4
www.fortinet.com 1 Enabling Your Small Business Secure Yet Simple Information Technology It all started with a couple of people, a couple computers and a good idea. Now you have a growing company with employees, an office, and a range of business systems. One key to your success will be continued agility and efficiency as you scale your operation. And that will only be possible if those systems are secure yet accessible to your employees - anytime, anywhere. In fact, a recent survey of small business owners found that two-thirds view Information Technology (IT) and security as critical to their business and think about it all the time 1 ! However IT is constantly changing, with BYOD, more connected devices and wireless access creating new infrastructure demands. As is the threat landscape, with Verizon’s recent Data Breach Investigations Report (DBIR) finding that small business were more likely than large ones to be the victims of attacks and data loss 2 . That’s where Fortinet can help. Specifically, Fortinet Connected UTM for small offices delivers all of the access and security technologies a growing business needs in a solution that is easy to use and affordable. Traditional Unified Threat Management Typically, smaller businesses will be using a Unified Threat Management (UTM) solution, defined in the Gartner IT Glossary as a converged platform of point security products, particularly suited to small and midsize businesses (SMBs). Typical feature sets fall into three main categories on one device: firewall/intrusion prevention system (IPS)/virtual private network, secure Web gateway security (URL filtering and Web antivirus) and messaging security (anti-spam, mail AV). In this manner, they are able to simplify the complexity of enterprise-class security and bolster protection of their business despite limited budgets and staff. SOLUTION BRIEF n Increase the Security of Your Business n Reduce the Complexity of Your Network n Rely on the Most Popular Appliance in the World CONNECTED UTM The pioneer in the Unified Threat Management (UTM) market, Fortinet continues to deliver security and simplicity for small businesses with our Connected UTM solution

SOLUTION BRIEF CONNECTED UTM · PDF fileWhile 2014 was clearly dominated by Point of Sale (POS) compromises, the year prior ... NSS Labs Next Gen IPS ¡ X ¡ X X NSS Labs Data Center

  • Upload
    ngodung

  • View
    220

  • Download
    5

Embed Size (px)

Citation preview

Page 1: SOLUTION BRIEF CONNECTED UTM · PDF fileWhile 2014 was clearly dominated by Point of Sale (POS) compromises, the year prior ... NSS Labs Next Gen IPS ¡ X ¡ X X NSS Labs Data Center

www.fortinet.com 1

Enabling Your Small BusinessSecure Yet Simple Information TechnologyIt all started with a couple of people, a couple computers and a good idea. Now you have a growing company with employees, an office, and a range of business systems. One key to your success will be continued agility and efficiency as you scale your operation. And that will only be possible if those systems are secure yet accessible to your employees - anytime, anywhere. In fact, a recent survey of small business owners found that two-thirds view Information Technology (IT) and security as critical to their business and think about it all the time1!

However IT is constantly changing, with BYOD, more connected devices and wireless access creating new infrastructure demands. As is the threat landscape, with Verizon’s recent Data Breach Investigations Report (DBIR) finding that small business were more likely than large ones to be the victims of attacks and data loss2.

That’s where Fortinet can help. Specifically, Fortinet Connected UTM for small offices delivers all of the access and security technologies a growing business needs in a solution that is easy to use and affordable.

Traditional Unified Threat ManagementTypically, smaller businesses will be using a Unified Threat Management (UTM) solution, defined in the Gartner IT Glossary as a converged platform of point security products, particularly suited to small and midsize businesses (SMBs). Typical feature sets fall into three main categories on one device: firewall/intrusion prevention system (IPS)/virtual private network, secure Web gateway security (URL filtering and Web antivirus) and messaging security (anti-spam, mail AV). In this manner, they are able to simplify the complexity of enterprise-class security and bolster protection of their business despite limited budgets and staff.

SOLUTION BRIEF

nn Increase the Security of Your Business

nn Reduce the Complexity of Your Network

nn Rely on the Most Popular Appliance in the World

CONNECTED UTM

The pioneer in the Unified

Threat Management

(UTM) market, Fortinet

continues to deliver

security and simplicity for

small businesses with our

Connected UTM solution

Page 2: SOLUTION BRIEF CONNECTED UTM · PDF fileWhile 2014 was clearly dominated by Point of Sale (POS) compromises, the year prior ... NSS Labs Next Gen IPS ¡ X ¡ X X NSS Labs Data Center

SOLUTION BRIEF: ENABLING YOUR SMALL BUSINESS

2

New Complexity EmergesHowever, as organizations have grown and/or technology has continued to evolve, IT has become more complicated. Whether it is wireless access points providing connectivity to an increasingly mobile, multi-device workforce, additional wired switching to support more connected devices in the workplace, or the rise of cloud services, today’s small business networks have grown much more complicated – with a patchwork of components from various vendors. In fact, 65% of small business owners reported they use a mix of IT (whether on premise or in the cloud) from multiple vendors.

At the same time, the threat landscape continues to evolve with new attack avenues and techniques. While 2014 was clearly dominated by Point of Sale (POS) compromises, the year prior was dominated by web application attacks.

Current IT Security Infrastructure

Completely on-premises using a variety ofproducts and vendors

Using a combination of on-premises plus cloudservices from multiple vendors

Completely on-premises using products from asingle vendor

Using a combination of on premises plus cloudservices from a single vendor

Using only cloud services from multiple vendors

Other

Source: Osterman Research, Inc.

35%

26%

19%

16%

4%

1%

POS Instrusions

Web App Attacks

Insider Misuse

Physical Theft/Loss

Miscellaneous Errors

Crimeware

Card Skimmers

DoS Attacks

Cyber-espionage

Everything else

14%

35%

8%

<1%

2%

4%

9%

<1%

22%

6%

And the 2015 Verizon report indicated that the vast majority of malware found was unique to the organization. As a result of these trends, security technologies continue to evolve and a growing emphasis is currently placed on measures like web application firewall and sandboxing.

70-90%OF MALWARE SAMPLESARE UNIQUE TO ANORGANIZATION.

The Solution for Small Businesses

As a result of these continued IT and security evolutions, especially the resulting complexity, Fortinet is continuing to extend the power and simplicity of its UTM appliances to encompass new networking and security capabilities. This is called Fortinet’s Connected UTM.

Built in Networking

Today’s converged FortiGate UTM appliances come in a wide range of models with varying hardware specifications. Small businesses can choose “WiFi” options which include integrated wireless access points directly or just the wireless controller to manage separate access points from a single console. They can also choose among high port density desktop models – including up to 16 built in switch points – as well as those with integrated Power over Ethernet (PoE) capability. All with an eye to further consolidating small business networking along with security. Other options include integrated IP PBX (phone systems) and more.

source Verizon, DBIR, 2014 http://www.verizonenterprise.com/DBIR/2014/

Page 3: SOLUTION BRIEF CONNECTED UTM · PDF fileWhile 2014 was clearly dominated by Point of Sale (POS) compromises, the year prior ... NSS Labs Next Gen IPS ¡ X ¡ X X NSS Labs Data Center

SOLUTION BRIEF: ENABLING YOUR SMALL BUSINESS

3

Even More Consolidated Security Services

At the same time, FortiGate UTM appliances also include endpoint protection, web application protection and cloud sandboxing to continue bringing the latest enterprise-class technologies to the small and medium business.

Specifically small business can now increase their ability to:

nn Extend network security policy to endpoints whether they are on or off the network.

nn Shield web-based applications from exploit and intrusion.

nn Continue inspecting apparently benign files to identify previously unknown malware.

Benefits

With Fortinet Connected UTM, reinstate simplicity over an increasingly complex IT environment and continue to raise security in response to an evolving threat landscape.

Customers can select a single appliance with fully converged networking and security or multiple security and networking devices all managed from a single console.

FunctionOn the FortiGate

Off-box Option

Network Security √

Email System & Security √ FortiMail

Web Application Security √ FortiWeb

Endpoint Security √ FortiClient

Wireless AP √ FortiAP

Switching √ FortiSwitch

PBX System √ FortiVoice

Management/Reporting √ FortiCloud

Either way, small businesses benefit from:

nn A single vendor.

nn A broad and integrated solution.

nn Top rated components.

nn Volume purchasing.

nn A single point of support.

As a result, small businesses can reduce the time and money spent procuring, deploying and managing IT and security, while also reducing their risk of a security incident.

Why Fortinet

We Are The Leader

Fortinet is the pioneer of the multi-function firewall now referred to as the UTM. We are a recognized leader in the Gartner Magic Quadrant noted for setting the cadence in the market. We are also the most popular network security appliance in the world, according to IDC.

We Deliver the Best Protection

At the same time, we develop and continually update all of our security services in-house through our FortiGuard Labs. We consistently earn top marks in independent, third-party testing conducted by organizations like NSS Labs, Virus Bulletin, AV Comparatives and others.

Page 4: SOLUTION BRIEF CONNECTED UTM · PDF fileWhile 2014 was clearly dominated by Point of Sale (POS) compromises, the year prior ... NSS Labs Next Gen IPS ¡ X ¡ X X NSS Labs Data Center

SOLUTION BRIEF: ENABLING YOUR SMALL BUSINESS

We Offer the Most Integrated Capabilities

With the broadest set of security and networking technologies, we deliver the most comprehensive UTM solution in the market. That translates to the easiest and most affordable solution for small businesses.

Conclusion

The pioneer in the Unified Threat Management (UTM) market, Fortinet continues to deliver security and simplicity for small businesses with our Connected UTM. Customers benefit from top rated protection, the broadest set of integrated networking and security components, with one console, vendor and support contact. As a result, small businesses can continue to grow with the very latest secure IT to enable them.

Certification Fortinet Check Point Cisco Palo Alto Juniper SRX FireEye

NSS Labs Firewall NGFW ¡ ¡ ¡ ¡ ¡ X

NSS Labs Data Center Firewall ¡ X X X X X

NSS Labs Breach Detection System ¡ ¡ ¡ X X ¡

NSS Labs WAF ¡ X X X X X

NSS Labs Next Gen IPS ¡ X ¡ X X

NSS Labs Data Center IPS X X X ¡ X

BreakingPointResiliency Score ¡ X X X X

ICSA Firewall ¡ ¡ X ¡ ¡ X

ICSA IPS ¡ X X X X X

ICSA Antivirus ¡ X X X X X

ICSA WAF ¡ X X X X X

ICSA ATD ¡ X X ¡ X X

VB100 Virus ¡ ¡ X X X X

AV Comparative ¡ X X X X X

Common Criteria ¡ ¡ ¡ ¡ ¡ ¡

¡ RECOMMENDED NEUTRAL ¡ CAUTION

IT Provider Management

Integrated Wireless

Integrated Endpoint/Mobile Security

Consolidated Securityand Switching

Copyright © 2016 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.

GLOBAL HEADQUARTERSFortinet Inc.899 Kifer RoadSunnyvale, CA 94086United StatesTel: +1.408.235.7700www.fortinet.com/sales

EMEA SALES OFFICE120 rue Albert Caquot06560, Sophia Antipolis, FranceTel: +33.4.8987.0510

APAC SALES OFFICE300 Beach Road 20-01The ConcourseSingapore 199555Tel: +65.6513.3730

LATIN AMERICA SALES OFFICEPaseo de la Reforma 412 piso 16Col. JuarezC.P. 06600 México D.F.Tel: 011-52-(55) 5524-8428

Feb 08, 2016

1 U.S. Osterman survey. http://www.fortinet.com/resource_center/analyst_reports/smb-it-security-priorities.html

2 Verizon DBIR, 2015. http://www.verizonenterprise.com/DBIR/2015/