1 Fortinet Confidential
November 20, 2012
BYODThe power to
verifyvisualizesimplifyconsolidatemanage
protectsecureaccelerateenableenforce
2 Fortinet Confidential
• Defining BYOD
• The Role of Network Security
• Fortinet Answers Critical BYOD Questions
Focus Points
3 Fortinet Confidential
November 20, 2012
Defining BYOD
4 Fortinet Confidential
Today’s BYOD Issues are Just the Tip of the iceberg…
• Devices continue to proliferate
• Web connectivity spreading to
unlikely devices
» Gaming consoles
» Media devices (e.g. TVs)
• Many web-enabled devices do
not allow installation of software
/ agents
• Security features vary from
device to device, even for same
vendor / provider
5 Fortinet Confidential
History Repeats Itself:
Network Security Remains Critical
• End-users have been
introducing technology to
their organizations for
decades
• IT organizations adjusted and
accommodated each
technology
• Network security technology
has always been critical to
successful deployment
1980’s
Personal Computers
1990’s
Web Access
2000’s
Web.20
2010’sBYOD
6 Fortinet Confidential
November 20, 2012
The Role Of Network Security
7 Fortinet Confidential
A Range Of BYOD Use Cases:
It’s All About The Traffic
No Client VPN VPN & 2
Factor
Virtual Desktop(incl VPN
& 2 Factor)
Employee Devices With Mobile Device Management
Corporate Owned Devices
Uncontrolled
Devices
MDM
Client• Fortinet Mobile Clients
• FortiToken
MDM
Client
• Most organizations require a spectrum of solutions
• No perfect solution for all environments
• Trade-offs for each solution
Network Security
8 Fortinet Confidential
The Network Is The Common Denominator
• The network is THE core element in any approach you take
• The network handles all the traffic, secures it, logs it and reports upon it
• Regardless of what’s on the device
Network(LAN & WAN)
Virtual Desktop
Mobile Device
Management
Unmanaged Endpoint
9 Fortinet Confidential
MDM Does Not Equal Network Security:
No Network Security Vendors Provide MDM
MDM does not provide network-
based:
• Firewalling
• Intrusion Prevention
• Antimalware
• Identity based, secure access
Gartner MDM Magic Quadrant
• Application control
• Data loss prevention
• Content control
• Traffic Shaping
MDM consists of: *
• Software Mgt. (config, backup, updates…)
• Network Service Mgt. (location, usage…)
• Hardware Mgt. (provisioning, activation…)
• Security Mgt. (remote wipe, secure config…)
* Gartner Group Magic Quadrant
For Mobile Device Management Software
May, 2012
10 Fortinet Confidential
November 20, 2012
Fortinet Answers The Critical Questions
11 Fortinet Confidential
Mobile Devices:
The Questions To Ask
•Who are you?
•Where do you want to go?
•What data do you need?
12 Fortinet Confidential
Who Are You?
Fortinet provides the answer:
»Two Factor Authentication (hard and soft tokens)
» Connection to LDAP and Radius servers
» Guest provisioning
» Supports range of end user platforms (iPhone, iPad, Android)
13 Fortinet Confidential
Fortinet Mobile Clients
iOS Android
• Protected connections via SSL VPN Encryption
14 Fortinet Confidential
Fortinet 2-Factor Authentication
FortiToken
iOS Android
• Ensured Identity via FortiToken 2 Factor Authentication
(soft token and hard token options)
15 Fortinet Confidential
Where Do You Want To Go?
1. Are you on the LAN?
2. Are you on a WAN?
3. Where are you allowed to go?
16 Fortinet Confidential
The Fortinet Answer – LAN
Wireless devices join
WLAN as registered
users or guests.
All data flowing to and
from the network is
inspected, logged, and
managed through the
FortiGate.
FortiGate controls
wireless access
and enforces
security policies.
17 Fortinet Confidential
The Fortinet Answer – WAN
All data flowing to and from
the network is inspected,
logged, and managed
through the FortiGate.
3G
4G
LTE
Cable DSL
WiMax
Connect via Fortinet Mobile
Client and FortiToken
(VPN & 2-Factor
Authentication)
Retail
StoreHome
Coffee Shop
School
18 Fortinet Confidential
Critical Technology:
Wireless Controller - In Every FortiGate
19 Fortinet Confidential
What Data Do You Need?
Answer These Questions:
1. Is the data sensitive?
2. Are specific applications involved?
3. Is the requested data safe?
4. Is the requested data relevant
to a user’s job?
5. Is malware being transmitted?
20 Fortinet Confidential
The Fortinet Answer
Fortinet Solution Solves BYOD challenge
Data Loss Prevention
Mobile users can be blocked from
sending sensitive data outside the
network
Application Control
Mobile users can be stopped from
accessing non-corporate approved
applications
Antimalware
Infected devices will not be allowed to
propagate infections
Spam Filtering
Email is always protected regardless of
receiving device
Web Filtering
Mobile users can be protected against
malicious sites
Traffic Shaping
Mobile applications can be limited to
ensure that bandwidth is preserved
21 Fortinet Confidential
BYOD Enablement through Network Security
Emily, a customer, needs guest access to
Skype on her iPad while visiting your
headquarters
Bill’s device is infected with malware and he
brings it on the corporate network
Jill is at Starbucks and needs to communicate
and be protected as if she was at HQ.
WiFi Guest Access
Bandwidth
Management
2-Factor Authentication
VPN Tunneling
Antivirus
22 Fortinet Confidential
BYODEnablement through Network Security (Cont.)
Sue is in corporate marketing and should
have access to post non-sensitive
information to Facebook, but she should not
be playing Farmville
Joe started streaming movies while at work
through his tablet – this is against corporate
policy
Application Control
Data Leakage
Prevention
Application Control
Ed unintentionally shared a sensitive
company presentation via his personal
Gmail account on his Android Phone.
Data Leakage
Prevention
23 Fortinet Confidential
Protecting All BYOD Attack Vectors
Email Sent – Contains Sensitive Data
Mail message detected as Data Loss (DLP)
User accesses phishing site, enters credentials
Access to phishing website is blocked
Phishing site sends Bot infection to user disguised as
‘Security Update’ application
Content scanning prevents download
End user executes malware, is infected and now all
their data is compromised
Malicious activity is detected and blocked
24 Fortinet Confidential
Fortinet:
The Right Approach
TRADITIONAL SOLUTIONS
Cumbersome and costly
THE FORTINET SOLUTION
Simple and cost-effective
25 Fortinet Confidential
Broad Product Portfolio
FortiGate
20-1000 Series
LARGE ENTERPRISEFortiGate
1000-3000 Series
SERVICE PROVIDER
SMALL/MEDIUM
ENTERPRISE
FortiGate
3000-5000 Series
FortiManager
FortiAnalyzerFortiMail FortiWeb
FortiDB
FortiScan
FortiSwitch
VM
FortiAuthenticator
FortiAP
FortiDDoS
26 Fortinet Confidential
Fortinet:
A Position Of Strength$434
$39
$80
$123
$155
$212
$252
$325
FORTINET REVENUE ($MM)
$13
03 04 05 06 07 08 09 10 11
Market Leader• UTM - Fast-growth security segment
Advanced technology and products• 101+ patents; 113+ pending
Strong global footprint• 1,700+ employees; 40 offices worldwide
Blue chip customer base• Over 125,000 customers
(incl. majority of Global 100)
Exceptional financials• FY11 revenues: $434M (34% YoY growth)
ICSA Certified
27 Fortinet Confidential
The Result:
Market Leadership
(1) IDC Worldwide Security Appliances Tracker, June 2012 market share based on factory revenue
(2) IDC Worldwide Network Security 2012-2016 Forecast and 2011 Vendor Share, July 2012(3) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012
Rank CompanyMarket
Share (%)
1 18.9
2 Check Point 17.8
3 SonicWALL 9.3
4 Juniper 5.8
5 Cisco 5.4
6 WatchGuard 5.1
7 McAfee 4.2
8 Astaro 2.2
9 Others 31.3
Total 100%
Market Size $2.2B
IDC Worldwide Network Security Revenue 2011 (2)
Rank CompanyMarket
Share (%)
1 Cisco 18.2
2 Check Point 14.5
3 Juniper 8.9
4 5.1
5 McAfee 4.5
6 Microsoft 3.5
7 IBM 3.4
8 HP 2.7
9 Others 31.2
Total 100%
Market Size $7.4B
IDC Worldwide UTM Market Share Q1 2012 (1)
Magic Quadrant for Unified Threat Management (3)
28 Fortinet Confidential
Solving the BYOD Challenge
Good News
• Network security technologies allow you the flexibility you need to
deploy the mobile technologies you want
Even Better News
• Fortinet provides a complete range of hardware and software
solutions to solve your BYOD challenges
29 Fortinet Confidential
Thank You
www.fortinet.com
Top Related