of 15 /15
1 Fortinet Confidential June 13, 2022 Fortinet An Introduction

1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

Embed Size (px)

Text of 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

  • Slide 1
  • 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction
  • Slide 2
  • 2 Fortinet Confidential September 11, 2015 ControlThe power to verify visualize simplify consolidate manage protect secure accelerate enable enforce
  • Slide 3
  • 3 Fortinet Confidential Agenda Fortinet Introduction Strategic Solutions Technology Overview
  • Slide 4
  • 4 Fortinet Confidential Fortinet Corporate Overview $434 $39 $80 $123 $155 $212 $252 $325 FORTINET REVENUE ($MM) 48% CAGR $13 03 04 05 06 07 08 09 10 11 Market Leader UTM - Fast-growth security segment Advanced technology and products 80+ patents; 115+ pending Strong global footprint 1,500+ employees; 30 offices worldwide Blue chip customer base 100,000 customers (incl. majority of Global 100) Exceptional financial model FY11 revenues: $434M (34% YoY growth) Q411 revenues: $121M (29% YoY growth) Strong balance sheet: $500M+ in cash; no debt IPO - November 2009
  • Slide 5
  • 5 Fortinet Confidential Network Security: The Traditional Approach New Threat Intercepts New Device: VPN Termination New Threat Spam New Device: Spam Filtering New Threat App Layer Attacks New Device: Next Generation Firewall A VICIOUS CIRCLE
  • Slide 6
  • 6 Fortinet Confidential I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks. Security Professionals Say Network Breaches Are Rampant Ponemon Institute Survey New York Times 6/22/11 The Result: More Expense, Less Security, Less Control
  • Slide 7
  • 7 Fortinet Confidential Reducing Complexity Is Critical Source: Navigating IT: Objective & Obstacles Infoworld, May, 2011 Q: What are the top security-related challenges your organization is facing? (base: of those that are involved in Security investments)
  • Slide 8
  • 8 Fortinet Confidential Fortinet Breaks The Cycle New Threat Update Firmware: Web Filtering New Threat Update Firmware: IM & P2P Protection New Threat Update Firmware App Control, Data Leakage, SSL Inspection
  • Slide 9
  • 9 Fortinet Confidential The Benefit Of Integration: Continuous Updates New Threat Anti-Virus: 4x each day New Threat IPS: 2x each day New Threat Antispam & Web Filtering Continuous
  • Slide 10
  • 10 Fortinet Confidential LOCK & KEY ANTI-SPYWARE ANTI-SPAM WEB FILTER ANTI-VIRUS VPN IPS FIREWALL APP CONTROL PHYSICAL CONNECTION-BASED HARDWARE THEFT 1980s1990s2000sToday Performance - Damage CONTENT-BASED SPYWARE WORMS SPAM BANNED CONTENT TROJANS VIRUSES INTRUSIONS APP LAYER ATTACKS HARDWARE THEFT Security: Followed The Internet Evolution
  • Slide 11
  • 11 Fortinet Confidential PHYSICAL CONNECTION-BASED CONTENT-BASED ANTI-SPYWARE ANTI-SPAM WEB FILTER ANTI-VIRUS VPN IPS FIREWALL LOCK & KEY SPYWARE WORMS SPAM BANNED CONTENT TROJANS VIRUSES INTRUSIONS HARDWARE THEFT 1980s1990s2000sToday Performance - Damage APP CONTROL APP LAYER ATTACKS The Fortinet Solution
  • Slide 12
  • 12 Fortinet Confidential Fortinet: A New Approach TRADITIONAL SOLUTIONS Cumbersome and costly THE FORTINET SOLUTION Simple and cost-effective
  • Slide 13
  • 13 Fortinet Confidential Purpose-Built Hardware Specialized OS Firewall Fully Integrated Security & Networking Technologies Hardened Platform High Performance Real-Time Protection Traffic ShapingVPN SSL Insp DLPWAN Opt FortiGuard Updates WLANLoad BalancingVoIPHA Support and Services FortiCareFortiGuard Labs AVIPS AntispamWeb FilterApp Ctrl VM Purpose-built to deliver overlapping, complementary security Provides both flexibility & defense-in-depth capabilities FortiGate: Integrated Architecture
  • Slide 14
  • 14 Fortinet Confidential Unmatched Solution Spectrum SIZE COVERAGE SOHO/CPE Enterprise Carrier Data Center/Cloud Domain Network Content Device
  • Slide 15
  • 15 Fortinet Confidential The Result: Market Leadership (1) IDC Worldwide Security Appliances Tracker, Sept 2011 (market share based on factory revenue) (2) Gartner, Inc., Magic Quadrant for Unified Threat Management, March 2012 RankCompany Market Share (%) 1 18.0 2Check Point 14.0 3SonicWALL 8.3 4Juniper 7.9 5Cisco 6.5 6WatchGuard 4.7 7McAfee 4.0 8Crossbeam 3.0 9Other 33.6 Total 100.0 Magic Quadrant for Unified Threat Management 2 Worldwide UTM Market Share Q3 2011 1