Corporate Presentation Template March 2006

Download Report

Transcript Corporate Presentation Template March 2006

End-to-End Strategic Security

Bryan Wood

Manager – Western Channel Sales

October 14th, 2009 Fortinet Confidential

IT Threats Are Increasing

In Number… Exponential Growth in Malware Threats

in thousands

In Severity…

Motive and intent has moved from notoriety to financial gain

Cyber security is critical U.S. DoD Reported Incidents of Malicious Cyber Activity

in thousands

Hackers Breach Heartland Payment Credit Card System (1/20/2009)

“Heartland Payment Systems (HPY) disclosed that intruders hacked into thecomputers it uses to process 100 million payment card transactions per month for 175,000 merchants …”

Electricity Grid in U.S. Penetrated by Spies (4/8/2009)

“Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system , according to current and former

U.S. South Korea Investigate Possible North Korean Cyber Attack (7/8/2009)

“A series of coordinated attacks on government and financial websites startedaround the same time North Korea tested new missiles fresh sanctions…” and faced Fortinet Confidential

In Complexity…

Coordinated and blended attacks are now a common practice

Increased processing power required

Business Requirements Are Increasing

Network Throughput

Network requirements / demands accelerating

Security demands must co-exist

10GB

Budgetary Constraints

IT budgets shrinking

Security spend increasing Change in External IT Services Spending From FY09 to FY10 % Regulatory Pressures

 

Industries demanding greater IT compliance (FISMA, PCI DSS, etc.) Compliance needs coming from government regulations as well as business partners / industry mandates

HIPPA FISMA SOX 404

10MB 100MB 1GB Multi-GB Fortinet Confidential

Real-World Consequences

ChoicePoint 163K Consumers

$15M fine largest in FTC history 2006

Biggest Breach In British History

4.5M Monster.co.uk users 2009

Billions Lost Billions Lost Heartland Data Breach:

MasterCard, Visa Impose Hefty Fines Processor says it Has Already Spent $12.5 Million… 2009

9 Major Retailers incl. TJ Maxx Hacked

41M cards, $118 Million 2008 Fortinet Confidential

We Have Pioneered a New Approach to IT Security

The Fortinet Solution Traditional Network Security Solutions Real-time, integrated security intelligence ASIC-accelerated performance Low total cost of ownership Easy to deploy / manage / use

5 Fortinet Confidential

Layers of protection

• • • Requires an integrated security strategy Allow but don’t trust any application Examine all application content • Comprehensive, integrated inspection • Overlapping, complementary layers of protection 6 Fortinet Confidential

Real Threat Protection in Action

Problem: “Innocent” Video Link:

Redirects to malicious Website

“Out of date” Flash player error:

“Download” malware file

Solution: Integrated Web Filtering

Blocks access to malicious Website

Network Antivirus

Blocks download of virus

Intrusion Protection

Blocks the spread of the worm

Error message:

“Drops” copy of itself on system and attempts to propagate 7 Fortinet Confidential

Prioritize

Defer non-essential projects

What projects can wait?

What can’t wait

?

Fortinet Confidential

Thinking Strategically About Security

Future-proof your security infrastructure

• Anticipate change •

Look for opportunities to consolidate without compromise

• • • • Reduce complexity Increase protection Decrease risk Lower capex & opex •

Move beyond tactical responses to threats “

By 2010, only 10% of emerging security threats will require tactical point solutions,

compared with 80% in 2005.

Source: Gartner

*Gartner:

Cost Cutting While Improving IT Security

, March 20, 2008 Fortinet Confidential

Unified Threat Management

 IDC definition: UTM security appliance products which provide multiple security features integrated into one device  By 2011 UTM will be the largest single market, with a CAGR of 26.2%  UTM has already surpassed firewall market • Antispam • Antivirus • Antispyware • Web Filtering • IDS • IPS • Firewall • VPN Unified Threat Management

UTM $1.3B

• IDS • IPS • Firewall • VPN Intrusion Detection & Prevention

$1.2B

$1.5B

Firewall & VPN

In 2008, UTM surpassed Firewall market $3.5B

$2.0B

$1.3B

CAGR

2007-2012 50% 25% 0% -25% Source: IDC Fortinet Confidential

Do More with Less

Reduce complexity

Expand protection

Consolidate without compromise

Reduce cost

Fortinet Confidential

A Reliable Partner

Proven Industry Leadership

• Since 2000, Fortinet has received more than 100 product & company awards • IDC: Overall leader in UTM factory revenue for all of 2008 • • • Frost & Sullivan: 2008 Award for Market Leadership in Unified Threat Management (UTM) Frost & Sullivan: 2008 "Global Competitive Strategy Leadership of the Year" SC Magazine: 2008 Readers' Trust Award for "Best Integrated Security Solution".

Certified security

• Six ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL, VPN, Anti-Spam) • Government Certifications (FIPS-2, Common Criteria EAL4+) • ISO 9001 certification Fortinet Confidential

Top 4 Network Security Appliance Vendor

Note: Market shares are based on IDC’s Quarterly Appliance Tracker. (Source: IDC, June 2009)

Fortinet Confidential

1.

2.

3.

4.

5.

6.

7.

8.

9.

Worldwide Security Appliance Revenue Share by Vendor, Q1 09 Cisco McAfee Juniper IBM Nokia Tipping Point SonicWall Check Point

#1 in Unified Threat Management (UTM)

Juniper Checkpoint McAfee Crossbeam Other Cisco SonicWALL

Worldwide UTM Revenue Share by Vendor, Q1 2009 Note: Market shares are based on IDC’s Quarterly Appliance Tracker.

Source: IDC, June 2009

Fortinet Confidential

Leader in Gartner Multi-Function Firewall

Magic Quadrant 2H09

Source: Gartner, Inc., “1H09 MultiFunction Firewall Magic Quadrant” by G. Young and A. Hils, June X, 2009. This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Fortinet.

The Magic Quadrant is copyrighted June X, 2009 by Gartner, Inc., and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Fortinet Confidential

Core Value Proposition

Traditional Network Security Solutions The Fortinet Solution

Inadequate security Performance degradation High total cost of ownership Difficult to manage Fortinet Confidential Real-time, integrated security intelligence ASIC-accelerated performance Low total cost of ownership Easy to deploy / manage / use

Fortinet Brings Networking and Security DNA

Networking Vendors Security Vendors

Fortinet Confidential

FortiGate Product Lineup

UTM Security FortiGate Network Security Platform Management FortiManager Centralized Mgmt FortiAnalyzer Logging & Reporting Data Security FortiDB Database Security Security Services FortiGuard Real time Security Services Host Security FortiClient Host Security Solution FortiScan Asset Vulnerability Mgmt Application Security FortiMail Email Security FortiWeb XML & Web Application Secur ity

Fortinet Confidential

FortiGate Multi-Threat Security Platform

Real Time Protection Flexible Capabilities Hardened Platform Firewall VPN Traffic Shaping FortiGuard Updates AV SSL Insp IPS AppCtrl Specialized OS WF DLP Antispam WANopt High Performance Purpose-Built Hardware In today’s sophisticated threatscape, network security requires overlapping, complementary technologies; Fortinet’s security PLATFORM provides both flexibility & defense-in-depth capabilities. 21 Fortinet Confidential

FortiGate UTM Lineup

• ASIC-based multi-threat security platform • Common OS across all platforms • Single management interface • FortiGuard Services • Antivirus, IPS, Antispam, Web content filtering SMB & Remote Office Enterprise Service Provider & Large Enterprise Fortinet Confidential

Product Portfolio

UTM Security FortiGate Network Security Platform Management FortiManager Centralized Mgmt FortiAnalyzer Logging & Reporting Data Security FortiDB Database Security Security Services FortiGuard Real time Security Services Host Security FortiClient Host Security Solution FortiScan Asset Vulnerability Mgmt Application Security FortiMail Email Security FortiWeb XML & Web Application Secur ity

Fortinet Confidential

FortiGuard Services Network

Real-time updates

• “Push” / “pull” updates for Fortinet customers • Tied to FortiCare registration system •

Distributed infrastructure

• Multiple servers deployed globally • Approximately 16 data center locations • Hierarchical deployment strategy • Main server update pushes secondary updates •

Gather feedback from worldwide installed base

24 Fortinet Confidential

The Fortinet Solution

FortiGate Appliance FortiGateServices Consolidate Security

 

Provides broad array of best-in-class security functions Global Threat Research Team provides real-time updates Disruptive Technology Platform Low Total Cost of Ownership

Fortinet Confidential  

FortiASIC and FortiOS deliver faster network performance Network and content level functions are integrated

Eliminates expense of purchasing and integrating separate single-function products from multiple vendors

Fortinet’s End-to-End IT Security Portfolio

Content

Email & Web Security Content & App Security

FortiMail FortiWeb FortiDB FortiScan Applications

UTM

FortiGate

Networks

Security Management & Analysis

FortiManager FortiAnalyzer Fortinet Confidential

Endpoint Security

Endpoints FortiClient FortiMobile

Summary

Comprehensive solution

• From a single vendor •

Lower TCO

• Less complexity and easier management •

Real-time security

• 24/7 global updates •

Strategic flexibility

• Fit your timeline and budget Fortinet Confidential

Thank You

Bryan Wood Fortinet Manager Western Channel Sales O 949-713-5690 C 949-394-1036 E [email protected]

Fortinet Confidential