26
Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales [email protected] 310.536.0039 Daryl Jung - SE [email protected] 626.592.3789

Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales [email protected] 310.536.0039 Daryl Jung - SE [email protected] 626.592.3789

Embed Size (px)

Citation preview

Page 1: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

Fortinet and Hawaiian TelcomMike Wysocki - [email protected] 310.536.0039

Daryl Jung - [email protected] 626.592.3789

Page 2: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential2

Your Business Requirements Keep GrowingN

etw

ork

Th

rou

gh

pu

t o

f E

nte

rpri

se D

ata

Cen

ter

10MB 100MB

1GB

Multi-GB

10GB

Industries demanding greater IT compliance

Compliance needs coming from government regulations as well as business partners / industry mandates

IT budgets shrinking

Security spend increasing

Network requirements / demands accelerating

Security demands must co-exist

SOX 404

FISMA

HIPAA

Network Throughput Budgetary Constraints Regulatory Pressures

Change in External IT Services Spending From FY09 to FY10%

EU Data Protection Directive

Page 3: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

“I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks.”“Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey New York Times 6/22/11

The Result: More Expense, Less Security, Less Control

Page 4: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

Reducing Complexity Is Critical

•Source: Navigating IT: Objective & ObstaclesInfoworld, May, 2011

Q: What are the top security-related challenges your organization is facing? (base: of those that are involved in Security investments)

Page 5: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

12 Steps to Great Security (find 3 issues)

5

• Simple Written Security Policy• Database and Network Vulnerability Assessments• Patch and Appliance Management• Redundancy: High-Availability & WAN-WAN• Grouping of Divisions… Data Leak Prevention• Content Filtering… Application Control• Integrated Anti-Virus/Gateway Anti-Virus• Log Reporting • Anti-Spam/Spyware• Secure your Tele-Commuters• Secure Wireless Access Points• ICSA/IPsec Firewall (with logging) & Intrusion Prevention

Page 6: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

Protection

• Protect assets• Guard against

threats

Policy

• Improve employee productivity

• Meet regulatory requirements

Process

• Enable business growth

• Increase efficiency

The “Basic” Problems

Page 7: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

Staggering Statistics

7

Internet users spent an average of 6 hours (100% increase from a year ago) on social networking sites & the average US worker spends almost 5.5 hours a month visiting social network sites from the office.

Nielson Reports: Internet & Social Media Consumer Insights, May ’10

The use of social media at work is increasing with nearly 7% of all business Internet traffic going to Facebook, according to new analysis by managed security firm, Network Box.

BizReport: Social Media Cuts into Internet Bandwidth Consumption, April ’10

Page 8: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

Controlling Web Applications

• Allow Facebook, but block Facebook applications» Farmville

» Facebook Chat

» Facebook Video

• Allow YouTube, but block YouTube download• Allow Google Maps, but block Google Web Talk

Page 9: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

What are the Risks?

12

• Lack of visibility and controlMany businesses are limited in their control of social networking. They use URL filters to either allow complete access to restrict the entire application.

• Widening attack surfaceMalicious code “is not just coming from the dark corners of the web,” like pornography, gaming and pharmaceutical sites. Its estimated that 77 percent is coming from legitimate sites.

• Data loss potentialSocial networking sites are all about collaboration and sharing—potentially even of sensitive data. Today, there is little control over data loss in social media arenas because policies do not typically cover what users contribute.

Page 10: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential13

Thinking Strategically About Security

• Future-proof your security infrastructure»Anticipate change in threat scape

• Look for opportunities to consolidate without compromise»Reduce complexity» Increase protection»Decrease risk»Lower CapEx & OpEx

By 2010, only 10% of emerging security threats will require

tactical point solutions,

compared with 80% in 2005.

Source: Gartner

““

Page 11: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

The Result: Market Leadership

(1) IDC Worldwide Security Appliances Tracker, Sept 2011 (market share based on factory revenue)(2) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012

Rank Company MarketShare (%)

1 18.0

2 Check Point 14.0

3 SonicWALL 8.3

4 Juniper 7.9

5 Cisco 6.5

6 WatchGuard 4.7

7 McAfee 4.0

8 Crossbeam 3.0

9 Other 33.6

Total 100.0

Magic Quadrant for Unified Threat Management2

Worldwide UTM Market ShareQ3 20111

Page 12: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

Fortinet: A New Approach

TRADITIONAL SOLUTIONSCumbersome and costly

THE FORTINET SOLUTIONSimple and cost-effective

Page 13: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

FortiOS

Purpose-Built

Hardware

Original Threat

Research

Anatomy of the FortiGate Solution

FortiOS is the security hardened operating system that powers all FortiGate multi-threat security systems.

Page 14: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

Purpose-Built Hardware

Specialized OS

Firewall

Fully Integrated Security & Networking Technologies

Hardened Platform

High Performance

Real-Time Protection

Traffic ShapingVPN

SSL Insp

DLP WAN Opt

FortiGuard™ Updates

WLAN Load BalancingVoIP HA

Support and Services FortiCare™ FortiGuard Labs

AV IPS AntispamWeb Filter App Ctrl VM

• Purpose-built to deliver overlapping, complementary security

• Provides both flexibility & defense-in-depth capabilities

FortiGate: Integrated Architecture

Page 15: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

Centralized Visibility and Control:FortiManager & FortiAnalzyer

• Single Pane of Glass Management Global policy enforcement across 5 or 5,000

devices Increased flexibility with granular role-based

administration Simplified configuration of Firewall, IPS,

Application Controls and other protections

• Centralized Analysis and Reporting Continuous monitoring across the enterprise Greater visibility into real-time incidents Monitor activity by users identity Automate compliance reporting

Page 16: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

Real Threat Protection in Action

“Innocent” Video Link:Redirects to malicious Website

Integrated Web FilteringBlocks access to malicious Website

Network AntivirusBlocks download of virus

Intrusion ProtectionBlocks the spread of the worm

Solution: FIRE

WA

LL

Error message:“Drops” copy of itself on system and attempts to propagate

WE

B FILTE

RIN

G

AN

TIVIR

US

“Out of date” Flash player error:“Download” malware file

INTR

US

ION

PR

OTE

CTIO

N

PORT 80

Problem:

Page 17: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential20

Threat Protection Solution for IM & P2P

Access Control• Enforce appropriate user access only• Limit IM functionalities (eg. File transfer)

Monitoring & Audit• Detailed conversation & File transfer logging • IM Message content archiving

Antivirus• Detects and block infected File transfers• Enforce File blocking by extensions

Attack Prevention• IPS signatures that stop attacks using known

vulnerabilities of IM clients

Page 18: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

FortiGuard: Research, Updates, Services

FortiGuard Research:• Rootkits: Kernel Hooks• Botnets: Dynamic Monitoring, Spambots,

New Malware Protocols• Malware: Code Techniques-PDF/Flash/Doc• Security: Exploits & Vulnerabilities, Zero Day Detection• Packer Research: Unpacking, Generic Detection

FortiGuard Services:• AV Signatures – 4x Daily• IPS Signatures – 2x Daily• Antispam/Web Content Filtering – Real Time• Sample Collection• Signature Creation• Alerts & Escalation

Global Distribution Network:• Application Control• Vulnerability Management• Antispam• Web Filtering• Intrusion Prevention• Antivirus

Page 19: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

Greening of IT….

Firewall / VPN

Antivirus

Web Filtering

IPS

FortiGate Appliance¼ Physical Space

¼ Power Consumption=

=

Page 20: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

Comprehensive Product Portfolio

Powerful Centralized Management & Reporting

Secure E-Mail & Client SoftwareFortiGate-50B – FortiGate-100A

SMB & Remote Office

FortiGate-200A – FortiGate-800F

Enterprise

FortiGate-1000A – FortiGate-5000

Carrier, MSSP &Large Enterprise

Page 21: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential24

Fortinet at a glance:

• 100,000+ customers

• 900,000 appliances shipped

• The world’s leading enterprises, telcos and service providers

• Major government education, healthcare and retail institutions

Global Installed Base

Page 22: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential25

Why is Fortinet Successful in Hawaii?

• Trained Partners – Hawaiian Telcom• Availability – 4 to 5 times a year in Hawaii for client meetings• Engineering Refreshers – 11 Since 2008 – No Cost (except parking)• Diverse island client base…

− Enterprise− Hospitality− State and Local − K-12− Retail− Higher Education

Page 23: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

Why Fortinet?

Technology ASIC Chips = speed + complete inspection FortiGuard update network = always up to date Custom hardware = purpose built for security Scalable = ready for growth Value = ability to replace multiple products in your

network

Cost / Ease of Management Low TCO, no user fees, bundled pricing No third party updates One vendor to deal with support issues/billing Fewer technical resources required to manage

Page 24: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

Fortinet Corporate Overview

$434

$39

$80

$123

$155

$212

$252

$325

FORTINET REVENUE ($MM)

55% CAGR

$13

03 04 05 06 07 08 09 10 11

Market Leader• UTM - Fast-growth security segment

Advanced technology and products• 101+ patents; 113+ pending

Strong global footprint• 1,700+ employees; 40 offices worldwide

Blue chip customer base• Over 125,000 customers

(incl. majority of Global 100)

Exceptional financial model• FY11 revenues: $434M (34% YoY growth)• Q1/12 revenues: $117M (26% YoY growth)• Strong balance sheet: $600M+ in cash; no

debt• IPO - November 2009

Page 25: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

4 Points = 1 Solution

• Comprehensive solution

»Integrated, strategic security• Lower TCO

»Less complexity and easier management

• Real-time security

»24/7 global updates• Strategic flexibility

»Fit your timeline and budget

Page 26: Fortinet Confidential Fortinet and Hawaiian Telcom Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789

Fortinet Confidential

Thank You

www.fortinet.com