Fortinet Security Fabric - IS_Summit Fortinet: Global Network Security Leader Highlights: 2000 - present

  • View
    5

  • Download
    0

Embed Size (px)

Text of Fortinet Security Fabric - IS_Summit Fortinet: Global Network Security Leader Highlights: 2000 -...

  • © Copyright Fortinet Inc. All rights reserved.

    Fortinet Security Fabric

    Innovative Solutions Security Summit May 7th 2018

  • 2

    Fortinet: Global Network Security Leader Highlights: 2000 - present

    4,900+

    EMPLOYEES WORLDWIDE

    100+ OFFICES ACROSS THE GLOBE

    439 PATENTS

    291 IN PROCESS

    ISSUED

    3.4m SHIPPED SECURITY DEVICES

    330K CUSTOMERS

    $1bn REVENUE

    IN EXCESS OF

    $1.5bn IN CASH

    24% YEAR ON YEAR GROWTH

    2000 BY KEN XIE

    FOUNDED IN

    HEADQUARTERED IN

    SUNNYVALE CALIFORNIA

  • 3

    A Leader in Network Security

    Gartner Magic Quadrant for Enterprise Network Firewalls, Adam Hills, Jeremy D'Hoinne, Rajpreet Kaur, 10 July 2017

    Disclaimer: This graphic was published by Gartner, Inc. as part of a larger research document and should be

    evaluated in the context of the entire document. The Gartner document is available upon request from Fortinet.

    Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise

    technology users to select only those vendors with the highest ratings or other designation. Gartner research

    publications consist of the opinions of Gartner's research organization and should not be construed as statements of

    fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of

    merchantability or fitness for a particular purpose

    Gartner Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls), Jeremy D'Hoinne, Rajpreet

    Kaur, Adam Hils, June 2017

    Disclaimer: This graphic was published by Gartner, Inc. as part of a larger research document and should be

    evaluated in the context of the entire document. The Gartner document is available upon request from Fortinet.

    Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise

    technology users to select only those vendors with the highest ratings or other designation. Gartner research

    publications consist of the opinions of Gartner's research organization and should not be construed as statements

    of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any

    warranties of merchantability or fitness for a particular purpose.

  • 4

    Minutes Hours Days

    15%

    50%

    27%

    5%

    2% 2%

    Minutes Hours Days

    Dealing With Today’s Issues

    3 BILLION NEW DEVICES

    PER YEAR

    THROUGH 2020

    OF EMEA ENTERPRISES

    BREACHED IN THE LAST 12

    MONTHS*

    51% TIME TO DETECT BREACH*

    More than 1 hour for

    85%

    AREAS OF GREATEST CONCERN FOR SECURITY

    Cloud

    Vulnerability in IT systems

    Inside Threats

    BYOD

    IoT

    1

    2

    3

    4

    5

  • 5

    And Those of Tomorrow

    INFRASTRUCTURE

    EVOLUTION

    EVOLVING THREAT

    LANDSCAPE

    REGULATION, COMPLIANCE

    AND CERTIFICATION

  • 6

    The State of the Enterprise Network

    Today’s Network is

    BORDERLESS

    Today’s Network is

    FASTER Than Ever

    Today’s Network is More

    COMPLEX Than Ever

  • 7

    Branch

    Office Campus

    Data

    Center

    Remote

    Office

    Mobile

    PoS

    IoT

    More Ways to Get In

    More Ways to Get Data Out

  • 8

    Containing the Borderless

    Internal External

     Perimeter and internal security in equal doses

    » Segmentation Strategies

     Security extending outward from the core to the access

    layer

     Integration between the elements of the broader network

    security solution

    Branch

    Office

    PoS

    IoT

    Campus

    Mobile

    Endpoint

    Data

    Center

  • 9

    Business

    Security

    Which Compromise Do You Make?

    Infrastructure

    Speed

  • 10

    Powering the Solution

     Integration into the underlying network, not resting on top

     Scalability

    » In terms of size and function

    » Current and projected performance requirements

    » Of the security model – the 3 P’s

    SOLUTION

  • 11

    Branch

    Office Campus

    Data

    Center

    Remote Office

    Vendor A

    Vendor B

    Vendor C

    Vendor C

    Vendor D

    Complexity Decreases Security Effectiveness

    Each product is “Silo’d”

    No interaction

    No integration

  • 12

    Eliminating Complexity

     Individual elements that work together, automatically

     Pervasive threat intelligence

     Single pane of glass management

    THREAT

    INTELLIGENCE

    Endpoint Clients

    Application Security

    Email Gateways

    Firewalls

  • 13

    Addressing Today’s Security Challenges

    Security Objective:

    Automated

    Security Objective:

    Broad

    Security Objective:

    Powerful

    Today’s Network is

    BORDERLESS

    Today’s Network is

    FASTER Than Ever

    Today’s Network is More

    COMPLEX Than Ever

  • 14

    Flexible/Open

    Broad – The Fabric Gives You Complete Visibility, Coverage and Flexibility Across The Entire Dynamic Attack Surface

    CoverageVisibility

    Application Security

    Cloud Security

    Client/IoT Security

    Access Security

    Network Security

  • 15

    Network Security

    Multi-Cloud Security

    Endpoint Security

    Email Security

    Web Application Security

    Secure Unified Access

    Advanced Threat Protection

    Management & Analytics

    FortiOS 6.0

    FortiClient 6.0 FortiWeb 6.0

    FortiMail

    Secure Email

    Gateway

    FortiSandbox 3.0 FortiAnalyzer 6.0

    FortiManager 6.0

    FortiSIEM 5.0

    FortiOS 6.0 FortiAP 6.0

    FortiSwitch 6.0

    Endpoint

    IoTMulti

    Cloud Applications

    Web Unified

    Access Email Threat

    Protection

    Advanced Management

    Analytics

    FortiCASB 1.2

    The Broadest Security Portfolio in the Industry Built from the ground up to deliver true integration end-to-end

  • 16

    Powerful – Increasing Performance Reduces The Burden on Infrastructure

    Comprehensive

    Range

    Parallel Path

    Processing

    Security Processors

    (SPU’s)

    Accelerates

    Content Inspection

    Optimized

    Performance for

    Entry Level

    Accelerates

    Network Traffic

    High End

    Mid Range

    Entry

    Level

    1 Tbps

  • 17

    Automated to Provide a Fast, Coordinated Response to Threats

    CoordinatedAudit & RecommendGlobal & Local

    Known Threats

    FortiGuard

    Unknown Threats

    FortiSandbox

    ISFW-PRI

    Demo_ISFW-Sales

    Demo_ISFW-Finance

    Demo_ISFW-ENG

    FP320C3X15002440

    2.62 GB

  • 18

    Rapid Sharing of Global and Local Threat Intelligence

    Web Mail

    Local Threat Intelligence

    FirewallClient

    Firewall

    Security Fabric

    Global Threat

    Intelligence

    Traffic Analysis

    Clustered Local Intelligence distributed

    throughout the Security Fabric speeds mitigation

    Correlation of Global IoCs and networking

    logs pinpoints new threats

    IoCs IoCs

  • 19

    Threat Intelligence Sharing and IOCs

    Asset

    Threat

    Identity

    Activity

    Risk

    Data

    Location

    DDoS Protection

    Database

    Protection

    Web Application

    Firewall

    Application

    Delivery

    Controller

    Top-of-Rack

    Email

    Server

    Web Servers

    SDN, Virtual

    Firewall

    DCFW/ NGFW

    Sandbox

    Internal Segmentation

    FW

    Email

    Security

    Internal

    Segmentation FW

    Internal Segmentation

    FW

  • 20

    DDoS Protection

    Database

    Protection

    Web Application

    Firewall

    Application

    Delivery

    Controller

    Top-of-Rack

    Email

    Server

    Web

    Servers

    SDN, Virtual

    Firewall

    DCF

    W/

    NGF

    W

    Sandbox

    Internal

    Segmentati

    on FW

    Email

    Security

    Internal

    Segment

    ation FW

    Internal

    Segmentati

    on FW

    Threat Intelligence Sharing and IOCs

    - Attack telemetry from clients

    - Malware samples

    - Public & private information sources

    - Website monitoring

    - Attack signatures

    - Domain names

    - Host names

    - IP addresses

    - - File names

    • - Registry data

    • - Vulnerabilities

    • - Catalogued malware