Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
© Copyright Fortinet Inc. All rights reserved.
Consolidation of Cybersecurity Architecture: Myth or Reality?
Adrian Danciu
Regional Director – South Eastern Europe, FORTINET
Oct 24th, 2018
2
What’s Going On With The Enterprise?Change, Change and Some More Change
3
Three Out of Many Concerns
DIGITAL
TRANSFORMATION
CYBER
THREATSCOMPLIANCE
4
Digital Transformation
Engage YourCustomers
Empower YourEmployees
Optimize YourBusiness
Transform YourProducts
Digital Technology
Digital Transformation
5
“…in the digital era, [security] focus needs to shift from
securing network perimeters to safeguarding data spread across systems, devices, and the cloud.”
MIT Technology Review, 2017
Mobile DevicesAugmented
Reality/WearablesIoT Platforms Cloud Computing
3D Printing Location Detection
Technologies
Smart Sensor Advanced Human-machine
Interfaces
Bid Data Analytics
and Advanced
Algorithms
Multi-level
Customer
Interaction and
Customer Profiling
Securing the Digital Transformed Enterprise
6
Three Out of Many Concerns
DIGITAL
TRANSFORMATION
CYBER
THREATS
COMPLIANCE
7
Q2 2018 by the Numbers* (some of the numbers)
*FortiGuard Q2 2018 Threat Landscape Report
EXPLOITS
MALWARE
BOTNETS
7,230 unique exploit
detections
96% of firms saw severe
exploits
23,945 variants in 4,856
families
23% detected cryptojacking
malware
265 unique botnets
1.8 active botnets per firm
8
But Still Need to Look Backwards
9
Three Out of Many ConcernsCYBER
THREATS
DIGITAL
TRANSFORMATION
COMPLIANCE
10
The Post-GDPR EraThe World Didn’t End of May 25, 2018
11
And It’s Just Started
12
[Security Transformation]
SXis the integration of security into all areas of digital technology resulting in
fundamental changes to how security is architected, deployed and operated.
A Fundamental Change is Needed
13
A Security Architecture that is:
NETWORK
MULTI-CLOUD
PARTNER API
EMAILUNIFIED ACCESS
IOT-ENDPOINT
WEB APPS
ADVANCED THREAT PROTECTION
MANAGEMENT-ANALYTICS
AUTOMATED
Provides Visibility and Protection Across the Entire Digital Attack
Surface
Multiple Technologies Working Together for the Detection of Advanced Threats
Embedded Intelligence for Automatic Response & Continuous Trust
Assessment
BROAD INTEGRATED
The Fortinet Security Fabric
14
Multi
CloudEmail Applications
Web Unified
Access
Management
AnalyticsThreat
Protection
Advanced
Endpoint
IoT
NetworkSecurity
Multi-Cloud Security
EndpointSecurity
Email Security
Web Application Security
SecureUnified Access
Advanced Threat Protection
Management& Analytics
FortiGate
Enterprise Firewall
FortiGate Cloud Firewall
Network Security
FortiClient
EPP
FortiWeb
Web Application
Firewall
FortiMail
Secure Email
Gateway
FortiSandbox
Advanced Threat
Protection
FortiAnalyzer
Central Logging
/Reporting
FortiManager
Central Security
Management
FortiSIEM
Security Information &
Event Management
FortiGate Virtual
Firewall
Network Security
FortiAP
Wireless
Infrastructure
FortiSwitch
Switching Infrastructure
The Technologies Enabling the Fortinet Security Fabric
15
It All Starts with FortiGate and FortiOS
Branch
Regional
Campus
Internal
SegmentationData
Center
Cloud
WAN/
Internet
16
Meanwhile, Back in the Data Center…
WAN/
Internet
Internal
SegmentationData
Center
Web
Servers
FortiWeb
Servers
FortiMail
17
Adding Transformative Technology
WAN/
Internet
FortiSandbox
Internal
SegmentationData
Center
Web
Servers
FortiWeb
Servers
FortiMail
18
Adding Transformative Technology
WAN/
Internet
FortiSandbox
Internal
SegmentationData
Center
Web
Servers
FortiWeb
Servers
FortiMail
19
Extending Advanced Threat Protection to the Desktop
Branch
Regional
Campus
Data
Center
FortiSandbox
WAN/
Internet
Cloud
20
FortiGuard - An Integrated Threat Intelligence Ecosystem
Exodus
Cyber Threat Alliance
DHS, MITRE
Telcos,CERTS…
FortiGuard
Labs
Installed
Devices
Firewalls
EPP
Manager
Sandbox
Anti-spam
Vulnerability
IP Reputation
IPS
App Control
Web Filtering
Web Threat Research
Malicious Javascript
Security Research
Botnet Research
Mobile Research
FortiGuard
Services
Anti-malware
Web
Web App Security
Mobile App ControlThreat
Intelligence
Sharing
AI/Machine Learning
21
FORTIGUARD THREAT INTELLIGENCE PROJECTS
CISCP & NCCIC
22
We Lead the Industry in Innovation
* As of June 30 2018 Global Patents = 539
Based on patents issued as listed by the US Patent and Trademark Office
23
NSS Labs 3rd-Party Certifications
9 Recommendations
out of 9!
Cisco 4
Check Point 3
Palo Alto Networks 4
Most Recent Test Results
9Recommendations
Fortinet Confidential
Updated August 20, 2018
5th year in
a row!
24
1990 2000 2010 2020 2030
FIREWALL
Connectivity
NGFW
UTM
ContentFABRIC
Infrastructure
Well-Positioned to Lead the 3rd Evolution of Network Security
Network Security Evolution
25
Where Does it Go From Here?
Changing Business
Objectives and
Requirements
Threat Landscape Regulatory Pressure
Digital Transformation is
today’s focus but that
will change…
Organizations create
cyber value, Hackers are
there to take it away –
how they do it will
continue to change…
GDPR shifts the focus
from collecting data to
protecting it. How much
of a change will it have?
The Fortinet Security Fabric IS the One Constant in
these Multiple Changes