SlideShare a Scribd company logo
© Copyright Fortinet Inc. All rights reserved.
Secure Access Architecture
Alessandro Berta – Systems Engineer
15 Aprile 2016
2
Trend: Device Growth Continues
More devices and newer device types are entering the network
 33 Billion endpoints projected to
be connected by 2020 – Gartner
 New device types entering the
network
» ‘headless’ IoT, wireless sensor
nodes, beacons, wearables
3
Trend: Devices Going Wireless
Wi-Fi becoming the primary access medium
© Nemertes Research, August 2015
9%
7%
13%
35%
36%
0% 10% 20% 30% 40% 50%
Other
ZigBee
Bluetooth
Wi-Fi
Ethernet
Percent of Respondents
LANAccessTechnologies
2014
• Each generation of Wi-Fi technology accelerates the migration
to wireless for users
IoT Access Technology Predications
© Infonetics, M2M Strategies by Vertical: N. American Enterprise Survey, January 2014
64%
Wireless
• IoT devices going wireless
4
Trend: Need for More Speed
Migration to 802.11ac continues
1st Generation
1997-1998
2nd Generation
1999-2001
3rd Generation
2002-2006
4th Generation
2007-2011
5th Generation
Now
802.11
2 Mbps
802.11b
11 Mbps
802.11g/a
54 Mbps
802.11n
450 Mbps
802.11ac
Gigabit Mbps
Infonetics, Wireless LAN Equipment Quarterly Worldwide and Regional Market Share: 4Q14
Migration to 802.11acWi-Fi Standards Evolution
5
Trend: Seamless User Experience
A unified access experience is the expected norm
 Users utilize multiple devices in the enterprise
» Wireless: smartphone, tablets
» Wired: desktops, workstations
 Consistent user experience is the norm
» Consistent policies for access, application, security
 Seamless device experience
» New device types must be provisioned appropriately
» “Headless” devices – IoT
Access
Points
Switch
Wireless Wired
Authentication
6
Wireless - the Weakest Link
Endpoint
Core network
infrastructure
Wireless Databases Applications Storage Email
Worldwide 45% 29% 49% 25% 17% 11% 25%
Americas 43% 28% 50% 27% 17% 12% 23%
EMEA 47% 27% 52% 22% 17% 10% 24%
APAC 43% 31% 44% 25% 18% 10% 29%
0%
10%
20%
30%
40%
50%
60%
WLAN Ranked as the Most Vulnerable IT infrastructure
Source: Fortinet Security Census 2015, 1490 respondents
7
Expectations are on the Rise
Need More Speed
Migration to 802.11ac
Seamless
Unified Experience
Unified Network
Operations
Application Growth
Move to wireless
Device Growth
8
Combine Security and Access
Need More Speed
Migration to 802.11ac
Seamless
Unified Experience
Unified Network
Operations
Application Growth
Move to wireless
Device Growth
SECURE ACCESS
ARCHITECTURE
9
FortiPresence FortiAuthenticator
FortiManager FortiWLM
FortiClient FortiWiFi
FortiWLC
FortiAP
FortiGate Controller
FortiSwitch (POE)
SECURE ACCESS
ARCHITECTURE
N
Why Fortinet?
10
Complete Secure Access Offerings
Note: formally Meru Networks
Cloud
APSwitch
Cloud
(Cloud Management)
Security
+
WLAN Management
APSwitch
Integrated
(Integrated Controller)
AP
Security
WLAN
Management
Switch
Infrastructure
(Dedicated Controller)
1 2 3
11
Fortinet Offers More Choices
Infrastructure
(Dedicated Controller)
Integrated
(Integrated Controller)
Cloud
(Cloud Management)
Distributed Enterprise
(Retail / QSR)  
Healthcare / Financials  
K-12 / Primary / Secondary
School  
Higher Education 
Large Public Venue 
Infrastructure Wireless
Secure Access Architecture
13
Why Infrastructure?
1
 Mobile: Fit for highly mobile deployments
 Flexible: Many deployment options
 Stand-alone: Able to separate access purchase decision from security
FortiWLC-50D
FortiWLC-200D
FortiWLC-500D
Infrastructure Wireless
14
Infrastructure Wireless
Multi-Channel
One channel to simplify deployment
and seamless roaming
Multiple channels to maximize
spectrum reuse and performance
Single Channel + Virtual Cell
36 36 36
36 36 36 36
36 36 36
Multiple channels to segment
application traffic and add capacity
Channel Layers + Virtual Cells
36 36 36
36 36 36 36
58 58 5844 44 44
44 44 44 44
42 42 42
149 149 149
149 149 149 149
149 149 149
1
15
Infrastructure Wireless
Network In Control
Fortinet decides when clients roam for best
possible user experience in time-sensitive
applications.
Mobile
Fit for highly mobile and scalable deployments
where low latency and roaming support matter
Controlling the User Experience
1
16
Client-in-control: the “Sticky Clients” issue
Scanners and VoIP handsets re-charging in the cradles
1
17
Client-in-control: the “Sticky Clients” issue
WiFi Client tend to stick to the same AP, depending on their NIC driver
1
18
Client-in-control: the “Sticky Clients” issue
The AP-Client links are barely optimized. Many connections are at long distance, weak
signal, low data rate, scarce throughput.
1
19
Network-in-control
Optimized Distribution of Clients
Wi-Fi Clients are always associated to the best AP: higher signal, faster data rate, better
performance, AP’s are not congested by far-away clients.
1
20
Roaming is really Seamless and at the right time
20
X
Multi-Channel
Virtual Cell
100 ms – 3 seconds
between handoff 5 - 10 ms
between handoff
X
1
Integrated Wireless
Secure Access Architecture
22
Integrated Wireless
Security Access
Control
 Enterprise WLAN controller
 Rogue AP and WIDS
 Integrated captive portal
 Tunnel, bridge and mesh
 Single pane of glass
 Unified wired/wireless
 Application control
 FortiGuard Services
Security
2
23
Integrated Wireless
 Every FortiGate includes a WLAN controller
 Largest range of controllers in the industry
 Support ranges from 5 APs (100 users) up to 10K APs
(32,000 users)
2
WiFi > SSID2
FortiView > Device topology (SSID and VLAN)2
FortiView > Applications2
FortiView > Applications > Drill Down > Sessions2
FortiView > Threat Map2
Cloud Wireless
Secure Access Architecture
30
Why Cloud?
3
FAP-S323C
802.11ac
3x3:3
FAP-S321C
802.11ac
3x3:3
 Secure: Industry’s only UTM + AP solution
 Cloud: Roll out remote sites in minutes - not hours and days
 Controller-less: Wi-Fi without the complexity of on premise controllers
Cloud Wireless
31
Competitor Cloud Wi-Fi FortiAP-S Series
Connection
Credential Lookup
Authentication
Gap in Security
Protection
Continue to Wire
Connection
Credential Lookup
Authentication
IPS, AV, Botnet
URL Filter, App Control
Continue to Wire
 Managed by FortiCloud
 No controller required
 FortiGuard services run on each AP
 Simplifies deployment and management
Cloud Wireless3
32
Cloud Wireless
Intrusion Prevention System
Antivirus and Anti-botnet
L7 Application Control
Web Filtering
3
Other Secure Access related products
Secure Access Architecture
34
FortiPlanner
 Wireless LAN Planning and Real-Time Visualization Software
 Free download for deployments of up to 30 FortiAPs.
 Pro license supports unlimited FortiAPs and enables Site Survey and Real-Time
Heat-map features
FortiPlanner wireless deployment planning FortiPlanner wireless site survey
35
FortiPresence
Presence Analytics Solution
Uses existing in-store FortiAP or FortiWiFi access points to collect the WiFi signal information from the
smartphones of visitors.
 Solution Components:
» FortiAP or FortiWiFi - Detects WiFi signal from smartphones
» FortiGate or FortiWLC - Aggregates signal information from multiple APs
» FortiPresence Cloud – Processes data and presents analytics on dashboard
FortiPresence
36
FortiPresence
 Total visitor traffic
 Real time visit capture rate
 Dwell time duration
 A/B comparison across stores
 Repeat visitors, frequency
 VIP Alert
 Heat maps with animated flows
 Real-time density, staff resources
 Measure marketing campaign effectiveness
37
FortiSwitch
Why FortiSwitch?  Control: Managed and secured from FortiGate GUI
 Power: Full PoE+ power for APs and other Power over Ethernet devices
 Stackable: 1GbE, 10GbE and 40GbE with stacking capability
38
FortiGate Switch Management
» Fortilink protocol for secure
management
» Visibility into port speed/status
» Centrally manage VLANs
» Apply security policy
» Authenticate clients centrally via
802.1x or captive portal
FortiSwitch
39
FortiPresence FortiAuthenticator
FortiManager FortiWLM
FortiClient FortiWiFi
FortiWLC
FortiAP
FortiGate Controller
FortiSwitch (POE)
SECURE ACCESS
ARCHITECTURE
N
Secure Access Architecture

More Related Content

What's hot

Fortinet Tanıtım
Fortinet TanıtımFortinet Tanıtım
Fortinet Tanıtım
Güney Bilişim
 
Fortinet FortiGate 100D
Fortinet FortiGate 100DFortinet FortiGate 100D
Fortinet FortiGate 100D
Hoai Duyen
 
Frost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products MarketFrost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products Market
NetMotion Wireless
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
John Rhoton
 
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PROIDEA
 
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
Mikael Falkvidd
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Tap Into the Health of Your Network
Tap Into the Health of Your NetworkTap Into the Health of Your Network
Tap Into the Health of Your Network
LiveAction Next Generation Network Management Software
 
Juniper sa-sslvpn
Juniper sa-sslvpnJuniper sa-sslvpn
IoT Wireless Technologies
IoT Wireless TechnologiesIoT Wireless Technologies
IoT Wireless Technologies
NEXT INDUSTRIES SRL
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
Fortinet
 
Mikael Falkvidd IoT - Stena AB Faster Forward
Mikael Falkvidd IoT - Stena AB Faster ForwardMikael Falkvidd IoT - Stena AB Faster Forward
Mikael Falkvidd IoT - Stena AB Faster Forward
Mikael Falkvidd
 
Infonetics and Stoke webinar: Security at the speed of VoLTE
Infonetics and Stoke webinar: Security at the speed of VoLTEInfonetics and Stoke webinar: Security at the speed of VoLTE
Infonetics and Stoke webinar: Security at the speed of VoLTE
Mary McEvoy Carroll
 
Fortinet
FortinetFortinet
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 

What's hot (20)

UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)
 
Fortinet Tanıtım
Fortinet TanıtımFortinet Tanıtım
Fortinet Tanıtım
 
Managed IP solution
Managed IP solutionManaged IP solution
Managed IP solution
 
Fortinet FortiGate 100D
Fortinet FortiGate 100DFortinet FortiGate 100D
Fortinet FortiGate 100D
 
Fire Eye Appliance Quick Start
Fire Eye Appliance Quick StartFire Eye Appliance Quick Start
Fire Eye Appliance Quick Start
 
Frost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products MarketFrost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products Market
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
 
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Wi fi
Wi fiWi fi
Wi fi
 
Tap Into the Health of Your Network
Tap Into the Health of Your NetworkTap Into the Health of Your Network
Tap Into the Health of Your Network
 
Juniper sa-sslvpn
Juniper sa-sslvpnJuniper sa-sslvpn
Juniper sa-sslvpn
 
IoT Wireless Technologies
IoT Wireless TechnologiesIoT Wireless Technologies
IoT Wireless Technologies
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
 
Mikael Falkvidd IoT - Stena AB Faster Forward
Mikael Falkvidd IoT - Stena AB Faster ForwardMikael Falkvidd IoT - Stena AB Faster Forward
Mikael Falkvidd IoT - Stena AB Faster Forward
 
Infonetics and Stoke webinar: Security at the speed of VoLTE
Infonetics and Stoke webinar: Security at the speed of VoLTEInfonetics and Stoke webinar: Security at the speed of VoLTE
Infonetics and Stoke webinar: Security at the speed of VoLTE
 
Fortinet
FortinetFortinet
Fortinet
 
Product Overview Nov 2010 V1
Product Overview Nov 2010 V1Product Overview Nov 2010 V1
Product Overview Nov 2010 V1
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 

Viewers also liked

Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationNCS Computech Ltd.
 
Evento 15 aprile
Evento 15 aprileEvento 15 aprile
Evento 15 aprile
Lan & Wan Solutions
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
Lan & Wan Solutions
 
Openworld presentation
Openworld presentationOpenworld presentation
Openworld presentationRavi Rathore
 
Fortinet. Алексей Андрияшин. "Стратегический подход к противодействию совреме...
Fortinet. Алексей Андрияшин. "Стратегический подход к противодействию совреме...Fortinet. Алексей Андрияшин. "Стратегический подход к противодействию совреме...
Fortinet. Алексей Андрияшин. "Стратегический подход к противодействию совреме...
Expolink
 
Presentation fortinet securing the cloud
Presentation   fortinet securing the cloudPresentation   fortinet securing the cloud
Presentation fortinet securing the cloudxKinAnx
 
2016 Edelman TRUST BAROMETER - Global Results
2016 Edelman TRUST BAROMETER - Global Results2016 Edelman TRUST BAROMETER - Global Results
2016 Edelman TRUST BAROMETER - Global Results
Edelman
 

Viewers also liked (8)

Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
 
Evento 15 aprile
Evento 15 aprileEvento 15 aprile
Evento 15 aprile
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
 
Forti presence
Forti presenceForti presence
Forti presence
 
Openworld presentation
Openworld presentationOpenworld presentation
Openworld presentation
 
Fortinet. Алексей Андрияшин. "Стратегический подход к противодействию совреме...
Fortinet. Алексей Андрияшин. "Стратегический подход к противодействию совреме...Fortinet. Алексей Андрияшин. "Стратегический подход к противодействию совреме...
Fortinet. Алексей Андрияшин. "Стратегический подход к противодействию совреме...
 
Presentation fortinet securing the cloud
Presentation   fortinet securing the cloudPresentation   fortinet securing the cloud
Presentation fortinet securing the cloud
 
2016 Edelman TRUST BAROMETER - Global Results
2016 Edelman TRUST BAROMETER - Global Results2016 Edelman TRUST BAROMETER - Global Results
2016 Edelman TRUST BAROMETER - Global Results
 

Similar to Secure Access Architecture

Firetide GSA Wireless Mesh Nodes
Firetide GSA Wireless Mesh NodesFiretide GSA Wireless Mesh Nodes
Firetide GSA Wireless Mesh Nodes
Paul Richards
 
Firetide Wireless Mesh Nodes for Commercial
Firetide Wireless Mesh Nodes for CommercialFiretide Wireless Mesh Nodes for Commercial
Firetide Wireless Mesh Nodes for Commercial
Paul Richards
 
Wireless World
Wireless World Wireless World
Wireless World
bhattsipl
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
ssuser5824cf
 
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
PawachMetharattanara
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless Network
SecurEdgeNetworks
 
Fortinet
FortinetFortinet
Fortinet
ABEP123
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
DATA SECURITY SOLUTIONS
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
Exclusive Networks ME
 
Tropos Sales Overview 081704
Tropos Sales Overview 081704Tropos Sales Overview 081704
Tropos Sales Overview 081704Ayça Apak Tonge
 
Fortinet k
Fortinet kFortinet k
Fortinet k
mrehan2k2
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTM
sharetech
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
International Communications Corporation
 
Assess security from sensors to api c4 i 20151126
Assess security from sensors to api c4 i 20151126Assess security from sensors to api c4 i 20151126
Assess security from sensors to api c4 i 20151126
Denis Rousset
 
Manging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkManging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkSecurEdgeNetworks
 
Taking Wi-Fi Where It’s Never Gone Before
Taking Wi-Fi Where It’s Never Gone BeforeTaking Wi-Fi Where It’s Never Gone Before
Taking Wi-Fi Where It’s Never Gone Before
TelExcell Information Systems Ltd. New Delhi
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
NetworkCollaborators
 
Aerohive - The Connected Experience
Aerohive - The Connected ExperienceAerohive - The Connected Experience
Aerohive - The Connected Experience
VITO - Securitas
 

Similar to Secure Access Architecture (20)

Firetide GSA Wireless Mesh Nodes
Firetide GSA Wireless Mesh NodesFiretide GSA Wireless Mesh Nodes
Firetide GSA Wireless Mesh Nodes
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Firetide Wireless Mesh Nodes for Commercial
Firetide Wireless Mesh Nodes for CommercialFiretide Wireless Mesh Nodes for Commercial
Firetide Wireless Mesh Nodes for Commercial
 
Wireless World
Wireless World Wireless World
Wireless World
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
 
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless Network
 
Fortinet
FortinetFortinet
Fortinet
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
 
Tropos Sales Overview 081704
Tropos Sales Overview 081704Tropos Sales Overview 081704
Tropos Sales Overview 081704
 
Fortinet k
Fortinet kFortinet k
Fortinet k
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTM
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
 
Assess security from sensors to api c4 i 20151126
Assess security from sensors to api c4 i 20151126Assess security from sensors to api c4 i 20151126
Assess security from sensors to api c4 i 20151126
 
Manging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkManging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless Network
 
4ipnet_Product_Catalogue_2016
4ipnet_Product_Catalogue_20164ipnet_Product_Catalogue_2016
4ipnet_Product_Catalogue_2016
 
Taking Wi-Fi Where It’s Never Gone Before
Taking Wi-Fi Where It’s Never Gone BeforeTaking Wi-Fi Where It’s Never Gone Before
Taking Wi-Fi Where It’s Never Gone Before
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
Aerohive - The Connected Experience
Aerohive - The Connected ExperienceAerohive - The Connected Experience
Aerohive - The Connected Experience
 

More from Lan & Wan Solutions

CYBER THREAT ASSESSMENT
CYBER THREAT ASSESSMENTCYBER THREAT ASSESSMENT
CYBER THREAT ASSESSMENT
Lan & Wan Solutions
 
Nuova presentazione Lan & Wan Solutions Fortinet Partner
Nuova presentazione Lan & Wan Solutions Fortinet PartnerNuova presentazione Lan & Wan Solutions Fortinet Partner
Nuova presentazione Lan & Wan Solutions Fortinet Partner
Lan & Wan Solutions
 
Nuova presentazione Lan & Wan Solutions
Nuova presentazione Lan & Wan SolutionsNuova presentazione Lan & Wan Solutions
Nuova presentazione Lan & Wan Solutions
Lan & Wan Solutions
 
Mc business solutions set
Mc business solutions setMc business solutions set
Mc business solutions set
Lan & Wan Solutions
 
Mc partner playbook
Mc partner playbookMc partner playbook
Mc partner playbook
Lan & Wan Solutions
 
160415 lan and-wan-ctap
160415 lan and-wan-ctap160415 lan and-wan-ctap
160415 lan and-wan-ctap
Lan & Wan Solutions
 
Lan & Wan
Lan & WanLan & Wan
Advanced Threat Protection
Advanced Threat ProtectionAdvanced Threat Protection
Advanced Threat Protection
Lan & Wan Solutions
 
scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22
Lan & Wan Solutions
 
scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22
Lan & Wan Solutions
 
Scheda tecnica hspa 08
Scheda tecnica hspa 08Scheda tecnica hspa 08
Scheda tecnica hspa 08
Lan & Wan Solutions
 
Antenne filari
Antenne filariAntenne filari
Antenne filari
Lan & Wan Solutions
 
Antenne multifilari
Antenne multifilariAntenne multifilari
Antenne multifilari
Lan & Wan Solutions
 
Emea nutanix overview presentation emea
Emea  nutanix overview presentation emeaEmea  nutanix overview presentation emea
Emea nutanix overview presentation emea
Lan & Wan Solutions
 

More from Lan & Wan Solutions (20)

CYBER THREAT ASSESSMENT
CYBER THREAT ASSESSMENTCYBER THREAT ASSESSMENT
CYBER THREAT ASSESSMENT
 
Nuova presentazione Lan & Wan Solutions Fortinet Partner
Nuova presentazione Lan & Wan Solutions Fortinet PartnerNuova presentazione Lan & Wan Solutions Fortinet Partner
Nuova presentazione Lan & Wan Solutions Fortinet Partner
 
Nuova presentazione Lan & Wan Solutions
Nuova presentazione Lan & Wan SolutionsNuova presentazione Lan & Wan Solutions
Nuova presentazione Lan & Wan Solutions
 
CTAP
CTAPCTAP
CTAP
 
Mc business solutions set
Mc business solutions setMc business solutions set
Mc business solutions set
 
Mc partner playbook
Mc partner playbookMc partner playbook
Mc partner playbook
 
160415 lan and-wan-ctap
160415 lan and-wan-ctap160415 lan and-wan-ctap
160415 lan and-wan-ctap
 
Lan & Wan
Lan & WanLan & Wan
Lan & Wan
 
Lan & Wan
Lan & WanLan & Wan
Lan & Wan
 
CTAP
CTAPCTAP
CTAP
 
ATP
ATPATP
ATP
 
Advanced Threat Protection
Advanced Threat ProtectionAdvanced Threat Protection
Advanced Threat Protection
 
scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22
 
scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22
 
Scheda tecnica hspa 08
Scheda tecnica hspa 08Scheda tecnica hspa 08
Scheda tecnica hspa 08
 
Vmware
VmwareVmware
Vmware
 
Antenne filari
Antenne filariAntenne filari
Antenne filari
 
Antenne multifilari
Antenne multifilariAntenne multifilari
Antenne multifilari
 
Forti web
Forti webForti web
Forti web
 
Emea nutanix overview presentation emea
Emea  nutanix overview presentation emeaEmea  nutanix overview presentation emea
Emea nutanix overview presentation emea
 

Recently uploaded

Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
Henry Tapper
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
PaulBryant58
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 

Recently uploaded (20)

Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 

Secure Access Architecture

  • 1. © Copyright Fortinet Inc. All rights reserved. Secure Access Architecture Alessandro Berta – Systems Engineer 15 Aprile 2016
  • 2. 2 Trend: Device Growth Continues More devices and newer device types are entering the network  33 Billion endpoints projected to be connected by 2020 – Gartner  New device types entering the network » ‘headless’ IoT, wireless sensor nodes, beacons, wearables
  • 3. 3 Trend: Devices Going Wireless Wi-Fi becoming the primary access medium © Nemertes Research, August 2015 9% 7% 13% 35% 36% 0% 10% 20% 30% 40% 50% Other ZigBee Bluetooth Wi-Fi Ethernet Percent of Respondents LANAccessTechnologies 2014 • Each generation of Wi-Fi technology accelerates the migration to wireless for users IoT Access Technology Predications © Infonetics, M2M Strategies by Vertical: N. American Enterprise Survey, January 2014 64% Wireless • IoT devices going wireless
  • 4. 4 Trend: Need for More Speed Migration to 802.11ac continues 1st Generation 1997-1998 2nd Generation 1999-2001 3rd Generation 2002-2006 4th Generation 2007-2011 5th Generation Now 802.11 2 Mbps 802.11b 11 Mbps 802.11g/a 54 Mbps 802.11n 450 Mbps 802.11ac Gigabit Mbps Infonetics, Wireless LAN Equipment Quarterly Worldwide and Regional Market Share: 4Q14 Migration to 802.11acWi-Fi Standards Evolution
  • 5. 5 Trend: Seamless User Experience A unified access experience is the expected norm  Users utilize multiple devices in the enterprise » Wireless: smartphone, tablets » Wired: desktops, workstations  Consistent user experience is the norm » Consistent policies for access, application, security  Seamless device experience » New device types must be provisioned appropriately » “Headless” devices – IoT Access Points Switch Wireless Wired Authentication
  • 6. 6 Wireless - the Weakest Link Endpoint Core network infrastructure Wireless Databases Applications Storage Email Worldwide 45% 29% 49% 25% 17% 11% 25% Americas 43% 28% 50% 27% 17% 12% 23% EMEA 47% 27% 52% 22% 17% 10% 24% APAC 43% 31% 44% 25% 18% 10% 29% 0% 10% 20% 30% 40% 50% 60% WLAN Ranked as the Most Vulnerable IT infrastructure Source: Fortinet Security Census 2015, 1490 respondents
  • 7. 7 Expectations are on the Rise Need More Speed Migration to 802.11ac Seamless Unified Experience Unified Network Operations Application Growth Move to wireless Device Growth
  • 8. 8 Combine Security and Access Need More Speed Migration to 802.11ac Seamless Unified Experience Unified Network Operations Application Growth Move to wireless Device Growth SECURE ACCESS ARCHITECTURE
  • 9. 9 FortiPresence FortiAuthenticator FortiManager FortiWLM FortiClient FortiWiFi FortiWLC FortiAP FortiGate Controller FortiSwitch (POE) SECURE ACCESS ARCHITECTURE N Why Fortinet?
  • 10. 10 Complete Secure Access Offerings Note: formally Meru Networks Cloud APSwitch Cloud (Cloud Management) Security + WLAN Management APSwitch Integrated (Integrated Controller) AP Security WLAN Management Switch Infrastructure (Dedicated Controller) 1 2 3
  • 11. 11 Fortinet Offers More Choices Infrastructure (Dedicated Controller) Integrated (Integrated Controller) Cloud (Cloud Management) Distributed Enterprise (Retail / QSR)   Healthcare / Financials   K-12 / Primary / Secondary School   Higher Education  Large Public Venue 
  • 13. 13 Why Infrastructure? 1  Mobile: Fit for highly mobile deployments  Flexible: Many deployment options  Stand-alone: Able to separate access purchase decision from security FortiWLC-50D FortiWLC-200D FortiWLC-500D Infrastructure Wireless
  • 14. 14 Infrastructure Wireless Multi-Channel One channel to simplify deployment and seamless roaming Multiple channels to maximize spectrum reuse and performance Single Channel + Virtual Cell 36 36 36 36 36 36 36 36 36 36 Multiple channels to segment application traffic and add capacity Channel Layers + Virtual Cells 36 36 36 36 36 36 36 58 58 5844 44 44 44 44 44 44 42 42 42 149 149 149 149 149 149 149 149 149 149 1
  • 15. 15 Infrastructure Wireless Network In Control Fortinet decides when clients roam for best possible user experience in time-sensitive applications. Mobile Fit for highly mobile and scalable deployments where low latency and roaming support matter Controlling the User Experience 1
  • 16. 16 Client-in-control: the “Sticky Clients” issue Scanners and VoIP handsets re-charging in the cradles 1
  • 17. 17 Client-in-control: the “Sticky Clients” issue WiFi Client tend to stick to the same AP, depending on their NIC driver 1
  • 18. 18 Client-in-control: the “Sticky Clients” issue The AP-Client links are barely optimized. Many connections are at long distance, weak signal, low data rate, scarce throughput. 1
  • 19. 19 Network-in-control Optimized Distribution of Clients Wi-Fi Clients are always associated to the best AP: higher signal, faster data rate, better performance, AP’s are not congested by far-away clients. 1
  • 20. 20 Roaming is really Seamless and at the right time 20 X Multi-Channel Virtual Cell 100 ms – 3 seconds between handoff 5 - 10 ms between handoff X 1
  • 22. 22 Integrated Wireless Security Access Control  Enterprise WLAN controller  Rogue AP and WIDS  Integrated captive portal  Tunnel, bridge and mesh  Single pane of glass  Unified wired/wireless  Application control  FortiGuard Services Security 2
  • 23. 23 Integrated Wireless  Every FortiGate includes a WLAN controller  Largest range of controllers in the industry  Support ranges from 5 APs (100 users) up to 10K APs (32,000 users) 2
  • 25. FortiView > Device topology (SSID and VLAN)2
  • 27. FortiView > Applications > Drill Down > Sessions2
  • 30. 30 Why Cloud? 3 FAP-S323C 802.11ac 3x3:3 FAP-S321C 802.11ac 3x3:3  Secure: Industry’s only UTM + AP solution  Cloud: Roll out remote sites in minutes - not hours and days  Controller-less: Wi-Fi without the complexity of on premise controllers Cloud Wireless
  • 31. 31 Competitor Cloud Wi-Fi FortiAP-S Series Connection Credential Lookup Authentication Gap in Security Protection Continue to Wire Connection Credential Lookup Authentication IPS, AV, Botnet URL Filter, App Control Continue to Wire  Managed by FortiCloud  No controller required  FortiGuard services run on each AP  Simplifies deployment and management Cloud Wireless3
  • 32. 32 Cloud Wireless Intrusion Prevention System Antivirus and Anti-botnet L7 Application Control Web Filtering 3
  • 33. Other Secure Access related products Secure Access Architecture
  • 34. 34 FortiPlanner  Wireless LAN Planning and Real-Time Visualization Software  Free download for deployments of up to 30 FortiAPs.  Pro license supports unlimited FortiAPs and enables Site Survey and Real-Time Heat-map features FortiPlanner wireless deployment planning FortiPlanner wireless site survey
  • 35. 35 FortiPresence Presence Analytics Solution Uses existing in-store FortiAP or FortiWiFi access points to collect the WiFi signal information from the smartphones of visitors.  Solution Components: » FortiAP or FortiWiFi - Detects WiFi signal from smartphones » FortiGate or FortiWLC - Aggregates signal information from multiple APs » FortiPresence Cloud – Processes data and presents analytics on dashboard FortiPresence
  • 36. 36 FortiPresence  Total visitor traffic  Real time visit capture rate  Dwell time duration  A/B comparison across stores  Repeat visitors, frequency  VIP Alert  Heat maps with animated flows  Real-time density, staff resources  Measure marketing campaign effectiveness
  • 37. 37 FortiSwitch Why FortiSwitch?  Control: Managed and secured from FortiGate GUI  Power: Full PoE+ power for APs and other Power over Ethernet devices  Stackable: 1GbE, 10GbE and 40GbE with stacking capability
  • 38. 38 FortiGate Switch Management » Fortilink protocol for secure management » Visibility into port speed/status » Centrally manage VLANs » Apply security policy » Authenticate clients centrally via 802.1x or captive portal FortiSwitch
  • 39. 39 FortiPresence FortiAuthenticator FortiManager FortiWLM FortiClient FortiWiFi FortiWLC FortiAP FortiGate Controller FortiSwitch (POE) SECURE ACCESS ARCHITECTURE N