Sie sind auf Seite 1von 32

Fortinet

An Introduction

March 27, 2019


1 Fortinet Confidential
verify
visualize
simplify
consolidate
manage
The power to Control
protect
secure
accelerate
enable
enforce
March 27, 2019
2 Fortinet Confidential
Agenda

Fortinet Introduction
Strategic Solutions
Technology Overview

3 Fortinet Confidential
Fortinet Corporate Overview
Market Leader $434
• UTM - Fast-growth security segment FORTINET REVENUE ($MM)
Advanced technology and products
• 101+ patents; 113+ pending
$325
Strong global footprint
• 1,700+ employees; 40 offices worldwide $252

Blue chip customer base $212


• Over 125,000 customers
(incl. majority of Global 100) $155
$123
Exceptional financial model
• FY11 revenues: $434M (34% YoY growth) $80
• Q1/12 revenues: $117M (26% YoY growth)
$39
• Strong balance sheet: $600M+ in cash; no debt
$13
• IPO - November 2009
03 04 05 06 07 08 09 10 11

4 Fortinet Confidential
Network Security:
The Traditional Approach
New
Threat
Intercepts
New Device:
‘Next Generation’ New Device:
Firewall VPN Termination

A VICIOUS
New CIRCLE
Threat New
App Layer Threat
Attacks Spam
New Device:
Spam Filtering

5 Fortinet Confidential
The Result:
More Expense, Less Security, Less Control

“I.T. departments must


manage a growing array
of specialized security
technologies that may or
may not work together to
help security
departments detect and
halt attacks.”
“Security Professionals Say Network
Breaches Are Rampant” Ponemon
Institute Survey New York Times 6/22/11

6 Fortinet Confidential
Reducing Complexity Is Critical

Q: What are the top security-related challenges your organization is facing?


(base: of those that are involved in Security investments)

•Source: Navigating IT: Objective & Obstacles


Infoworld, May, 2011

7 Fortinet Confidential
Fortinet Breaks The Cycle

New
Threat
Update Firmware
App Control, Data Update Firmware:
Leakage, SSL Web Filtering
Inspection

New New
Threat Threat
Update Firmware:
IM & P2P Protection

8 Fortinet Confidential
The Benefit Of Integration:
Continuous Updates

New
Threat
Antispam &
Web Filtering Anti-Virus:
Continuous 4x each day

New New
Threat Threat
IPS:
2x each day

9 Fortinet Confidential
Security:
Followed The Internet Evolution
APP LAYER APP CONTROL
ATTACKS

SPYWARE ANTI-SPYWARE
Performance - Damage

WORMS
ANTI-SPAM
SPAM

BANNED CONTENT WEB FILTER

TROJANS
ANTI-VIRUS
VIRUSES

INTRUSIONS IPS
CONTENT-BASED
VPN

CONNECTION-BASED
FIREWALL

HARDWARE THEFT
PHYSICAL LOCK & KEY

1980s 1990s 2000s Today

10 Fortinet Confidential
The Fortinet Solution

APP LAYER APP CONTROL


ATTACKS

SPYWARE ANTI-SPYWARE
Performance - Damage

WORMS
ANTI-SPAM
SPAM

BANNED CONTENT WEB FILTER

TROJANS
ANTI-VIRUS
VIRUSES

INTRUSIONS IPS
CONTENT-BASED
VPN

CONNECTION-BASED
FIREWALL

HARDWARE THEFT
PHYSICAL LOCK & KEY

1980s 1990s 2000s Today

11 Fortinet Confidential
Fortinet:
A New Approach

TRADITIONAL SOLUTIONS THE FORTINET SOLUTION


Cumbersome and costly Simple and cost-effective

12 Fortinet Confidential
FortiGate:
Integrated Architecture

Real-Time Protection FortiGuard™ Updates


Fully Integrated AV IPS Web Filter Antispam App Ctrl VM
Security &
Firewall VPN DLP WAN Opt Traffic Shaping
Networking
Technologies WLAN VoIP SSL Insp HA Load Balancing

Hardened Platform Specialized OS

High Performance Purpose-Built Hardware

Support and Services FortiCare™ FortiGuard Labs


• Purpose-built to deliver overlapping, complementary security
• Provides both flexibility & defense-in-depth capabilities
13 Fortinet Confidential
Unmatched Solution Spectrum

COVERAGE
Domain

Network

Data
SOHO/CPE Enterprise Center/Cloud Carrier

SIZE
Content

Device

14 Fortinet Confidential
The Result:
Market Leadership
IDC Worldwide UTM IDC Worldwide Network Magic Quadrant for Unified
Market Share Q1 2012 (1) Security Revenue 2011 (2) Threat Management (3)

Market Market
Rank Company Rank Company
Share (%) Share (%)
1 18.9 1 Cisco 18.2
2 Check Point 17.8 2 Check Point 14.5
3 SonicWALL 9.3 3 Juniper 8.9
4 Juniper 5.8 4 5.1
5 Cisco 5.4 5 McAfee 4.5
6 WatchGuard 5.1 6 Microsoft 3.5
7 McAfee 4.2 7 IBM 3.4
8 Astaro 2.2 8 HP 2.7
9 Others 31.3 9 Others 31.2
Total 100% Total 100%
Market Size $2.2B Market Size $7.4B

(1) IDC Worldwide Security Appliances Tracker, June 2012 market share based on factory revenue
(2) IDC Worldwide Network Security 2012-2016 Forecast and 2011 Vendor Share, July 2012
(3) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012

15 Fortinet Confidential
Agenda

Fortinet Introduction
Strategic Solutions
Technology Overview

16 Fortinet Confidential
Reacting To Change

Social Media Strategies Mergers & Acquisitions

New Business Processes Mission Critical Applications

Productivity Improvements Partnering

Compliance ‘Bring Your Own Device’

17 Fortinet Confidential
The Problems

POLICY
• Protect Assets • Enable Business
• Guard Against Growth
• Improve
Threats • Increase
Employee
Efficiencies
Productivity
• Meet Regulatory
Requirements
PROTECTION PROCESS

18 Fortinet Confidential
The Power To Control

WHY WHAT HOW


CONTROL? TO CONTROL? TO CONTROL?

• Improve • Users • Multiple Points


Protection of Contact
• Applications
• Improve Policy • Diverse Toolset
• Data
Compliance
• Consolidation
• Devices
• Increase of Functions
Efficiency of
People/Process
es

19 Fortinet Confidential
The Power To Control

Controlling Apps & Defining User Controlling


Features Within Apps Behavior Data
• Categories of Apps • By Domain • Prioritize
• Individual Apps • By Groups • Limit Access By
Groups or Users
• Actions Within • By Individual
Apps Users - Time of Day
- Day of Week

20 Fortinet Confidential
The Power To:
Solve Everyday Problems

Emily, a financial trader, installed Skype on Endpoint Control


her company laptop to talk with family.

Bill works for a Fortune 100 company and Identity-Based


shares company details on Facebook. Policies

2-Factor
Jill is at Starbucks and needs to communicate Authentication
and be protected as if she was at HQ. VPN Tunneling
WAN Optimization

Ed shared a company presentation via his Data Leak


personal Gmail account. Protection

21 Fortinet Confidential
The Power To:
Improve Productivity – Limiting Web Access

“Your daily quota for this category of webpage has expired…


URL: beach-camera.store.buy.com
Category: Shopping and Auction”

22 Fortinet Confidential
Fortinet Delivers
The Power To Control
Over the entire With the broadest Business Benefits
network, end-to- base of solutions • Increased Protection
end • Endpoint to • Improved Policy
• Users Datacenter Solution Compliance
• Behavior • Integrated Stack • Lower TCO
Security
• Data • Enhanced Productivity
• Consolidated (end users & operations)
• Devices Functionality
• Operating • Simplified Technology Benefits
Systems Management
• End to end security
• Applications • Real-time Threat
• High uptime/availability
Protection
• Easy management
• Proactive protection

23 Fortinet Confidential
Agenda

Fortinet Introduction
Strategic Solutions
Technology Overview

24 Fortinet Confidential
Broad Product Portfolio

FortiDDoS FortiVoice

SMALL/MEDIUM
SERVICE PROVIDER ENTERPRISE
FortiAuthenticator
FortiGate FortiGate FortiSwitch
3000-5000 Series 20-1000 Series
LARGE ENTERPRISE
FortiGate
FortiBalancer 1000-3000 Series
FortiScan

FortiCache
FortiDB
FortiManager
FortiWeb
FortiAnalyzer FortiMail

25 Fortinet Confidential
Significant Competitive Advantages

Comprehensive High Performance Real Time


FortiOS Operating System FortiASIC Network ASIC FortiGuard Subscription Service

FIREWALL VPN
Anti- Web Email
IPS
malware security security

ANTIVIRUS/ WEB
ANTISPYWARE DLP FILTERING

APPLICATION WAN
ANTISPAM CONTROL OPTIMIZATION

FortiASIC Network Processor

FortiASIC Content Processor


Multi-Threat Security FortiASIC System-on-a-Chip FortiCare Customer Support

26 Fortinet Confidential
The Power To:
Centralize Management & Analysis
• Single Pane of Glass Management
• Global policy enforcement across 5 or 5,000 devices
• Increased flexibility with granular role-based
administration
• Simplified configuration of Firewall, IPS, Application
Control and other protections

• Centralized Analysis and Reporting


• Continuous monitoring across the enterprise
• Greater visibility into real-time incidents
• Monitor activity by users identity
• Automate compliance reporting

27 Fortinet Confidential
Custom ASICs:
Foundation For Unmatched Performance

Custom Designed Hardware


Dedicated Security functions coupled with powerful CPUs
• Content Processor (ASIC) FortiASIC
• Accelerates computationally Content
intensive tasks Processor

• Network Processor (ASIC) General Purpose


CPU
• Heart of the hardware accelerated firewall
• Operates at interface level, providing FortiASIC FortiASIC
Security Network
low latency data path Processor Processor
• Security Processor (Hybrid)
• Multi-core, multi-threaded processor
combined with content processor ASIC logic Integrated
• Operates at interface level, Switch Fabric

adding additional packet processing


Network
• Integrated Switch Fabric Interfaces

28 Fortinet Confidential
Disruptive Technology Platform

FortiOS
Custom built operating system
Architected for security and
networking demands
Leverages custom hardware
platform
Mature OS - at version 4.0 today

29 Fortinet Confidential
FortiGuard
Research, Updates, Services
FortiGuard Research:
• Rootkits: Kernel Hooks
• Botnets: Dynamic Monitoring, Spambots,
New Malware Protocols
• Malware: Code Techniques-PDF/Flash/Doc
• Security: Exploits & Vulnerabilities, Zero Day Detection
• Packer Research: Unpacking, Generic Detection

FortiGuard Services:
• AV Signatures – 4x Daily
• IPS Signatures – 2x Daily
• Antispam/Web Content Filtering – Real Time
• Sample Collection
• Signature Creation
• Alerts & Escalation

Global Distribution Network:


• Application Control
• Vulnerability Management
• Antispam
• Web Filtering
• Intrusion Prevention
• Antivirus

30 Fortinet Confidential
Fortinet in Action: BYOD

Error message:
»Installs on system and
“Innocent” Video Link: attempts to propagate
»Redirects to malicious
Website
“Out of date” Flash
player
»Download malware
file
Integrated Web Filtering
Blocks access to malicious Website

Network Antivirus
Blocks download of virus

Intrusion Prevention Authentication


Blocks the spread of the worm & Encryption

31 Fortinet Confidential
Thank You
www.fortinet.com

32 Fortinet Confidential

Das könnte Ihnen auch gefallen