32
1 Fortinet Confidential June 11, 2022 Fortinet An Introduction

1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

Embed Size (px)

Citation preview

Page 1: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

1 Fortinet Confidential

April 21, 2023

Fortinet

An Introduction

Page 2: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

2 Fortinet Confidential

April 21, 2023

ControlControlThe power toThe power to

verifyverifyvisualizevisualizesimplifysimplifyconsolidateconsolidatemanagemanage

protectprotectsecuresecureaccelerateaccelerateenableenableenforceenforce

Page 3: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

3 Fortinet Confidential

Agenda

Fortinet Introduction

Strategic Solutions

Technology Overview

Page 4: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

4 Fortinet Confidential

Fortinet Corporate Overview

$434$434

$39$39

$80$80

$123$123

$155$155

$212$212

$252$252

$325$325

FORTINET REVENUE ($MM)FORTINET REVENUE ($MM)

$13$13

03 04 05 06 07 08 09 10 1103 04 05 06 07 08 09 10 11

Market Leader• UTM - Fast-growth security segment

Advanced technology and products• 101+ patents; 113+ pending

Strong global footprint• 1,700+ employees; 40 offices worldwide

Blue chip customer base• Over 125,000 customers

(incl. majority of Global 100)

Exceptional financial model• FY11 revenues: $434M (34% YoY growth)• Q1/12 revenues: $117M (26% YoY growth)• Strong balance sheet: $600M+ in cash; no

debt• IPO - November 2009

Page 5: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

5 Fortinet Confidential

Network Security:The Traditional Approach

New Threat

Intercepts

New Threat

Intercepts

New Device:VPN TerminationNew Device:VPN Termination

New Threat

Spam

New Threat

SpamNew Device:Spam FilteringNew Device:Spam Filtering

New Threat

App LayerAttacks

New Threat

App LayerAttacks

New Device:‘Next Generation’Firewall

New Device:‘Next Generation’Firewall

A VICIOUS CIRCLE

A VICIOUS CIRCLE

Page 6: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

6 Fortinet Confidential

“I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks.”“Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey New York Times 6/22/11

The Result:More Expense, Less Security, Less Control

Page 7: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

7 Fortinet Confidential

Reducing Complexity Is Critical

•Source: Navigating IT: Objective & ObstaclesInfoworld, May, 2011

Q: What are the top security-related challenges your organization is facing? (base: of those that are involved in Security investments)

Page 8: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

8 Fortinet Confidential

Fortinet Breaks The Cycle

New ThreatNew

Threat

Update Firmware:Web Filtering

Update Firmware:Web Filtering

New ThreatNew

Threat

Update Firmware:IM & P2P Protection

Update Firmware:IM & P2P Protection

New ThreatNew

Threat

Update FirmwareApp Control, Data

Leakage, SSL Inspection

Update FirmwareApp Control, Data

Leakage, SSL Inspection

Page 9: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

9 Fortinet Confidential

The Benefit Of Integration:Continuous Updates

New ThreatNew

Threat

Anti-Virus:4x each day

Anti-Virus:4x each day

New ThreatNew

Threat

IPS:2x each day

IPS:2x each day

New ThreatNew

Threat

Antispam &Web Filtering

Continuous

Antispam &Web Filtering

Continuous

Page 10: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

10 Fortinet Confidential

LOCK & KEY

ANTI-SPYWARE

ANTI-SPAM

WEB FILTER

ANTI-VIRUS

VPN

IPS

FIREWALL

APP CONTROL

PHYSICAL

CONNECTION-BASED

HARDWARE THEFT

1980s 1990s 2000s Today

Pe

rfo

rma

nc

e

- D

am

ag

e

CONTENT-BASED

SPYWARE

WORMS

SPAM

BANNED CONTENT

TROJANS

VIRUSES

INTRUSIONS

APP LAYER ATTACKS

HARDWARE THEFTHARDWARE THEFT

Security:Followed The Internet Evolution

Page 11: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

11 Fortinet Confidential

PHYSICALPHYSICAL

CONNECTION-BASEDCONNECTION-BASED

CONTENT-BASEDCONTENT-BASED

ANTI-SPYWARE

ANTI-SPAM

WEB FILTER

ANTI-VIRUS

VPN

IPS

FIREWALL

LOCK & KEY

SPYWARE

WORMS

SPAM

BANNED CONTENT

TROJANS

VIRUSES

INTRUSIONS

HARDWARE THEFT

1980s 1990s 2000s Today

Pe

rfo

rma

nc

e

- D

am

ag

e

APP CONTROLAPP LAYER ATTACKS

The Fortinet Solution

Page 12: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

12 Fortinet Confidential

Fortinet:A New Approach

TRADITIONAL SOLUTIONSCumbersome and costlyTRADITIONAL SOLUTIONSCumbersome and costly

THE FORTINET SOLUTIONSimple and cost-effectiveTHE FORTINET SOLUTIONSimple and cost-effective

Page 13: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

13 Fortinet Confidential

Purpose-Built Hardware

Specialized OS

Firewall

Fully Integrated Security & Networking Technologies

Hardened Platform

High Performance

Real-Time Protection

Traffic ShapingVPN

SSL Insp

DLP WAN Opt

FortiGuard™ Updates

WLAN Load BalancingVoIP HA

Support and Services FortiCare™ FortiGuard Labs

AV IPS AntispamWeb Filter App Ctrl VM

• Purpose-built to deliver overlapping, complementary security

• Provides both flexibility & defense-in-depth capabilities

FortiGate:Integrated Architecture

Page 14: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

14 Fortinet Confidential

Unmatched Solution Spectrum

SIZESIZE

COVERAGECOVERAGE

SOHO/CPESOHO/CPE EnterpriseEnterprise CarrierCarrierData

Center/CloudData

Center/Cloud

DomainDomain

NetworkNetwork

ContentContent

DeviceDevice

Page 15: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

15 Fortinet Confidential

The Result:Market Leadership

(1) IDC Worldwide Security Appliances Tracker, June 2012 market share based on factory revenue(2) IDC Worldwide Network Security 2012-2016 Forecast and 2011 Vendor Share, July 2012(3) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012

Rank Company Market Share (%)

1 18.9

2 Check Point 17.8

3 SonicWALL 9.3

4 Juniper 5.8

5 Cisco 5.4

6 WatchGuard 5.1

7 McAfee 4.2

8 Astaro 2.2

9 Others 31.3

Total 100%

Market Size $2.2B

IDC Worldwide Network Security Revenue 2011 (2)

Rank Company Market Share (%)

1 Cisco 18.2

2 Check Point 14.5

3 Juniper 8.9

4 5.1

5 McAfee 4.5

6 Microsoft 3.5

7 IBM 3.4

8 HP 2.7

9 Others 31.2

Total 100%

Market Size $7.4B

IDC Worldwide UTM Market Share Q1 2012 (1)

Magic Quadrant for Unified Threat Management (3)

Page 16: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

16 Fortinet Confidential

Agenda

Fortinet Introduction

Strategic Solutions

Technology Overview

Page 17: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

17 Fortinet Confidential

Social Media Strategies

Reacting To Change

New Business Processes

Productivity Improvements

Compliance

Mergers & Acquisitions

Mission Critical Applications

Partnering

‘Bring Your Own Device’

Page 18: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

18 Fortinet Confidential

The Problems

Page 19: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

19 Fortinet Confidential

HOWTO CONTROL?

HOWTO CONTROL?

WHATTO CONTROL?

WHATTO CONTROL?

The Power To Control

• Improve Protection

• Improve PolicyCompliance

• Increase Efficiency of People/Processes

• Improve Protection

• Improve PolicyCompliance

• Increase Efficiency of People/Processes

• Users

• Applications

• Data

• Devices

• Users

• Applications

• Data

• Devices

• Multiple Pointsof Contact

• Diverse Toolset

• Consolidation of Functions

• Multiple Pointsof Contact

• Diverse Toolset

• Consolidation of Functions

WHYCONTROL?WHY

CONTROL?

Page 20: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

20 Fortinet Confidential

The Power To Control

Controlling Apps & Features Within Apps

• Categories of Apps

• Individual Apps

• Actions Within Apps

Controlling Apps & Features Within Apps

• Categories of Apps

• Individual Apps

• Actions Within Apps

Defining User Behavior

• By Domain

• By Groups

• By Individual Users

Defining User Behavior

• By Domain

• By Groups

• By Individual Users

Controlling Data

• Prioritize

• Limit Access By Groups or Users

- Time of Day

- Day of Week

Controlling Data

• Prioritize

• Limit Access By Groups or Users

- Time of Day

- Day of Week

Page 21: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

21 Fortinet Confidential

The Power To: Solve Everyday Problems

Emily, a financial trader, installed Skype on her company laptop to talk with family.

Bill works for a Fortune 100 company and shares company details on Facebook.

Ed shared a company presentation via his personal Gmail account.

Jill is at Starbucks and needs to communicate and be protected as if she was at HQ.

Endpoint Control

2-Factor Authentication

VPN TunnelingWAN Optimization

Identity-Based Policies

Data Leak Protection

Page 22: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

22 Fortinet Confidential

The Power To:Improve Productivity – Limiting Web Access

“Your daily quota for this category of webpage has expired…URL: beach-camera.store.buy.com

Category: Shopping and Auction”

Page 23: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

23 Fortinet Confidential

With the broadest base of solutions

• Endpoint to Datacenter Solution

• Integrated Stack Security

• Consolidated Functionality

• Simplified Management

• Real-time Threat Protection

Over the entire network, end-to-end

• Users

• Behavior

• Data

• Devices

• Operating Systems

• Applications

Technology Benefits

• End to end security

• High uptime/availability

• Easy management

• Proactive protection

Fortinet DeliversThe Power To Control

Business Benefits

• Increased Protection

• Improved Policy Compliance

• Lower TCO

• Enhanced Productivity(end users & operations)

Page 24: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

24 Fortinet Confidential

Agenda

Fortinet Introduction

Strategic Solutions

Technology Overview

Page 25: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

25 Fortinet Confidential

Broad Product Portfolio

FortiGate 20-1000 Series

LARGE ENTERPRISEFortiGate

1000-3000 Series

SERVICE PROVIDER

SMALL/MEDIUM ENTERPRISE

FortiGate 3000-5000 Series

FortiManager

FortiAnalyzer FortiMail FortiWeb

FortiDB

FortiScan

FortiSwitch

FortiDDoS

FortiAuthenticator

FortiBalancer

FortiCache

FortiVoice

Page 26: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

26 Fortinet Confidential

Significant Competitive Advantages

FortiOS Operating System

Multi-Threat Security

FortiASIC Network ASIC

FortiASIC Network Processor

FortiGuard Subscription Service

FortiCare Customer Support

FIREWALL

APPLICATIONCONTROLANTISPAM

VPN

WEB FILTERINGDLP

WANOPTIMIZATION

ANTIVIRUS/ANTISPYWARE

IPSWeb

securityEmail

securityAnti-

malware

FortiASIC System-on-a-Chip

FortiASIC Content Processor

Page 27: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

27 Fortinet Confidential

The Power To:Centralize Management & Analysis

• Single Pane of Glass Management

• Global policy enforcement across 5 or 5,000 devices

• Increased flexibility with granular role-based administration

• Simplified configuration of Firewall, IPS, Application Control and other protections

• Centralized Analysis and Reporting

• Continuous monitoring across the enterprise

• Greater visibility into real-time incidents

• Monitor activity by users identity

• Automate compliance reporting

Page 28: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

28 Fortinet Confidential

Custom ASICs:Foundation For Unmatched Performance

• Content Processor (ASIC)• Accelerates computationally

intensive tasks

• Network Processor (ASIC)• Heart of the hardware accelerated firewall

• Operates at interface level, providing low latency data path

• Security Processor (Hybrid)• Multi-core, multi-threaded processor

combined with content processor ASIC logic

• Operates at interface level, adding additional packet processing

• Integrated Switch Fabric

Custom Designed HardwareDedicated Security functions coupled with powerful CPUs

IntegratedSwitch Fabric

FortiASIC

FortiASIC

FortiASIC

SecurityProcessor

NetworkProcessor

ContentProcessor

NetworkInterfaces

General PurposeCPU

Page 29: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

29 Fortinet Confidential

FortiOS

Custom built operating system

Architected for security and networking demands

Leverages custom hardware platform

Mature OS - at version 4.0 today

Disruptive Technology Platform

Page 30: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

30 Fortinet Confidential

FortiGuardResearch, Updates, Services

FortiGuard Research:• Rootkits: Kernel Hooks• Botnets: Dynamic Monitoring, Spambots, New Malware Protocols• Malware: Code Techniques-PDF/Flash/Doc• Security: Exploits & Vulnerabilities, Zero Day Detection• Packer Research: Unpacking, Generic Detection

FortiGuard Services:• AV Signatures – 4x Daily• IPS Signatures – 2x Daily• Antispam/Web Content Filtering – Real Time• Sample Collection• Signature Creation• Alerts & Escalation

Global Distribution Network:• Application Control• Vulnerability Management• Antispam• Web Filtering• Intrusion Prevention• Antivirus

Page 31: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

31 Fortinet Confidential

“Innocent” Video Link:»Redirects to malicious Website

Integrated Web FilteringBlocks access to malicious Website

Network AntivirusBlocks download of virus

Intrusion PreventionBlocks the spread of the worm

Error message:»Installs on system and attempts to propagate

“Out of date” Flash player »Download malware file

Authentication & Encryption

Fortinet in Action: BYOD

Page 32: 1 Fortinet Confidential September 5, 2015 Fortinet An Introduction

32 Fortinet Confidential

Thank You

www.fortinet.com