take control of end user security

38
1 CONFIDENTIAL – INTERNAL ONLY 603.766.5924 www.daystarinc.com TAKE CONTROL OF END USER SECURITY! How to minimize the risks end users inflict on your network. Presented by: Keith Bamford CEO, Daystar, Inc. James Cabe Systems Engineer II, Advanced Technology

Upload: anniebrowny

Post on 28-Jan-2015

103 views

Category:

Documents


1 download

DESCRIPTION

Daystar - Fortinet 01/23/2013 & 01/29/2013

TRANSCRIPT

Page 1: Take Control of End User Security

1 CONFIDENTIAL – INTERNAL ONLY

603.766.5924www.daystarinc.com

TAKE CONTROL OF END USER SECURITY!How to minimize the risks end users inflict on your network.

Presented by:

Keith BamfordCEO, Daystar, Inc.

James CabeSystems Engineer II,Advanced Technology

Page 2: Take Control of End User Security

2 CONFIDENTIAL – INTERNAL ONLY

603.766.5924www.daystarinc.com

Serving ME, NH, & MA since 2000

Long-term, partnership approach

Hardware and service offerings:• Procurement• Project-based IT services• Outsourced/Augmented IT

support Onsite Remote

DAYSTAR: Your Technology Partner

Page 3: Take Control of End User Security

3 CONFIDENTIAL – INTERNAL ONLY

603.766.5924www.daystarinc.com

DAYSTAR provides Consultation

Infrastructure Design

Network Implementation & Administration

Network Maintenance

Security

Cloud Integration

Network Monitoring

Data Backup

E-mail Solutions

Hosting

Mobile Integration

Hardware Procurement

Application Development

Page 4: Take Control of End User Security

4 CONFIDENTIAL – INTERNAL ONLY

603.766.5924www.daystarinc.com

End user threats to your network security

Mobile device access / BYOD

Spyware / Malware

Bandwidth and data access

Unauthorized access

Unauthorized downloads

Page 5: Take Control of End User Security

5 CONFIDENTIAL – INTERNAL ONLY

603.766.5924www.daystarinc.com

More control…simplified. Powerful security coupled with enhanced

user access

Increase awareness / knowledge

Micro-control access and users

Manageable, easy, simplified

The solution? security solutions

featuring FortiOS 5.

Page 6: Take Control of End User Security

6 CONFIDENTIAL – INTERNAL ONLY 6 Fortinet ConfidentialApril 10, 2023

Fortinet for the future:More Security, More Control, More Intelligence

Page 7: Take Control of End User Security

7 CONFIDENTIAL – INTERNAL ONLY

Fortinet Corporate Overview

• Founded in 2000

• Global presence with 30+ offices worldwide & 1,900+ employees– 5,000+ channel partners– 100,000+ customers

– Majority of the Fortune Global 100

• IPO Nov 2009 • NASDAQ: FTNT

• 2011 revenue of $423 Million – 34% YoY growth

• World class management team

7

2004 2006 2008 2010

$13$39

$80$123

$155

$212$252

$325

Fortinet Revenue ($MM)

58.4

% C

AGR

Page 8: Take Control of End User Security

8 CONFIDENTIAL – INTERNAL ONLY

Clear, Continuous Focus Since 2000

• Proven Leadership»Technology consolidation» Industry-leading performance»Simplified security

• Vision That Drives Us Today»Anticipate & innovate»Push the performance envelope»Make the competition follow our lead

8

Page 9: Take Control of End User Security

9 CONFIDENTIAL – INTERNAL ONLY

• Real-time, integrated security intelligence• ASIC-accelerated performance• Lower total cost of ownership• Easy to deploy / manage / use

9

• Stand-alone, non-integrated security • Mix of off the shelf systems and applications• Higher total cost of ownership• Difficult to deploy / manage / use

The Fortinet SolutionTraditional Network Security Solutions

We Pioneered a New Approach

Page 10: Take Control of End User Security

10 CONFIDENTIAL – INTERNAL ONLY

Fortinet’s Growth Strategy

UTM

Firewall / VPN

IDP

VPN

2010 2014

FortiGate

UTM

Firewall / VPN

IDP

APPLICATION CONTROL

VPN

DLPWAN ACCELERATION

WiFi

$7.5 Billion

$9.5 BillionGROWTH STRATEGY

1. Extend UTM leadership with new technology

2. Continue our security focus in the broader network security market

Page 11: Take Control of End User Security

11 CONFIDENTIAL – INTERNAL ONLY

Consolidated Security

11

Fortinet Delivers Complete Protection

Antispam/Antivirus

Data Loss Prevention

SSL Inspection

WAN Optimization

/ Traffic Shaping

Endpoint Protection/

NAC

Firewall

VPN

IPS

Web Filtering

Application Control

Real-Time Threat

Updates

Wireless Controller/Wireless LAN

IPv6, Dynamic Routing

SSL Inspection

VoIP

Virtual Appliance/

Virtual Domains

Vulnerability Mgmt

The Evolution of the Firewall

Page 12: Take Control of End User Security

12 CONFIDENTIAL – INTERNAL ONLY

Market Leadership Across the Board

Worldwide UTM Market ShareQ4 2010 (1)

UTM Market Competitive Landscape, 2009(3)

Low Market Penetration High

Niche ParticipantSpecialist

Contender

Challenger

Market Leader

Low

High

Abilityto

Deliver

12

(1) IDC Worldwide Security Appliances Tracker, March 2011 (market share based on factory revenue)(2) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, October 2010(3) Frost & Sullivan, “World Unified Threat Management, Products Market 2009”, 2010

Notes

Magic Quadrant for Unified Threat Management (2)

Rank Company Market Share (%)

1 16.2

2 Check Point 11.8

3 Juniper 8.4

4 Cisco 6.6

5 SonicWALL 7.8

6 McAfee 6.3

7 WatchGuard 5.2

8 Crossbeam 2.6

9 Other 35.1

Total 100.0

Page 13: Take Control of End User Security

13 CONFIDENTIAL – INTERNAL ONLY

Results of Singular Focus

• Delivering Effective, Consolidated Security»Best in class protection in a single device»Complete content protection

• Leading the Market»Performance»Depth of services

• Ensuring Flexibility» Integrated technologies»Simple pricing model

• Protecting All Segments»From carrier to SOHO

13

Page 14: Take Control of End User Security

14 CONFIDENTIAL – INTERNAL ONLY

Do More with Less

• Increase access to data and systems• Decrease risk of unauthorized access• Increase effectiveness of existing resources and investments• Reduce complexity of security infrastructure• Lower operating and capital costs

14

Page 15: Take Control of End User Security

15 CONFIDENTIAL – INTERNAL ONLY

Network TrendsWired Connectivity Moving Beyond 10G

Ubiquitous Wireless Connectivity

Mobile Devices Everywhere

Video and Audio Content

IPv6 a Reality

Background

Page 16: Take Control of End User Security

16 CONFIDENTIAL – INTERNAL ONLY

Security TrendsVisibility of Traffic

Accuracy of Detection

Policy Explosion

Log Explosion

Threats Scale

Background

Page 17: Take Control of End User Security

17 CONFIDENTIAL – INTERNAL ONLY

No ChangeBudget

Department Size

Background

Page 18: Take Control of End User Security

18 CONFIDENTIAL – INTERNAL ONLY 18 Fortinet Confidential

FortiOS 5

Page 19: Take Control of End User Security

19 CONFIDENTIAL – INTERNAL ONLY 19 F O R T I N E T C O N F I D E N T I A L

FortiOS 5

More Security

More Control

More Intelligence

Page 20: Take Control of End User Security

20 CONFIDENTIAL – INTERNAL ONLY

Over 150 New Features & Enhancements

Fighting Advanced Threats-------------------------------------- Client Reputation Advanced Anti-malware

Protection

More Security

Securing Mobile Devices------------------------------------ Device Identification Device Based Policy Endpoint Control

More Control

Making Smart Policies-------------------------------------- Identity Centric Enforcement Secured Guest Access Visibility & reporting

More Intelligence

FortiOS 5 Highlights

Page 21: Take Control of End User Security

21 CONFIDENTIAL – INTERNAL ONLY

Fighting Advanced ThreatsClient Reputation

Advanced Anti-malware Protection

More Security

Page 22: Take Control of End User Security

22 CONFIDENTIAL – INTERNAL ONLY

Ranking

Client Reputation

Identification

Policy Enforceme

nt

Multiple Scoring Vectors

Reputation by Activity Threat StatusReal Time, Relative,

Drill-down, Correlated

Identify potential … zero-day attacks

Score Computati

on

Zero Day Attack Detection

Page 23: Take Control of End User Security

23 CONFIDENTIAL – INTERNAL ONLY

Multi-pass Filters

In-box Enhanced AV Engine Cloud Based AV Service

Hardware Accelerated& Code optimized

Real time updated, 3rd party validated Signature DB

Local LightweightSandboxing

Behavior / Attribute Based Heuristic Detection

Application Control – Botnet Category

FortiGuard Botnet IP Reputation DB

Cloud BasedSandboxing

Improves threat …. … detection

Advanced Anti-Malware Protection

Page 24: Take Control of End User Security

24 CONFIDENTIAL – INTERNAL ONLY

Client Reputation Threat profiling to quickly identify most suspicious clients Effective zero-day attacks detection

!

Advanced Anti-malware Protection Mutilayered: Combines best-in class local AV Engine with

additional cloud based detection system Detects and block Botnet clients and activities Improves malware detection capabilities

More Security

Page 25: Take Control of End User Security

25 CONFIDENTIAL – INTERNAL ONLY

Securing Mobile DevicesDevice Identification

Device Based Policy

Endpoint Control

More Control

Page 26: Take Control of End User Security

26 CONFIDENTIAL – INTERNAL ONLY

See It… Control IT

Seamless integration!

BYOD – Device Identity & Policies

Device Based

Identity Policies

Agentless

Agent based

Device Identification

Access ControlSecurity

Application

UTM Profiles

Awareness

Page 27: Take Control of End User Security

27 CONFIDENTIAL – INTERNAL ONLY

Authorized Device

Device Based Policy Securely adopt BYOD Setup different security and network usage policies based on device

types

Personal Device

✔ DMZ ✔ INTERNET

✗DMZ ✔ INTERNET

More Control

Page 28: Take Control of End User Security

28 CONFIDENTIAL – INTERNAL ONLY

“Off-Net” Protection

Endpoint Control: FortiClient 5

INTERNET

LAN

OFF

ON

• Client enrolls into the FortiGate and then receives its end point policy. It will receive any updates when connected again.

• Client uses last known security policies and VPN configurations.

11

22

Page 29: Take Control of End User Security

29 CONFIDENTIAL – INTERNAL ONLY

Securing Remote Devices Protect mobile hosts against malicious external threats Enforce consistent end point security policies, anywhere all the time Simplified host security and remote VPN management

Endpoint Control: FortiClient 5

Page 30: Take Control of End User Security

30 CONFIDENTIAL – INTERNAL ONLY

Making Smart PoliciesIdentity Centric Enforcement

Secured Guest Access

Visibility & Reporting

More Intelligence

Page 31: Take Control of End User Security

31 CONFIDENTIAL – INTERNAL ONLY

Identity = Policy

External Radius ServiceExternal Radius Service

Windows ADWindows AD

Citrix EnvironmentCitrix Environment

= M.Jones =

= S.Lim =

= V.Baker =

= J.Jackson =

Captive PortalCaptive Portal

802.1x802.1x

Users identified without additional logins

FortiClientFortiClient

DMZ

DMZ

Users assigned to their policies

Identity-Centric Enforcement

FSSOFSSO Identity based PoliciesIdentity based Policies

Page 32: Take Control of End User Security

32 CONFIDENTIAL – INTERNAL ONLY

Single Sign-On and Role Based Policies Authorized network access based on user credentials secure network

right at entry point Reuse captured information for security policies unifies security

configurations and offers better user experience. Reduce administrative tasks & configuration errors

Marketing, Management

Operation, Staff

✔ CMS ✔ INTERNET

✗CMS ✔ INTERNET

M.Jones

S.Lim

SSID: STAFF

SSID: MGMT

Identity-Centric Enforcement

Page 33: Take Control of End User Security

33 CONFIDENTIAL – INTERNAL ONLY

Temporary Network Access Guest Administration Portal

Credential Generation & Delivery

Time Quota

Ad hoc access without compromising security

Integrated Guest Access

Identify and track guest activities Time limits prevent unnecessary exposure to exploits

Page 34: Take Control of End User Security

34 CONFIDENTIAL – INTERNAL ONLY

Network & Threat StatusKnowledge is Power !

Drill-Down Statistics

Filter & Sorting

Object Details

Contextual Information

Visibility & Reporting

Page 35: Take Control of End User Security

35 CONFIDENTIAL – INTERNAL ONLY

Deep InsightsNew PDF Formatting

Drill-downs

Per User Summary

FortiManager

FortiCloud

Comprehensive reports

Visibility & Reporting

Page 36: Take Control of End User Security

36 CONFIDENTIAL – INTERNAL ONLY

Visibility Widgets & Reports Gain real time knowledge of current network & threat for appropriate

actions Identify network usage trends to optimize infrastructure and

resources

URLURL{Visibility & Reporting

Page 37: Take Control of End User Security

37 CONFIDENTIAL – INTERNAL ONLY

Q & A

Page 38: Take Control of End User Security

38 CONFIDENTIAL – INTERNAL ONLY

603.766.5924www.daystarinc.com

DAYSTARYOUR TECHNOLOGY PARTNER

121 Shattuck Way, Suite 10 [email protected], NH 03801

www.daystarinc.comP. 603.766.5924Q. 603.766.5925