1 fortinet confidential september 5, 2015 fortinet an introduction
TRANSCRIPT
1 Fortinet Confidential
April 21, 2023
Fortinet
An Introduction
2 Fortinet Confidential
April 21, 2023
ControlControlThe power toThe power to
verifyverifyvisualizevisualizesimplifysimplifyconsolidateconsolidatemanagemanage
protectprotectsecuresecureaccelerateaccelerateenableenableenforceenforce
3 Fortinet Confidential
Agenda
Fortinet Introduction
Strategic Solutions
Technology Overview
4 Fortinet Confidential
Fortinet Corporate Overview
$434$434
$39$39
$80$80
$123$123
$155$155
$212$212
$252$252
$325$325
FORTINET REVENUE ($MM)FORTINET REVENUE ($MM)
$13$13
03 04 05 06 07 08 09 10 1103 04 05 06 07 08 09 10 11
Market Leader• UTM - Fast-growth security segment
Advanced technology and products• 101+ patents; 113+ pending
Strong global footprint• 1,700+ employees; 40 offices worldwide
Blue chip customer base• Over 125,000 customers
(incl. majority of Global 100)
Exceptional financial model• FY11 revenues: $434M (34% YoY growth)• Q1/12 revenues: $117M (26% YoY growth)• Strong balance sheet: $600M+ in cash; no
debt• IPO - November 2009
5 Fortinet Confidential
Network Security:The Traditional Approach
New Threat
Intercepts
New Threat
Intercepts
New Device:VPN TerminationNew Device:VPN Termination
New Threat
Spam
New Threat
SpamNew Device:Spam FilteringNew Device:Spam Filtering
New Threat
App LayerAttacks
New Threat
App LayerAttacks
New Device:‘Next Generation’Firewall
New Device:‘Next Generation’Firewall
A VICIOUS CIRCLE
A VICIOUS CIRCLE
6 Fortinet Confidential
“I.T. departments must manage a growing array of specialized security technologies that may or may not work together to help security departments detect and halt attacks.”“Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey New York Times 6/22/11
The Result:More Expense, Less Security, Less Control
7 Fortinet Confidential
Reducing Complexity Is Critical
•Source: Navigating IT: Objective & ObstaclesInfoworld, May, 2011
Q: What are the top security-related challenges your organization is facing? (base: of those that are involved in Security investments)
8 Fortinet Confidential
Fortinet Breaks The Cycle
New ThreatNew
Threat
Update Firmware:Web Filtering
Update Firmware:Web Filtering
New ThreatNew
Threat
Update Firmware:IM & P2P Protection
Update Firmware:IM & P2P Protection
New ThreatNew
Threat
Update FirmwareApp Control, Data
Leakage, SSL Inspection
Update FirmwareApp Control, Data
Leakage, SSL Inspection
9 Fortinet Confidential
The Benefit Of Integration:Continuous Updates
New ThreatNew
Threat
Anti-Virus:4x each day
Anti-Virus:4x each day
New ThreatNew
Threat
IPS:2x each day
IPS:2x each day
New ThreatNew
Threat
Antispam &Web Filtering
Continuous
Antispam &Web Filtering
Continuous
10 Fortinet Confidential
LOCK & KEY
ANTI-SPYWARE
ANTI-SPAM
WEB FILTER
ANTI-VIRUS
VPN
IPS
FIREWALL
APP CONTROL
PHYSICAL
CONNECTION-BASED
HARDWARE THEFT
1980s 1990s 2000s Today
Pe
rfo
rma
nc
e
- D
am
ag
e
CONTENT-BASED
SPYWARE
WORMS
SPAM
BANNED CONTENT
TROJANS
VIRUSES
INTRUSIONS
APP LAYER ATTACKS
HARDWARE THEFTHARDWARE THEFT
Security:Followed The Internet Evolution
11 Fortinet Confidential
PHYSICALPHYSICAL
CONNECTION-BASEDCONNECTION-BASED
CONTENT-BASEDCONTENT-BASED
ANTI-SPYWARE
ANTI-SPAM
WEB FILTER
ANTI-VIRUS
VPN
IPS
FIREWALL
LOCK & KEY
SPYWARE
WORMS
SPAM
BANNED CONTENT
TROJANS
VIRUSES
INTRUSIONS
HARDWARE THEFT
1980s 1990s 2000s Today
Pe
rfo
rma
nc
e
- D
am
ag
e
APP CONTROLAPP LAYER ATTACKS
The Fortinet Solution
12 Fortinet Confidential
Fortinet:A New Approach
TRADITIONAL SOLUTIONSCumbersome and costlyTRADITIONAL SOLUTIONSCumbersome and costly
THE FORTINET SOLUTIONSimple and cost-effectiveTHE FORTINET SOLUTIONSimple and cost-effective
13 Fortinet Confidential
Purpose-Built Hardware
Specialized OS
Firewall
Fully Integrated Security & Networking Technologies
Hardened Platform
High Performance
Real-Time Protection
Traffic ShapingVPN
SSL Insp
DLP WAN Opt
FortiGuard™ Updates
WLAN Load BalancingVoIP HA
Support and Services FortiCare™ FortiGuard Labs
AV IPS AntispamWeb Filter App Ctrl VM
• Purpose-built to deliver overlapping, complementary security
• Provides both flexibility & defense-in-depth capabilities
FortiGate:Integrated Architecture
14 Fortinet Confidential
Unmatched Solution Spectrum
SIZESIZE
COVERAGECOVERAGE
SOHO/CPESOHO/CPE EnterpriseEnterprise CarrierCarrierData
Center/CloudData
Center/Cloud
DomainDomain
NetworkNetwork
ContentContent
DeviceDevice
15 Fortinet Confidential
The Result:Market Leadership
(1) IDC Worldwide Security Appliances Tracker, June 2012 market share based on factory revenue(2) IDC Worldwide Network Security 2012-2016 Forecast and 2011 Vendor Share, July 2012(3) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012
Rank Company Market Share (%)
1 18.9
2 Check Point 17.8
3 SonicWALL 9.3
4 Juniper 5.8
5 Cisco 5.4
6 WatchGuard 5.1
7 McAfee 4.2
8 Astaro 2.2
9 Others 31.3
Total 100%
Market Size $2.2B
IDC Worldwide Network Security Revenue 2011 (2)
Rank Company Market Share (%)
1 Cisco 18.2
2 Check Point 14.5
3 Juniper 8.9
4 5.1
5 McAfee 4.5
6 Microsoft 3.5
7 IBM 3.4
8 HP 2.7
9 Others 31.2
Total 100%
Market Size $7.4B
IDC Worldwide UTM Market Share Q1 2012 (1)
Magic Quadrant for Unified Threat Management (3)
16 Fortinet Confidential
Agenda
Fortinet Introduction
Strategic Solutions
Technology Overview
17 Fortinet Confidential
Social Media Strategies
Reacting To Change
New Business Processes
Productivity Improvements
Compliance
Mergers & Acquisitions
Mission Critical Applications
Partnering
‘Bring Your Own Device’
18 Fortinet Confidential
The Problems
19 Fortinet Confidential
HOWTO CONTROL?
HOWTO CONTROL?
WHATTO CONTROL?
WHATTO CONTROL?
The Power To Control
• Improve Protection
• Improve PolicyCompliance
• Increase Efficiency of People/Processes
• Improve Protection
• Improve PolicyCompliance
• Increase Efficiency of People/Processes
• Users
• Applications
• Data
• Devices
• Users
• Applications
• Data
• Devices
• Multiple Pointsof Contact
• Diverse Toolset
• Consolidation of Functions
• Multiple Pointsof Contact
• Diverse Toolset
• Consolidation of Functions
WHYCONTROL?WHY
CONTROL?
20 Fortinet Confidential
The Power To Control
Controlling Apps & Features Within Apps
• Categories of Apps
• Individual Apps
• Actions Within Apps
Controlling Apps & Features Within Apps
• Categories of Apps
• Individual Apps
• Actions Within Apps
Defining User Behavior
• By Domain
• By Groups
• By Individual Users
Defining User Behavior
• By Domain
• By Groups
• By Individual Users
Controlling Data
• Prioritize
• Limit Access By Groups or Users
- Time of Day
- Day of Week
Controlling Data
• Prioritize
• Limit Access By Groups or Users
- Time of Day
- Day of Week
21 Fortinet Confidential
The Power To: Solve Everyday Problems
Emily, a financial trader, installed Skype on her company laptop to talk with family.
Bill works for a Fortune 100 company and shares company details on Facebook.
Ed shared a company presentation via his personal Gmail account.
Jill is at Starbucks and needs to communicate and be protected as if she was at HQ.
Endpoint Control
2-Factor Authentication
VPN TunnelingWAN Optimization
Identity-Based Policies
Data Leak Protection
22 Fortinet Confidential
The Power To:Improve Productivity – Limiting Web Access
“Your daily quota for this category of webpage has expired…URL: beach-camera.store.buy.com
Category: Shopping and Auction”
23 Fortinet Confidential
With the broadest base of solutions
• Endpoint to Datacenter Solution
• Integrated Stack Security
• Consolidated Functionality
• Simplified Management
• Real-time Threat Protection
Over the entire network, end-to-end
• Users
• Behavior
• Data
• Devices
• Operating Systems
• Applications
Technology Benefits
• End to end security
• High uptime/availability
• Easy management
• Proactive protection
Fortinet DeliversThe Power To Control
Business Benefits
• Increased Protection
• Improved Policy Compliance
• Lower TCO
• Enhanced Productivity(end users & operations)
24 Fortinet Confidential
Agenda
Fortinet Introduction
Strategic Solutions
Technology Overview
25 Fortinet Confidential
Broad Product Portfolio
FortiGate 20-1000 Series
LARGE ENTERPRISEFortiGate
1000-3000 Series
SERVICE PROVIDER
SMALL/MEDIUM ENTERPRISE
FortiGate 3000-5000 Series
FortiManager
FortiAnalyzer FortiMail FortiWeb
FortiDB
FortiScan
FortiSwitch
FortiDDoS
FortiAuthenticator
FortiBalancer
FortiCache
FortiVoice
26 Fortinet Confidential
Significant Competitive Advantages
FortiOS Operating System
Multi-Threat Security
FortiASIC Network ASIC
FortiASIC Network Processor
FortiGuard Subscription Service
FortiCare Customer Support
FIREWALL
APPLICATIONCONTROLANTISPAM
VPN
WEB FILTERINGDLP
WANOPTIMIZATION
ANTIVIRUS/ANTISPYWARE
IPSWeb
securityEmail
securityAnti-
malware
FortiASIC System-on-a-Chip
FortiASIC Content Processor
27 Fortinet Confidential
The Power To:Centralize Management & Analysis
• Single Pane of Glass Management
• Global policy enforcement across 5 or 5,000 devices
• Increased flexibility with granular role-based administration
• Simplified configuration of Firewall, IPS, Application Control and other protections
• Centralized Analysis and Reporting
• Continuous monitoring across the enterprise
• Greater visibility into real-time incidents
• Monitor activity by users identity
• Automate compliance reporting
28 Fortinet Confidential
Custom ASICs:Foundation For Unmatched Performance
• Content Processor (ASIC)• Accelerates computationally
intensive tasks
• Network Processor (ASIC)• Heart of the hardware accelerated firewall
• Operates at interface level, providing low latency data path
• Security Processor (Hybrid)• Multi-core, multi-threaded processor
combined with content processor ASIC logic
• Operates at interface level, adding additional packet processing
• Integrated Switch Fabric
Custom Designed HardwareDedicated Security functions coupled with powerful CPUs
IntegratedSwitch Fabric
FortiASIC
FortiASIC
FortiASIC
SecurityProcessor
NetworkProcessor
ContentProcessor
NetworkInterfaces
General PurposeCPU
29 Fortinet Confidential
FortiOS
Custom built operating system
Architected for security and networking demands
Leverages custom hardware platform
Mature OS - at version 4.0 today
Disruptive Technology Platform
30 Fortinet Confidential
FortiGuardResearch, Updates, Services
FortiGuard Research:• Rootkits: Kernel Hooks• Botnets: Dynamic Monitoring, Spambots, New Malware Protocols• Malware: Code Techniques-PDF/Flash/Doc• Security: Exploits & Vulnerabilities, Zero Day Detection• Packer Research: Unpacking, Generic Detection
FortiGuard Services:• AV Signatures – 4x Daily• IPS Signatures – 2x Daily• Antispam/Web Content Filtering – Real Time• Sample Collection• Signature Creation• Alerts & Escalation
Global Distribution Network:• Application Control• Vulnerability Management• Antispam• Web Filtering• Intrusion Prevention• Antivirus
31 Fortinet Confidential
“Innocent” Video Link:»Redirects to malicious Website
Integrated Web FilteringBlocks access to malicious Website
Network AntivirusBlocks download of virus
Intrusion PreventionBlocks the spread of the worm
Error message:»Installs on system and attempts to propagate
“Out of date” Flash player »Download malware file
Authentication & Encryption
Fortinet in Action: BYOD
32 Fortinet Confidential
Thank You
www.fortinet.com