next generation security by fortinet -...
TRANSCRIPT
![Page 1: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/1.jpg)
© Copyright Fortinet Inc. All rights reserved.
CONFIDENTIAL
Next generation security by Fortinet
Ivan Ščavničar – Presales systems [email protected]
![Page 2: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/2.jpg)
2CONFIDENTIAL
DO WE NEED A CHANGE IN SECURITY?
![Page 3: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/3.jpg)
3
Infrastructure constantly chaning
GreenGoogle’s 13 data
centers use 0.01%
of global power
SDN/NFVSoftware-defined
everything. SD WAN
SaaSOn average, companies
have 10+ applications
running via the Cloud
IaaSSecurity still the
No.1 inhibitor
IoT35B devices, mostly
headless attaching
to the network
Virtualization80% of data center
apps are virtualized
MobileNo control of
endpoints (BYOD)
SocialBandwidth ever
increasing
BandwidthWi-Fi speeds rival LANs.
100G networks here
AnalyticsBig Data
Internet 2100 Gbps and
UHDTV
5GWireless
FUTURE
100G
![Page 4: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/4.jpg)
4
Malware is constantly changing
Hard to catch by classical security engines» HIPS usually bypassed by 0-day exploit kits
» URL filtering bypassed by using legit websites or random domain
names
» Top 5 AV engines reach ~96% detection rate, repacked malware
passes through
Both massively deployed (ransomware) or targeted,
specially developed for governments, SCADA & financial
![Page 5: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/5.jpg)
5
The attack surface has increased dramatically, everywhere, inside and out.
Internet
SaaS
PoS
IoT
UTM
Internet
Cloud
SaaS
NGFW
Campus
Mobile
Endpoint
Data Center
DCFWBranch
Office
Internal External
![Page 6: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/6.jpg)
6CONFIDENTIAL
WHAT IS THE SECURITY FABRIC?
![Page 7: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/7.jpg)
7
Fortinet Security Fabric – Integrated Security Architecture
Scalable
Aware
Secure
Actionable
Open
Client Security
Network Security
Application
Security
Cloud Security
Secure WLAN Access
Alliance Partners
Secure LAN Access
IoT
Fortinet
Security Fabric
Global Intelligence
Local
Intelligence
![Page 8: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/8.jpg)
8
Device Access Network Cloud
Distributed
Enterprise
Edge Segmentation
Branch
Data Center
North-South
Carrier Class
SDN/NFVPrivate Cloud IaaS/SaaS
WLAN / LAN
Rugged
Embedded System on a Chip Packet and Content Processor ASIC Hardware Dependent
Device
>1G
Appliance
>5G
Appliance
>30G
Appliance
>300G
Chassis
>Terabit
Virtual Machine
SDN/NFV
Virtual Machine
On Demand
Client
Endpoint/IoT Application
Security
FLOW
Appliance
Virtual
Cloud
Secure – The Fabric cover all the possible attack vectors such as Network, Endpoint Access, Web, Email and Cloud
Security
UpdatesIPS AVAPPFW VPN
![Page 9: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/9.jpg)
9
FortiMail
FortiClient
FortiGateAdvanced
Threat
Protection
Appliance Virtual Cloud
App Control Antivirus Anti-spam
IPS Web App Database
WebFiltering
VulnerabilityManagement
BotnetMobile
Security
CloudSandbox
DeepApp Control
Partner
FortiWeb
Actionable – The Fabric cuts Time to Protect from hours to seconds
![Page 10: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/10.jpg)
10
Open – The Fabric allows integration of existing security solutions
SIEM
Private
Cloud
(SDN)Endpoint
Public
CloudVulnerability
Management
![Page 11: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/11.jpg)
11
Cyber Threat Alliance:
» Fortinet + Palo Alto Networks founded CTA – may 2014
» Defined as Cyber Defense Consortium; goal is to have Automated Threat Intelligence
Sharing Platform
» Now it extended to
Intel Security Group, Intel Corporation;
Check Point;
Cisco Security;
Symantec;
McAfee
Telefonica
Zscaler
Barracuda
..and we mean open
![Page 12: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/12.jpg)
12
A Leader in Network Security
![Page 13: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/13.jpg)
13CONFIDENTIAL
ADVANCED THREAT PROTECTION
![Page 14: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/14.jpg)
14
Random Detection(average ~200 days,
prior to response)
DURATION
IMP
AC
T
Time Malware Remains Undetected
![Page 15: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/15.jpg)
15
How Does it Remain Undetected? Unique Code.
Sources: Verizon 2016 Data Breach Investigations Report, April 2016
70-90%
![Page 16: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/16.jpg)
16
How Should We Address it? Sandboxing.
Sources: Verizon 2016 Data Breach Investigations Report, April 2016
70-90%
![Page 17: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/17.jpg)
17
Key FortiSandbox Components
Call Back Detection
Full Virtual Sandbox
Code Emulation
Cloud File Query
AV Prefilter
• Quickly simulate intended activity
• OS independent and immune to
evasion/obfuscation
• Apply top-rated anti-malware engine
• Examine real-time, full lifecycle activity
to get the
threat to expose itself
• Check community intelligence & file reputation
• Identify the ultimate aim, call back &
exfiltration
• Mitigate w/FortiGuard updates
Intelligence Sharing • Distribute real-time updates
• Feed global systems
![Page 18: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/18.jpg)
18
Network Share
Modes of Operation
Fabric Integration
» Files submitted directly from FortiGate,
FortiMail, FortiWeb, FortiADC,
FortiProxy, and FortiClient
3rd Party Adapters
» Carbon Black/Bit9
» ICAP for SWG
» JSON API
Sniffer
» Extract files from mirrored traffic
to perform inspection
On-demand
» Manual file or URL submission
using management GUI
Network share
FortiMail
FortiClient
3rd party Endpoint Agent
FortiSandboxFortiGate
Switch
(Tap enabled)
FortiWeb
Router
Router
File
submissionsFiles extracted from
mirrored traffic
CIFS/NFS
protocol
Su
pport
for
Non-F
ort
inet
Ecosyste
m
FortiProxy
3rd party ICAP Client
![Page 19: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/19.jpg)
19
That is Fully AutomatedAutomated Intelligence Sharing and Response
FortiClient (ATP Agent)
3rd party Endpoint Agent
FortiGate/FortiMail/FortiWeb/FortiADC/FortiProxy/ICAP Device
FortiGuard Labs
Intelligence Sharing3b
Block Objects2a
Quarantine Devices
2bForensics and Response
2c
File Quarantine2a
File Submission/ Result
1
File Submission/ Result
1
Security Updates4
Real-time Intelligence Updates3a
FortiSandbox
Animated
![Page 20: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/20.jpg)
20
FortiGate / FortiSandbox in Security Fabric
![Page 21: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/21.jpg)
21
Independent Validation of FortiSandbox
![Page 22: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/22.jpg)
22CONFIDENTIAL
SECURE ACCESS
![Page 23: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/23.jpg)
23
SECURITY FABRIC | NETWORKING
UNIFIED SECURE ACCESS
Shared Services
Configuration
User/Device Identification
and Control
Content Inspection and
Protection
Visibility
Logs & Reports
Remote Access
via VPN
Wired & Wireless
Local Access
Integrated Connectivity Management with Security
![Page 24: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/24.jpg)
24
SECURITY FABRIC | NETWORKING
WIRELESS CONTROLLER
Corporate Wi-Fi
SECURE ACCESS APPROACH
1. Captive Portal, 802.1x—Radius /shared key
2. Assign users and devices to their role
3. Examine wireless traffic to remove threats
4. Identify applications and destinations
5. Apply policy to users and applications
6. Ensures Business traffic has priority
7. Reports on policy violations, application
usage, destinations and PCI DSS
![Page 25: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/25.jpg)
25
INTEGRATED SWITCH
MANAGEMENT
Easily connects switches to
FortiGate via FortiLink
Setup stacks, configure and
upgrade switches firmware with
FortiOS
Port level visibility – what is
connected, plus contextual info
on topology map and Device
Inventory
SECURITY FABRIC | NETWORKING
SWITCH CONTROLLER
![Page 26: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/26.jpg)
26CONFIDENTIAL
FORTICLIENT
Fabric extension to endpoints
![Page 27: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/27.jpg)
27
Fortinet’s FortiClient Endpoint Protection Platform
Independent Validation✓ Top rated protection
✓ Easy deployment
✓ Low TCO
Antivirus Web Filter
Remote VPN
Application
Firewall
Vulnerability
Scanning
2-Factor
Authentication
WAN
Optimization
Part of Fortinet’s
ATP System (Sandbox Integration)
![Page 28: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/28.jpg)
28
FortiClient Integration
▪ Hold For or Act Upon Result
▪ Dynamic, Local Threat Intelligence
![Page 29: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/29.jpg)
29CONFIDENTIAL
FABRIC BENEFITS
![Page 30: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/30.jpg)
30
Visualization of Security Fabric
components from physical and
logical connectivity perspective
Mouse-over for endpoint contextual
details
Remote login to downstream
FortiGates
TOPOLOGYMAPS
SECURITY FABRIC | OPERATION
VISIBILITY
![Page 31: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/31.jpg)
31
SECURITY FABRIC | OPERATION
VISIBILITY
Powerful on-demand query tool that
provides contextual results with drill
down capabilities
Presents in various viewers
Uses real-time or historical data
from FortiAnalyzer or FortiCloud
Aggregated data from downstream
FortiGates within the Security
Fabric
FORTIVIEW
Assists in network
troubleshooting
Provides insights to
optimizing networks &
productivity
Why is a particular group of users is having trouble using the cloud based ERP system?
Acquires proactive
security knowledge
Supports proactive
security management
Is there an abnormality that needs further investigation?
Identifies network and
threat status
Resolves threats and
networking problems
quickly
Are my users abusing the network and how so?
![Page 32: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/32.jpg)
32
SECURITY FABRIC | OPERATION
VISIBILITY
Setup query using easy-to-use auto-complete filters
Select row for drill down
Sort rows to display Top sessions
Examine real-time or historical data
APPLICATION VIEWER
![Page 33: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/33.jpg)
33
Automatically quarantine
compromised hosts via Stitch
Option to do so using FortiClient via
EMS or connection via FortiSwitch
and FortiAP
QUARANTINE
SECURITY FABRIC | OPERATION
AUTOMATION
![Page 34: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/34.jpg)
34
iOS Push notification via
FortiExplorer
NOTIFICATIONS
SECURITY FABRIC | OPERATION
AUTOMATION
![Page 35: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/35.jpg)
35
SECURITY RATING AUDIT
Fabric-wide audit against
»Endpoint agent installation
»Configuration hardening
»Subscription status
»Network Design & Policies
»ATP implementation
Provides recommendation or one-
click fixes
SECURITY FABRIC | POLICY & CONTROL
COMPLIANCE & SECURITY RATING
![Page 36: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/36.jpg)
36
SECURITY RATING RANKING
Benchmark against peers
»Rank against similar organizations
in term of size and industry by
percentile
»Requires FortiGuard Security
Rating subscription
SECURITY FABRIC | POLICY & CONTROL
COMPLIANCE & SECURITY RATING
![Page 37: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/37.jpg)
37
ENDPOINT COMPLIANCE
Different profiles can be setup
accordingly such as Location
(Source IPs), User groups and/or
Device types etc
Compliance criteria includes
Vulnerability scan status, Windows
application/process presence and
FortiClient configurations
Warn or block clients if not
compliant
SECURITY FABRIC | POLICY & CONTROL
COMPLIANCE & SECURITY RATING
![Page 38: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/38.jpg)
38
SECURITY FABRIC | POLICY & CONTROL
COMPLIANCE & SECURITY RATING
![Page 39: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/39.jpg)
39
Qubit Conference 2017 39Ivan Ščavničar
Visibility
![Page 40: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/40.jpg)
40
More visibility
4
0
![Page 41: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/41.jpg)
41
Asset tagging
4
1
![Page 42: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/42.jpg)
42
Easy apply
4
2
![Page 43: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/43.jpg)
43CONFIDENTIAL
WHERE DO WE GO FROM HERE
![Page 44: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/44.jpg)
44
EXPAND
EXPAND
Cloud
SDN
CASB
SD-WAN
UEBA
Single Pane
CISO
AWS
Azure
Oracle
VMWare
KVM
Xen
HyperV
AzureStack
Telemetry &
Segmentation
Dynamic
Policies
Acceleration
Server
Protection
IAAS
Vulnerability & IOC
Detection &
Response
Integrated
NOC / SOC
Threat Intel
ExchangeAudit &
Compliance
Industry
Comparisons
Unified Views
Priorities & Metrics
Cloud
SDN
![Page 45: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/45.jpg)
45
INTEGRATE
Fabric Connectors
Threat Feeds
Dynamic Policy
Automation /
Remediation
IAAS
SSO
ITSM
Endpoint CVE
![Page 46: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/46.jpg)
46
MEASURE
Integrated Measurement
Fabric-wide Reporting
Multi-product
Industry, Region & Size
Comparison
How Secure Am I?
Security
Roadmap
Standards
Based
Feature
Map
![Page 47: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/47.jpg)
47
DETECT
DETECT
APT
IOC
3rd Party
Vulnerability
UEBA
Weakness
![Page 48: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/48.jpg)
48
AUTOMATE
DETECT
Remediation
Framework (Stitches)
Fabric Inputs
Fabric Outputs
IFTTT
Endless
Event
Action
Any Source
• Audit
• Real-time detection
• FortiAnalzyer
• IOC
• EVENTS
• REST API
• …
Any Destination
• Fabric Config
• Push Notification
• Configuration change
• Endpoint Actions
• REST API
• …
Infected IP
Quarantine
0-day
IOC
Bot Infection
HostSwitch (VLAN)
SSID (VLAN)
![Page 49: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/49.jpg)
49
Based on IOC lavel (medium/high)
Automatic FortiClient quarantine via EMS
FortiClient Automatic Quarantine (FOS 6.0.0)
![Page 50: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/50.jpg)
50
Quarantine Host option to quarantine devices that are
connected in Tunnel-mode
Host gets an IP address from the quarantine VLAN
Wireless user quarantine
![Page 51: Next generation security by Fortinet - AVADavad.ba/.../2018/10/Fortinet-Next-generation-security.pdf · 2018-11-05 · Next generation security by Fortinet Ivan Ščavničar ±Presales](https://reader030.vdocuments.us/reader030/viewer/2022040608/5ec8f1a38859ec39871c3983/html5/thumbnails/51.jpg)