SlideShare uma empresa Scribd logo
1 de 17
A Consolidated Approach to
                     Security
Stefan Oancea
Product Manager
Netsafe Solutions




November 16, 2011
Fortinet Confidential
November 16, 2011
Fortinet Confidential
Fortinet Corporate Overview

                                                   Fortinet Revenue ($MM)
    • Founded in 2000
    • Global presence with 30+ offices
      worldwide & 1,300+ employees
                                                                               $252
      – 5,000+ channel partners
                                                                            $212
      – 100,000+ customers
           – Majority of the Fortune Global 100                       $155
                                                                  $123
    • IPO Nov 2009                                             $80
      • NASDAQ: FTNT                                     $39
                                                   $13
    • 2010 revenue of $325 Million
      – 29% YoY growth                            2003
                                                           2005
                                                                     2007
    • World class management team                                              2009



3    Fortinet Confidential
We Pioneered a New Approach

     Traditional Network Security Solutions                        The Fortinet Solution




•   Stand-alone, non-integrated security            •   Real-time, integrated security intelligence
•   Mix of off the shelf systems and applications   •   ASIC-accelerated performance
•   Higher total cost of ownership                  •   Lower total cost of ownership
•   Difficult to deploy / manage / use              •   Easy to deploy / manage / use

    4    Fortinet Confidential
Evolution of Firewall Security

                                     Complete Protection

                                                             WAN
                                  Antispam
                                                          Optimization
                                Evolution of Firewall Security            Endpoint
                 Antivirus/                  Data Loss
                                                                         Protection/
                Antispyware                  Prevention
                                                                            NAC
                                                             Web
                                    VPN
                                                           Filtering

                                                                           App
                  Firewall                      IPS
                                                                          Control

                                  Wireless                   SSL
                                   LAN                    Inspection
                                              IPv6,
                Vulnerability                                               VoIP
                                             Dynamic
                   Mgmt
                                             Routing


5   Fortinet Confidential
Complete Content Protection

• Application control + identity-based policy
  enforcement
        – Allow but don’t trust any application
        – Examine all application content
        – Continuously enforce policies




6   Fortinet Confidential
Disruptive Technology Platform




                       FortiASIC                                   FortiOS

    • ASICs accelerate FortiOS security and      • Custom built operating system
      network functions                          • Architected for security and networking
    • Enables faster performance against           demands
      competitors                                • Leverages custom hardware platform
    • Multiple ASICs (CP, NP and SP) targeting   • Mature OS - at version 4.0 today
      key functions
    • Mature design across CP, NP and SP

7    Fortinet Confidential
Performance Advantage


OTHER VENDORS
                                      High Performance
                            Multiple Processing Engines
Slow Performance
Single Processing Engine




      Multi-Core                Multi-Core
      CPU                       CPU

      Offload                   Offload
     Processor                 Processor




8   Fortinet Confidential
FortiASIC Specialized Processors


    • FortiASIC Network Processor (NP) Series
      » Firewall Acceleration
      » VPN Acceleration
    • FortiASIC Content Processor (CP) Series
      » Pattern-Match Acceleration
      » Encryption / Decryption (e.g. IPSec, SSL-TLS)
    • FortiASIC Security Processor (SP) Series
      » Additional IPS Acceleration
      » Flow Based Antivirus
      » Unicast , Multicast Acceleration



9    Fortinet Confidential
FortiGate Platform
     • Integrated security appliance
         − Block network & content threats
     • Accelerated performance
         − 10 GbE ports
         − Up to 120 Gbps single appliance
         − Up to 480 Gbps modular chassis
     • Platforms for every market segment
         − Carrier to SOHO
         − No per-user licensing




10 Fortinet Confidential
FortiGate Consolidated Security Platform


Real-Time Protection                            FortiGuard™ Updates
Fully Integrated               AV       IPS      Web Filter Antispam    App Ctrl    VM
Security &
                             Firewall    VPN        DLP       WAN Opt      Traffic Shaping
Networking
Technologies                  WLAN       VoIP      SSL Insp      HA        Load Balancing

Hardened Platform                                Specialized OS

High Performance                          Purpose-Built Hardware

Support and Services                FortiCare™                  FortiGuard Labs
             • Purpose-built to deliver overlapping, complementary security
             • Provides both flexibility & defense-in-depth capabilities

11   Fortinet Confidential
Market Leadership Across the Board



       Worldwide UTM Market Share                                                          Magic Quadrant for Unified              UTM Market Competitive
               Q2 2011 (1)                                                                Threat Management 2010 (2)                 Landscape, 2009(3)

                                                        Market
      Rank Company
                                                       Share (%)

          1                                              17.0                                                            High


         2        Check Point                            13.2
                                                                                                                        Ability
          3       Juniper                                8.9                                                              to
                                                                                                                        Deliver
         4        SonicWALL                              7.5
          5       Cisco                                  6.9
         6        WatchGuard                             5.0
                                                                                                                         Low
          7       McAfee                                 4.0
                                                                                                                                  Low            Market Penetration            High
          8       Crossbeam                              2.9
          9       Other                                 34.6
                                                                                                                                                           Contender    Market Leader
                  Total                                 100.0                                                                      Niche Participant
                                                                                                                                                           Specialist    Challenger

Notes
(1)   IDC Worldwide Security Appliances Tracker, September 2011 (market share based on factory revenue)
(2)
(3)
           Fortinet Confidential
      Gartner, Inc., “Magic Quadrant for Unified Threat Management”, October 2010
      Frost & Sullivan, “World Unified Threat Management, Products Market 2009”, 2010

                                                                                                                                                                                 12
Fortinet Product Portfolio

    Unified Threat              Centralized              Application
    Management                  Management                Security
            FortiGate              FortiManager             FortiMail
            Network Security       Centralized Device       Messaging Security
            Platform               Management
            FortiAP                FortiAnalyzer            FortiWeb
            Network Security       Centralized Logging      Web & XML
                                   and Reporting            Application Firewall
            Platform

         Security                 Host                     Data
         Services                Security                 Security
                                   FortiClient
            FortiGuard             Endpoint Security        FortiDB
            Real time                                       Database Security
            Security Services      FortiScan
                                   Asset Vulnerability
                                   Management

13 Fortinet Confidential
A Proven Partner




• Proven Industry Leadership
   − Since 2000, Fortinet has received more than 100 product & company awards.
           ▪ IDC: Overall leader in UTM factory revenue for all of 2010
           ▪ Gartner: Leader in Unified Threat Management Magic Quadrant
           ▪ Frost & Sullivan: 2010 "Fortinet is the established and undisputed leader" of worldwide
              UTM market
           ▪ SC Magazine: 2009 Readers' Trust Award for "Best Integrated Security Solution”
• Certified security
   − Seven ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam, WAF)
   − Government Certifications (FIPS-2, Common Criteria EAL4+, JITC IPv6, SCAP)
   − ISO 9001 certification

14 Fortinet Confidential
Customers Worldwide



                    7 of the top 10 Fortune companies in Americas
                      8 of the top 10 Fortune companies in EMEA
                       9 of the top 10 Fortune companies in APAC
            10 of the top 10 Fortune Telecommunications companies
                 9 of the top 10 Fortune Retail & Commercial Banks
                           7 of top 10 Fortune Aerospace & Defense




15 Fortinet Confidential
Summary


• Consolidated Security
  » Complete content protection
• Unmatched performance
  » Purpose-built hardware and
    software
• Lower TCO
  » Less complexity, faster deployment,
    easier management
• Real-time security
  » 24/7 global updates deliver security
    expertise


 Fortinet Confidential
Thank You




Fortinet Confidential

Mais conteúdo relacionado

Mais procurados

Developer Jam Session - What is new in Prophecy 9 / VoiceObjects 9?
Developer Jam Session - What is new in Prophecy 9 / VoiceObjects 9?Developer Jam Session - What is new in Prophecy 9 / VoiceObjects 9?
Developer Jam Session - What is new in Prophecy 9 / VoiceObjects 9?Voxeo Corp
 
Mazer Road Show HP Networking Outubro 2012
Mazer Road Show HP Networking Outubro 2012Mazer Road Show HP Networking Outubro 2012
Mazer Road Show HP Networking Outubro 2012Mazer Distribuidora
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10Yustinus Malawau
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking PointMUK Extreme
 
SIP conferencing Application Server Enables Video ...
SIP conferencing Application Server Enables Video ...SIP conferencing Application Server Enables Video ...
SIP conferencing Application Server Enables Video ...Videoguy
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowDan York
 
FreeSWITCH Modules for Asterisk Developers
FreeSWITCH Modules for Asterisk DevelopersFreeSWITCH Modules for Asterisk Developers
FreeSWITCH Modules for Asterisk DevelopersMoises Silva
 
Blank - Competitive Analysis - MASTER
Blank - Competitive Analysis - MASTERBlank - Competitive Analysis - MASTER
Blank - Competitive Analysis - MASTERJody Spoor
 
BGAN Video Conferencing Using Polycom
BGAN Video Conferencing Using PolycomBGAN Video Conferencing Using Polycom
BGAN Video Conferencing Using PolycomVideoguy
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
 

Mais procurados (19)

test upload
test uploadtest upload
test upload
 
Discover Great Reasons to move to ConfigMgr 2012 SP1
Discover Great Reasons to move to ConfigMgr 2012 SP1Discover Great Reasons to move to ConfigMgr 2012 SP1
Discover Great Reasons to move to ConfigMgr 2012 SP1
 
Developer Jam Session - What is new in Prophecy 9 / VoiceObjects 9?
Developer Jam Session - What is new in Prophecy 9 / VoiceObjects 9?Developer Jam Session - What is new in Prophecy 9 / VoiceObjects 9?
Developer Jam Session - What is new in Prophecy 9 / VoiceObjects 9?
 
Mazer Road Show HP Networking Outubro 2012
Mazer Road Show HP Networking Outubro 2012Mazer Road Show HP Networking Outubro 2012
Mazer Road Show HP Networking Outubro 2012
 
Sonic wall tz series
Sonic wall tz seriesSonic wall tz series
Sonic wall tz series
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10
 
Shore
ShoreShore
Shore
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking Point
 
iPICS
iPICSiPICS
iPICS
 
The Guardian
The GuardianThe Guardian
The Guardian
 
FLIR United VMS
FLIR United VMSFLIR United VMS
FLIR United VMS
 
SIP conferencing Application Server Enables Video ...
SIP conferencing Application Server Enables Video ...SIP conferencing Application Server Enables Video ...
SIP conferencing Application Server Enables Video ...
 
Cisco aironet 1600
Cisco aironet 1600Cisco aironet 1600
Cisco aironet 1600
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To Know
 
PAN 5000
PAN 5000PAN 5000
PAN 5000
 
FreeSWITCH Modules for Asterisk Developers
FreeSWITCH Modules for Asterisk DevelopersFreeSWITCH Modules for Asterisk Developers
FreeSWITCH Modules for Asterisk Developers
 
Blank - Competitive Analysis - MASTER
Blank - Competitive Analysis - MASTERBlank - Competitive Analysis - MASTER
Blank - Competitive Analysis - MASTER
 
BGAN Video Conferencing Using Polycom
BGAN Video Conferencing Using PolycomBGAN Video Conferencing Using Polycom
BGAN Video Conferencing Using Polycom
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 

Semelhante a NetSafe - 11nov2011

NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012Agora Group
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Securityanniebrowny
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012dvanwyk30
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentationsaddepalli
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Enterprise
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Securityneoma329
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Haris Khan
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortTen Sistemas e Redes
 
PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywhereGlobal Knowledge Training
 
Presentation fortinet securing the cloud
Presentation   fortinet securing the cloudPresentation   fortinet securing the cloud
Presentation fortinet securing the cloudxKinAnx
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinJoe Sarno
 
Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablementresponsedatacomms
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Companydtimal
 

Semelhante a NetSafe - 11nov2011 (20)

NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentation
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security Myths
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Mcafee ips nsp-2011
Mcafee ips  nsp-2011Mcafee ips  nsp-2011
Mcafee ips nsp-2011
 
Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
IBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - EcuadorIBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - Ecuador
 
PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention Everywhere
 
Presentation fortinet securing the cloud
Presentation   fortinet securing the cloudPresentation   fortinet securing the cloud
Presentation fortinet securing the cloud
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
Fortinet Tanıtım
Fortinet TanıtımFortinet Tanıtım
Fortinet Tanıtım
 
Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablement
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Company
 

Mais de Agora Group

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...Agora Group
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseAgora Group
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftAgora Group
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Agora Group
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital ForensicsAgora Group
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMAgora Group
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the EnterpriseAgora Group
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateAgora Group
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessAgora Group
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu DopAgora Group
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru paciențiAgora Group
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...Agora Group
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Agora Group
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateAgora Group
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wireAgora Group
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileAgora Group
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Group
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LANAgora Group
 

Mais de Agora Group (20)

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe procese
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms Shift
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004
 
Curs OSINT
Curs OSINTCurs OSINT
Curs OSINT
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPM
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the Enterprise
 
ABPMP Romania
ABPMP RomaniaABPMP Romania
ABPMP Romania
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de Sănătate
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent Business
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu Dop
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru pacienți
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatate
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorni
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 

Último

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

NetSafe - 11nov2011

  • 1. A Consolidated Approach to Security Stefan Oancea Product Manager Netsafe Solutions November 16, 2011 Fortinet Confidential
  • 3. Fortinet Corporate Overview Fortinet Revenue ($MM) • Founded in 2000 • Global presence with 30+ offices worldwide & 1,300+ employees $252 – 5,000+ channel partners $212 – 100,000+ customers – Majority of the Fortune Global 100 $155 $123 • IPO Nov 2009 $80 • NASDAQ: FTNT $39 $13 • 2010 revenue of $325 Million – 29% YoY growth 2003 2005 2007 • World class management team 2009 3 Fortinet Confidential
  • 4. We Pioneered a New Approach Traditional Network Security Solutions The Fortinet Solution • Stand-alone, non-integrated security • Real-time, integrated security intelligence • Mix of off the shelf systems and applications • ASIC-accelerated performance • Higher total cost of ownership • Lower total cost of ownership • Difficult to deploy / manage / use • Easy to deploy / manage / use 4 Fortinet Confidential
  • 5. Evolution of Firewall Security Complete Protection WAN Antispam Optimization Evolution of Firewall Security Endpoint Antivirus/ Data Loss Protection/ Antispyware Prevention NAC Web VPN Filtering App Firewall IPS Control Wireless SSL LAN Inspection IPv6, Vulnerability VoIP Dynamic Mgmt Routing 5 Fortinet Confidential
  • 6. Complete Content Protection • Application control + identity-based policy enforcement – Allow but don’t trust any application – Examine all application content – Continuously enforce policies 6 Fortinet Confidential
  • 7. Disruptive Technology Platform FortiASIC FortiOS • ASICs accelerate FortiOS security and • Custom built operating system network functions • Architected for security and networking • Enables faster performance against demands competitors • Leverages custom hardware platform • Multiple ASICs (CP, NP and SP) targeting • Mature OS - at version 4.0 today key functions • Mature design across CP, NP and SP 7 Fortinet Confidential
  • 8. Performance Advantage OTHER VENDORS High Performance Multiple Processing Engines Slow Performance Single Processing Engine Multi-Core Multi-Core CPU CPU Offload Offload Processor Processor 8 Fortinet Confidential
  • 9. FortiASIC Specialized Processors • FortiASIC Network Processor (NP) Series » Firewall Acceleration » VPN Acceleration • FortiASIC Content Processor (CP) Series » Pattern-Match Acceleration » Encryption / Decryption (e.g. IPSec, SSL-TLS) • FortiASIC Security Processor (SP) Series » Additional IPS Acceleration » Flow Based Antivirus » Unicast , Multicast Acceleration 9 Fortinet Confidential
  • 10. FortiGate Platform • Integrated security appliance − Block network & content threats • Accelerated performance − 10 GbE ports − Up to 120 Gbps single appliance − Up to 480 Gbps modular chassis • Platforms for every market segment − Carrier to SOHO − No per-user licensing 10 Fortinet Confidential
  • 11. FortiGate Consolidated Security Platform Real-Time Protection FortiGuard™ Updates Fully Integrated AV IPS Web Filter Antispam App Ctrl VM Security & Firewall VPN DLP WAN Opt Traffic Shaping Networking Technologies WLAN VoIP SSL Insp HA Load Balancing Hardened Platform Specialized OS High Performance Purpose-Built Hardware Support and Services FortiCare™ FortiGuard Labs • Purpose-built to deliver overlapping, complementary security • Provides both flexibility & defense-in-depth capabilities 11 Fortinet Confidential
  • 12. Market Leadership Across the Board Worldwide UTM Market Share Magic Quadrant for Unified UTM Market Competitive Q2 2011 (1) Threat Management 2010 (2) Landscape, 2009(3) Market Rank Company Share (%) 1 17.0 High 2 Check Point 13.2 Ability 3 Juniper 8.9 to Deliver 4 SonicWALL 7.5 5 Cisco 6.9 6 WatchGuard 5.0 Low 7 McAfee 4.0 Low Market Penetration High 8 Crossbeam 2.9 9 Other 34.6 Contender Market Leader Total 100.0 Niche Participant Specialist Challenger Notes (1) IDC Worldwide Security Appliances Tracker, September 2011 (market share based on factory revenue) (2) (3) Fortinet Confidential Gartner, Inc., “Magic Quadrant for Unified Threat Management”, October 2010 Frost & Sullivan, “World Unified Threat Management, Products Market 2009”, 2010 12
  • 13. Fortinet Product Portfolio Unified Threat Centralized Application Management Management Security FortiGate FortiManager FortiMail Network Security Centralized Device Messaging Security Platform Management FortiAP FortiAnalyzer FortiWeb Network Security Centralized Logging Web & XML and Reporting Application Firewall Platform Security Host Data Services Security Security FortiClient FortiGuard Endpoint Security FortiDB Real time Database Security Security Services FortiScan Asset Vulnerability Management 13 Fortinet Confidential
  • 14. A Proven Partner • Proven Industry Leadership − Since 2000, Fortinet has received more than 100 product & company awards. ▪ IDC: Overall leader in UTM factory revenue for all of 2010 ▪ Gartner: Leader in Unified Threat Management Magic Quadrant ▪ Frost & Sullivan: 2010 "Fortinet is the established and undisputed leader" of worldwide UTM market ▪ SC Magazine: 2009 Readers' Trust Award for "Best Integrated Security Solution” • Certified security − Seven ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam, WAF) − Government Certifications (FIPS-2, Common Criteria EAL4+, JITC IPv6, SCAP) − ISO 9001 certification 14 Fortinet Confidential
  • 15. Customers Worldwide 7 of the top 10 Fortune companies in Americas 8 of the top 10 Fortune companies in EMEA 9 of the top 10 Fortune companies in APAC 10 of the top 10 Fortune Telecommunications companies 9 of the top 10 Fortune Retail & Commercial Banks 7 of top 10 Fortune Aerospace & Defense 15 Fortinet Confidential
  • 16. Summary • Consolidated Security » Complete content protection • Unmatched performance » Purpose-built hardware and software • Lower TCO » Less complexity, faster deployment, easier management • Real-time security » 24/7 global updates deliver security expertise Fortinet Confidential

Notas do Editor

  1. -> Pentru a ofericredibilitatecelorceurmeazahaidetisastudiempentru o clipacatevastatistici in ceeaceprivestecompaniaFortinet-> Pelangafaptul ca de la infiintarealorsipanaastazi au cunoscut o crestereconstantaceisigaseste media undeva la 63-64% anual, in plinacriza au reusit o crestere de aproape 30%-> Acestfaptdovedestedouaaspecte: 1. interesul in continua crestere al pieteipentruprodusele de securitate; 2. capacitateaechipamentelorFortinet de a executa
  2. -> Plecand de la functionalitatiuzualeechipamentelor de securitatesimainouechipamentelor de tip NG Firewall, Fortinet a dezvoltatconceptul de UTM adugandfunctionalitati de securitatecomplementareinsacriticepentrusecurizareauneiretele cat sifunctionalitati de rutare/comunicatie in reteaAs firewalls have evolved, additional technologies have been added to the core firewall technology to provide additional functionality and protect against new threats.FortiGate multi-threat platforms have been at the forefront of this evolutionary process. We have led the market with our ability to anticipate changes to the threat landscape by adding new functionality and technologies into our UTM platform. For example, FortiGate platforms have had the ability to identify applications independent of port or protocol since FortiOS 3.0, well ahead of other vendors. There has been a lot of noise in the market around ‘next generation’ firewalls. NGFWs are a subset of UTM, as they provide a limited feature set compared with the FortiGate UTM platform. This slide highlights the difference between the limited feature-set of NGFWs and the FortiGate UTM platform.
  3. -> Mai multenivele consecutive de securitate-> Fiecareasigura un alt tip de filtrarefolosindtehnicidiferitesisemnaturispecializatefiecaruifiltruComplete content protection enables you to keep up with the changing threatscape without having to purchase more technology. More than simply identifying applications and allowing or denying the traffic. It is application control coupled with content-based policy enforcement. The criminals are using sophisticated techniques to evade traditional countermeasures. By relying on a single platform with multiple technologies, you get the benefit of layers of security without the performance penalty. You also get the benefit of our global threat research team’s expertise, which means less reliance on your IT staff’s ability to configure the technology to anticipate new threats. Fortinet continuously updates our inspection engines to ensure that our customers are fully protected against the latest threats automatically.
  4. -> Construireauneiplatforme hardware dedicate reprezintamareleavantaj al solutiilorFortinet-> ASIC-uri dedicate, performantemultmaibunedecat in cazulunorplatforme hardware generale de tip server
  5. ->Aceste ASIC-uri in functie de dimensiunileechipamentului pot fie savinagata integrate, fie sa fie disponibile sub forma unor module aditionalece pot fiachizitionate ulterior in functie de nevoi-> CP – generatia 8-> Este important saremarcamfaptul ca prinajutorulacestor ASIC-uri o mare parte din traficramane la nivelulporturilor, degravandastfelprocesorul central siobtinandu-se performanteremarcabile
  6. -> Portofoliu complex si in acelasitimpcomplet