Upload
joe-sarno
View
118
Download
3
Tags:
Embed Size (px)
DESCRIPTION
Citation preview
Fortinet Corporate Presentation
Joe SarnoCountry Manager - Fortinet
2
Agenda
Fortinet at a Glance
Security Market Dynamics
Fortinet Solutions
Industry Recognition
3
Fortinet Overview
Market-Leading Provider of End-to-End IT Security Solutions
Company Stats
• Founded in 2000
• Silicon Valley-based, strong global presence with 30+ offices worldwide
• Seasoned and proven executive management team
• 1,100+ employees / 700+ engineers
• 425,000+ FortiGate devices shipped worldwide
Innovative, Best-in-Class
Technologies and Products
• Six ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam)
• Strong IP portfolio – 20+ patents; 80+ pending
• Government Certifications (FIPS-2, Common Criteria EAL4+, NIST)
• Consistent Antivirus Validation – (Virus Bulletin 100 approved; 2005, 2006, 2007, 2008, 2009)
4
Profitable
Balanced across product market segments• SMB, Enterprise, & Service Provider• High-end is fastest-growing product segment
Balanced geographic global presence• 65% of revenue generated outside of Americas
Strong growth in services & recurring revenues
• 50% of revenue from services
Consistently strong growth year over year• 36% growth in revenue 2008 vs. 2007
Financial Highlights
5
Endpoints
Content & Applications
Fortinet’s End-to-End IT Security Portfolio
Taking security beyond UTM
Networks
End to end IT security
UTM FortiGate
Endpoint Security
Email Security
Web, Database, App
Management & Analysis
6
UTM Competitive Landscape
FW/VPN
IPS AVWeb
filtering
Anti-spam
Access Contro
l
WAN Opt.
FortiGateFortiGate
NetScreen NetScreen OneSecureOneSecureNeoterisNeoteris PerabitPerabit
65xx blade65xx bladeMARSMARS
VPN-1 with SmartDefenseVPN-1 with SmartDefense
UTM-1 UTM-1
ASA (Trend for AV)ASA (Trend for AV)
SSG (Trend, Kaspersky, Symantec, SurfControl)SSG (Trend, Kaspersky, Symantec, SurfControl)
Zone LabsZone Labs
““Homegrown” productsHomegrown” products Acquired / OEM productsAcquired / OEM products
IronPortIronPort
7
Fortinet Global Services
Vancouver, Canada
Sophia Antipolis, France
Bangalore, India
Beijing, China
Tokyo,Japan
Kuala Lumpur,Malaysia
• FortiGuard Global Research Team: original security intelligence via FortiGuard subscriptions• Antivirus
• Intrusion Prevention
• Web Filtering
• Antispam
• FortiCare Support services provides ongoing technical assistance, anywhere• Multiple service levels to
meet customer requirements
8
Broad technology platform• Home-grown security functions AV, IPS, WCF,
FW, VPN, Anti-spam/Spyware• Powerful operating system and custom ASICs
• First ATCA security vendor
Fortinet Differentiation
Broad product line and global channel• End-to-end IT security portfolio• 100% channel based
Broad security subscription • Coverage via global infrastructure• >100 researchers WW
9
Agenda
Fortinet at a Glance
Security Market Dynamics
Fortinet Solutions
Industry Recognition
10
Recent Industry Recognition
• IDC: Top 4 Security Appliance Vendor; #1 UTM Vendor
• Gartner: Strong Positive in Multi-function Firewall Marketscope
• Frost & Sullivan: Global Market Leadership Award for UTM Best Practices & Award for enabling profitable network-based Managed Security Services
• Radicati Group: “Top Player” in Email Security Quadrant
•Current Analysis: Tier-1 Enterprise Security Vendor
• Computer Business Review: Top Ten Most Influential Security Companies
• Deloitte Technology Fast 50 for Silicon Valley
• Inc. Magazine 5,000 Fastest Growing Companies
• #10 - Silicon Valley Business Journal Fast 50
11
By 2011 UTM will be the largest single market with a CAGR of
26.2%
UTM Leadership & Growth
In 2008 UTM has already surpassed firewall market
12
Agenda
Fortinet at a Glance
Security Market Dynamics
Fortinet Solutions
Industry Recognition
13
Threatscape Evolution
ConnectionBased Attacks
Layer 2/3/4
Mobile Devicesand Crossover
Web 2.0
InappropriateContent
Denial of Service Attacks
Spam, PhishingPharming
Virus, Spyware,Adware, Trojan,Worm
Peer to Peer
Botnets
Identity Theft
Application and System
Vulnerabilities
14
• Continued sophistication and prevalence of threats, requiring multiple security protections
• Regulatory compliance pressures (SOX, PCI, etc.)
• Impact of security breaches on business• Higher performance to cope with evolution of business applications• Distributed networks & mobile users
Top concerns in IT Security
Dynamic Threat Landscape
IT Budget: Do more with less
• Complexity and cost of managing multiple security solutions• Increased pressure to improve security service while reducing TCO
Footprint Reduction
• Multiple Physical / Data Center• Carbon
Business Continuity
15
Navigating the Security Landscape
Virtual Private Network (VPN)“Secure” private traffic across public networks
Network Security
Firewall“External” threat protection
Application Security
Application FirewallProtection for WebServices Applications
Data Leak PreventionPreventing unautorized documents leaving the network
Antivirus / AntimalwareDetection and removal of malicious application content
Content Security
Web filteringProtection from harmful web sites and web content DataBase Security
Protecting DBs from internal Threats
Intrusion Prevention System (IPS)Monitoring and active protection from malicious traffic
Messaging securityDetection and protection from malicious email
Fortinet Confidential
Application Control Regardless the protocol or port being used
16
• Multiple management interfaces• No integration between vendors• No single vendor for issue resolution
• Multiple vendor contracts• Costly support licensing• Data resource allocation (power, rack space, cooling)
The Point Solution Syndrome
Difficult to manage
Lack of integration
• Leads to reduced security
Performance challenges
• Multiple inspection steps tax network performance• Software only solutions further reduce performance
Expensive to deploy & maintain
17
A Comprehensive Security Approach Is Required
Network Security• FortiGate Multi-Threat Security
End Point Security• FortiClient Multi-Threat Security
Enterprise Management• FortiAnalyzer Appliances• FortiManager Appliances
Application Security• FortiMail Email Security• FortiDB Database Security• FortiWeb Application Security
18
Agenda
Fortinet at a Glance
Security Market Dynamics
Fortinet Solutions
Industry Recognition
19
• Multi-Threat protection
• Comprehensive security solution
• High-Performance security
• Custom ASICs for real-time, high performance network protection
The New Generation of Security Gateway
FortiGate Appliances
20
FortiOS 4.0
FortiOS 4.0 introduces four major new technologies into the existing comprehensive network security offering:
• WAN Optimization and Caching• Accelerate applications over WAN connections while ensuring multi-
threat security enforcement• Application Control
• Recognize traffic based on the application generating it, instead of port or protocol
• SSL Inspection • to increase security and policy control among encrypted traffic
streams• Data Leakage Prevention (DLP)
• to identify and prevent the communication of sensitive information outside of the network boundaries
21
Custom ASICs for Unmatched Performance
The FortiASIC™ Family
Network ASIC (NP)• Firewall acceleration• VPN (IPSEC and SSL)• IPS anomaly acceleration
Application ASIC (CP)
• Accelerated Antivirus (+Antispyware) analysis
• Web Filtering and Antispam Advantage from Accelerated AV scanning
• Traffic Shaping
22
• Reduces number of vendors and appliance
• Provides comprehensive security
• Minimizes down-time from individual threats
• Simplifies security management
• Coordinates security alerting, logging, and reporting
• Improves detection capabilities
Comprehensive, Integrated Security
FortiGate Appliances
23
Network Security
• Firewall• Prevent unauthorized
access
• Establish security perimeters / implement segmentation
• IPSec & SSL VPN• Provide remote access to
privileged resources
24
Integrated Application and Content Security
• Intrusion Prevention• Prevents exploitation of
vulnerabilities
• Protocol awareness allows application awareness
• Antivirus / Antispyware• Prevents malicious
content from propagating
25
Application Security
• Web Filtering• Prevents access to known
malicious and spam/phishing sites
• Prevents any policy violating content
• Antispam• Filters unsolicited bulk mail
• Application Control• Prevents/Limits communication of
common network applications (IM, P2P, etc.)
• Shapes traffic to guarantee/restrict bandwidth for a given application
26
Content Security
FortiMail high-performance multi-layered email security platforms provide maximum protection for email threats and facilitate regulatory compliance
• Ideal for:• SMBs, Enterprises (Small to Large),
Service Providers• Primary Benefits:
• Comprehensive protection eliminating threats and attacks from emails
• Avoids mail system resource consumption
• Preserves internal network bandwidth• Aids compliance with advanced
content archiving• Increases employee productivity• Protect, quarantine and archive all-in-
one
27
Application Security
Scan for Vulnerabiliti
es
• Scans for security problems – provides advice to fix
• Built-in best practices and/or your own standards• Ongoing scan of every DB in your enterprise
Monitoring &
Auditing
• Automatically create baselines of normal behavior• Continuously scan for suspicious end-user
behavior • Alert on suspicious data access patterns
• Full history of user privilege and object / schema design changes, incl. data access / data update events
• Audit/Compliance reports for use by DBA team, infosec or audit team
FortiPartner Program: IPLocks Japan
Assures the confidentiality, integrity and availability of
critical enterprise data
28
Endpoint Security
FortiClient PC & FortiClient Mobile for multi-layered, dynamic endpoint security:
• For personal computers, laptops and smartphones
• Powered by FortiGuard subscription services
• FortiClient lightweight software agents available for Microsoft Windows XP, MS Vista, MS Mobile and Symbian™ operating systems
• Comprehensive FW, AV, AS, SSL & IPSec VPN and antispyware protection, WAN Opt. & Application control
• Web content filtering for Windows-based PCs and incoming call filtering for mobile devices
• Mobile contacts and SMS encryption
for PCs , Laptops and Mobile phones
29
Summary
Industry-leading security vendor
End-to-end IT Security portfolio
Strong Financials
Global Customer Base
Experienced Management Team
30
Questions