The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4...

29
1 Fortinet Confidential November 20, 2012 BYOD The power to verify visualize simplify consolidate manage protect secure accelerate enable enforce

Transcript of The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4...

Page 1: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

1 Fortinet Confidential

November 20, 2012

BYODThe power to

verifyvisualizesimplifyconsolidatemanage

protectsecureaccelerateenableenforce

Page 2: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

2 Fortinet Confidential

• Defining BYOD

• The Role of Network Security

• Fortinet Answers Critical BYOD Questions

Focus Points

Page 3: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

3 Fortinet Confidential

November 20, 2012

Defining BYOD

Page 4: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

4 Fortinet Confidential

Today’s BYOD Issues are Just the Tip of the iceberg…

• Devices continue to proliferate

• Web connectivity spreading to

unlikely devices

» Gaming consoles

» Media devices (e.g. TVs)

• Many web-enabled devices do

not allow installation of software

/ agents

• Security features vary from

device to device, even for same

vendor / provider

Page 5: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

5 Fortinet Confidential

History Repeats Itself:

Network Security Remains Critical

• End-users have been

introducing technology to

their organizations for

decades

• IT organizations adjusted and

accommodated each

technology

• Network security technology

has always been critical to

successful deployment

1980’s

Personal Computers

1990’s

Web Access

2000’s

Web.20

2010’sBYOD

Page 6: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

6 Fortinet Confidential

November 20, 2012

The Role Of Network Security

Page 7: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

7 Fortinet Confidential

A Range Of BYOD Use Cases:

It’s All About The Traffic

No Client VPN VPN & 2

Factor

Virtual Desktop(incl VPN

& 2 Factor)

Employee Devices With Mobile Device Management

Corporate Owned Devices

Uncontrolled

Devices

MDM

Client• Fortinet Mobile Clients

• FortiToken

MDM

Client

• Most organizations require a spectrum of solutions

• No perfect solution for all environments

• Trade-offs for each solution

Network Security

Page 8: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

8 Fortinet Confidential

The Network Is The Common Denominator

• The network is THE core element in any approach you take

• The network handles all the traffic, secures it, logs it and reports upon it

• Regardless of what’s on the device

Network(LAN & WAN)

Virtual Desktop

Mobile Device

Management

Unmanaged Endpoint

Page 9: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

9 Fortinet Confidential

MDM Does Not Equal Network Security:

No Network Security Vendors Provide MDM

MDM does not provide network-

based:

• Firewalling

• Intrusion Prevention

• Antimalware

• Identity based, secure access

Gartner MDM Magic Quadrant

• Application control

• Data loss prevention

• Content control

• Traffic Shaping

MDM consists of: *

• Software Mgt. (config, backup, updates…)

• Network Service Mgt. (location, usage…)

• Hardware Mgt. (provisioning, activation…)

• Security Mgt. (remote wipe, secure config…)

* Gartner Group Magic Quadrant

For Mobile Device Management Software

May, 2012

Page 10: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

10 Fortinet Confidential

November 20, 2012

Fortinet Answers The Critical Questions

Page 11: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

11 Fortinet Confidential

Mobile Devices:

The Questions To Ask

•Who are you?

•Where do you want to go?

•What data do you need?

Page 12: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

12 Fortinet Confidential

Who Are You?

Fortinet provides the answer:

»Two Factor Authentication (hard and soft tokens)

» Connection to LDAP and Radius servers

» Guest provisioning

» Supports range of end user platforms (iPhone, iPad, Android)

Page 13: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

13 Fortinet Confidential

Fortinet Mobile Clients

iOS Android

• Protected connections via SSL VPN Encryption

Page 14: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

14 Fortinet Confidential

Fortinet 2-Factor Authentication

FortiToken

iOS Android

• Ensured Identity via FortiToken 2 Factor Authentication

(soft token and hard token options)

Page 15: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

15 Fortinet Confidential

Where Do You Want To Go?

1. Are you on the LAN?

2. Are you on a WAN?

3. Where are you allowed to go?

Page 16: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

16 Fortinet Confidential

The Fortinet Answer – LAN

Wireless devices join

WLAN as registered

users or guests.

All data flowing to and

from the network is

inspected, logged, and

managed through the

FortiGate.

FortiGate controls

wireless access

and enforces

security policies.

Page 17: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

17 Fortinet Confidential

The Fortinet Answer – WAN

All data flowing to and from

the network is inspected,

logged, and managed

through the FortiGate.

3G

4G

LTE

Cable DSL

WiMax

Connect via Fortinet Mobile

Client and FortiToken

(VPN & 2-Factor

Authentication)

Retail

StoreHome

Coffee Shop

School

Page 18: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

18 Fortinet Confidential

Critical Technology:

Wireless Controller - In Every FortiGate

Page 19: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

19 Fortinet Confidential

What Data Do You Need?

Answer These Questions:

1. Is the data sensitive?

2. Are specific applications involved?

3. Is the requested data safe?

4. Is the requested data relevant

to a user’s job?

5. Is malware being transmitted?

Page 20: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

20 Fortinet Confidential

The Fortinet Answer

Fortinet Solution Solves BYOD challenge

Data Loss Prevention

Mobile users can be blocked from

sending sensitive data outside the

network

Application Control

Mobile users can be stopped from

accessing non-corporate approved

applications

Antimalware

Infected devices will not be allowed to

propagate infections

Spam Filtering

Email is always protected regardless of

receiving device

Web Filtering

Mobile users can be protected against

malicious sites

Traffic Shaping

Mobile applications can be limited to

ensure that bandwidth is preserved

Page 21: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

21 Fortinet Confidential

BYOD Enablement through Network Security

Emily, a customer, needs guest access to

Skype on her iPad while visiting your

headquarters

Bill’s device is infected with malware and he

brings it on the corporate network

Jill is at Starbucks and needs to communicate

and be protected as if she was at HQ.

WiFi Guest Access

Bandwidth

Management

2-Factor Authentication

VPN Tunneling

Antivirus

Page 22: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

22 Fortinet Confidential

BYODEnablement through Network Security (Cont.)

Sue is in corporate marketing and should

have access to post non-sensitive

information to Facebook, but she should not

be playing Farmville

Joe started streaming movies while at work

through his tablet – this is against corporate

policy

Application Control

Data Leakage

Prevention

Application Control

Ed unintentionally shared a sensitive

company presentation via his personal

Gmail account on his Android Phone.

Data Leakage

Prevention

Page 23: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

23 Fortinet Confidential

Protecting All BYOD Attack Vectors

Email Sent – Contains Sensitive Data

Mail message detected as Data Loss (DLP)

User accesses phishing site, enters credentials

Access to phishing website is blocked

Phishing site sends Bot infection to user disguised as

‘Security Update’ application

Content scanning prevents download

End user executes malware, is infected and now all

their data is compromised

Malicious activity is detected and blocked

Page 24: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

24 Fortinet Confidential

Fortinet:

The Right Approach

TRADITIONAL SOLUTIONS

Cumbersome and costly

THE FORTINET SOLUTION

Simple and cost-effective

Page 25: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

25 Fortinet Confidential

Broad Product Portfolio

FortiGate

20-1000 Series

LARGE ENTERPRISEFortiGate

1000-3000 Series

SERVICE PROVIDER

SMALL/MEDIUM

ENTERPRISE

FortiGate

3000-5000 Series

FortiManager

FortiAnalyzerFortiMail FortiWeb

FortiDB

FortiScan

FortiSwitch

VM

FortiAuthenticator

FortiAP

FortiDDoS

Page 26: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

26 Fortinet Confidential

Fortinet:

A Position Of Strength$434

$39

$80

$123

$155

$212

$252

$325

FORTINET REVENUE ($MM)

$13

03 04 05 06 07 08 09 10 11

Market Leader• UTM - Fast-growth security segment

Advanced technology and products• 101+ patents; 113+ pending

Strong global footprint• 1,700+ employees; 40 offices worldwide

Blue chip customer base• Over 125,000 customers

(incl. majority of Global 100)

Exceptional financials• FY11 revenues: $434M (34% YoY growth)

ICSA Certified

Page 27: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

27 Fortinet Confidential

The Result:

Market Leadership

(1) IDC Worldwide Security Appliances Tracker, June 2012 market share based on factory revenue

(2) IDC Worldwide Network Security 2012-2016 Forecast and 2011 Vendor Share, July 2012(3) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012

Rank CompanyMarket

Share (%)

1 18.9

2 Check Point 17.8

3 SonicWALL 9.3

4 Juniper 5.8

5 Cisco 5.4

6 WatchGuard 5.1

7 McAfee 4.2

8 Astaro 2.2

9 Others 31.3

Total 100%

Market Size $2.2B

IDC Worldwide Network Security Revenue 2011 (2)

Rank CompanyMarket

Share (%)

1 Cisco 18.2

2 Check Point 14.5

3 Juniper 8.9

4 5.1

5 McAfee 4.5

6 Microsoft 3.5

7 IBM 3.4

8 HP 2.7

9 Others 31.2

Total 100%

Market Size $7.4B

IDC Worldwide UTM Market Share Q1 2012 (1)

Magic Quadrant for Unified Threat Management (3)

Page 28: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

28 Fortinet Confidential

Solving the BYOD Challenge

Good News

• Network security technologies allow you the flexibility you need to

deploy the mobile technologies you want

Even Better News

• Fortinet provides a complete range of hardware and software

solutions to solve your BYOD challenges

Page 29: The power to BYOD - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/Webinar...4 Juniper 5.8 5 Cisco 5.4 6WatchGuard 5.1 7McAfee 4.2 8 Astaro 2.2 9 Others 31.3 Total

29 Fortinet Confidential

Thank You

www.fortinet.com