SlideShare a Scribd company logo
© Copyright Fortinet Inc. All rights reserved.
Protect your Organisation from Zero Day &
Unknown Threats
With the Fortinet Security Fabric
Conor Byrne 21.06.2018
2
Who are we?
3
Fortinet Global Network Security Leader
4,900+
EMPLOYEES WORLDWIDE
100+OFFICES
ACROSS
THE GLOBE
395PATENTS
316 IN
PROCESS
ISSUED
3.4mSHIPPED
SECURITY
DEVICES
340K
CUSTOMERS
$10bn
MARKET CAP
IN EXCESS OF
$1.46bn
IN CASH
30%
SHIPPED WORLDWIDE
OF ALL
APPLIANCES
2000BY KEN XIE
FOUNDED IN
HEADQUARTERED IN
SUNNYVALE
CALIFORNIA
4
Fortinet Gaining Share in a Growing Market
-
100,000
200,000
300,000
400,000
500,000
600,000
700,000
2011 2012 2013 2014 2015 2016
Cisco
Check Point
Juniper Networks
Palo Alto Networks
5
Number 1 Security Vendor in Ireland since 2012
10
1 1 1 1 11 1 1 1 1
2009 2012 2013 2014 2015 2016
Market Position
6
Unequalled Third-Party Certifications
11Cisco 4
Check Point 4
Palo Alto Networks 2
DCIPSAEP WAF NGFW NGFW BDS NGIPS BPS DCSG DCSG DCIPS
#1 Certified Security Vendor
2017 & 2018 Results
7
NETWORK
FortiGate VMPartner API
FortiMailFortiAP | FortiSwitch
FortiClient FortiWeb
FortiSandbox
FortiManager | FortiAnalyzer | FortiSIEM
FortiOS
FORTINET
SECURITY
FABRIC
BROAD
INTEGRATED
AUTOMATED FortiGuard
Visibility & Protection of the
Digital Attack Surface
Detection of Advanced Threats
Response & Continuous Trust
Assessment
8
What are zero day threats?
9
When is signature based malware
detection not enough?
“a unique hash does not mean you have been
targeted by an ultra-sophisticated group of nation
state malware ninjas”
10
Threat actors have changed
Motivation: notoriety, curiosity Motivation: make money
Script Kiddie Cyber Crime Organisations
11
1. DIY Crypters
12
2. Managed malware crypting services
13
3. Polymorphism
14
Data breaches result from the unknown
15
FortiSandbox
Product Overview
16
How does FortiSandbox
detect unknown and zero day threats?
17
FortiSandbox: Life of a Sample
Code Emulation focuses on encrypted and/or packed
malware.
No code evasion possible as this code is not run.
Step 1 – Code Emulation 1
18
FortiSandbox: Life of a Sample
Realtime AV Engine decrypts, decodes then tracks
behaviors of polymorphic code.
Step 2 – Realtime AV Engine 2
19
FortiSandbox: Life of a Sample
Complex Pattern Recognition Language (patented)
is used to detect suspicious code and behaviour of
a virus and all variants.
Step 3 – CPRL 3
20
FortiSandbox: Life of a Sample
A hash of the file is sent to Fortiguard Service and
checked against our intelligence database.
Step 4 – Cloud Query 4
21
FortiSandbox: Life of a Sample
The file is executed in a virtual machine and full
behavioural analysis takes place.
• Windows, android and mac releases supported.
• Anti Evasion techniques
• Analysis performed by a sophisticated tracer engine.
• Network activity is captured, all processes are detailed and
listed, all changes are tracked, logs and original files are
available for download.
Step 5 – VM Scan Engine 5
22
Unique Multi-tiered Approach
Code Emulation
Realtime AV Engine
CPRL with full DB
Cloud Query
Execution in a VM
Fortimail AV
Code Emulation
Realtime AV Engine
CPRL with full DB
Cloud Query
Execution in a VM
Fortiweb AV
Improved Performance
23
Deployment Options
Hardware Appliances
• 4 models
• 480 – 3,600 real-world
throughput (objects/hr)
SaaS
• Fortinet managed
• Supports FortiGate,
FortiMail, FortiWeb,
FortiADC
• Available as a add-on
service or in a bundle
Virtual Appliances
• CPU-based
• 4 – 792 VMs*
AWS FortiSandbox VM
24
Integration with other Fortinet Products
25
Integration with third party technology
Anyserver
Or share CIFS
push
poll
API
• File share scanning
• Open API
• Network Sniffer
• Fabric Partners
• ICAP
26
Fortinet Security Fabric
in action
27
Mail Relay
Sandbox
Firewall
Mail Server
Global share ATP
database
Without Fortinet Fabric - Patient Zero
?
?
? Infected !
28
FortiSandbox
Fortigate
FortiMail
Mail Server
Global share ATP
database
With Fortinet Fabric - No Patient Zero
✓ Clean !
?
…the same with forticlient !
29
Summary
• Zero day malware is easily produced these days
• Zero day malware is common and short-lived
• Traditional defences can detect known good and known bad
• Sandboxing technology is the only proven technology to detect unknown threats
• FortiSandbox has the most flexible input options of any vender solution on the
market and will integrate with all of your existing Security Fabric elements
QUESTIONS?

More Related Content

What's hot

ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
Cisco Canada
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
Cisco Canada
 
Cisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better TogetherCisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better Together
Lancope, Inc.
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
Oscar Romano
 
CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
mohannadalhanahnah
 
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
Cisco Canada
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Canada
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn security
Jack Melson
 
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Canada
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Canada
 
Hope, fear, and the data center time machine
Hope, fear, and the data center time machineHope, fear, and the data center time machine
Hope, fear, and the data center time machine
Cisco Canada
 
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Canada
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
Cisco Enterprise Networks
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
Belsoft
 
Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0
Shamal Abeyrathne
 
Cisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is nowCisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is now
Cisco Canada
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
Amazon Web Services
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation Firewall
Cisco Canada
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simple
Cisco Canada
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
Robb Boyd
 

What's hot (20)

ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Cisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better TogetherCisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better Together
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
 
CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
 
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn security
 
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Hope, fear, and the data center time machine
Hope, fear, and the data center time machineHope, fear, and the data center time machine
Hope, fear, and the data center time machine
 
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven Telemetry
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0
 
Cisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is nowCisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is now
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation Firewall
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simple
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
 

Similar to Novosco Zero day protection webinar

Fortinet Tanıtım
Fortinet TanıtımFortinet Tanıtım
Fortinet Tanıtım
Güney Bilişim
 
Fortinet Broşür
Fortinet BroşürFortinet Broşür
Fortinet Broşür
Güney Bilişim
 
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PROIDEA
 
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PROIDEA
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
Nick Straughan
 
Forti gate 90d
Forti gate 90dForti gate 90d
Forti gate 90d
Erick Celada
 
Forti gate 90d
Forti gate 90dForti gate 90d
Forti gate 90d
hape01
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
Mirza Bilal Baig
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
internetbrasil
 
V Mworld 2010 Lab Cloud
V Mworld 2010 Lab CloudV Mworld 2010 Lab Cloud
V Mworld 2010 Lab Cloud
csharney
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Nancy Nimmegeers
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012
Agora Group
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
ssuserfb92ae
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
Michele Vecchione
 
Reallinx 2011 product catalog v1.5
Reallinx 2011 product catalog v1.5Reallinx 2011 product catalog v1.5
Reallinx 2011 product catalog v1.5
Bryan Lambert
 
Profinet for IIoT and Industry 4 - Derek Lane
Profinet for IIoT and Industry 4 - Derek LaneProfinet for IIoT and Industry 4 - Derek Lane
Profinet for IIoT and Industry 4 - Derek Lane
PROFIBUS and PROFINET InternationaI - PI UK
 
Salesforce Cloud Security
Salesforce Cloud SecuritySalesforce Cloud Security
Salesforce Cloud Security
waubin
 
Fortinet Perspectiva Coporativa
Fortinet Perspectiva CoporativaFortinet Perspectiva Coporativa
Fortinet Perspectiva Coporativa
Suministros Obras y Sistemas
 
Industry 4 and the industrial internet of things - Derek Lane
Industry 4 and the industrial internet of things - Derek LaneIndustry 4 and the industrial internet of things - Derek Lane
Industry 4 and the industrial internet of things - Derek Lane
PROFIBUS and PROFINET InternationaI - PI UK
 
Policy in OpenStack - Martin Casado, CTO, VMware - OpenStackSV 2014
Policy in OpenStack - Martin Casado, CTO, VMware - OpenStackSV 2014Policy in OpenStack - Martin Casado, CTO, VMware - OpenStackSV 2014
Policy in OpenStack - Martin Casado, CTO, VMware - OpenStackSV 2014
Mirantis
 

Similar to Novosco Zero day protection webinar (20)

Fortinet Tanıtım
Fortinet TanıtımFortinet Tanıtım
Fortinet Tanıtım
 
Fortinet Broşür
Fortinet BroşürFortinet Broşür
Fortinet Broşür
 
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
 
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
Forti gate 90d
Forti gate 90dForti gate 90d
Forti gate 90d
 
Forti gate 90d
Forti gate 90dForti gate 90d
Forti gate 90d
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
 
V Mworld 2010 Lab Cloud
V Mworld 2010 Lab CloudV Mworld 2010 Lab Cloud
V Mworld 2010 Lab Cloud
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 
Reallinx 2011 product catalog v1.5
Reallinx 2011 product catalog v1.5Reallinx 2011 product catalog v1.5
Reallinx 2011 product catalog v1.5
 
Profinet for IIoT and Industry 4 - Derek Lane
Profinet for IIoT and Industry 4 - Derek LaneProfinet for IIoT and Industry 4 - Derek Lane
Profinet for IIoT and Industry 4 - Derek Lane
 
Salesforce Cloud Security
Salesforce Cloud SecuritySalesforce Cloud Security
Salesforce Cloud Security
 
Fortinet Perspectiva Coporativa
Fortinet Perspectiva CoporativaFortinet Perspectiva Coporativa
Fortinet Perspectiva Coporativa
 
Industry 4 and the industrial internet of things - Derek Lane
Industry 4 and the industrial internet of things - Derek LaneIndustry 4 and the industrial internet of things - Derek Lane
Industry 4 and the industrial internet of things - Derek Lane
 
Policy in OpenStack - Martin Casado, CTO, VMware - OpenStackSV 2014
Policy in OpenStack - Martin Casado, CTO, VMware - OpenStackSV 2014Policy in OpenStack - Martin Casado, CTO, VMware - OpenStackSV 2014
Policy in OpenStack - Martin Casado, CTO, VMware - OpenStackSV 2014
 

More from Novosco

Cloudy with a Chance of Failure - Novosco
Cloudy with a Chance of Failure - NovoscoCloudy with a Chance of Failure - Novosco
Cloudy with a Chance of Failure - Novosco
Novosco
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Novosco
 
Cloud Application Discovery
Cloud Application Discovery Cloud Application Discovery
Cloud Application Discovery
Novosco
 
Novosco Building IT Resilience Webinar
Novosco Building IT Resilience Webinar Novosco Building IT Resilience Webinar
Novosco Building IT Resilience Webinar
Novosco
 
Lets talk data security
Lets talk data securityLets talk data security
Lets talk data security
Novosco
 
Let talk Citrix
Let talk CitrixLet talk Citrix
Let talk Citrix
Novosco
 
Webinar: Lets talk Office 365
Webinar: Lets talk Office 365Webinar: Lets talk Office 365
Webinar: Lets talk Office 365
Novosco
 
Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017
Novosco
 
VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017
Novosco
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
Novosco
 
Let's Talk Webinar - Disaster Recovery for Business
Let's Talk Webinar - Disaster Recovery for BusinessLet's Talk Webinar - Disaster Recovery for Business
Let's Talk Webinar - Disaster Recovery for Business
Novosco
 
Novosco software defined storage webinar
Novosco software defined storage webinarNovosco software defined storage webinar
Novosco software defined storage webinar
Novosco
 
Novosco ransomware webinar presentation
Novosco ransomware webinar presentationNovosco ransomware webinar presentation
Novosco ransomware webinar presentation
Novosco
 
Prevention is not enough
Prevention is not enoughPrevention is not enough
Prevention is not enough
Novosco
 
The Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid CloudThe Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid Cloud
Novosco
 
Dell EMC Spanning
Dell EMC SpanningDell EMC Spanning
Dell EMC Spanning
Novosco
 
Microsoft Azure
Microsoft AzureMicrosoft Azure
Microsoft Azure
Novosco
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365
Novosco
 
Novosco Hosted Skype for Business
Novosco Hosted Skype for BusinessNovosco Hosted Skype for Business
Novosco Hosted Skype for Business
Novosco
 
Evolution of hybrid cloud
Evolution of hybrid cloudEvolution of hybrid cloud
Evolution of hybrid cloud
Novosco
 

More from Novosco (20)

Cloudy with a Chance of Failure - Novosco
Cloudy with a Chance of Failure - NovoscoCloudy with a Chance of Failure - Novosco
Cloudy with a Chance of Failure - Novosco
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
 
Cloud Application Discovery
Cloud Application Discovery Cloud Application Discovery
Cloud Application Discovery
 
Novosco Building IT Resilience Webinar
Novosco Building IT Resilience Webinar Novosco Building IT Resilience Webinar
Novosco Building IT Resilience Webinar
 
Lets talk data security
Lets talk data securityLets talk data security
Lets talk data security
 
Let talk Citrix
Let talk CitrixLet talk Citrix
Let talk Citrix
 
Webinar: Lets talk Office 365
Webinar: Lets talk Office 365Webinar: Lets talk Office 365
Webinar: Lets talk Office 365
 
Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017
 
VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
Let's Talk Webinar - Disaster Recovery for Business
Let's Talk Webinar - Disaster Recovery for BusinessLet's Talk Webinar - Disaster Recovery for Business
Let's Talk Webinar - Disaster Recovery for Business
 
Novosco software defined storage webinar
Novosco software defined storage webinarNovosco software defined storage webinar
Novosco software defined storage webinar
 
Novosco ransomware webinar presentation
Novosco ransomware webinar presentationNovosco ransomware webinar presentation
Novosco ransomware webinar presentation
 
Prevention is not enough
Prevention is not enoughPrevention is not enough
Prevention is not enough
 
The Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid CloudThe Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid Cloud
 
Dell EMC Spanning
Dell EMC SpanningDell EMC Spanning
Dell EMC Spanning
 
Microsoft Azure
Microsoft AzureMicrosoft Azure
Microsoft Azure
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365
 
Novosco Hosted Skype for Business
Novosco Hosted Skype for BusinessNovosco Hosted Skype for Business
Novosco Hosted Skype for Business
 
Evolution of hybrid cloud
Evolution of hybrid cloudEvolution of hybrid cloud
Evolution of hybrid cloud
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Novosco Zero day protection webinar

  • 1. © Copyright Fortinet Inc. All rights reserved. Protect your Organisation from Zero Day & Unknown Threats With the Fortinet Security Fabric Conor Byrne 21.06.2018
  • 3. 3 Fortinet Global Network Security Leader 4,900+ EMPLOYEES WORLDWIDE 100+OFFICES ACROSS THE GLOBE 395PATENTS 316 IN PROCESS ISSUED 3.4mSHIPPED SECURITY DEVICES 340K CUSTOMERS $10bn MARKET CAP IN EXCESS OF $1.46bn IN CASH 30% SHIPPED WORLDWIDE OF ALL APPLIANCES 2000BY KEN XIE FOUNDED IN HEADQUARTERED IN SUNNYVALE CALIFORNIA
  • 4. 4 Fortinet Gaining Share in a Growing Market - 100,000 200,000 300,000 400,000 500,000 600,000 700,000 2011 2012 2013 2014 2015 2016 Cisco Check Point Juniper Networks Palo Alto Networks
  • 5. 5 Number 1 Security Vendor in Ireland since 2012 10 1 1 1 1 11 1 1 1 1 2009 2012 2013 2014 2015 2016 Market Position
  • 6. 6 Unequalled Third-Party Certifications 11Cisco 4 Check Point 4 Palo Alto Networks 2 DCIPSAEP WAF NGFW NGFW BDS NGIPS BPS DCSG DCSG DCIPS #1 Certified Security Vendor 2017 & 2018 Results
  • 7. 7 NETWORK FortiGate VMPartner API FortiMailFortiAP | FortiSwitch FortiClient FortiWeb FortiSandbox FortiManager | FortiAnalyzer | FortiSIEM FortiOS FORTINET SECURITY FABRIC BROAD INTEGRATED AUTOMATED FortiGuard Visibility & Protection of the Digital Attack Surface Detection of Advanced Threats Response & Continuous Trust Assessment
  • 8. 8 What are zero day threats?
  • 9. 9 When is signature based malware detection not enough? “a unique hash does not mean you have been targeted by an ultra-sophisticated group of nation state malware ninjas”
  • 10. 10 Threat actors have changed Motivation: notoriety, curiosity Motivation: make money Script Kiddie Cyber Crime Organisations
  • 12. 12 2. Managed malware crypting services
  • 14. 14 Data breaches result from the unknown
  • 16. 16 How does FortiSandbox detect unknown and zero day threats?
  • 17. 17 FortiSandbox: Life of a Sample Code Emulation focuses on encrypted and/or packed malware. No code evasion possible as this code is not run. Step 1 – Code Emulation 1
  • 18. 18 FortiSandbox: Life of a Sample Realtime AV Engine decrypts, decodes then tracks behaviors of polymorphic code. Step 2 – Realtime AV Engine 2
  • 19. 19 FortiSandbox: Life of a Sample Complex Pattern Recognition Language (patented) is used to detect suspicious code and behaviour of a virus and all variants. Step 3 – CPRL 3
  • 20. 20 FortiSandbox: Life of a Sample A hash of the file is sent to Fortiguard Service and checked against our intelligence database. Step 4 – Cloud Query 4
  • 21. 21 FortiSandbox: Life of a Sample The file is executed in a virtual machine and full behavioural analysis takes place. • Windows, android and mac releases supported. • Anti Evasion techniques • Analysis performed by a sophisticated tracer engine. • Network activity is captured, all processes are detailed and listed, all changes are tracked, logs and original files are available for download. Step 5 – VM Scan Engine 5
  • 22. 22 Unique Multi-tiered Approach Code Emulation Realtime AV Engine CPRL with full DB Cloud Query Execution in a VM Fortimail AV Code Emulation Realtime AV Engine CPRL with full DB Cloud Query Execution in a VM Fortiweb AV Improved Performance
  • 23. 23 Deployment Options Hardware Appliances • 4 models • 480 – 3,600 real-world throughput (objects/hr) SaaS • Fortinet managed • Supports FortiGate, FortiMail, FortiWeb, FortiADC • Available as a add-on service or in a bundle Virtual Appliances • CPU-based • 4 – 792 VMs* AWS FortiSandbox VM
  • 24. 24 Integration with other Fortinet Products
  • 25. 25 Integration with third party technology Anyserver Or share CIFS push poll API • File share scanning • Open API • Network Sniffer • Fabric Partners • ICAP
  • 27. 27 Mail Relay Sandbox Firewall Mail Server Global share ATP database Without Fortinet Fabric - Patient Zero ? ? ? Infected !
  • 28. 28 FortiSandbox Fortigate FortiMail Mail Server Global share ATP database With Fortinet Fabric - No Patient Zero ✓ Clean ! ? …the same with forticlient !
  • 29. 29 Summary • Zero day malware is easily produced these days • Zero day malware is common and short-lived • Traditional defences can detect known good and known bad • Sandboxing technology is the only proven technology to detect unknown threats • FortiSandbox has the most flexible input options of any vender solution on the market and will integrate with all of your existing Security Fabric elements