Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security...

26
Fortinet Confidential

Transcript of Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security...

Page 1: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

Page 2: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential2

Fortinet Overview

Market-Leading Provider of End-to-End IT Security Solutions

Company Stats

• Founded in 2000

• Silicon Valley-based, strong global presence with 30+ offices worldwide

• $325M+ in revenues (2010)

• Seasoned and proven executive management team

• (NASDAQ: FTNT)

• 1,350+ employees / 600+ engineers

• 500,000+ FortiGate devices shipped worldwide

Innovative, Best-in-Class

Technologies and Products

• Six ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam)

• Strong IP portfolio – 20+ patents; 80+ pending

• Government Certifications (FIPS-2, Common Criteria EAL4+, NIST)

• Consistent Antivirus Validation – (Virus Bulletin 100 approved; 2005, 2006, 2007, 2008, 2009, 2010)

Page 3: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

Security TODAY: Blended Threats Leverage Multiple Threat Vectors

Malicious threats lead to− Data loss− Identify theft− Database espionage− Network downtime− Bad publicity− Regulatory fines

The motive has changed − From notoriety to criminal intent − More malicious in nature− Global in reach− Predatory behaviors

Net

wo

rkT

hre

at V

ecto

rsA

pp

lica

tio

nT

hre

at V

ecto

rs

Page 4: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

You Have to Do More with Less

• Increase access to backend data and systems• Decrease risk of unauthorized access• Increase effectiveness of existing resources and investments• Reduce complexity of security infrastructure• Lower operating and capital costs

Page 5: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

Fortinet – Consolidated Security

• Deliver comprehensive solutions for the largest global networks and organizations» Improve performance» Increase protection»Reduce complexity

• Continually raising the performance bar with purpose-built hardware and software»Custom processors and latest generation general

purpose processors

• Convert stand-alone products into features»Simplify the network and improve visibility»Reduce Total Cost of ownership

5

Page 6: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

We Pioneered a New Approach

The Fortinet SolutionTraditional Network Security Solutions

• Real-time, integrated security intelligence• ASIC-accelerated performance• Lower total cost of ownership• Easy to deploy / manage / use

• Stand-alone, non-integrated security • Mix of off the shelf systems and applications• Higher total cost of ownership• Difficult to deploy / manage / use

Page 7: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

UTM Surpassing Traditional Network Security

2008 2009 2010 2011 2012 2013

Firewall & VPN

UTM

(-0.5%) CAGR

$2.2

$2.1

$ in billions

13.8% CAGR

$1.7

$3.2

Source: IDC “Worldwide Network Security 2008-2012 Forecast and 2007 Vendor Shares: Transitions – Appliances Are More Than Meets the Eye”

Page 8: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

Market Leadership Across the Board

Worldwide UTM Market ShareQ2 2010 (1)

UTM Market Competitive Landscape, 2009(3)

Low Market Penetration High

Niche ParticipantSpecialist

Contender

Challenger

Market Leader

Low

High

Abilityto

Deliver

8

(1) IDC Worldwide Security Appliances Tracker, September 2010 (market share based on factory revenue)(2) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, October 2010(3) Frost & Sullivan, “World Unified Threat Management, Products Market 2009”, 2010

Notes

Rank Company Market Share (%) (2)

1 16.4

2 Cisco 9.8

3 Juniper 9.0

4 SonicWALL 8.1

5 Check Point 7.2

6 McAfee 5.5

7 WatchGuard 4.9

8 Crossbeam 2.6

9 Other 41.4

Total 100.0

Magic Quadrant for Unified Threat Management (2)

Page 9: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

Fortinet Solutions

9

Unified Threat

Management

FortiGateNetwork SecurityPlatform

FortiAPNetwork SecurityPlatform

Centralized Manageme

ntFortiManagerCentralized DeviceManagement

FortiAnalyzerCentralized Loggingand Reporting

Application Security

FortiMailMessaging Security

FortiWebWeb & XML Application Firewall

Host Security

FortiClientEndpoint Security

FortiScanAsset Vulnerability Management

Application Delivery

FortiGuardReal time Security Services

FortiToken2-factor Authentication

FortiBalancerApplication Delivery Controller

Page 10: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

WAN Optimization

Fortinet's Approach to Consolidated Security

10

Complete Content Protection

Antivirus/ Antispyware

Data Loss Prevention

Antispam

Endpoint Protection/

NAC

Firewall

VPN

IPS

Web Filtering

App Control

Vulnerability Mgmt

Wireless LAN

IPv6, Dynamic Routing

SSL Inspection

VoIP

Strong Authenti-

cation

VLANs, VDOMs, Virtual

Appliances

Page 11: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

Application Evolution

• “Application” has evolved to include web browser, web server, application server, operating system• Delivery can be on-premise or hosted in the cloud, or some combination • Regardless of delivery model, most data now browser-based

− Well known port numbers

▪ Port 80 (HTTP) / Port 443 (HTTPS)

11

Page 12: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

Beyond Application Identification

• Today’s Network Security Requires Application Detection, Monitoring, and Control − Allowing access to Web 2.0 applications has made

enforcing data security policies far more complex▪ User-created content embeds threats in content,

pages, links, comments to blogs…− Protection against effects of social media applications

▪ Data loss▪ Threat propagation▪ Bandwidth consumption▪ Inappropriate use

− Endpoint to the Core− “Single pane of glass” management for visibility & control

12

Page 13: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

Identification

• Over 1,500 applications− More added every week− Category

▪ IM, P2P, Remote Access, Video, etc.

− Ranked on popularity & risk− Impendent of port, protocol, IP

address− Decrypt encrypted traffic

▪ Including HTTPS, POP3S, SMTPS and IMAPS protocols

13

Page 14: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

Control

• Granular control of behavior − Apps & features within apps

▪ Categories of apps▪ Individual apps▪ Actions within apps

− Users▪ Domain, groups, individual users

− Traffic▪ Prioritize▪ Limit access by groups or users

» Time of day» Day of week

14

Page 15: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

FortiGate

• Integrated security appliance− Network threat detection− Application-aware screening

• Accelerated performance− Custom ASIC

• Platforms for every market segment− Non-user licensing − Performance-based models− Firewall Virtualization

ASIC

FIREWALL

APPLICATIONCONTROL

WIRELESS DATABASE

ANTISPAM VPN

FORTIOS FORTIASIC

WEB FILTERING

DLP ROUTING

WANOPTIMIZATION

ANTIVIRUS

IPS

Page 16: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

Integrated Threat Protection in Action

“Innocent” Video Link:Redirects to malicious Website

Integrated Web FilteringBlocks access to malicious Website

Network AntivirusBlocks download of virus

Intrusion ProtectionBlocks the spread of the worm

Solution: FIRE

WA

LL

Error message:“Drops” copy of itself on system and attempts to propagate

WE

B FILTE

RIN

G

AN

TIVIR

US

“Out of date” Flash player error:“Download” malware file

INTR

US

ION

PR

OTE

CTIO

N

PORT 80

Problem:

Page 17: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

FortiASIC

Disruptive Technology Platform

ASICs accelerate FortiOS security and network functions

Enables faster performance against competitors

Multiple ASICs targeting key functions

Mature design across FortiASICs

Custom built operating system

Architected for security and networking demands

Leverages custom hardware platform

Mature OS - At version 4.0 MR2 today

FortiOS

Page 18: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

FortiASIC Specialized Processors

• FortiASIC Content Processor (CP) Series− Pattern-Match Acceleration− Encryption / Decryption (e.g. IPSec, SSL-TLS)

• FortiASIC Network Processor (NP) Series− Firewall Acceleration− IPSec VPN Acceleration

• FortiASIC Security Processor (SP) Series− Additional IPS Acceleration− Flow based AV Acceleration− Unicast , Multicast Acceleration

18

Page 19: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

FortiOS

• Fully Integrated Technologies− Manage all policy enforcement from

a single console

• Single Inspection of Packets− Delivers greater efficiency and

intelligence

• Deployment Ease & Flexibility− Single console for all FortiGate

platforms, all technologies− Ability to deploy technologies where

needed− IPv6 Ready

19

Page 20: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

20

100+ threat research professionals

Eight global locations

Automated updates to Fortinet customers

Global software updates

Large knowledgebase of security

8 million antivirus signatures, 90 million URLs for Web filtering

Robust 24 x 7 x 365 Real-Time Global Intelligence

FortiGuard Subscription Services

Real-Time Security Protection Global Distributed Network

Page 21: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

FortiGate UTM Lineup

• ASIC-based multi-threat security platform• Common OS across all platforms• Single management interface• FortiGuard Services

− Antivirus, IPS, Antispam, Web content filtering,Application control

Enterprise Service Provider & Large EnterpriseSMB & Remote Office

Page 22: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

Fortinet Virtual Appliances

FortiGate Virtual Appliances Combine with traditional FortiGate

appliances for maximum network visibility and security controls.

Utilize Virtual Domain (VDOM) and Virtual LAN (VLAN) technologies to enforce security between zones

Released w/ FortiOS 4.2 (MR2)

FG

Availability / Licensing Available Now Licensed by # of vCPU: 2 / 4 / 8 30-Day evaluation license

available

Hypervisor Support VMware ESXi/ESX 3.5/4.0/4.1 Delivered in OVF format

Page 23: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

Virtualized Data Center Security

Primary security goal: separation of logical zones Virtual perimeters Firewalling between zones

Public ZoneDMZ/Private Zone

ServerServer

Servers / DMZ

Desktops / Private

Virtualized Data Center

Logical Security Zones are used to isolate hosts with differing security requirements Servers Desktops

Page 24: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

A Reliable Partner

• Proven Industry Leadership− Since 2000, Fortinet has received more than 100 product & company awards.

▪ IDC: Overall leader in UTM factory revenue for all of 2009▪ Gartner: Leader in Multi-Function Firewall Magic Quadrant▪ Frost & Sullivan: 2010 "Fortinet is the established and undisputed leader" of worldwide UTM market▪ SC Magazine: 2009 Readers' Trust Award for "Best Integrated Security Solution"

• Certified security− Five ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam)− Government Certifications (FIPS-2, Common Criteria EAL4+, JITC IPv6, SCAP) − ISO 9001 certification

Page 25: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential25

High Performance Real Time

Summary

Comprehensive

FortiOS Operating System

Consolidated Security

FortiASIC Network Processor

FortiASIC Content Processor

FortiGuard Threat Research

FortiCare Customer Support

FIREWALL

APPLICATIONCONTROLANTISPAM

VPN

WEB FILTERINGDLP

WANOPTIMIZATION

ANTIVIRUS/ANTISPYWARE

IPS

Page 26: Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,

Fortinet Confidential

Thank You