15
1 Fortinet Confidential June 13, 2022 Fortinet An Introduction

1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

Embed Size (px)

Citation preview

Page 1: 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

1 Fortinet Confidential

April 19, 2023

Fortinet

An Introduction

Page 2: 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

2 Fortinet Confidential

April 19, 2023

ControlControlThe power toThe power to

verifyverifyvisualizevisualizesimplifysimplifyconsolidateconsolidatemanagemanage

protectprotectsecuresecureaccelerateaccelerateenableenableenforceenforce

Page 3: 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

3 Fortinet Confidential

Agenda

Fortinet Introduction

Strategic Solutions

Technology Overview

Page 4: 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

4 Fortinet Confidential

Fortinet Corporate Overview

$434$434

$39$39

$80$80

$123$123

$155$155

$212$212

$252$252

$325$325

FORTINET REVENUE ($MM)

48% CAGRFORTINET REVENUE ($MM)

48% CAGR

$13$13

03 04 05 06 07 08 09 10 1103 04 05 06 07 08 09 10 11

Market Leader• UTM - Fast-growth security segment

Advanced technology and products• 80+ patents; 115+ pending

Strong global footprint• 1,500+ employees; 30 offices worldwide

Blue chip customer base• 100,000 customers

(incl. majority of Global 100)

Exceptional financial model• FY11 revenues: $434M (34% YoY growth)• Q411 revenues: $121M (29% YoY growth)• Strong balance sheet: $500M+ in cash; no

debt• IPO - November 2009

Page 5: 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

5 Fortinet Confidential

Network Security:The Traditional Approach

New Threat

Intercepts

New Threat

Intercepts

New Device:VPN TerminationNew Device:VPN Termination

New Threat

Spam

New Threat

SpamNew Device:Spam FilteringNew Device:Spam Filtering

New Threat

App LayerAttacks

New Threat

App LayerAttacks

New Device:‘Next Generation’Firewall

New Device:‘Next Generation’Firewall

A VICIOUS CIRCLE

A VICIOUS CIRCLE

Page 6: 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

6 Fortinet Confidential

“I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks.”“Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey New York Times 6/22/11

The Result:More Expense, Less Security, Less Control

Page 7: 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

7 Fortinet Confidential

Reducing Complexity Is Critical

•Source: Navigating IT: Objective & ObstaclesInfoworld, May, 2011

Q: What are the top security-related challenges your organization is facing? (base: of those that are involved in Security investments)

Page 8: 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

8 Fortinet Confidential

Fortinet Breaks The Cycle

New ThreatNew

Threat

Update Firmware:Web Filtering

Update Firmware:Web Filtering

New ThreatNew

Threat

Update Firmware:IM & P2P Protection

Update Firmware:IM & P2P Protection

New ThreatNew

Threat

Update FirmwareApp Control, Data

Leakage, SSL Inspection

Update FirmwareApp Control, Data

Leakage, SSL Inspection

Page 9: 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

9 Fortinet Confidential

The Benefit Of Integration:Continuous Updates

New ThreatNew

Threat

Anti-Virus:4x each day

Anti-Virus:4x each day

New ThreatNew

Threat

IPS:2x each day

IPS:2x each day

New ThreatNew

Threat

Antispam &Web Filtering

Continuous

Antispam &Web Filtering

Continuous

Page 10: 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

10 Fortinet Confidential

LOCK & KEY

ANTI-SPYWARE

ANTI-SPAM

WEB FILTER

ANTI-VIRUS

VPN

IPS

FIREWALL

APP CONTROL

PHYSICAL

CONNECTION-BASED

HARDWARE THEFT

1980s 1990s 2000s Today

Pe

rfo

rma

nc

e

- D

am

ag

e

CONTENT-BASED

SPYWARE

WORMS

SPAM

BANNED CONTENT

TROJANS

VIRUSES

INTRUSIONS

APP LAYER ATTACKS

HARDWARE THEFTHARDWARE THEFT

Security:Followed The Internet Evolution

Page 11: 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

11 Fortinet Confidential

PHYSICALPHYSICAL

CONNECTION-BASEDCONNECTION-BASED

CONTENT-BASEDCONTENT-BASED

ANTI-SPYWARE

ANTI-SPAM

WEB FILTER

ANTI-VIRUS

VPN

IPS

FIREWALL

LOCK & KEY

SPYWARE

WORMS

SPAM

BANNED CONTENT

TROJANS

VIRUSES

INTRUSIONS

HARDWARE THEFT

1980s 1990s 2000s Today

Pe

rfo

rma

nc

e

- D

am

ag

e

APP CONTROLAPP LAYER ATTACKS

The Fortinet Solution

Page 12: 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

12 Fortinet Confidential

Fortinet:A New Approach

TRADITIONAL SOLUTIONSCumbersome and costlyTRADITIONAL SOLUTIONSCumbersome and costly

THE FORTINET SOLUTIONSimple and cost-effectiveTHE FORTINET SOLUTIONSimple and cost-effective

Page 13: 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

13 Fortinet Confidential

Purpose-Built Hardware

Specialized OS

Firewall

Fully Integrated Security & Networking Technologies

Hardened Platform

High Performance

Real-Time Protection

Traffic ShapingVPN

SSL Insp

DLP WAN Opt

FortiGuard™ Updates

WLAN Load BalancingVoIP HA

Support and Services FortiCare™ FortiGuard Labs

AV IPS AntispamWeb Filter App Ctrl VM

• Purpose-built to deliver overlapping, complementary security

• Provides both flexibility & defense-in-depth capabilities

FortiGate:Integrated Architecture

Page 14: 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

14 Fortinet Confidential

Unmatched Solution Spectrum

SIZESIZE

COVERAGECOVERAGE

SOHO/CPESOHO/CPE EnterpriseEnterprise CarrierCarrierData

Center/CloudData

Center/Cloud

DomainDomain

NetworkNetwork

ContentContent

DeviceDevice

Page 15: 1 Fortinet Confidential September 11, 2015 Fortinet An Introduction

15 Fortinet Confidential

The Result:Market Leadership

(1) IDC Worldwide Security Appliances Tracker, Sept 2011 (market share based on factory revenue)(2) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012

Rank CompanyMarketShare (%)

1 18.0

2 Check Point 14.0

3 SonicWALL 8.3

4 Juniper 7.9

5 Cisco 6.5

6 WatchGuard 4.7

7 McAfee 4.0

8 Crossbeam 3.0

9 Other 33.6

Total 100.0

Magic Quadrant for Unified Threat Management2

Magic Quadrant for Unified Threat Management2

Worldwide UTM Market ShareQ3 20111

Worldwide UTM Market ShareQ3 20111