Guest Wi-Fi is a standard offering for growing numbers of organizations from cafes to businesses. But do you have any idea how your guests are using your Wi-Fi? VectorUSA and Fortinet have the answers.
My INSURER PTE LTD - Insurtech Innovation Award 2024
VectorUSA and Fortinet: Next Generation Network Security
1. Next Generation Network Security and
why you need it for your business!
Patrick Luce, CISSP, CISM
Director of Consultative Services, VectorUSA
August 18, 2016
2. What is Next Generation Security?
Why is it important for your organization?
How is Next Generation Security evolving?
How does Fortinet approach protecting customers from emerging threats?
Agenda
3. Next Generation Security - History
To have a next generation, there needs to be a previous generation.
5. Hackers expose all kinds of security flaws…
Application port designations become unreliable.
No control over where inside computers choose to connect to the outside world.
No control over the payload that outside computers deliver.
Weak security practices when configuring inside workstations and servers.
7. New technologies require upkeep of signatures.
- This costs money…forever…
Traffic delays from processing packet streams multiple times.
- When life was web, file transfer and mail, no problem.
- With live video and audio, big problem.
Questions about real need, compliance, etc.
Now we have new problems…
8. Enter, Unified Threat Management (UTM)
FortiGate UTM
Application Control
Antivirus
AntiSpam
Web Filtering
Next Generation Firewall
WAN Acceleration
Traffic Optimization
VPN
IPS
DLP
WiFi Controller
↑↑↑↑↑↑↑↑↑↑↑
9. According to Gartner…(sigh)…
“Non-disruptive in-line bump-in-the-wire configuration”
“Standard first-generation firewall capabilities, e.g., network-address translation
(NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc.”
“Integrated signature-based IPS engine”
Enter, Next Generation Firewall NGFW??
10. “Application awareness, full stack visibility and granular control”
“Capability to incorporate information from outside the firewall, e.g., directory-based
policy, blacklists, white lists, etc.”
“Upgrade path to include future information feeds and security threats”
“SSL decryption to enable identifying undesirable encrypted applications”
Now we had new problems continued …
14. Sandbox Inspection
- Code emulation, OS sandboxing
Reputation Analysis
- IP and Domain
Mobile Security
Embedded Vulnerability Assessment
Coming to a NGFW near you (or already here)
15. Talk to Patrick Luce about your Network Security
Pluce@vectorusa.com
310-436-1000