Upload
juliana-scovell
View
213
Download
0
Tags:
Embed Size (px)
Citation preview
Fortinet Confidential
Fortinet and Hawaiian TelcomMike Wysocki - [email protected] 310.536.0039
Daryl Jung - [email protected] 626.592.3789
Fortinet Confidential2
Your Business Requirements Keep GrowingN
etw
ork
Th
rou
gh
pu
t o
f E
nte
rpri
se D
ata
Cen
ter
10MB 100MB
1GB
Multi-GB
10GB
Industries demanding greater IT compliance
Compliance needs coming from government regulations as well as business partners / industry mandates
IT budgets shrinking
Security spend increasing
Network requirements / demands accelerating
Security demands must co-exist
SOX 404
FISMA
HIPAA
Network Throughput Budgetary Constraints Regulatory Pressures
Change in External IT Services Spending From FY09 to FY10%
EU Data Protection Directive
Fortinet Confidential
“I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks.”“Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey New York Times 6/22/11
The Result: More Expense, Less Security, Less Control
Fortinet Confidential
Reducing Complexity Is Critical
•Source: Navigating IT: Objective & ObstaclesInfoworld, May, 2011
Q: What are the top security-related challenges your organization is facing? (base: of those that are involved in Security investments)
Fortinet Confidential
12 Steps to Great Security (find 3 issues)
5
• Simple Written Security Policy• Database and Network Vulnerability Assessments• Patch and Appliance Management• Redundancy: High-Availability & WAN-WAN• Grouping of Divisions… Data Leak Prevention• Content Filtering… Application Control• Integrated Anti-Virus/Gateway Anti-Virus• Log Reporting • Anti-Spam/Spyware• Secure your Tele-Commuters• Secure Wireless Access Points• ICSA/IPsec Firewall (with logging) & Intrusion Prevention
Fortinet Confidential
Protection
• Protect assets• Guard against
threats
Policy
• Improve employee productivity
• Meet regulatory requirements
Process
• Enable business growth
• Increase efficiency
The “Basic” Problems
Fortinet Confidential
Staggering Statistics
7
Internet users spent an average of 6 hours (100% increase from a year ago) on social networking sites & the average US worker spends almost 5.5 hours a month visiting social network sites from the office.
Nielson Reports: Internet & Social Media Consumer Insights, May ’10
The use of social media at work is increasing with nearly 7% of all business Internet traffic going to Facebook, according to new analysis by managed security firm, Network Box.
BizReport: Social Media Cuts into Internet Bandwidth Consumption, April ’10
Fortinet Confidential
Controlling Web Applications
• Allow Facebook, but block Facebook applications» Farmville
» Facebook Chat
» Facebook Video
• Allow YouTube, but block YouTube download• Allow Google Maps, but block Google Web Talk
Fortinet Confidential
What are the Risks?
12
• Lack of visibility and controlMany businesses are limited in their control of social networking. They use URL filters to either allow complete access to restrict the entire application.
• Widening attack surfaceMalicious code “is not just coming from the dark corners of the web,” like pornography, gaming and pharmaceutical sites. Its estimated that 77 percent is coming from legitimate sites.
• Data loss potentialSocial networking sites are all about collaboration and sharing—potentially even of sensitive data. Today, there is little control over data loss in social media arenas because policies do not typically cover what users contribute.
Fortinet Confidential13
Thinking Strategically About Security
• Future-proof your security infrastructure»Anticipate change in threat scape
• Look for opportunities to consolidate without compromise»Reduce complexity» Increase protection»Decrease risk»Lower CapEx & OpEx
By 2010, only 10% of emerging security threats will require
tactical point solutions,
compared with 80% in 2005.
Source: Gartner
““
Fortinet Confidential
The Result: Market Leadership
(1) IDC Worldwide Security Appliances Tracker, Sept 2011 (market share based on factory revenue)(2) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012
Rank Company MarketShare (%)
1 18.0
2 Check Point 14.0
3 SonicWALL 8.3
4 Juniper 7.9
5 Cisco 6.5
6 WatchGuard 4.7
7 McAfee 4.0
8 Crossbeam 3.0
9 Other 33.6
Total 100.0
Magic Quadrant for Unified Threat Management2
Worldwide UTM Market ShareQ3 20111
Fortinet Confidential
Fortinet: A New Approach
TRADITIONAL SOLUTIONSCumbersome and costly
THE FORTINET SOLUTIONSimple and cost-effective
Fortinet Confidential
FortiOS
Purpose-Built
Hardware
Original Threat
Research
Anatomy of the FortiGate Solution
FortiOS is the security hardened operating system that powers all FortiGate multi-threat security systems.
Fortinet Confidential
Purpose-Built Hardware
Specialized OS
Firewall
Fully Integrated Security & Networking Technologies
Hardened Platform
High Performance
Real-Time Protection
Traffic ShapingVPN
SSL Insp
DLP WAN Opt
FortiGuard™ Updates
WLAN Load BalancingVoIP HA
Support and Services FortiCare™ FortiGuard Labs
AV IPS AntispamWeb Filter App Ctrl VM
• Purpose-built to deliver overlapping, complementary security
• Provides both flexibility & defense-in-depth capabilities
FortiGate: Integrated Architecture
Fortinet Confidential
Centralized Visibility and Control:FortiManager & FortiAnalzyer
• Single Pane of Glass Management Global policy enforcement across 5 or 5,000
devices Increased flexibility with granular role-based
administration Simplified configuration of Firewall, IPS,
Application Controls and other protections
• Centralized Analysis and Reporting Continuous monitoring across the enterprise Greater visibility into real-time incidents Monitor activity by users identity Automate compliance reporting
Fortinet Confidential
Real Threat Protection in Action
“Innocent” Video Link:Redirects to malicious Website
Integrated Web FilteringBlocks access to malicious Website
Network AntivirusBlocks download of virus
Intrusion ProtectionBlocks the spread of the worm
Solution: FIRE
WA
LL
Error message:“Drops” copy of itself on system and attempts to propagate
WE
B FILTE
RIN
G
AN
TIVIR
US
“Out of date” Flash player error:“Download” malware file
INTR
US
ION
PR
OTE
CTIO
N
PORT 80
Problem:
Fortinet Confidential20
Threat Protection Solution for IM & P2P
Access Control• Enforce appropriate user access only• Limit IM functionalities (eg. File transfer)
Monitoring & Audit• Detailed conversation & File transfer logging • IM Message content archiving
Antivirus• Detects and block infected File transfers• Enforce File blocking by extensions
Attack Prevention• IPS signatures that stop attacks using known
vulnerabilities of IM clients
Fortinet Confidential
FortiGuard: Research, Updates, Services
FortiGuard Research:• Rootkits: Kernel Hooks• Botnets: Dynamic Monitoring, Spambots,
New Malware Protocols• Malware: Code Techniques-PDF/Flash/Doc• Security: Exploits & Vulnerabilities, Zero Day Detection• Packer Research: Unpacking, Generic Detection
FortiGuard Services:• AV Signatures – 4x Daily• IPS Signatures – 2x Daily• Antispam/Web Content Filtering – Real Time• Sample Collection• Signature Creation• Alerts & Escalation
Global Distribution Network:• Application Control• Vulnerability Management• Antispam• Web Filtering• Intrusion Prevention• Antivirus
Fortinet Confidential
Greening of IT….
Firewall / VPN
Antivirus
Web Filtering
IPS
FortiGate Appliance¼ Physical Space
¼ Power Consumption=
=
Fortinet Confidential
Comprehensive Product Portfolio
Powerful Centralized Management & Reporting
Secure E-Mail & Client SoftwareFortiGate-50B – FortiGate-100A
SMB & Remote Office
FortiGate-200A – FortiGate-800F
Enterprise
FortiGate-1000A – FortiGate-5000
Carrier, MSSP &Large Enterprise
Fortinet Confidential24
Fortinet at a glance:
• 100,000+ customers
• 900,000 appliances shipped
• The world’s leading enterprises, telcos and service providers
• Major government education, healthcare and retail institutions
Global Installed Base
Fortinet Confidential25
Why is Fortinet Successful in Hawaii?
• Trained Partners – Hawaiian Telcom• Availability – 4 to 5 times a year in Hawaii for client meetings• Engineering Refreshers – 11 Since 2008 – No Cost (except parking)• Diverse island client base…
− Enterprise− Hospitality− State and Local − K-12− Retail− Higher Education
Fortinet Confidential
Why Fortinet?
Technology ASIC Chips = speed + complete inspection FortiGuard update network = always up to date Custom hardware = purpose built for security Scalable = ready for growth Value = ability to replace multiple products in your
network
Cost / Ease of Management Low TCO, no user fees, bundled pricing No third party updates One vendor to deal with support issues/billing Fewer technical resources required to manage
Fortinet Confidential
Fortinet Corporate Overview
$434
$39
$80
$123
$155
$212
$252
$325
FORTINET REVENUE ($MM)
55% CAGR
$13
03 04 05 06 07 08 09 10 11
Market Leader• UTM - Fast-growth security segment
Advanced technology and products• 101+ patents; 113+ pending
Strong global footprint• 1,700+ employees; 40 offices worldwide
Blue chip customer base• Over 125,000 customers
(incl. majority of Global 100)
Exceptional financial model• FY11 revenues: $434M (34% YoY growth)• Q1/12 revenues: $117M (26% YoY growth)• Strong balance sheet: $600M+ in cash; no
debt• IPO - November 2009
•
Fortinet Confidential
4 Points = 1 Solution
• Comprehensive solution
»Integrated, strategic security• Lower TCO
»Less complexity and easier management
• Real-time security
»24/7 global updates• Strategic flexibility
»Fit your timeline and budget
Fortinet Confidential
Thank You
www.fortinet.com