Fortinet Fortigate Whiteboard

Download Report

Transcript Fortinet Fortigate Whiteboard

True Unified Threat
Management
Fortigate Technology Positioning
Agenda
The legacy network security approach & multi-party UTM
The Fortinet approach
Maximizing the Fortinet opportunity
Summary
The legacy network security approach
Multiple point solutions & multi-party UTM
Key Points:
Main
drawbacks
Multi-Party
Resilient
architecture
UTM
Consolidated
hardware
100%
Inefficient
multiple
in hardware
point solutions
sprawl = latency & vulnerabilities
Legacyincrease
firewall
Cost savings from reduced utility overheads, training etc
Very
low
utilisation
of
investment
A
setnetwork
of individuals,
nottechnology
a team – Under 50%
First
security
BUT!
Considerable
Limited
End result
functionality
is underperforming,
sprawl in
– Port
appliances
& Protocol,
over expensive
Allow &security
Block posture
Similar
performance
issues
dueto
multiple of
scanning
Time
consuming
environment
administer,
multiple
consoles
Insufficient
protection
against
ato
multitude
threatsengines
Sizeable
total
cost
offrom
ownership…
More
advanced
protection
Reliance
on
updates
3rdrequired
partyTechnical
databasestraining, power & cooling, costly license programs
No major improvement in efficacy
The Fortinet approach
An integrated network security platform
Inside Fortigate
Virtualisation
WAN Opt
Firewall
SSL VPN
DLP
Wireless
Anti-Spam
Anti-Virus
App Control Traffic Shaping
Web Filter
IPS
Content ASIC
Proprietary Unified Threat Management
Purpose built Operating System
FortiOS
Network ASIC
Advanced Networking Services
General Purpose CPU
Purpose built hardware
Maximising the Fortinet opportunity
The unified access layer
Fortigate:
Integrated security platform
FortiAP:
Secure wireless access
Fortigate:
Secure site to site connectivity
FortiToken:
Strong authentication for mobile workers
The Unified Access Layer
Summary
Legacy security
Multiple point solutions are inefficient with a high total cost of ownership
Leave gaps in the network security posture
Multi-party UTM offer similar problems with very little improvement in performance
Fortinet
Fortinet offers a different approach with purpose built, accelerated hardware
High performance at a low price
Complimentary Fortinet technologies provide a ‘unified access layer’ for secure connectivity
regardless of location or network type
True Unified Threat Management