26
© Copyright Fortinet Inc. All rights reserved. Consolidation of Cybersecurity Architecture: Myth or Reality? Adrian Danciu Regional Director South Eastern Europe, FORTINET Oct 24th, 2018

Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

© Copyright Fortinet Inc. All rights reserved.

Consolidation of Cybersecurity Architecture: Myth or Reality?

Adrian Danciu

Regional Director – South Eastern Europe, FORTINET

Oct 24th, 2018

Page 2: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

2

What’s Going On With The Enterprise?Change, Change and Some More Change

Page 3: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

3

Three Out of Many Concerns

DIGITAL

TRANSFORMATION

CYBER

THREATSCOMPLIANCE

Page 4: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

4

Digital Transformation

Engage YourCustomers

Empower YourEmployees

Optimize YourBusiness

Transform YourProducts

Digital Technology

Digital Transformation

Page 5: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

5

“…in the digital era, [security] focus needs to shift from

securing network perimeters to safeguarding data spread across systems, devices, and the cloud.”

MIT Technology Review, 2017

Mobile DevicesAugmented

Reality/WearablesIoT Platforms Cloud Computing

3D Printing Location Detection

Technologies

Smart Sensor Advanced Human-machine

Interfaces

Bid Data Analytics

and Advanced

Algorithms

Multi-level

Customer

Interaction and

Customer Profiling

Securing the Digital Transformed Enterprise

Page 6: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

6

Three Out of Many Concerns

DIGITAL

TRANSFORMATION

CYBER

THREATS

COMPLIANCE

Page 7: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

7

Q2 2018 by the Numbers* (some of the numbers)

*FortiGuard Q2 2018 Threat Landscape Report

EXPLOITS

MALWARE

BOTNETS

7,230 unique exploit

detections

96% of firms saw severe

exploits

23,945 variants in 4,856

families

23% detected cryptojacking

malware

265 unique botnets

1.8 active botnets per firm

Page 8: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

8

But Still Need to Look Backwards

Page 9: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

9

Three Out of Many ConcernsCYBER

THREATS

DIGITAL

TRANSFORMATION

COMPLIANCE

Page 10: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

10

The Post-GDPR EraThe World Didn’t End of May 25, 2018

Page 11: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

11

And It’s Just Started

Page 12: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

12

[Security Transformation]

SXis the integration of security into all areas of digital technology resulting in

fundamental changes to how security is architected, deployed and operated.

A Fundamental Change is Needed

Page 13: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

13

A Security Architecture that is:

NETWORK

MULTI-CLOUD

PARTNER API

EMAILUNIFIED ACCESS

IOT-ENDPOINT

WEB APPS

ADVANCED THREAT PROTECTION

MANAGEMENT-ANALYTICS

AUTOMATED

Provides Visibility and Protection Across the Entire Digital Attack

Surface

Multiple Technologies Working Together for the Detection of Advanced Threats

Embedded Intelligence for Automatic Response & Continuous Trust

Assessment

BROAD INTEGRATED

The Fortinet Security Fabric

Page 14: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

14

Multi

CloudEmail Applications

Web Unified

Access

Management

AnalyticsThreat

Protection

Advanced

Endpoint

IoT

NetworkSecurity

Multi-Cloud Security

EndpointSecurity

Email Security

Web Application Security

SecureUnified Access

Advanced Threat Protection

Management& Analytics

FortiGate

Enterprise Firewall

FortiGate Cloud Firewall

Network Security

FortiClient

EPP

FortiWeb

Web Application

Firewall

FortiMail

Secure Email

Gateway

FortiSandbox

Advanced Threat

Protection

FortiAnalyzer

Central Logging

/Reporting

FortiManager

Central Security

Management

FortiSIEM

Security Information &

Event Management

FortiGate Virtual

Firewall

Network Security

FortiAP

Wireless

Infrastructure

FortiSwitch

Switching Infrastructure

The Technologies Enabling the Fortinet Security Fabric

Page 15: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

15

It All Starts with FortiGate and FortiOS

Branch

Regional

Campus

Internal

SegmentationData

Center

Cloud

WAN/

Internet

Page 16: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

16

Meanwhile, Back in the Data Center…

WAN/

Internet

Internal

SegmentationData

Center

Web

Servers

FortiWeb

Email

Servers

FortiMail

Page 17: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

17

Adding Transformative Technology

WAN/

Internet

FortiSandbox

Internal

SegmentationData

Center

Web

Servers

FortiWeb

Email

Servers

FortiMail

Page 18: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

18

Adding Transformative Technology

WAN/

Internet

FortiSandbox

Internal

SegmentationData

Center

Web

Servers

FortiWeb

Email

Servers

FortiMail

Page 19: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

19

Extending Advanced Threat Protection to the Desktop

Branch

Regional

Campus

Data

Center

FortiSandbox

WAN/

Internet

Cloud

Page 20: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

20

FortiGuard - An Integrated Threat Intelligence Ecosystem

Exodus

Cyber Threat Alliance

DHS, MITRE

Telcos,CERTS…

FortiGuard

Labs

Installed

Devices

Firewalls

EPP

Manager

Sandbox

Anti-spam

Vulnerability

IP Reputation

IPS

App Control

Web Filtering

Web Threat Research

Malicious Javascript

Security Research

Botnet Research

Mobile Research

FortiGuard

Services

Anti-malware

Email

Web

Web App Security

Mobile App ControlThreat

Intelligence

Sharing

AI/Machine Learning

Page 21: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

21

FORTIGUARD THREAT INTELLIGENCE PROJECTS

CISCP & NCCIC

Page 22: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

22

We Lead the Industry in Innovation

* As of June 30 2018 Global Patents = 539

Based on patents issued as listed by the US Patent and Trademark Office

Page 23: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

23

NSS Labs 3rd-Party Certifications

9 Recommendations

out of 9!

Cisco 4

Check Point 3

Palo Alto Networks 4

Most Recent Test Results

9Recommendations

Fortinet Confidential

Updated August 20, 2018

5th year in

a row!

Page 24: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

24

1990 2000 2010 2020 2030

FIREWALL

Connectivity

NGFW

UTM

ContentFABRIC

Infrastructure

Well-Positioned to Lead the 3rd Evolution of Network Security

Network Security Evolution

Page 25: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management

25

Where Does it Go From Here?

Changing Business

Objectives and

Requirements

Threat Landscape Regulatory Pressure

Digital Transformation is

today’s focus but that

will change…

Organizations create

cyber value, Hackers are

there to take it away –

how they do it will

continue to change…

GDPR shifts the focus

from collecting data to

protecting it. How much

of a change will it have?

The Fortinet Security Fabric IS the One Constant in

these Multiple Changes

Page 26: Consolidation of Cybersecurity Architecture: Myth or Reality? · Assessment BROAD INTEGRATED The Fortinet Security Fabric. 14 Multi Cloud Email Applications Web Unified Access Management