Upload
buikhanh
View
225
Download
4
Embed Size (px)
Citation preview
1
1
Alvin RodriguesMarket Development DirectorSouth East Asia and Hong Kong
Securing your IOT journey and beyond
2
What is the internet of
things?
2
3
Imagine if …
5 mins later
Cold nightstarts car 5 minutes
before you leave
Meeting @ 9am
Meeting delayed 9:45am
Stop for petrol5 minutes
Traffic jamTraffic detour15 minutes
Train ride20 minutes
4
3
5
The Internet of things and beyond
Source: International Data Corporation
6
The Internet of things ecosystem
Source: International Data Corporation
4
7
Asia-Pacific and Japan Internet of things ecosystem revenues –2020
Source: International Data Corporation
8
Risk and benefits discussion
drives greater automation delivering convenience
constant evolution – driving innovationefficiency real-time contextual based
insights100% availability
highly personalised service
securityprivacy
autonomy (potentially)lose creativity (potentially)
Benefits Risk
5
9
Matured networking technologies
Network
Connected Devices
Applications
IPv4 - 4,294,967,296 IPv6 - 340,282,366,920,938,463,463,374,607,431,768,211,456
340 undecillion, 282 decillion, 366 nonillion, 920 octillion, 938 septillion, 463 sextillion, 463 quintillion, 374 quadrillion, 607 trillion, 431 billion, 768 million, 211 thousand and 456
10
Extensive proliferation of connected devices
Network
Connected Devices
Applications
IPv4 - 4,294,967,296IPv6 - 340,282,366,920,938,463,463,374,607,431,768,211,456
Gartner, nearly 26 billion devices on IoT by 2020ABI Research, more than 30 billion wirelessly devices will be wirelessly on IoT by 2020
6
11
Extensive proliferation of connected devices
Expected growth in the number of connected devices
Source:GSMA 2011 report
M2M global revenue forecasts 2011 - 2015 in USD billions and CAGR
Source – machina M2 and global forecast and analysis 2010 to 2020
12
Security CamerasSecurity Cameras
External Hard Drives
External Hard Drives
Extensive proliferation of connected devices
7
13
Countless platform independent application types
Network
Connected Devices
Applications
IPv4 - 4,294,967,296IPv6 - 340,282,366,920,938,463,463,374,607,431,768,211,456
Big Data
14
Transforming the way we do things
Network
Connected Devices
Applications
Activities
Communicate
EngageInteract
Social Business
Transact
Collaborate
Share
8
15
New innovative solutions, services and new markets
Network
Connected Devices
Applications
InnovativeSolution
InnovativeServices
InnovativeSolutions
AndServices
16
New innovative solutions, services and new markets
Network
Connected Devices
Applications
InnovativeSolution
InnovativeServices
InnovativeSolutions
AndServices
Software Network
Hackable Exposed
9
17
More information and activities are online
Network
Connected Devices
Applications
Activities
18
Increased sophistication in socially engineered activities
Network
Connected Devices
Applications
Activities
socially engineered activitiessocially engineered activities
10
19
Rise of unknown threats
Network
Connected Devices
Applications
Activities
APTAPT ATP
20
Protection at Networks
Network
Connected Devices
Applications
IPv4 - 4,294,967,296IPv6 - 340,282,366,920,938,463,463,374,607,431,768,211,456
FirewallIPS, AVCamera
Policy MgtAP, etc
11
21
Protect your connected devices
Network
Connected Devices
Applications
IPv4 - 4,294,967,296IPv6 - 340,282,366,920,938,463,463,374,607,431,768,211,456
FirewallIPS, AVCamera
Policy MgtAP, etc
Firewall2FA, AP
IPS, AVURL Filter
Identity Mgt
22
Attacks launched from Smart Devices
100,000 consumer gadgets compromisedPlatform for 750,000 malicious email to enterprises and individualOccurred between 23 December, 2013 to 6 January, 2014
Reason for compromise• Default password not changed• Network not set up correctly
12
23
Protect your applications
Network
Applications
IPv4 - 4,294,967,296IPv6 - 340,282,366,920,938,463,463,374,607,431,768,211,456
FirewallIPS, AV, Camera
Policy MgtAP, DDoS
etc
Firewall,VM WAF,IPS, AV,
DDoS, WAFADC, etc
Connected Devices
Firewall2FA, AP
IPS, AVURL Filter
Identity Mgt
24
Critical for Security tools and Threat Intelligence to work together
Network
Applications
IPv4 - 4,294,967,296IPv6 - 340,282,366,920,938,463,463,374,607,431,768,211,456
FirewallIPS, AV, Camera
Policy MgtAP, DDoS
etc
Firewall,VM WAF,IPS, AV,
DDoS, WAFADC, etc
Connected Devices
Firewall2FA, AP
IPS, AVURL Filter
Identity Mgt
13
25 Fortinet Confidential
Source: Verizon data breaches investigation report 2014
The evolution of that over the last 5 years
26 Fortinet Confidential
Prevailing types of attack by industry
Source: Verizon data breaches investigation report 2014
14
27
Threat intelligenceInnovative security
solutions
Stay one step ahead of threat
Stay in step withyour business strategy
Robust Security Solution
Identifying a security solution
28
and not just robust security solution
But companies want complete protection
16
31
Attract and retain customers
32
Convenience100% service
availability
Secured Identity ownership
Positive multi platform and multi channel experience
Personalisedservice
What does your customer value and want?
Privacy
17
33
Corporate aware security culture
Protection
Security Technology
Security Intelligence
Security Management Process
Your Customer’s Expectation
Your Business
Value Prop
Business Critical Assets
Risk and Compliance
Building a business aligned security strategy
Review existing security measures
34
A few things about…
18
35
Threat intelligence
Innovative security solutions
Market leadership
Technology leadership
5 things to remember about Fortinet
Business aligned security strategy
36
Market leadership
Market leadership
19
37 Fortinet Confidential
Gartner Magic Quadrant for UTM (2)
Notes
Gartner Magic Quadrant for Enterprise Firewall (3)
Worldwide Security Appliances Market Share
2013 (1)
(1) IDC Worldwide Security Appliances Tracker, Q2 2014 (market share based on factory revenue)(2) Gartner Magic Quadrant for Unified Threat Management, July 2013(3) Gartner Magic Quadrant for Enterprise Firewall April 2014
Market Leadership
Rank CompanyMarket
Share (%)
1 Cisco/SourceFire 17.5
2 Check Point 12.8
3 7.1
4 Palo Alto Networks 6.7
5 Juniper 6.0
Market Size $9 Bil.
Fortinet Q2 2014, Billings Growth33%
38
Market Leadership –IDC Security Tracker 1H 2013 vs 1H 2014
Growth 1H 2013 1H 2014 % Change
Market $ 109.73 $ 116.68 6.3%
FTNT $ 15.07 $ 22.23 47.5%
CHKP $ 18.56 $ 17.85 -3.8%
Cisco $ 14.49 $ 15.39 6.2%
PANW $ 9.56 $ 12.07 26.3%
Growth 1H 2013 1H 2014 % Change
Market $ 925.52 $1,018.83 10.1%
Others $ 307.93 $ 350.30 13.8%
Cisco $ 133.75 $ 141.55 5.8%
FTNT $ 64.51 $ 73.73 14.3%
CHKP $ 67.77 $ 69.89 3.1%
JNPR $ 44.96 $ 51.53 14.6%
20
39
Technology leadership
Technology leadership
40
Technology Leadership - Test Lab and Certification Results Separate Facts from Claims
21
41
Threat intelligence
Threat intelligence and internal network visibility
42 Fortinet Confidential
Awards & Certifications Partnerships & Industry
35 Awards
FortiGuard - Industry Leaders
22
43 Fortinet Confidential
FortiGuard Threat Research & Response
ANTI-BOTNET
FORTIGUARD ANTIVIRUS SERVICE
FORTIGUARD IP REPUTATIONSERVICE
FORTIGUARD DATABASESECURITY SERVICE
FORTIGUARD WEBSECURITY SERVICE
FORTIGUARD ANTISPAMSECURITY SERVICE
FORTIGUARD APPLICATIONCONTROL SERVICE
FORTIGUARD INTRUSIONPREVENTION SERVICE
FORTIGUARD WEBFILTERING SERVICE
FORTIGUARD VULNERABILITYMANAGEMENT SERVICE
44 Fortinet Confidential
Security Advantage –FortiGuard Threat Research Labs
23
45
Getting network visibility
Top applications(known and unknown)
Top URL destination categories Source and
destination of traffic
List of top exploits and malwareTop attackers and
top victims
Top email senders
46
Corp ComplianceIdentify Potential
Malware
Approved Sites? Employee behavior?
Is this an usual activity? Do you have
Biz in these countries?
Corrective counter measures
Remediation. Early Detection
Is this out of the normal? DLP?
How to use the information?
24
47
Innovative security solutions
Innovative security solution
48
Infrastructure is Evolving Quickly
Bandwidth PerimeterCloudBYODSDN Data Center
Bandwidth requirements are doubling every 18 months
Segmentation is becoming a best practice for the core
1TB& Segmentation
SaaS & IaaS use is becoming prevalent in enterprises
Data centers are re-architecting for more flexibility
Cloud& SDN
The number of connected devices is growing fast
Many endpoints lack asecurity enforcement agent
BYOD& Identity
25
49
Fortinet Plays in all the Key Firewall Markets
Access Firewall - UTM
Full Security Stack
Extended Access Points
Extended Switching
Extended Client
Edge Firewall - NGFW
5X NG Security
Performance under Full NG Security Policy
FortiGuard Enabled
Core Firewall - Data Center
10X DC Performance
Integrated Switching & Routing
Virtual Domains
Advanced Threat Protection
Integration with NGFW
10X Performance
FortiGuard Enabled
50
Extensible Platform Provides Complete Solution
Advanced Threat Protection
DDoS Protection
WLAN & LAN Access
Application Security
Cloud &SDN Support
End Point Security
FortiSandboxFortiWiFi, FortiAPFortiSwitch
Integrated with FortiGate Powered by FortiGuard NSS Recommended
FortiGate WiFi version Extensive range of AP’s Integrated AP Controller Integrated Switch Controller
FortiGate VM
FortiADC, FortiWebFortiMail
FortiDDoS
All Major Hypervisors Supported VMware, Citrix, Microsoft… AWS Cloud for WAF & FortiGate AWS Pay as you Go Model SDN integration VMware NSX
Extensive ADC range from 1 to 50Gbps
Web Application Firewall High Performance Secure
Email Gateway
FortiClient
Application Level ASIC Powered Extensive range from
2 to 24Gbps
Full Anti-Malware Client VPN Client MAC Version Mobile Versions
26
51
Fortinet secures the SCADA networks
52
Complete Security Solution For Your Network
Enterprise
Network
HQ/Campus Edge (NGFW)FortiGate 1000/3000FortiSandbox
Access UTMFortiGate 30-90FortiWiFi 30-90FortiAPFortiSwitchFortiClient
Carrier/ CoreFortiGate 5000
Branch EdgeFortiGate 100-800
Data Center/SDNFortiGate 3000/5000
FortiManager | FortiAnalyzerFortiCloud | FortiAuthenticator
CloudFortiGate VMFortiGate AWSFortiWeb AWS
Management
FortiDDoS FortiWeb
FortiADCFortiMail
27
53
Service and Support
FortiGuard
Our FortiGuard Labs’ global research team continuously monitors the evolving threat landscape. More than 200 researchers provide around the clock coverage to ensure your network stays protected. They deliver rapid product updates and detailed security knowledge, providing protection from the latest threats.
• 8x5 Enhanced Support• 24x7 Comprehensive Support• Premium Services• Professional Services
FortiCare
Our FortiCare customer support organization provides global technical support for all Fortinet products, with support staff in the Americas, Europe, the Middle East and Asia.
• Wide range of self-paced and instructor led courses• Practical, experiential exercises that demonstrate
mastery of complex network security concepts• Designed for customers, partners, and employees
Training and Certification
The Fortinet Network Security Expert (NSE) is a new, 8-level certification program designed for technical professionals interested in independent validation of their network security skills and experience.
Easy, Modular FortiGuard Service Bundles
• Each FortiGuard bundle comes packaged with your choice of 8x5 or 24x7 FortiCare support
54
Network visibility report
28
55
Finally, we are here to help your journey to IoT
Existing Security Needs
56
But if security is not in place…