Mohou pokročilé hrozbyovlivnit digitální transformacie-governmentu?Horymír Šíma, Fortinet
© Fortinet Inc. All Rights Reserved.
Network Security Leader
Fortinet is among the top 5 public cybersecurity companies in the world.
Its broad portfolio of solutions spans
Network, Infrastructure, Cloud, and IoT
Security.
$12B Mkt Cap ~$1.8B - 2018(revenue)
* As of Sept 30th 2018
385,000+ Customers
4.4M+ Appliances Shipments Worldwide
(+30% units WW)
© Fortinet Inc. All Rights Reserved.
596
155
167
165
75
74
51
46
0 100 200 300 400 500 600
Fortinet
Palo Alto Networks
FireEye
SonicWall
Sophos
Check Point
WatchGuard
Barracuda
#1 Security InnovatorCompetitor data based on patents issued as listed by the U.S. Patent and Trademark Office
We Lead The Industry in Innovation
566 U.S. Patents
30 International Patents
596 Global Patents
Jaká kybernetická rizikadigitální transformace dneshrozí?Aktuální hrozby pro e-government.
© Fortinet Inc. All Rights Reserved.
Changes in Cyber Since 2007
Cybercrime Marketplace Ecosystem
Victims
Criminal Organizations
Affiliates
Exploits
CRIMEWAREPRODUCERSPackers
Special Platforms
Mobile
Senior Developers
Source Code Junior Developers
Affiliate ProgramsFakeAV
Ransomware
Botnets
Partnerships
Copy & paste
Sales, Licensing, Maintenance
COMPOUNDED
CYBERCRIME
Quality AssuranceCrypters / Packers
Scanners
HostingInfections / Drop Zones
Management
Botnet RentalsInstalls / Spam /
SEO / DDoS
Money MulesAccounts Receivable
Consulting
CRIME SERVICESENABLERS
Bank Accounts
Credentials & Data
Digital Real Estate
© Fortinet Inc. All Rights Reserved.
Existing approaches are not working…
• Missing basics due to complexity
• Cyber is complex is growing
• IT teams are overwhelmed
• Perimeters are disappearing
• Determined threat actors can break anything
• IT teams are missing security basics
• Less awareness and control
• Make complexity work for us
Kde bezpečnostní technologieobvykle neuspějí?Představení funkčního systému pro optimálníochranu proti kybernetickým hrozbám (zejménapro ty, kteří ho ještě nemají nebo nevyužívajínaplno).
© Fortinet Inc. All Rights Reserved.
Fortinet Security Fabric
Open Ecosystem
NetworkSecurity
Network Security
Device, Access, and Application Security
Multi-Cloud Security
NetworkOperations
Security Operations
Q1FY19 v1.4.4
Multi-CloudSecurity
Endpoint/DeviceProtection
SecureAccess
ApplicationSecurity
FabricAPIs
FabricConnectors
SecurityOperations
INTEGRATEDAI-driven breach prevention across devices, networks, and applications
AUTOMATEDOperations, orchestration, and response
BROADVisibility of the entire digital attack surface
© Fortinet Inc. All Rights Reserved.
The Broadest Security Portfolio in the Industry
Endpoint Security
FortiClient
Email Security
FortiMail
Web Application Security
FortiWeb
Management& Analytics
FortiSIEM
FortiAnalyzer
FortiManager
Advanced Threat Protection
FortiSandbox
SecureUnified Access
FortiSwitch
FortiAP
Multi-Cloud Security
FortiGateVirtual Firewall
FortiGateCloud Firewall
FortiCASB
FortiGateEnterprise Firewall
IPS
SWG
SD-WAN
VPN
NetworkSecurity
OpenEcosystem
Partner API
DevOps
Connectors FortiNAC
© Fortinet Inc. All Rights Reserved.
Fabric-Ready Ecosystem Partners Expand the Reach of the Fabric
IOT/OT/NAC/IDENTITY
CLOUD/NFV/SDN
VULNERABILITY/SIEM
Fabric Connectors
Fabric APIs
TECHNOLOGY
ENDPOINTMANAGEMENT
Co můžeme udělat více nežaplikovat sandboxing?Mohou uživatelé využívat Internet opravdubezpečně?
© Fortinet Inc. All Rights Reserved.
Forti Deceptor in DMZ mode
© Fortinet Inc. All Rights Reserved.
Forti Deceptor
© Fortinet Inc. All Rights Reserved.
Forti Deceptor
© Fortinet Inc. All Rights Reserved.
Forti ISOLATOR
© Fortinet Inc. All Rights Reserved.
Forti ISOLATOR
© Fortinet Inc. All Rights Reserved.
Forti ISOLATOR
© Fortinet Inc. All Rights Reserved.
Forti ISOLATOR
19
Top Related