4 Fortinet Confidential Fortinet Corporate Overview $434 $39
$80 $123 $155 $212 $252 $325 FORTINET REVENUE ($MM) 48% CAGR $13 03
04 05 06 07 08 09 10 11 Market Leader UTM - Fast-growth security
segment Advanced technology and products 80+ patents; 115+ pending
Strong global footprint 1,500+ employees; 30 offices worldwide Blue
chip customer base 100,000 customers (incl. majority of Global 100)
Exceptional financial model FY11 revenues: $434M (34% YoY growth)
Q411 revenues: $121M (29% YoY growth) Strong balance sheet: $500M+
in cash; no debt IPO - November 2009
Slide 5
5 Fortinet Confidential Network Security: The Traditional
Approach New Threat Intercepts New Device: VPN Termination New
Threat Spam New Device: Spam Filtering New Threat App Layer Attacks
New Device: Next Generation Firewall A VICIOUS CIRCLE
Slide 6
6 Fortinet Confidential I.T. departments must manage a growing
array of specialized security technologies that may or may not work
together to help security departments detect and halt attacks.
Security Professionals Say Network Breaches Are Rampant Ponemon
Institute Survey New York Times 6/22/11 The Result: More Expense,
Less Security, Less Control
Slide 7
7 Fortinet Confidential Reducing Complexity Is Critical Source:
Navigating IT: Objective & Obstacles Infoworld, May, 2011 Q:
What are the top security-related challenges your organization is
facing? (base: of those that are involved in Security
investments)
Slide 8
8 Fortinet Confidential Fortinet Breaks The Cycle New Threat
Update Firmware: Web Filtering New Threat Update Firmware: IM &
P2P Protection New Threat Update Firmware App Control, Data
Leakage, SSL Inspection
Slide 9
9 Fortinet Confidential The Benefit Of Integration: Continuous
Updates New Threat Anti-Virus: 4x each day New Threat IPS: 2x each
day New Threat Antispam & Web Filtering Continuous
Slide 10
10 Fortinet Confidential LOCK & KEY ANTI-SPYWARE ANTI-SPAM
WEB FILTER ANTI-VIRUS VPN IPS FIREWALL APP CONTROL PHYSICAL
CONNECTION-BASED HARDWARE THEFT 1980s1990s2000sToday Performance -
Damage CONTENT-BASED SPYWARE WORMS SPAM BANNED CONTENT TROJANS
VIRUSES INTRUSIONS APP LAYER ATTACKS HARDWARE THEFT Security:
Followed The Internet Evolution