SlideShare una empresa de Scribd logo
1 de 17
A Consolidated Approach to
                     Security
Stefan Oancea
Product Manager
Netsafe Solutions




March 28, 2012
Fortinet Confidential
March 28, 2012
Fortinet Confidential
Fortinet Corporate Overview

                                                   Fortinet Revenue ($MM)
    • Founded in 2000
    • Global presence with 30+ offices
      worldwide & 1,500+ employees                                             $434

      – 5,000+ channel partners
                                                                        $325
      – 100,000+ customers
                                                                   $252
           – Majority of the Fortune Global 100
    • IPO Nov 2009
                                                                $123
      • NASDAQ: FTNT                                         $80
                                                   $13 $39
    • 2011 revenue of $434 Million
      – 33.5% YoY growth                          2003
                                                         2005
                                                                   2009 2010
                                                                               2011
    • World class management team


3    Fortinet Confidential
We Pioneered a New Approach

     Traditional Network Security Solutions                        The Fortinet Solution




•   Stand-alone, non-integrated security            •   Real-time, integrated security intelligence
•   Mix of off the shelf systems and applications   •   ASIC-accelerated performance
•   Higher total cost of ownership                  •   Lower total cost of ownership
•   Difficult to deploy / manage / use              •   Easy to deploy / manage / use

    4    Fortinet Confidential
Evolution of Firewall Security

                                     Complete Protection

                                                              WAN
                                  Antispam
                                                           Optimization
                                Evolution of Firewall Security             Endpoint
                 Antivirus/                  Data Loss
                                                                          Protection/
                Antispyware                  Prevention
                                                                             NAC
                                                              Web
                                    VPN
                                                            Filtering

                                                                            App
                  Firewall                      IPS
                                                                           Control

                                  Wireless                    SSL
                                   LAN                     Inspection

                Vulnerability                IPv6, Dyna
                                                                             VoIP
                   Mgmt                      mic Routing



5   Fortinet Confidential
Complete Content Protection

• Application control + identity-based policy
  enforcement
        – Allow but don’t trust any application
        – Examine all application content
        – Continuously enforce policies




6   Fortinet Confidential
Disruptive Technology Platform




                       FortiASIC                                   FortiOS

    • ASICs accelerate FortiOS security and      • Custom built operating system
      network functions                          • Architected for security and networking
    • Enables faster performance against           demands
      competitors                                • Leverages custom hardware platform
    • Multiple ASICs (CP, NP and SP) targeting   • Mature OS - at version 4.0 today
      key functions
    • Mature design across CP, NP and SP

7    Fortinet Confidential
Performance Advantage


OTHER VENDORS
                                      High Performance
                            Multiple Processing Engines
Slow Performance
Single Processing Engine




      Multi-Core                Multi-Core
      CPU                       CPU

      Offload                   Offload
     Processor                 Processor




8   Fortinet Confidential
FortiASIC Specialized Processors

    • FortiASIC Network Processor (NP) Series
      » Firewall Acceleration
      » IPSec Offloading
      » Interface level
    • FortiASIC Content Processor (CP) Series
      » SSL/IPSec Offloading
      » Pattern-Match Acceleration - IPS
      » Encryption / Decryption
      » System level
    • FortiASIC Security Processor (SP) Series
      » Additional IPS Acceleration
      » Flow Based Antivirus
      » Firewall Acceleration
      » Interface and system level

9    Fortinet Confidential
FortiGate Platform
     • Integrated security appliance
         − Block network & content threats
     • Accelerated performance
         − 10 GbE ports
         − Up to 120 Gbps single appliance
         − Up to 526 Gbps modular chassis
     • Platforms for every market segment
         − Carrier to SOHO
         − No per-user licensing




10 Fortinet Confidential
FortiGate Consolidated Security Platform


Real-Time Protection                            FortiGuard™ Updates
Fully Integrated               AV       IPS      Web Filter Antispam    App Ctrl    VM
Security &
                             Firewall    VPN        DLP       WAN Opt      Traffic Shaping
Networking
Technologies                  WLAN       VoIP      SSL Insp      HA        Load Balancing

Hardened Platform                                Specialized OS

High Performance                          Purpose-Built Hardware

Support and Services                FortiCare™                  FortiGuard Labs
             • Purpose-built to deliver overlapping, complementary security
             • Provides both flexibility & defense-in-depth capabilities

11   Fortinet Confidential
Fortinet Product Portfolio

    Unified Threat              Centralized              Application
    Management                  Management                Security
            FortiGate              FortiManager             FortiMail
            Network Security       Centralized Device       Messaging Security
            Platform               Management
            FortiAP                FortiAnalyzer            FortiWeb
            Network Security       Centralized Logging      Web & XML
                                   and Reporting            Application Firewall
            Platform

         Security                 Host                     Data
         Services                Security                 Security
                                   FortiClient
            FortiGuard             Endpoint Security        FortiDB
            Real time                                       Database Security
            Security Services      FortiScan
                                   Asset Vulnerability
                                   Management

12 Fortinet Confidential
Market Leadership Across the Board



       Worldwide UTM Market Share                                                          Magic Quadrant for Unified              UTM Market Competitive
               Q2 2011 (1)                                                                Threat Management 2012 (2)                 Landscape, 2009(3)

                                                        Market
      Rank Company
                                                       Share (%)

          1                                              17.0                                                            High


         2        Check Point                            13.2
                                                                                                                        Ability
          3       Juniper                                8.9                                                              to
                                                                                                                        Deliver
         4        SonicWALL                              7.5
          5       Cisco                                  6.9
         6        WatchGuard                             5.0
                                                                                                                         Low
          7       McAfee                                 4.0
                                                                                                                                  Low            Market Penetration            High
          8       Crossbeam                              2.9
          9       Other                                 34.6
                                                                                                                                                           Contender    Market Leader
                  Total                                 100.0                                                                      Niche Participant
                                                                                                                                                           Specialist    Challenger

Notes
(1)   IDC Worldwide Security Appliances Tracker, September 2011 (market share based on factory revenue)
(2)
(3)
           Fortinet Confidential
      Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012
      Frost & Sullivan, “World Unified Threat Management, Products Market 2009”, 2010

                                                                                                                                                                                 13
A Proven Partner




• Proven Industry Leadership
   − Since 2000, Fortinet has received more than 100 product & company awards.
           ▪ IDC: Overall leader in UTM factory revenue for 23rd consecutive Quarter – Q3 2012
           ▪ Gartner: Leader in Unified Threat Management Magic Quadrant
           ▪ SC Magazine: 2012 Readers' Trust Award for "Best UTM Security”
           ▪ http://www.worldsfastestfirewall.com/
• Certified security
   − Seven ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam, WAF)
   − Government Certifications (FIPS-2, Common Criteria EAL4+, JITC IPv6, SCAP)
   − ISO 9001 certification


14 Fortinet Confidential
Customers Worldwide



                    7 of the top 10 Fortune companies in Americas
                      8 of the top 10 Fortune companies in EMEA
                       9 of the top 10 Fortune companies in APAC
            10 of the top 10 Fortune Telecommunications companies
                 9 of the top 10 Fortune Retail & Commercial Banks
                           7 of top 10 Fortune Aerospace & Defense




15 Fortinet Confidential
Summary


• Consolidated Security
  » Complete content protection
• Unmatched performance
  » Purpose-built hardware and
    software
• Lower TCO
  » Less complexity, faster
    deployment, easier management
• Real-time security
  » 24/7 global updates deliver security
    expertise


 Fortinet Confidential
„Provocări de securitate pentru
  SMB”?

  FortiGate 60C - SC Magazine
  Readers' Trust Award for
  “Best UTM Security” - March
  6, 2012



Fortinet Confidential

Más contenido relacionado

La actualidad más candente

Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
Joe Sarno
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Fatih Ozavci
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
NCS Computech Ltd.
 
fortimanager-v5.0.10-administration-guide
fortimanager-v5.0.10-administration-guidefortimanager-v5.0.10-administration-guide
fortimanager-v5.0.10-administration-guide
Drew Shearman
 

La actualidad más candente (20)

Fortinet
FortinetFortinet
Fortinet
 
Fortinet Tanıtım
Fortinet TanıtımFortinet Tanıtım
Fortinet Tanıtım
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabric
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
FortiGate-40C
FortiGate-40CFortiGate-40C
FortiGate-40C
 
Fortigate Modelo 90d
Fortigate Modelo 90dFortigate Modelo 90d
Fortigate Modelo 90d
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
Fortigate class1
Fortigate class1Fortigate class1
Fortigate class1
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
Forti gate 90d
Forti gate 90dForti gate 90d
Forti gate 90d
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
 
Forti cloud
Forti cloudForti cloud
Forti cloud
 
fortimanager-v5.0.10-administration-guide
fortimanager-v5.0.10-administration-guidefortimanager-v5.0.10-administration-guide
fortimanager-v5.0.10-administration-guide
 
Product Overview Nov 2010 V1
Product Overview Nov 2010 V1Product Overview Nov 2010 V1
Product Overview Nov 2010 V1
 
FortiGate-200B
FortiGate-200BFortiGate-200B
FortiGate-200B
 
IPTV Security
IPTV SecurityIPTV Security
IPTV Security
 
VoIP security: Implementation and Protocol Problems
VoIP security: Implementation and Protocol ProblemsVoIP security: Implementation and Protocol Problems
VoIP security: Implementation and Protocol Problems
 
FortiGate-60C
FortiGate-60CFortiGate-60C
FortiGate-60C
 
Ict encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosantiIct encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosanti
 

Similar a NetSafe_Fortinet - 13martie2012

NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011
Agora Group
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
dvanwyk30
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
Işınsu Akçetin
 
Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablement
responsedatacomms
 

Similar a NetSafe_Fortinet - 13martie2012 (20)

NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
Forti gate 5101c
Forti gate 5101cForti gate 5101c
Forti gate 5101c
 
FortiGate-310B Datasheet
FortiGate-310B DatasheetFortiGate-310B Datasheet
FortiGate-310B Datasheet
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentation
 
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
 
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
 
Threat Landscape for Education
Threat Landscape for EducationThreat Landscape for Education
Threat Landscape for Education
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edge
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Novosco Zero day protection webinar
Novosco Zero day protection webinarNovosco Zero day protection webinar
Novosco Zero day protection webinar
 
Mcafee ips nsp-2011
Mcafee ips  nsp-2011Mcafee ips  nsp-2011
Mcafee ips nsp-2011
 
Fortinet Perspectiva Coporativa
Fortinet Perspectiva CoporativaFortinet Perspectiva Coporativa
Fortinet Perspectiva Coporativa
 
IBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - EcuadorIBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - Ecuador
 
MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version
 
Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablement
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Company
 
Fortinet, держи марку!
Fortinet, держи марку!Fortinet, держи марку!
Fortinet, держи марку!
 

Más de Agora Group

Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
Agora Group
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
Agora Group
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
Agora Group
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorni
Agora Group
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
Agora Group
 

Más de Agora Group (20)

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe procese
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms Shift
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004
 
Curs OSINT
Curs OSINTCurs OSINT
Curs OSINT
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPM
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the Enterprise
 
ABPMP Romania
ABPMP RomaniaABPMP Romania
ABPMP Romania
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de Sănătate
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent Business
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu Dop
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru pacienți
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatate
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorni
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

NetSafe_Fortinet - 13martie2012

  • 1. A Consolidated Approach to Security Stefan Oancea Product Manager Netsafe Solutions March 28, 2012 Fortinet Confidential
  • 2. March 28, 2012 Fortinet Confidential
  • 3. Fortinet Corporate Overview Fortinet Revenue ($MM) • Founded in 2000 • Global presence with 30+ offices worldwide & 1,500+ employees $434 – 5,000+ channel partners $325 – 100,000+ customers $252 – Majority of the Fortune Global 100 • IPO Nov 2009 $123 • NASDAQ: FTNT $80 $13 $39 • 2011 revenue of $434 Million – 33.5% YoY growth 2003 2005 2009 2010 2011 • World class management team 3 Fortinet Confidential
  • 4. We Pioneered a New Approach Traditional Network Security Solutions The Fortinet Solution • Stand-alone, non-integrated security • Real-time, integrated security intelligence • Mix of off the shelf systems and applications • ASIC-accelerated performance • Higher total cost of ownership • Lower total cost of ownership • Difficult to deploy / manage / use • Easy to deploy / manage / use 4 Fortinet Confidential
  • 5. Evolution of Firewall Security Complete Protection WAN Antispam Optimization Evolution of Firewall Security Endpoint Antivirus/ Data Loss Protection/ Antispyware Prevention NAC Web VPN Filtering App Firewall IPS Control Wireless SSL LAN Inspection Vulnerability IPv6, Dyna VoIP Mgmt mic Routing 5 Fortinet Confidential
  • 6. Complete Content Protection • Application control + identity-based policy enforcement – Allow but don’t trust any application – Examine all application content – Continuously enforce policies 6 Fortinet Confidential
  • 7. Disruptive Technology Platform FortiASIC FortiOS • ASICs accelerate FortiOS security and • Custom built operating system network functions • Architected for security and networking • Enables faster performance against demands competitors • Leverages custom hardware platform • Multiple ASICs (CP, NP and SP) targeting • Mature OS - at version 4.0 today key functions • Mature design across CP, NP and SP 7 Fortinet Confidential
  • 8. Performance Advantage OTHER VENDORS High Performance Multiple Processing Engines Slow Performance Single Processing Engine Multi-Core Multi-Core CPU CPU Offload Offload Processor Processor 8 Fortinet Confidential
  • 9. FortiASIC Specialized Processors • FortiASIC Network Processor (NP) Series » Firewall Acceleration » IPSec Offloading » Interface level • FortiASIC Content Processor (CP) Series » SSL/IPSec Offloading » Pattern-Match Acceleration - IPS » Encryption / Decryption » System level • FortiASIC Security Processor (SP) Series » Additional IPS Acceleration » Flow Based Antivirus » Firewall Acceleration » Interface and system level 9 Fortinet Confidential
  • 10. FortiGate Platform • Integrated security appliance − Block network & content threats • Accelerated performance − 10 GbE ports − Up to 120 Gbps single appliance − Up to 526 Gbps modular chassis • Platforms for every market segment − Carrier to SOHO − No per-user licensing 10 Fortinet Confidential
  • 11. FortiGate Consolidated Security Platform Real-Time Protection FortiGuard™ Updates Fully Integrated AV IPS Web Filter Antispam App Ctrl VM Security & Firewall VPN DLP WAN Opt Traffic Shaping Networking Technologies WLAN VoIP SSL Insp HA Load Balancing Hardened Platform Specialized OS High Performance Purpose-Built Hardware Support and Services FortiCare™ FortiGuard Labs • Purpose-built to deliver overlapping, complementary security • Provides both flexibility & defense-in-depth capabilities 11 Fortinet Confidential
  • 12. Fortinet Product Portfolio Unified Threat Centralized Application Management Management Security FortiGate FortiManager FortiMail Network Security Centralized Device Messaging Security Platform Management FortiAP FortiAnalyzer FortiWeb Network Security Centralized Logging Web & XML and Reporting Application Firewall Platform Security Host Data Services Security Security FortiClient FortiGuard Endpoint Security FortiDB Real time Database Security Security Services FortiScan Asset Vulnerability Management 12 Fortinet Confidential
  • 13. Market Leadership Across the Board Worldwide UTM Market Share Magic Quadrant for Unified UTM Market Competitive Q2 2011 (1) Threat Management 2012 (2) Landscape, 2009(3) Market Rank Company Share (%) 1 17.0 High 2 Check Point 13.2 Ability 3 Juniper 8.9 to Deliver 4 SonicWALL 7.5 5 Cisco 6.9 6 WatchGuard 5.0 Low 7 McAfee 4.0 Low Market Penetration High 8 Crossbeam 2.9 9 Other 34.6 Contender Market Leader Total 100.0 Niche Participant Specialist Challenger Notes (1) IDC Worldwide Security Appliances Tracker, September 2011 (market share based on factory revenue) (2) (3) Fortinet Confidential Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012 Frost & Sullivan, “World Unified Threat Management, Products Market 2009”, 2010 13
  • 14. A Proven Partner • Proven Industry Leadership − Since 2000, Fortinet has received more than 100 product & company awards. ▪ IDC: Overall leader in UTM factory revenue for 23rd consecutive Quarter – Q3 2012 ▪ Gartner: Leader in Unified Threat Management Magic Quadrant ▪ SC Magazine: 2012 Readers' Trust Award for "Best UTM Security” ▪ http://www.worldsfastestfirewall.com/ • Certified security − Seven ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam, WAF) − Government Certifications (FIPS-2, Common Criteria EAL4+, JITC IPv6, SCAP) − ISO 9001 certification 14 Fortinet Confidential
  • 15. Customers Worldwide 7 of the top 10 Fortune companies in Americas 8 of the top 10 Fortune companies in EMEA 9 of the top 10 Fortune companies in APAC 10 of the top 10 Fortune Telecommunications companies 9 of the top 10 Fortune Retail & Commercial Banks 7 of top 10 Fortune Aerospace & Defense 15 Fortinet Confidential
  • 16. Summary • Consolidated Security » Complete content protection • Unmatched performance » Purpose-built hardware and software • Lower TCO » Less complexity, faster deployment, easier management • Real-time security » 24/7 global updates deliver security expertise Fortinet Confidential
  • 17. „Provocări de securitate pentru SMB”? FortiGate 60C - SC Magazine Readers' Trust Award for “Best UTM Security” - March 6, 2012 Fortinet Confidential

Notas del editor

  1. -> Pentru a ofericredibilitatecelorceurmeazahaidetisastudiempentru o clipacatevastatistici in ceeaceprivestecompaniaFortinet-> Pelangafaptul ca de la infiintarealorsipanaastazi au cunoscut o crestereconstantaceisigaseste media undeva la 63-64% anual, in plinacriza au reusit o crestere de aproape 30%-> Acestfaptdovedestedouaaspecte: 1. interesul in continua crestere al pieteipentruprodusele de securitate; 2. capacitateaechipamentelorFortinet de a executa
  2. -> Plecand de la functionalitatiuzualeechipamentelor de securitatesimainouechipamentelor de tip NG Firewall, Fortinet a dezvoltatconceptul de UTM adugandfunctionalitati de securitatecomplementareinsacriticepentrusecurizareauneiretele cat sifunctionalitati de rutare/comunicatie in retea-> Complementareafunctionalitatilor: comunicatiesisecuritate
  3. -> Mai multenivele consecutive de securitate-> Fiecareasigura un alt tip de filtrarefolosindtehnicidiferitesisemnaturispecializatefiecaruifiltru
  4. -> Construireauneiplatforme hardware dedicate reprezintamareleavantaj al solutiilorFortinet-> ASIC-uri dedicate, performantemultmaibunedecat in cazulunorplatforme hardware generale de tip server
  5. ->Aceste ASIC-uri in functie de dimensiunileechipamentului pot fie savinagata integrate, fie sa fie disponibile sub forma unor module aditionalece pot fiachizitionate ulterior in functie de nevoi-> CP – generatia 8-> Este important saremarcamfaptul ca prinajutorulacestor ASIC-uri o mare parte din traficramane la nivelulporturilor, degravandastfelprocesorul central siobtinandu-se performanteremarcabile
  6. -> Portofoliu complex si in acelasitimpcomplet