SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
Securing the Cloud


Ondřej Šťáhlavský
Territory Manager CEE




Fortinet Confidential
Agenda




        1         • Introduction


        2         • Features and Virtualization


        3         • FortiGate 3950 Series


        4         • FortiGate VM




 Fortinet Confidential
Fortinet Corporate Overview

                                              Fortinet Revenue ($MM)
• Founded in 2000
• Global presence with 30+ offices
  worldwide & 1,200+ employees
                                                                          $252
   – 5,000+ channel partners
                                                                       $212
   – 100,000+ customers
                                                                 $155
      – Majority of the Fortune Global 100                   $123
• IPO Nov 2009                                            $80
   • NASDAQ: FTNT                                   $39
                                              $13
• 2009 revenue of $252 Million
   – 19% YoY growth                          2003
                                                      2005
                                                                2007
• World class management team                                             2009




Fortinet Confidential
A Reliable Partner




• Proven Industry Leadership
   » Since 2000, Fortinet has received more than 100 product & company awards.
           • IDC: Overall leader in UTM factory revenue for all of 2009
           • Gartner: Leader in Multi-Function Firewall Magic Quadrant
           • Frost & Sullivan: 2010 "Fortinet is the established and undisputed leader" of worldwide UTM market
           • SC Magazine: 2009 Readers' Trust Award for "Best Integrated Security Solution"

• Certified security
   » Seven ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam, WAF)
   » Government Certifications (FIPS-2, Common Criteria EAL4+, JITC IPv6, SCAP)
   » ISO 9001 certification

   Fortinet Confidential
The Need for Complete
    Content Protection


•   Overlapping, complementary layers of protection
•   Comprehensive, integrated inspection
•   Allow but don’t trust any application
•   Examine all application content & behavior




      Fortinet Confidential
We Pioneered a New Approach


Traditional Network Security Solutions                             The Fortinet Solution




•   Stand-alone, non-integrated security            •   Real-time, integrated security intelligence
•   Mix of off the shelf systems and applications   •   ASIC-accelerated performance
•   Higher total cost of ownership                  •   Lower total cost of ownership
•   Difficult to deploy / manage / use              •   Easy to deploy / manage / use

     Fortinet Confidential
UTM Surpassing Traditional
 Network Security

 $ in billions




                                                                                                                                                   $3.2

Firewall & VPN
                                       $2.2



                                                                                                                                                     $2.1
       UTM
                                        $1.7




                                          2008                       2009                         2010                        2011          2012     2013
 Source: IDC “Worldwide Network Security 2008-2012 Forecast and 2007 Vendor Shares: Transitions – Appliances Are More Than Meets the Eye”
      Fortinet Confidential
Market Leadership Across the Board


       Worldwide UTM Market Share                                                              Magic Quadrant for                     UTM Market Competitive
               Q2 2010 (1)                                                                  Multi-Function Firewalls (3)                Landscape, 2009(4)

                                                      Market
      Rank Company
                                                    Share (%) (2)

          1                                             16.4                                                                High


         2        Cisco                                  9.8
                                                                                                                           Ability
          3       Juniper                                9.0                                                                 to
                                                                                                                           Deliver
         4        SonicWALL                              8.1
          5       Check Point                            7.2
         6        WatchGuard                             4.9
                                                                                                                            Low
          7       McAfee                                 5.5
                                                                                                                                     Low            Market Penetration            High
          8       Crossbeam                              2.6
          9       Other                                 41.4
                                                                                                                                                              Contender    Market Leader
                  Total                                100.0                                                                          Niche Participant
                                                                                                                                                              Specialist    Challenger

Notes
(1)   IDC Worldwide Security Appliances Tracker, September 2010 (market share based on factory revenue)
(2)
(3)
           Fortinet Confidential
      Gartner, Inc., “Magic Quadrant for SMB Multifunction Firewalls”, June 2009
      Frost & Sullivan, “World Unified Threat Management, Products Market 2009”, 2010

                                                                                                                                                                                    8
Fortinet – Leader in Enterprise UTM


                                           Enterprise UTM Revenue
        Vendor                                                                        Q2 2010                                Market Share
       Fortinet                                                                        $42.02                                                  37%
       Juniper                                                                         $16.36                                                  14%
       Check Point                                                                     $10.92                                                  10%
       Cisco                                                                           $28.73                                                  25%
       McAfee                                                                          $15.33                                                  14%




    IDC Worldwide Security Appliances Tracker, September 2010. Data based on $6-$9.9K, $10-$24.K, $25-$49.9K and $50-$99.9K UTM price bands.



9    Fortinet Confidential
Agenda



       1         • Introduction


       2         • Features and Virtualization


       3         • FortiGate 3950 Series


       4         • FortiGate VM




Fortinet Confidential
Evolution of Firewall Security


              Complete Protection


                             Antispam                    WAN
                                                      Optimization
              Antivirus/ Evolution of Firewall Security
             Antispywar                  Data Loss                   SSL VPN
                  e                      Prevention                   ICSA
                ICSA         VPN(IPSEC                   Web
                                 )                     Filtering
                               ICSA                      CIPA
              Firewall                      IPS                       App
               ICSA                        ICSA                      Control
                                                         Load
                              Wireless                Balancing
                               LAN                       SSL
                                           IPv6,      Inspection
             Vulnerability               Dynamic&                    Endpoint
                Mgmt                     Multicast                     NAC
                                          Routing


Fortinet Confidential
Virtual Domains




               VDOM 1        VDOM 2         VDOM 3
                                                             …          VDOM X




• Divide FortiGate unit to operate as multiple separate units
• One FortiGate unit servicing up to 250 separate domains
• Each VDOM has separate administration interface, routing policies, firewall policies …


Fortinet Confidential
Virtual Domains




              Routed/NAT                                     Transparent




• VDOMs can be in routed or transparent mode
• Transparent VDOMs lack IPSEC and SSL VPN, Load Balancing, Wireless Controller and
  routing capabilities

Fortinet Confidential
VDOM Resource Limits




       • Resource limits configurable globally and per-VDOM
       (each VDOM has its own guarantied system resources)

 Fortinet Confidential
Inter-VDOM Links




                VDOM 1                      VDOM 2                     VDOM 3


  • Only Routed/NAT VDOMs can be interconnected
  • VDOMs communicate internally
     (Free up physical interfaces for external traffic)
  • Inter VDOM traffic controlled by complete UTM inspection on both sides of the link


Fortinet Confidential
Independent VDOM Configuration


                                                          Internet



                    External interfaces




                                              VDOM 1      VDOM 2      VDOM 3




                        Internal interfaces




                                              Network 1   Network 2   Network 3




 • Multiple VDOMs, completely separate from each other
 • No communication between VDOMs
    (Treated as if on separate physical device)

Fortinet Confidential
Management VDOM Configuration


                                                        Internet



                   External interface




                                                    Management VDOM




                                        VDOM 1         VDOM 2         VDOM 3



                  Internal interfaces




                                        Network 1       Network 2     Network 3




 • Root VDOM is management VDOM
    (Other VDOMS connected with inter-VDOM links)
 • All external traffic routed though management VDOM

Fortinet Confidential
Meshed VDOM Configuration


                                                   Internet



                  External interface




                                              Management VDOM




                                       VDOM 1                 VDOM 2



                 Internal interfaces




                                       Network 1              Network 2




 • VDOMs interconnected - mesh configuration
    (Full access between VDOMS, but handle traffic differently depending on origin)


Fortinet Confidential
Agenda




        1         • Introduction


        2         • Features and Virtualization


        3         • FortiGate 3950 Series


        4         • FortiGate VM




 Fortinet Confidential
FortiGate-3950B Series


• Dedicated Performance
  » FW : Up to 120 Gbps
  » IPS: Over 12 Gbps

                                               FortiGate-3950B
• Modular Appliance
  » Base model:
     − FW: 20 Gbps
     − IPS: 4 Gbps
  » Fortinet Mezzanine Cards (FMC)
                                               FortiGate-3951B
     − 20 Gbps FW (both FMC cards)
     − 4 Gbps IPS (FMC-XG2 / targeted)
  » 64 GB SSD internal storage (FG-3951B)
     − Fortinet Storage Module (FSM)
     − Expandable to 256 GB (4 x FSM-064)   FMC-XD2              FMC-XG2



     Fortinet Confidential
Enterprise-Class Benefits


  • Build the performance your customers need
  - Scalable performance with the ability to grow from 20 Gbps up to 120 Gbps »


  • Customize the appliance to meet performance requirements
     » Gateway, Datacenter
     » Pure Firewall / UTM


  • Exceed limited features/functions of ‘next generation’ devices
     » Highest performing firewall appliance at 120 GB
     » Seamless integration of FW, IPS, VPN, Web Filtering, and other FortiOS services
     » Complete content protection: Application control + application security
         • More than application identification
         • Integration of content-based security technologies into the firewall to identify threats within trusted
           application content




  Fortinet Confidential
Specialized Processors within
FMC Modules


       • FortiASIC-NP4
           » Accelerates security services at the interface level
               • Packet size independent , very low latency, wire speed performance for millions of sessions with dynamic
                 address translation
           » IPSec ESP encryption and decryption processing
           » Packet anomaly detection, checksum offload and packet defragmentation
           » Traffic Shaping and priority queuing
       • FortiASIC-SP2
           » Multi-core multi-threaded security processing complex
                  » Builds on the capabilities of the FortiASIC-NP4 to provide additional services, including
                         • Application control
                         • IPv6
                         • IPS Signature analysis
                         • DOS protection
                         • Multicast acceleration



  Fortinet Confidential
Integrated Switch Fabric inside
FG-3950 Series

                           NP/SP     NP/SP    NP/SP     NP/SP     NP/SP      NP




                                                                                      I
                            FMC      FMC       FMC       FMC       FMC       On       S
                             0        1         2         3         4       Board
                                                                                      F



                            PHY      PHY       PHY       PHY      PHY       PHY




                                                                               4x1G

    • Uniquely scalable approach to forwarding and security processing
       » Utilizes specialized FortiASIC-NP4 and –SP2 processors to achieve breakthrough acceleration
       » Fortinet Mezzanine Card (FMC) delivers additional processing power that can be distributed across
         the entire appliance via the ISF
            • Fully meshed connectivity between all FMC slots and associated processing modules




  Fortinet Confidential
Agenda




        1         • Introduction


        2         • Features and Virtualization


        3         • FortiGate 3950 Series


        4         • FortiGate VM




 Fortinet Confidential
FortiGate VM Specifications

Feature                            FortiGate-VM

Hypervisors Supported              VMware ESXi/ESX 3.5/4.0/4.1,
                                   others that can run *.ovf format
Hardened Platform                  Yes (Using VMware HW version
Open Virtualization Format (OVF)   7)
# of vCPU’s supported              2/4/8/U

Built in VDOMS (upgradeable)       10

Memory and CPU                     Uses Hypervisor

10/100/1000 Interfaces             10 Max (Uses Hypervisor)

Storage Capacity                   Uses Hypervisor

High Availability                  Yes

FortiGate version (Firmware)       4.2

   Fortinet Confidential
ostahlavsky@fortinet.com




 Fortinet Confidential

Mais conteúdo relacionado

Mais procurados

vSAN architecture components
vSAN architecture componentsvSAN architecture components
vSAN architecture componentsDavid Pasek
 
Enterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANEnterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANToshal Dudhwala
 
Palo alto NGfw2023.pptx
Palo alto  NGfw2023.pptxPalo alto  NGfw2023.pptx
Palo alto NGfw2023.pptxahmad661583
 
Fortinet & VMware integration
Fortinet & VMware integrationFortinet & VMware integration
Fortinet & VMware integrationVMUG IT
 
Network Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspectsNetwork Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspectsdeshpandeamrut
 
10 palo alto nat policy concepts
10 palo alto nat policy concepts10 palo alto nat policy concepts
10 palo alto nat policy conceptsMostafa El Lathy
 
VMware Virtual SAN Presentation
VMware Virtual SAN PresentationVMware Virtual SAN Presentation
VMware Virtual SAN Presentationvirtualsouthwest
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabricANSItunCERT
 
Technical Overview of Cisco Catalyst 9200 Series Switches
Technical Overview of Cisco Catalyst 9200 Series SwitchesTechnical Overview of Cisco Catalyst 9200 Series Switches
Technical Overview of Cisco Catalyst 9200 Series SwitchesRobb Boyd
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edgeitnewsafrica
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 
Top 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseTop 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseF5 Networks
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptxaungyekhant1
 
17 palo alto threat prevention concept
17 palo alto threat prevention concept17 palo alto threat prevention concept
17 palo alto threat prevention conceptMostafa El Lathy
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyCisco Canada
 

Mais procurados (20)

vSAN architecture components
vSAN architecture componentsvSAN architecture components
vSAN architecture components
 
Enterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANEnterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WAN
 
Apache CloudStack from API to UI
Apache CloudStack from API to UIApache CloudStack from API to UI
Apache CloudStack from API to UI
 
Palo alto NGfw2023.pptx
Palo alto  NGfw2023.pptxPalo alto  NGfw2023.pptx
Palo alto NGfw2023.pptx
 
Fortinet & VMware integration
Fortinet & VMware integrationFortinet & VMware integration
Fortinet & VMware integration
 
Network Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspectsNetwork Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspects
 
10 palo alto nat policy concepts
10 palo alto nat policy concepts10 palo alto nat policy concepts
10 palo alto nat policy concepts
 
VMware Virtual SAN Presentation
VMware Virtual SAN PresentationVMware Virtual SAN Presentation
VMware Virtual SAN Presentation
 
VLAN vs VXLAN
VLAN vs VXLANVLAN vs VXLAN
VLAN vs VXLAN
 
CloudStack Networking
CloudStack NetworkingCloudStack Networking
CloudStack Networking
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabric
 
Technical Overview of Cisco Catalyst 9200 Series Switches
Technical Overview of Cisco Catalyst 9200 Series SwitchesTechnical Overview of Cisco Catalyst 9200 Series Switches
Technical Overview of Cisco Catalyst 9200 Series Switches
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edge
 
Virtual Local Area Network (VLAN)
Virtual Local Area Network (VLAN)Virtual Local Area Network (VLAN)
Virtual Local Area Network (VLAN)
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Top 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseTop 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes Sense
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
17 palo alto threat prevention concept
17 palo alto threat prevention concept17 palo alto threat prevention concept
17 palo alto threat prevention concept
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN Technology
 

Destaque (20)

Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6
 
Fortinet
FortinetFortinet
Fortinet
 
Fortinet
FortinetFortinet
Fortinet
 
Forti presence
Forti presenceForti presence
Forti presence
 
Fortinet, держи марку!
Fortinet, держи марку!Fortinet, держи марку!
Fortinet, держи марку!
 
Fortinet icons
Fortinet iconsFortinet icons
Fortinet icons
 
Secure Access Architecture
Secure Access ArchitectureSecure Access Architecture
Secure Access Architecture
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
 
HP AIS
HP AISHP AIS
HP AIS
 
FCNSP
FCNSPFCNSP
FCNSP
 
citrix 200
citrix 200citrix 200
citrix 200
 
CCNA Voice
CCNA VoiceCCNA Voice
CCNA Voice
 
CompTIA Security+ ce Certificate
CompTIA Security+ ce CertificateCompTIA Security+ ce Certificate
CompTIA Security+ ce Certificate
 
ICDL Certificate
ICDL CertificateICDL Certificate
ICDL Certificate
 
FCSA - Fortinet Certified Sales Associate
FCSA - Fortinet Certified Sales AssociateFCSA - Fortinet Certified Sales Associate
FCSA - Fortinet Certified Sales Associate
 
HP MASE-ProCrvMb06-UV0351793813
HP MASE-ProCrvMb06-UV0351793813HP MASE-ProCrvMb06-UV0351793813
HP MASE-ProCrvMb06-UV0351793813
 
Diploma_Enterprise Security Manager (ESM) SIEM
Diploma_Enterprise Security Manager (ESM) SIEMDiploma_Enterprise Security Manager (ESM) SIEM
Diploma_Enterprise Security Manager (ESM) SIEM
 
Diana_Mantchevska_SureView Threat Overview
Diana_Mantchevska_SureView Threat OverviewDiana_Mantchevska_SureView Threat Overview
Diana_Mantchevska_SureView Threat Overview
 
cca_virtualization2
cca_virtualization2cca_virtualization2
cca_virtualization2
 

Semelhante a Securing the Cloud with FortiGate Virtualization

Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Enterprise
 
NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011Agora Group
 
Overview of LBS for the Enterprise
Overview of LBS for the EnterpriseOverview of LBS for the Enterprise
Overview of LBS for the Enterpriseeddy1b
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Securityanniebrowny
 
Grandstream Final22
Grandstream Final22Grandstream Final22
Grandstream Final22bongskey008
 
General Dynamics Itronix Rugged Mobile Computing Solutions from WAV
General Dynamics Itronix Rugged Mobile Computing Solutions from WAVGeneral Dynamics Itronix Rugged Mobile Computing Solutions from WAV
General Dynamics Itronix Rugged Mobile Computing Solutions from WAVWAV Inc.
 
Fortinet brochure by GTEC CxA
Fortinet brochure by GTEC CxAFortinet brochure by GTEC CxA
Fortinet brochure by GTEC CxAGTEC CxA
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012Agora Group
 
2007 Financial Analyst Meeting Presentation Please Note: This is a large doc...
	2007 Financial Analyst Meeting Presentation Please Note: This is a large doc...	2007 Financial Analyst Meeting Presentation Please Note: This is a large doc...
2007 Financial Analyst Meeting Presentation Please Note: This is a large doc...finance7
 
What is "carrier class network"?
What is "carrier class network"?What is "carrier class network"?
What is "carrier class network"?Volodymyr Litovka
 
Webinar: Yankee Group's 2009 Predictions for the Anywhere Economy
Webinar: Yankee Group's 2009 Predictions for the Anywhere EconomyWebinar: Yankee Group's 2009 Predictions for the Anywhere Economy
Webinar: Yankee Group's 2009 Predictions for the Anywhere EconomyYankee Group
 
Next Generation Messaging Market Ronald Gruia (Frost & Sullivan)
Next Generation Messaging Market   Ronald Gruia (Frost & Sullivan)Next Generation Messaging Market   Ronald Gruia (Frost & Sullivan)
Next Generation Messaging Market Ronald Gruia (Frost & Sullivan)guestceb1dfc
 
Una mirada a la situación tecnológica a través del caso Intel Norberto Mateos...
Una mirada a la situación tecnológica a través del caso Intel Norberto Mateos...Una mirada a la situación tecnológica a través del caso Intel Norberto Mateos...
Una mirada a la situación tecnológica a través del caso Intel Norberto Mateos...EOI Escuela de Organización Industrial
 
New partner preso
New partner presoNew partner preso
New partner presoEric Cullum
 
Increase Profitability with WAV and Exalt Solutions
Increase Profitability with WAV and Exalt SolutionsIncrease Profitability with WAV and Exalt Solutions
Increase Profitability with WAV and Exalt SolutionsWAV Inc.
 

Semelhante a Securing the Cloud with FortiGate Virtualization (20)

Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security Myths
 
NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011
 
Overview of LBS for the Enterprise
Overview of LBS for the EnterpriseOverview of LBS for the Enterprise
Overview of LBS for the Enterprise
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
Představení služby QualysGuard
Představení služby QualysGuardPředstavení služby QualysGuard
Představení služby QualysGuard
 
Grandstream Final22
Grandstream Final22Grandstream Final22
Grandstream Final22
 
General Dynamics Itronix Rugged Mobile Computing Solutions from WAV
General Dynamics Itronix Rugged Mobile Computing Solutions from WAVGeneral Dynamics Itronix Rugged Mobile Computing Solutions from WAV
General Dynamics Itronix Rugged Mobile Computing Solutions from WAV
 
Selis
SelisSelis
Selis
 
Fortinet brochure by GTEC CxA
Fortinet brochure by GTEC CxAFortinet brochure by GTEC CxA
Fortinet brochure by GTEC CxA
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
Bluetooth tutorial-2001
Bluetooth tutorial-2001Bluetooth tutorial-2001
Bluetooth tutorial-2001
 
2007 Financial Analyst Meeting Presentation Please Note: This is a large doc...
	2007 Financial Analyst Meeting Presentation Please Note: This is a large doc...	2007 Financial Analyst Meeting Presentation Please Note: This is a large doc...
2007 Financial Analyst Meeting Presentation Please Note: This is a large doc...
 
What is "carrier class network"?
What is "carrier class network"?What is "carrier class network"?
What is "carrier class network"?
 
Webinar: Yankee Group's 2009 Predictions for the Anywhere Economy
Webinar: Yankee Group's 2009 Predictions for the Anywhere EconomyWebinar: Yankee Group's 2009 Predictions for the Anywhere Economy
Webinar: Yankee Group's 2009 Predictions for the Anywhere Economy
 
Next Generation Messaging Market Ronald Gruia (Frost & Sullivan)
Next Generation Messaging Market   Ronald Gruia (Frost & Sullivan)Next Generation Messaging Market   Ronald Gruia (Frost & Sullivan)
Next Generation Messaging Market Ronald Gruia (Frost & Sullivan)
 
Company overview: Automotive + TTEthernet
Company overview: Automotive + TTEthernetCompany overview: Automotive + TTEthernet
Company overview: Automotive + TTEthernet
 
Una mirada a la situación tecnológica a través del caso Intel Norberto Mateos...
Una mirada a la situación tecnológica a través del caso Intel Norberto Mateos...Una mirada a la situación tecnológica a través del caso Intel Norberto Mateos...
Una mirada a la situación tecnológica a través del caso Intel Norberto Mateos...
 
New partner preso
New partner presoNew partner preso
New partner preso
 
Increase Profitability with WAV and Exalt Solutions
Increase Profitability with WAV and Exalt SolutionsIncrease Profitability with WAV and Exalt Solutions
Increase Profitability with WAV and Exalt Solutions
 

Mais de xKinAnx

Engage for success ibm spectrum accelerate 2
Engage for success   ibm spectrum accelerate 2Engage for success   ibm spectrum accelerate 2
Engage for success ibm spectrum accelerate 2xKinAnx
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep diveAccelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep divexKinAnx
 
Software defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloudSoftware defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloudxKinAnx
 
Ibm spectrum virtualize 101
Ibm spectrum virtualize 101 Ibm spectrum virtualize 101
Ibm spectrum virtualize 101 xKinAnx
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...xKinAnx
 
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directionsxKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...xKinAnx
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloudxKinAnx
 
Presentation disaster recovery for oracle fusion middleware with the zfs st...
Presentation   disaster recovery for oracle fusion middleware with the zfs st...Presentation   disaster recovery for oracle fusion middleware with the zfs st...
Presentation disaster recovery for oracle fusion middleware with the zfs st...xKinAnx
 
Presentation differentiated virtualization for enterprise clouds, large and...
Presentation   differentiated virtualization for enterprise clouds, large and...Presentation   differentiated virtualization for enterprise clouds, large and...
Presentation differentiated virtualization for enterprise clouds, large and...xKinAnx
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rolloutxKinAnx
 

Mais de xKinAnx (20)

Engage for success ibm spectrum accelerate 2
Engage for success   ibm spectrum accelerate 2Engage for success   ibm spectrum accelerate 2
Engage for success ibm spectrum accelerate 2
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep diveAccelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
 
Software defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloudSoftware defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloud
 
Ibm spectrum virtualize 101
Ibm spectrum virtualize 101 Ibm spectrum virtualize 101
Ibm spectrum virtualize 101
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
 
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
 
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
 
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
 
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
 
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
 
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
 
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
 
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
 
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
 
Presentation disaster recovery for oracle fusion middleware with the zfs st...
Presentation   disaster recovery for oracle fusion middleware with the zfs st...Presentation   disaster recovery for oracle fusion middleware with the zfs st...
Presentation disaster recovery for oracle fusion middleware with the zfs st...
 
Presentation differentiated virtualization for enterprise clouds, large and...
Presentation   differentiated virtualization for enterprise clouds, large and...Presentation   differentiated virtualization for enterprise clouds, large and...
Presentation differentiated virtualization for enterprise clouds, large and...
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rollout
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Securing the Cloud with FortiGate Virtualization

  • 1. Securing the Cloud Ondřej Šťáhlavský Territory Manager CEE Fortinet Confidential
  • 2. Agenda 1 • Introduction 2 • Features and Virtualization 3 • FortiGate 3950 Series 4 • FortiGate VM Fortinet Confidential
  • 3. Fortinet Corporate Overview Fortinet Revenue ($MM) • Founded in 2000 • Global presence with 30+ offices worldwide & 1,200+ employees $252 – 5,000+ channel partners $212 – 100,000+ customers $155 – Majority of the Fortune Global 100 $123 • IPO Nov 2009 $80 • NASDAQ: FTNT $39 $13 • 2009 revenue of $252 Million – 19% YoY growth 2003 2005 2007 • World class management team 2009 Fortinet Confidential
  • 4. A Reliable Partner • Proven Industry Leadership » Since 2000, Fortinet has received more than 100 product & company awards. • IDC: Overall leader in UTM factory revenue for all of 2009 • Gartner: Leader in Multi-Function Firewall Magic Quadrant • Frost & Sullivan: 2010 "Fortinet is the established and undisputed leader" of worldwide UTM market • SC Magazine: 2009 Readers' Trust Award for "Best Integrated Security Solution" • Certified security » Seven ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam, WAF) » Government Certifications (FIPS-2, Common Criteria EAL4+, JITC IPv6, SCAP) » ISO 9001 certification Fortinet Confidential
  • 5. The Need for Complete Content Protection • Overlapping, complementary layers of protection • Comprehensive, integrated inspection • Allow but don’t trust any application • Examine all application content & behavior Fortinet Confidential
  • 6. We Pioneered a New Approach Traditional Network Security Solutions The Fortinet Solution • Stand-alone, non-integrated security • Real-time, integrated security intelligence • Mix of off the shelf systems and applications • ASIC-accelerated performance • Higher total cost of ownership • Lower total cost of ownership • Difficult to deploy / manage / use • Easy to deploy / manage / use Fortinet Confidential
  • 7. UTM Surpassing Traditional Network Security $ in billions $3.2 Firewall & VPN $2.2 $2.1 UTM $1.7 2008 2009 2010 2011 2012 2013 Source: IDC “Worldwide Network Security 2008-2012 Forecast and 2007 Vendor Shares: Transitions – Appliances Are More Than Meets the Eye” Fortinet Confidential
  • 8. Market Leadership Across the Board Worldwide UTM Market Share Magic Quadrant for UTM Market Competitive Q2 2010 (1) Multi-Function Firewalls (3) Landscape, 2009(4) Market Rank Company Share (%) (2) 1 16.4 High 2 Cisco 9.8 Ability 3 Juniper 9.0 to Deliver 4 SonicWALL 8.1 5 Check Point 7.2 6 WatchGuard 4.9 Low 7 McAfee 5.5 Low Market Penetration High 8 Crossbeam 2.6 9 Other 41.4 Contender Market Leader Total 100.0 Niche Participant Specialist Challenger Notes (1) IDC Worldwide Security Appliances Tracker, September 2010 (market share based on factory revenue) (2) (3) Fortinet Confidential Gartner, Inc., “Magic Quadrant for SMB Multifunction Firewalls”, June 2009 Frost & Sullivan, “World Unified Threat Management, Products Market 2009”, 2010 8
  • 9. Fortinet – Leader in Enterprise UTM Enterprise UTM Revenue Vendor Q2 2010 Market Share Fortinet $42.02 37% Juniper $16.36 14% Check Point $10.92 10% Cisco $28.73 25% McAfee $15.33 14% IDC Worldwide Security Appliances Tracker, September 2010. Data based on $6-$9.9K, $10-$24.K, $25-$49.9K and $50-$99.9K UTM price bands. 9 Fortinet Confidential
  • 10. Agenda 1 • Introduction 2 • Features and Virtualization 3 • FortiGate 3950 Series 4 • FortiGate VM Fortinet Confidential
  • 11. Evolution of Firewall Security Complete Protection Antispam WAN Optimization Antivirus/ Evolution of Firewall Security Antispywar Data Loss SSL VPN e Prevention ICSA ICSA VPN(IPSEC Web ) Filtering ICSA CIPA Firewall IPS App ICSA ICSA Control Load Wireless Balancing LAN SSL IPv6, Inspection Vulnerability Dynamic& Endpoint Mgmt Multicast NAC Routing Fortinet Confidential
  • 12. Virtual Domains VDOM 1 VDOM 2 VDOM 3 … VDOM X • Divide FortiGate unit to operate as multiple separate units • One FortiGate unit servicing up to 250 separate domains • Each VDOM has separate administration interface, routing policies, firewall policies … Fortinet Confidential
  • 13. Virtual Domains Routed/NAT Transparent • VDOMs can be in routed or transparent mode • Transparent VDOMs lack IPSEC and SSL VPN, Load Balancing, Wireless Controller and routing capabilities Fortinet Confidential
  • 14. VDOM Resource Limits • Resource limits configurable globally and per-VDOM (each VDOM has its own guarantied system resources) Fortinet Confidential
  • 15. Inter-VDOM Links VDOM 1 VDOM 2 VDOM 3 • Only Routed/NAT VDOMs can be interconnected • VDOMs communicate internally (Free up physical interfaces for external traffic) • Inter VDOM traffic controlled by complete UTM inspection on both sides of the link Fortinet Confidential
  • 16. Independent VDOM Configuration Internet External interfaces VDOM 1 VDOM 2 VDOM 3 Internal interfaces Network 1 Network 2 Network 3 • Multiple VDOMs, completely separate from each other • No communication between VDOMs (Treated as if on separate physical device) Fortinet Confidential
  • 17. Management VDOM Configuration Internet External interface Management VDOM VDOM 1 VDOM 2 VDOM 3 Internal interfaces Network 1 Network 2 Network 3 • Root VDOM is management VDOM (Other VDOMS connected with inter-VDOM links) • All external traffic routed though management VDOM Fortinet Confidential
  • 18. Meshed VDOM Configuration Internet External interface Management VDOM VDOM 1 VDOM 2 Internal interfaces Network 1 Network 2 • VDOMs interconnected - mesh configuration (Full access between VDOMS, but handle traffic differently depending on origin) Fortinet Confidential
  • 19. Agenda 1 • Introduction 2 • Features and Virtualization 3 • FortiGate 3950 Series 4 • FortiGate VM Fortinet Confidential
  • 20. FortiGate-3950B Series • Dedicated Performance » FW : Up to 120 Gbps » IPS: Over 12 Gbps FortiGate-3950B • Modular Appliance » Base model: − FW: 20 Gbps − IPS: 4 Gbps » Fortinet Mezzanine Cards (FMC) FortiGate-3951B − 20 Gbps FW (both FMC cards) − 4 Gbps IPS (FMC-XG2 / targeted) » 64 GB SSD internal storage (FG-3951B) − Fortinet Storage Module (FSM) − Expandable to 256 GB (4 x FSM-064) FMC-XD2 FMC-XG2 Fortinet Confidential
  • 21. Enterprise-Class Benefits • Build the performance your customers need - Scalable performance with the ability to grow from 20 Gbps up to 120 Gbps » • Customize the appliance to meet performance requirements » Gateway, Datacenter » Pure Firewall / UTM • Exceed limited features/functions of ‘next generation’ devices » Highest performing firewall appliance at 120 GB » Seamless integration of FW, IPS, VPN, Web Filtering, and other FortiOS services » Complete content protection: Application control + application security • More than application identification • Integration of content-based security technologies into the firewall to identify threats within trusted application content Fortinet Confidential
  • 22. Specialized Processors within FMC Modules • FortiASIC-NP4 » Accelerates security services at the interface level • Packet size independent , very low latency, wire speed performance for millions of sessions with dynamic address translation » IPSec ESP encryption and decryption processing » Packet anomaly detection, checksum offload and packet defragmentation » Traffic Shaping and priority queuing • FortiASIC-SP2 » Multi-core multi-threaded security processing complex » Builds on the capabilities of the FortiASIC-NP4 to provide additional services, including • Application control • IPv6 • IPS Signature analysis • DOS protection • Multicast acceleration Fortinet Confidential
  • 23. Integrated Switch Fabric inside FG-3950 Series NP/SP NP/SP NP/SP NP/SP NP/SP NP I FMC FMC FMC FMC FMC On S 0 1 2 3 4 Board F PHY PHY PHY PHY PHY PHY 4x1G • Uniquely scalable approach to forwarding and security processing » Utilizes specialized FortiASIC-NP4 and –SP2 processors to achieve breakthrough acceleration » Fortinet Mezzanine Card (FMC) delivers additional processing power that can be distributed across the entire appliance via the ISF • Fully meshed connectivity between all FMC slots and associated processing modules Fortinet Confidential
  • 24. Agenda 1 • Introduction 2 • Features and Virtualization 3 • FortiGate 3950 Series 4 • FortiGate VM Fortinet Confidential
  • 25. FortiGate VM Specifications Feature FortiGate-VM Hypervisors Supported VMware ESXi/ESX 3.5/4.0/4.1, others that can run *.ovf format Hardened Platform Yes (Using VMware HW version Open Virtualization Format (OVF) 7) # of vCPU’s supported 2/4/8/U Built in VDOMS (upgradeable) 10 Memory and CPU Uses Hypervisor 10/100/1000 Interfaces 10 Max (Uses Hypervisor) Storage Capacity Uses Hypervisor High Availability Yes FortiGate version (Firmware) 4.2 Fortinet Confidential