and secure branch networking solutions with ease of use as a main driver. This use case can be any number of sites with branch locations, typically with fewer than 10 people. Branch Infrastructure Convergence Switching Wireless 4G/5G Backhaul SD-WAN NGFW NAC One Console One Config file DEFINITION • Support for integrated Wi-Fi in a single orchestration platform • Integrated orchestration of LAN, WLAN, WAN and security to simplify management • Ensuring service continuity in handling LTE connections WHY RANKED #1
  • 18.
  • 19. 19 © Fortinet Inc. All Rights Reserved. Secure Edge Connectivity 1 NGFW Optimize Application Experience 2 SD-WAN Secure Remote Users 3 SASE With Fortinet’s convergence of security & networking everywhere Pragmatic Journey to SASE
  • 20. 20 © Fortinet Inc. All Rights Reserved. Travel Factory Home Campus Secure SD-WAN : Flexible Application Steering at Edge Branch Edge Compute Public Cloud Internet SaaS Data Center SD WAN Network Firewall Secure SD-WAN SD-Branch Application Aware Intrusion Prevention Web Filtering DNS Protection Sandboxing In-Line Sandboxing In-Line CASB OT and IoT Security Consistent Security Convergence
  • 21. 21 © Fortinet Inc. All Rights Reserved. Travel Factory Home Campus Secure Remote Access – Securely connect remote users Branch Edge Compute Public Cloud Internet SaaS Data Center SSE SD WAN Network Firewall Secure SD-WAN SD-Branch SASE Application Aware Intrusion Prevention Web Filtering DNS Protection Sandboxing In-Line Sandboxing In-Line CASB OT and IoT Security Consistent Security Convergence
  • 22. 22 © Fortinet Inc. All Rights Reserved. Travel Factory Home Campus Universal ZTNA – Secure user access to applications Branch Edge Compute Public Cloud Internet SaaS Data Center SSE SD WAN Network Firewall Secure SD-WAN SD-Branch SASE Universal ZTNA Application Aware Intrusion Prevention Web Filtering DNS Protection Sandboxing In-Line Sandboxing Network Access Control (NAC) OT and IoT Security Consistent Security Convergence
  • 23. 23 © Fortinet Inc. All Rights Reserved. Travel Factory Home Campus Branch Edge Compute Public Cloud Internet SaaS Data Center SD WAN Secure Services Edge Network Firewall Secure SD-WAN SD-Branch SASE Universal ZTNA Application Aware Intrusion Prevention Web Filtering DNS Protection Sandboxing In-Line Sandboxing Network Access Control (NAC) OT and IoT Security Consistent Security Convergence “Single Vendor SASE” Unified SSE Solution
  • 24. 24 © Fortinet Inc. All Rights Reserved. Transition to support SD-Branch, SASE and Zero Trust Edge Tight Integration With LAN, WLAN, WWAN, ZTNA Wireless WAN Only Vendor Integrates & Manages All Functions with a Single Management SD-WAN NGFW LAN Wireless LAN ZTNA Enhance Operations and Lower TCO Accelerate Troubleshooting Accelerate Transition to Zero Trust Edge & SD-Branch Simplify Architecture and Management