SlideShare a Scribd company logo
1 of 36
Download to read offline
© Copyright Fortinet Inc. All rights reserved.
Threat Landscape for Education
FortiGuard
3
FORTIGUARD LABS 2017
Since 2000, FortiGuard Labs has provided in-house, industry-leading security intelligence and
research, powering Fortinet’s platform and delivering a suite of advanced services
Industry Leading Patented
Security Technology
4
FORTIGUARD LABS 2017
All of this results in Actionable Threat Intelligence
Antivirus Service
IP Reputation
Service
Vulnerability
Management Service
Application
Control Service
Intrusion
Prevention Service
Web
Filtering Service
Anti-spam
Security Service
Web
Security Service
Database
Security Service
What does it look like for Education
© Copyright Fortinet Inc. All rights reserved.
© Copyright Fortinet Inc. All rights reserved.
© Copyright Fortinet Inc. All rights reserved.
© Copyright Fortinet Inc. All rights reserved.
© Copyright Fortinet Inc. All rights reserved.
Why do we need the Security Fabric
12 12
Enterprise SMBTelco
Slow Is BrokenToday’s Network Is Borderless Complexity Is The Enemy of Security
Enterprise Firewall Cloud Security ATP Application Security Security OperationsSecure Access
Emerging Security Challenges
Fortinet’s mission is to deliver the most innovative, highest performing
network security fabric to secure and simplify your IT infrastructure
13
1980s
Hardware Theft
Advanced Threat
Protection
Application Control
Web Filter
Anti-spam
Antivirus
IPS
Firewall/VPN
Lock & Key
PerformanceDegradation
Generation 1
CONNECTION
Generation 2
CONTENT
Generation 3
INFRASTRUCTURE
Layer 1-2:
Physical
Layer 3-4:
Connection
Layer 5-7:
Content & Application
Viruses
& Spyware
Intrusion
& Worms
Malicious
Apps
Advanced
Targeted Attacks
Spam
Botnets
Today
Malicious
Sites
Machine to
Machine Attacks
Fabric
These Threats Have Moved Beyond The Application,
Content and User Level
14
Advanced
Threat
Intelligence
Access
Client Cloud
Partner API
NOC/SOC
Network
Application
BROAD
POWERFUL
AUTOMATED
15
Flexible/Open
Broad – The Fabric Gives You Complete Visibility, Coverage
and Flexibility Across The Entire Dynamic Attack Surface
CoverageVisibility
Application Security
Cloud Security
Client/IoT Security
Access Security
Network Security
16
17
Broad – The Fabric Allows Flexible, Open Integration
of Other Security Partners
Virtualization & SDN/NFV CLOUD ENDPOINT & IoT
MANAGEMENT SYSTEMS INTEGRATORSIEM
18
Powerful – Increasing Performance Reduces The
Burden on Infrastructure
Comprehensive
Range
Parallel Path
Processing
Security Processors
(SPU’s)
Accelerates
Content Inspection
Optimized
Performance for
Entry Level
Accelerates
Network Traffic
High End
Mid Range
Entry
Level
1 Tbps
19
Less
Latency
Less
Power
Less
Space
More
Performance
FortiGate 3980E > 1Tbps FW FortiGate 7060E > 100bps NGFW
Powerful – The Fastest Network Security Appliance’s
on the market
20
Automated to Provide a Fast, Coordinated Response
to Threats
CoordinatedAudit & RecommendGlobal & Local
Known Threats
FortiGuard
Unknown Threats
FortiSandbox
ISFW-PRI
Demo_ISFW-Sales
Demo_ISFW-Finance
Demo_ISFW-ENG
FP320C3X15002440
2.62 GB
21
Automated Security Audit and Recommendations
22
Apply to FabricFabric TranslationBusiness Language
“Add This Mobile Phone
to This Application
Securely”
“Convert into Policies,
Ports, Connections…”
Intent-based Network Security, Powered by Fabric
Automatically Translate Business Needs To Infrastructure Policies
23
THE FORTINET SECURITY FABRIC
The Fortinet Security Fabric is the vision that delivers on the promise of Security
without Compromise: Broad, Powerful and Automated
Advanced Threat
Intelligence
Access
Client Cloud
Partner API
NOC/SOC
Network
Application
Advanced Threat
Intelligence
Access
Client Cloud
Partner API
NOC/SOC
Network
Application
ExpertSystem
Security Fabric, your own Expert System
Security Fabric brings Artifical Inteligence to your Security Operations
ActionableIntelligence
ARTIFICIAL
INTELLIGENCE
MACHINE
LEARNING
DEEP
LEARNING
(DL)
THE FORTINET SECURITY FABRIC
REALIZED
26
FORTINET SECURITY FABRIC
DDoS Protection
Database
Protection
Web Application
Firewall
Application
Delivery
Controller
Top-of-Rack
BRANCH
OFFICE
Distributed Ent FW
LTE Extension
Endpoint
Protection NGFWSecure Access
Point
IP Video
Security
Email
Server
Web Servers
SDN, Virtual
Firewall
DCFW/
NGFW
Sandbox
Internal
Segmentation
FW
Sandbox
Switching
Internal
Segmentation FW
Email
Security
Internal
Segmentation
FW
CAMPUS
Internal
Segmentation FW
DATA CENTER/PRIVATE CLOUD
Virtual
Firewall
FortiCloud
Client Devices
Client Devices
PUBLIC CLOUD
OPERATIONS CENTER
27
FORTINET SECURITY FABRIC
DDoS Protection
Database
Protection
Web Application
Firewall
Application
Delivery
Controller
Top-of-Rack
BRANCH
OFFICE
LTE Extension
Endpoint
Protection
FortiGate
NGFW
Secure Access
Point
IP Video
Security
Email
Server
SDN, Virtual
Firewall
FortiGate
DCFW/
NGFW
Sandbox
FortiGate Internal
Segmentation FW
Sandbox
Switching
FortiGate Internal
Segmentation FW
Email
Security
FortiGate Internal
Segmentation FW
FortiGate Internal
Segmentation FW
CAMPUS
Client Devices
DATA CENTER/PRIVATE CLOUD
Web Servers
ENTERPRISE
FIREWALL
FortiGate/FortiWiFi
Distributed Ent FW
Client Devices
FortiManager
FortiAnalyzer
FortiSIEM
OPERATIONS CENTER
Virtual
Firewall
FortiCloud
PUBLIC CLOUD
28
FORTINET SECURITY FABRIC
DDoS Protection
Database
Protection
Web Application
Firewall
Application
Delivery
Controller
Top-of-Rack
BRANCH
OFFICE
LTE Extension
CAMPUS
Secure Access
Point
IP Video
Security
Switching
FortiGate
NGFW
FortiGate
DCFW/
NGFW
FortiGate Internal
Segmentation FW
FortiGate Internal
Segmentation FW
FortiGate Internal
Segmentation FW
FortiGate Internal
Segmentation FW
FortiGate VMX
SDN, Virtual
Firewall
DATA CENTER/PRIVATE CLOUD
Web Servers
ENTERPRISE
FIREWALL
Client Devices
CLOUD SECURITY
Client Devices
Endpoint
Protection
Email
Server
Sandbox
Sandbox
Email
Security
OPERATIONS CENTER
Fortinet
Virtual Firewall
FortiManager
FortiAnalyzer
FortiSIEM
FortiCloud
PUBLIC CLOUD
FortiGate/FortiWiFi
Distributed Ent FW
29
FORTINET SECURITY FABRIC
DDoS Protection
Database
Protection
Application
Delivery
Controller
Top-of-Rack
BRANCH
OFFICE
LTE Extension
CAMPUS
FortiClient
Secure Access
Point
IP Video
Security
Switching
FortiGate
NGFW
FortiGate
DCFW/
NGFW
FortiGate Internal
Segmentation FW
FortiGate Internal
Segmentation FW
FortiGate Internal
Segmentation FW
FortiGate Internal
Segmentation FW
FortiGate VMX
SDN, Virtual
Firewall
DATA CENTER/PRIVATE CLOUD
Web Servers
CLOUD SECURITYADVANCED THREAT
PROTECTION
ENTERPRISE
FIREWALL
FortiClient
FortiSandbox
FortiClient
FortiSandbox
FortiMail
Email Security
Email
Server
FortiWeb
Web Application
Firewall
OPERATIONS CENTER
FortiManager
FortiAnalyzer
FortiSIEM
Fortinet
Virtual Firewall
FortiCloud
PUBLIC CLOUD
FortiCloud Sandboxing
FortiGate/FortiWiFi
Distributed Ent FW
30
FORTINET SECURITY FABRIC
Top-of-Rack
BRANCH
OFFICE
LTE Extension
CAMPUS
FortiClient
Secure Access
Point
IP Video
Security
Switching
FortiGate
NGFW
FortiGate
DCFW/
NGFW
FortiGate Internal
Segmentation FW
FortiGate Internal
Segmentation FW
FortiGate Internal
Segmentation FW
FortiGate VMX
SDN, Virtual
Firewall
FortiDDoS Protection
FortiWeb
Web Application
Firewall
FortiADC
Application
Delivery
Controller
DATA CENTER/PRIVATE CLOUD
Web Servers
FortiGate Internal
Segmentation FW
APPLICATION
SECURITY
ENTERPRISE
FIREWALL
FortiClient
FortiSandbox
FortiClient
FortiSandbox
FortiMail
Email Security
FortiDB
Database
Protection
CLOUD SECURITYADVANCED THREAT
PROTECTION
Email
Server
OPERATIONS CENTER
FortiManager
FortiAnalyzer
FortiSIEM
Fortinet
Virtual Firewall
FortiCloud
PUBLIC CLOUD
FortiCloud Sandboxing
FortiGate/FortiWiFi
Distributed Ent FW
31
FORTINET SECURITY FABRIC
FortiWeb
Web Application
Firewall
FortiADC
Application
Delivery
Controller
Top-of-Rack
BRANCH
OFFICE
FortiExtender
LTE Extension
CAMPUS
FortiClient
Secure Access
Point
IP Video
Security
FortiGate
NGFW
FortiGate
DCFW/
NGFW
FortiGate Internal
Segmentation FW
FortiGate Internal
Segmentation FW
FortiGate Internal
Segmentation FW
FortiGate VMX
SDN, Virtual
Firewall
FortiDDoS Protection
FortiGate Internal
Segmentation FW
DATA CENTER/PRIVATE CLOUD
Web Servers
SECURE ACCESS APPLICATION
SECURITY
ENTERPRISE
FIREWALL
FortiClient
FortiSandbox
FortiClient
FortiSandbox
FortiMail
Email Security
FortiSwitch
Switching
CLOUD SECURITYADVANCED THREAT
PROTECTION
FortiSwitch
Switching
Email
Server
FortiDB
Database
Protection
OPERATIONS CENTER
FortiManager
FortiAnalyzer
FortiSIEM
Fortinet
Virtual Firewall
FortiCloud
PUBLIC CLOUD
FortiCloud Sandboxing
FortiCloud AP Management
FortiGate/FortiWiFi
Distributed Ent FW
32
Security Fabric Secured by FortiGuard
App Control Antivirus Anti-spam
IPS WebApp Database
Web
Filtering
Vulnerability
Management
IP
Reputation
Mobile
Security
NEW
Firewall
VPN
Application Control
IPS
Web Filtering
Anti-malware
WANAcceleration
Data Leakage Protection
Wi-Fi Controller
Advanced Threat Protection
Fortinet Assesment Programs
34
Learn more about what is on your with Fortinet’s Cyber
Threat Assessment Program (CTAP)
SECURITY
& THREAT PREVENTION
USER
PRODUCTIVITY
NETWORK
UTILIZATION
35
http://metal.fortiguard.com/tests/
Threat Landscape for Education

More Related Content

What's hot

Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystemMark Oakton
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseRobb Boyd
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...BGA Cyber Security
 
Novosco Zero day protection webinar
Novosco Zero day protection webinarNovosco Zero day protection webinar
Novosco Zero day protection webinarNovosco
 
Fg80 series
Fg80 seriesFg80 series
Fg80 seriespatchs
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the EnterpriseJohn Rhoton
 
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Canada
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Ajeet Singh
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceFatih Ozavci
 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune SystemJustin Hayward
 
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrustRoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrustTalea Consulting Srl
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysFatih Ozavci
 
Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Shamal Abeyrathne
 
Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASBAlberto Rivai
 
#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome HenryITSitio.com
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Belsoft
 

What's hot (20)

Fortinet Perspectiva Coporativa
Fortinet Perspectiva CoporativaFortinet Perspectiva Coporativa
Fortinet Perspectiva Coporativa
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystem
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
 
Novosco Zero day protection webinar
Novosco Zero day protection webinarNovosco Zero day protection webinar
Novosco Zero day protection webinar
 
Fg80 series
Fg80 seriesFg80 series
Fg80 series
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre security
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
 
Fortinet k
Fortinet kFortinet k
Fortinet k
 
FortiGate-80C
FortiGate-80CFortiGate-80C
FortiGate-80C
 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune System
 
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrustRoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
 
Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0
 
Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASB
 
#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 

Similar to Threat Landscape for Education

FTNT_Icon-Library-External-February-2023.pptx
FTNT_Icon-Library-External-February-2023.pptxFTNT_Icon-Library-External-February-2023.pptx
FTNT_Icon-Library-External-February-2023.pptxenriquecordova21
 
FTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptxFTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptxRicardoAndino9
 
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation FirewallFortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation FirewallShilaThak
 
Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Haris Khan
 
Forti gate 90d
Forti gate 90dForti gate 90d
Forti gate 90dhape01
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdfYounesChafi1
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinJoe Sarno
 
Fortinet FortiGate 100D
Fortinet FortiGate 100DFortinet FortiGate 100D
Fortinet FortiGate 100DHoai Duyen
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureExclusive Networks ME
 
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsxFortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsxAlejandro Daricz
 
Fortinet in Pakistan
Fortinet in Pakistan Fortinet in Pakistan
Fortinet in Pakistan lukeschlim
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanDATA SECURITY SOLUTIONS
 

Similar to Threat Landscape for Education (20)

FTNT_Icon-Library-External-February-2023.pptx
FTNT_Icon-Library-External-February-2023.pptxFTNT_Icon-Library-External-February-2023.pptx
FTNT_Icon-Library-External-February-2023.pptx
 
FTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptxFTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptx
 
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation FirewallFortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
 
Fortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-seriesFortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-series
 
Fortigate Modelo 90d
Fortigate Modelo 90dFortigate Modelo 90d
Fortigate Modelo 90d
 
Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6
 
FortiGate-40C
FortiGate-40CFortiGate-40C
FortiGate-40C
 
Evento 15 aprile
Evento 15 aprileEvento 15 aprile
Evento 15 aprile
 
Forti gate 90d
Forti gate 90dForti gate 90d
Forti gate 90d
 
Forti gate 90d
Forti gate 90dForti gate 90d
Forti gate 90d
 
FortiGate-200B
FortiGate-200BFortiGate-200B
FortiGate-200B
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
 
FortiGate-60C
FortiGate-60CFortiGate-60C
FortiGate-60C
 
Fortinet_for_SAP
Fortinet_for_SAPFortinet_for_SAP
Fortinet_for_SAP
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
Fortinet FortiGate 100D
Fortinet FortiGate 100DFortinet FortiGate 100D
Fortinet FortiGate 100D
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
 
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsxFortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
 
Fortinet in Pakistan
Fortinet in Pakistan Fortinet in Pakistan
Fortinet in Pakistan
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 

More from ColloqueRISQ

Blockchain Technologies : Landscape and Future Directions
Blockchain Technologies : Landscape and Future DirectionsBlockchain Technologies : Landscape and Future Directions
Blockchain Technologies : Landscape and Future DirectionsColloqueRISQ
 
Béluga : un super-ordinateur pour la science de demain
Béluga : un super-ordinateur pour la science de demainBéluga : un super-ordinateur pour la science de demain
Béluga : un super-ordinateur pour la science de demainColloqueRISQ
 
Why SD-WAN as it Moves to Mainstream Adoption?
Why SD-WAN as it Moves to Mainstream Adoption?Why SD-WAN as it Moves to Mainstream Adoption?
Why SD-WAN as it Moves to Mainstream Adoption?ColloqueRISQ
 
La révolution 5G et le projet ENCQOR
La révolution 5G et le projet ENCQORLa révolution 5G et le projet ENCQOR
La révolution 5G et le projet ENCQORColloqueRISQ
 
Travailler TOUS ensemble lors d’une cybercrise!
Travailler TOUS ensemble lors d’une cybercrise!Travailler TOUS ensemble lors d’une cybercrise!
Travailler TOUS ensemble lors d’une cybercrise!ColloqueRISQ
 
Audit 101 - Un guide de survie
Audit 101 - Un guide de survieAudit 101 - Un guide de survie
Audit 101 - Un guide de survieColloqueRISQ
 
Votre meilleure protection est un internet canadien
Votre meilleure protection est un internet canadienVotre meilleure protection est un internet canadien
Votre meilleure protection est un internet canadienColloqueRISQ
 
Office 365 : Sécuritaire?
Office 365 : Sécuritaire?Office 365 : Sécuritaire?
Office 365 : Sécuritaire?ColloqueRISQ
 
What Nature Can Tell Us About IoT Security at Scale
What Nature Can Tell Us About IoT Security at ScaleWhat Nature Can Tell Us About IoT Security at Scale
What Nature Can Tell Us About IoT Security at ScaleColloqueRISQ
 
The Power of the NREN
The Power of the NRENThe Power of the NREN
The Power of the NRENColloqueRISQ
 
L’hyperconvergence au cœur du Software-defined data center
L’hyperconvergence au cœur du Software-defined data centerL’hyperconvergence au cœur du Software-defined data center
L’hyperconvergence au cœur du Software-defined data centerColloqueRISQ
 
Plus de darkweb, moins de problèmes pour les pirates informatiques?
Plus de darkweb, moins de problèmes pour les pirates informatiques?Plus de darkweb, moins de problèmes pour les pirates informatiques?
Plus de darkweb, moins de problèmes pour les pirates informatiques?ColloqueRISQ
 
L'humain dans la cybersécurité - Problèmes et réflexions
L'humain dans la cybersécurité - Problèmes et réflexionsL'humain dans la cybersécurité - Problèmes et réflexions
L'humain dans la cybersécurité - Problèmes et réflexionsColloqueRISQ
 
L'internet des objets et la cybersécurité
L'internet des objets et la cybersécuritéL'internet des objets et la cybersécurité
L'internet des objets et la cybersécuritéColloqueRISQ
 
Au-delà du réseau - une défense simple en profondeur
Au-delà du réseau - une défense simple en profondeurAu-delà du réseau - une défense simple en profondeur
Au-delà du réseau - une défense simple en profondeurColloqueRISQ
 
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXComment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXColloqueRISQ
 
Sécuriser votre environnement de l'Internet des objets (IoT)
Sécuriser votre environnement de l'Internet des objets (IoT)Sécuriser votre environnement de l'Internet des objets (IoT)
Sécuriser votre environnement de l'Internet des objets (IoT)ColloqueRISQ
 
The 2018 Threat Landscape
The 2018 Threat LandscapeThe 2018 Threat Landscape
The 2018 Threat LandscapeColloqueRISQ
 
Cybersecurity Through Collaboration
Cybersecurity Through CollaborationCybersecurity Through Collaboration
Cybersecurity Through CollaborationColloqueRISQ
 
Prévention et détection des mouvements latéraux
Prévention et détection des mouvements latérauxPrévention et détection des mouvements latéraux
Prévention et détection des mouvements latérauxColloqueRISQ
 

More from ColloqueRISQ (20)

Blockchain Technologies : Landscape and Future Directions
Blockchain Technologies : Landscape and Future DirectionsBlockchain Technologies : Landscape and Future Directions
Blockchain Technologies : Landscape and Future Directions
 
Béluga : un super-ordinateur pour la science de demain
Béluga : un super-ordinateur pour la science de demainBéluga : un super-ordinateur pour la science de demain
Béluga : un super-ordinateur pour la science de demain
 
Why SD-WAN as it Moves to Mainstream Adoption?
Why SD-WAN as it Moves to Mainstream Adoption?Why SD-WAN as it Moves to Mainstream Adoption?
Why SD-WAN as it Moves to Mainstream Adoption?
 
La révolution 5G et le projet ENCQOR
La révolution 5G et le projet ENCQORLa révolution 5G et le projet ENCQOR
La révolution 5G et le projet ENCQOR
 
Travailler TOUS ensemble lors d’une cybercrise!
Travailler TOUS ensemble lors d’une cybercrise!Travailler TOUS ensemble lors d’une cybercrise!
Travailler TOUS ensemble lors d’une cybercrise!
 
Audit 101 - Un guide de survie
Audit 101 - Un guide de survieAudit 101 - Un guide de survie
Audit 101 - Un guide de survie
 
Votre meilleure protection est un internet canadien
Votre meilleure protection est un internet canadienVotre meilleure protection est un internet canadien
Votre meilleure protection est un internet canadien
 
Office 365 : Sécuritaire?
Office 365 : Sécuritaire?Office 365 : Sécuritaire?
Office 365 : Sécuritaire?
 
What Nature Can Tell Us About IoT Security at Scale
What Nature Can Tell Us About IoT Security at ScaleWhat Nature Can Tell Us About IoT Security at Scale
What Nature Can Tell Us About IoT Security at Scale
 
The Power of the NREN
The Power of the NRENThe Power of the NREN
The Power of the NREN
 
L’hyperconvergence au cœur du Software-defined data center
L’hyperconvergence au cœur du Software-defined data centerL’hyperconvergence au cœur du Software-defined data center
L’hyperconvergence au cœur du Software-defined data center
 
Plus de darkweb, moins de problèmes pour les pirates informatiques?
Plus de darkweb, moins de problèmes pour les pirates informatiques?Plus de darkweb, moins de problèmes pour les pirates informatiques?
Plus de darkweb, moins de problèmes pour les pirates informatiques?
 
L'humain dans la cybersécurité - Problèmes et réflexions
L'humain dans la cybersécurité - Problèmes et réflexionsL'humain dans la cybersécurité - Problèmes et réflexions
L'humain dans la cybersécurité - Problèmes et réflexions
 
L'internet des objets et la cybersécurité
L'internet des objets et la cybersécuritéL'internet des objets et la cybersécurité
L'internet des objets et la cybersécurité
 
Au-delà du réseau - une défense simple en profondeur
Au-delà du réseau - une défense simple en profondeurAu-delà du réseau - une défense simple en profondeur
Au-delà du réseau - une défense simple en profondeur
 
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXComment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
 
Sécuriser votre environnement de l'Internet des objets (IoT)
Sécuriser votre environnement de l'Internet des objets (IoT)Sécuriser votre environnement de l'Internet des objets (IoT)
Sécuriser votre environnement de l'Internet des objets (IoT)
 
The 2018 Threat Landscape
The 2018 Threat LandscapeThe 2018 Threat Landscape
The 2018 Threat Landscape
 
Cybersecurity Through Collaboration
Cybersecurity Through CollaborationCybersecurity Through Collaboration
Cybersecurity Through Collaboration
 
Prévention et détection des mouvements latéraux
Prévention et détection des mouvements latérauxPrévention et détection des mouvements latéraux
Prévention et détection des mouvements latéraux
 

Recently uploaded

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Threat Landscape for Education

  • 1. © Copyright Fortinet Inc. All rights reserved. Threat Landscape for Education
  • 3. 3 FORTIGUARD LABS 2017 Since 2000, FortiGuard Labs has provided in-house, industry-leading security intelligence and research, powering Fortinet’s platform and delivering a suite of advanced services Industry Leading Patented Security Technology
  • 4. 4 FORTIGUARD LABS 2017 All of this results in Actionable Threat Intelligence Antivirus Service IP Reputation Service Vulnerability Management Service Application Control Service Intrusion Prevention Service Web Filtering Service Anti-spam Security Service Web Security Service Database Security Service
  • 5. What does it look like for Education
  • 6. © Copyright Fortinet Inc. All rights reserved.
  • 7. © Copyright Fortinet Inc. All rights reserved.
  • 8. © Copyright Fortinet Inc. All rights reserved.
  • 9. © Copyright Fortinet Inc. All rights reserved.
  • 10. © Copyright Fortinet Inc. All rights reserved.
  • 11. Why do we need the Security Fabric
  • 12. 12 12 Enterprise SMBTelco Slow Is BrokenToday’s Network Is Borderless Complexity Is The Enemy of Security Enterprise Firewall Cloud Security ATP Application Security Security OperationsSecure Access Emerging Security Challenges Fortinet’s mission is to deliver the most innovative, highest performing network security fabric to secure and simplify your IT infrastructure
  • 13. 13 1980s Hardware Theft Advanced Threat Protection Application Control Web Filter Anti-spam Antivirus IPS Firewall/VPN Lock & Key PerformanceDegradation Generation 1 CONNECTION Generation 2 CONTENT Generation 3 INFRASTRUCTURE Layer 1-2: Physical Layer 3-4: Connection Layer 5-7: Content & Application Viruses & Spyware Intrusion & Worms Malicious Apps Advanced Targeted Attacks Spam Botnets Today Malicious Sites Machine to Machine Attacks Fabric These Threats Have Moved Beyond The Application, Content and User Level
  • 15. 15 Flexible/Open Broad – The Fabric Gives You Complete Visibility, Coverage and Flexibility Across The Entire Dynamic Attack Surface CoverageVisibility Application Security Cloud Security Client/IoT Security Access Security Network Security
  • 16. 16
  • 17. 17 Broad – The Fabric Allows Flexible, Open Integration of Other Security Partners Virtualization & SDN/NFV CLOUD ENDPOINT & IoT MANAGEMENT SYSTEMS INTEGRATORSIEM
  • 18. 18 Powerful – Increasing Performance Reduces The Burden on Infrastructure Comprehensive Range Parallel Path Processing Security Processors (SPU’s) Accelerates Content Inspection Optimized Performance for Entry Level Accelerates Network Traffic High End Mid Range Entry Level 1 Tbps
  • 19. 19 Less Latency Less Power Less Space More Performance FortiGate 3980E > 1Tbps FW FortiGate 7060E > 100bps NGFW Powerful – The Fastest Network Security Appliance’s on the market
  • 20. 20 Automated to Provide a Fast, Coordinated Response to Threats CoordinatedAudit & RecommendGlobal & Local Known Threats FortiGuard Unknown Threats FortiSandbox ISFW-PRI Demo_ISFW-Sales Demo_ISFW-Finance Demo_ISFW-ENG FP320C3X15002440 2.62 GB
  • 21. 21 Automated Security Audit and Recommendations
  • 22. 22 Apply to FabricFabric TranslationBusiness Language “Add This Mobile Phone to This Application Securely” “Convert into Policies, Ports, Connections…” Intent-based Network Security, Powered by Fabric Automatically Translate Business Needs To Infrastructure Policies
  • 23. 23 THE FORTINET SECURITY FABRIC The Fortinet Security Fabric is the vision that delivers on the promise of Security without Compromise: Broad, Powerful and Automated Advanced Threat Intelligence Access Client Cloud Partner API NOC/SOC Network Application
  • 24. Advanced Threat Intelligence Access Client Cloud Partner API NOC/SOC Network Application ExpertSystem Security Fabric, your own Expert System Security Fabric brings Artifical Inteligence to your Security Operations ActionableIntelligence ARTIFICIAL INTELLIGENCE MACHINE LEARNING DEEP LEARNING (DL)
  • 25. THE FORTINET SECURITY FABRIC REALIZED
  • 26. 26 FORTINET SECURITY FABRIC DDoS Protection Database Protection Web Application Firewall Application Delivery Controller Top-of-Rack BRANCH OFFICE Distributed Ent FW LTE Extension Endpoint Protection NGFWSecure Access Point IP Video Security Email Server Web Servers SDN, Virtual Firewall DCFW/ NGFW Sandbox Internal Segmentation FW Sandbox Switching Internal Segmentation FW Email Security Internal Segmentation FW CAMPUS Internal Segmentation FW DATA CENTER/PRIVATE CLOUD Virtual Firewall FortiCloud Client Devices Client Devices PUBLIC CLOUD OPERATIONS CENTER
  • 27. 27 FORTINET SECURITY FABRIC DDoS Protection Database Protection Web Application Firewall Application Delivery Controller Top-of-Rack BRANCH OFFICE LTE Extension Endpoint Protection FortiGate NGFW Secure Access Point IP Video Security Email Server SDN, Virtual Firewall FortiGate DCFW/ NGFW Sandbox FortiGate Internal Segmentation FW Sandbox Switching FortiGate Internal Segmentation FW Email Security FortiGate Internal Segmentation FW FortiGate Internal Segmentation FW CAMPUS Client Devices DATA CENTER/PRIVATE CLOUD Web Servers ENTERPRISE FIREWALL FortiGate/FortiWiFi Distributed Ent FW Client Devices FortiManager FortiAnalyzer FortiSIEM OPERATIONS CENTER Virtual Firewall FortiCloud PUBLIC CLOUD
  • 28. 28 FORTINET SECURITY FABRIC DDoS Protection Database Protection Web Application Firewall Application Delivery Controller Top-of-Rack BRANCH OFFICE LTE Extension CAMPUS Secure Access Point IP Video Security Switching FortiGate NGFW FortiGate DCFW/ NGFW FortiGate Internal Segmentation FW FortiGate Internal Segmentation FW FortiGate Internal Segmentation FW FortiGate Internal Segmentation FW FortiGate VMX SDN, Virtual Firewall DATA CENTER/PRIVATE CLOUD Web Servers ENTERPRISE FIREWALL Client Devices CLOUD SECURITY Client Devices Endpoint Protection Email Server Sandbox Sandbox Email Security OPERATIONS CENTER Fortinet Virtual Firewall FortiManager FortiAnalyzer FortiSIEM FortiCloud PUBLIC CLOUD FortiGate/FortiWiFi Distributed Ent FW
  • 29. 29 FORTINET SECURITY FABRIC DDoS Protection Database Protection Application Delivery Controller Top-of-Rack BRANCH OFFICE LTE Extension CAMPUS FortiClient Secure Access Point IP Video Security Switching FortiGate NGFW FortiGate DCFW/ NGFW FortiGate Internal Segmentation FW FortiGate Internal Segmentation FW FortiGate Internal Segmentation FW FortiGate Internal Segmentation FW FortiGate VMX SDN, Virtual Firewall DATA CENTER/PRIVATE CLOUD Web Servers CLOUD SECURITYADVANCED THREAT PROTECTION ENTERPRISE FIREWALL FortiClient FortiSandbox FortiClient FortiSandbox FortiMail Email Security Email Server FortiWeb Web Application Firewall OPERATIONS CENTER FortiManager FortiAnalyzer FortiSIEM Fortinet Virtual Firewall FortiCloud PUBLIC CLOUD FortiCloud Sandboxing FortiGate/FortiWiFi Distributed Ent FW
  • 30. 30 FORTINET SECURITY FABRIC Top-of-Rack BRANCH OFFICE LTE Extension CAMPUS FortiClient Secure Access Point IP Video Security Switching FortiGate NGFW FortiGate DCFW/ NGFW FortiGate Internal Segmentation FW FortiGate Internal Segmentation FW FortiGate Internal Segmentation FW FortiGate VMX SDN, Virtual Firewall FortiDDoS Protection FortiWeb Web Application Firewall FortiADC Application Delivery Controller DATA CENTER/PRIVATE CLOUD Web Servers FortiGate Internal Segmentation FW APPLICATION SECURITY ENTERPRISE FIREWALL FortiClient FortiSandbox FortiClient FortiSandbox FortiMail Email Security FortiDB Database Protection CLOUD SECURITYADVANCED THREAT PROTECTION Email Server OPERATIONS CENTER FortiManager FortiAnalyzer FortiSIEM Fortinet Virtual Firewall FortiCloud PUBLIC CLOUD FortiCloud Sandboxing FortiGate/FortiWiFi Distributed Ent FW
  • 31. 31 FORTINET SECURITY FABRIC FortiWeb Web Application Firewall FortiADC Application Delivery Controller Top-of-Rack BRANCH OFFICE FortiExtender LTE Extension CAMPUS FortiClient Secure Access Point IP Video Security FortiGate NGFW FortiGate DCFW/ NGFW FortiGate Internal Segmentation FW FortiGate Internal Segmentation FW FortiGate Internal Segmentation FW FortiGate VMX SDN, Virtual Firewall FortiDDoS Protection FortiGate Internal Segmentation FW DATA CENTER/PRIVATE CLOUD Web Servers SECURE ACCESS APPLICATION SECURITY ENTERPRISE FIREWALL FortiClient FortiSandbox FortiClient FortiSandbox FortiMail Email Security FortiSwitch Switching CLOUD SECURITYADVANCED THREAT PROTECTION FortiSwitch Switching Email Server FortiDB Database Protection OPERATIONS CENTER FortiManager FortiAnalyzer FortiSIEM Fortinet Virtual Firewall FortiCloud PUBLIC CLOUD FortiCloud Sandboxing FortiCloud AP Management FortiGate/FortiWiFi Distributed Ent FW
  • 32. 32 Security Fabric Secured by FortiGuard App Control Antivirus Anti-spam IPS WebApp Database Web Filtering Vulnerability Management IP Reputation Mobile Security NEW Firewall VPN Application Control IPS Web Filtering Anti-malware WANAcceleration Data Leakage Protection Wi-Fi Controller Advanced Threat Protection
  • 34. 34 Learn more about what is on your with Fortinet’s Cyber Threat Assessment Program (CTAP) SECURITY & THREAT PREVENTION USER PRODUCTIVITY NETWORK UTILIZATION