High Performance NGFW Extended
|
|
- Horace Burns
- 8 years ago
- Views:
Transcription
1 High Performance NGFW Extended Enrique Millán Country Manager Colombia 1 Copyright 2013 Fortinet Inc. All rights reserved.
2 D I S C L A I M E R This document contains confidential material proprietary to Fortinet, Inc. This document and information and ideas herein may not be disclosed, copied, reproduced or distributed to anyone outside Fortinet, Inc. without prior written consent of Fortinet, Inc. This information is pre-release and forward looking and therefore is subject to change without notice. The purpose of this document is to provide a statement of the current direction of Fortinet s product strategy and product marketing efforts. Please note that this Product Roadmap is neither intended to bind Fortinet to any particular course of product marketing and development nor to constitute a part of the license agreement or any contractual agreement with Fortinet or its subsidiaries or affiliates. 2
3 Agenda Market High Performance Competence FortiGuard 3
4 Global Success with Diversified Products Billings by Region Revenue by Segment Nine of Top 10 Global 100 Nine of Top 10 Global 100 Aerospace & Defense Seven of Top 10 Global 100 Computer Services Seven of Top 10 Global 100 Major Banks 4
5 Global Customers Top 5 Global Carriers Top 10 Fortune 500 Top 10 Global 500 Banks 5
6 Network Security Market - $11B Opportunity IDC Market Forecasts (except Advanced Threat Protection, which is a Fortinet estimate) 2012 $11 Billion $1B WOC $1.2B SWG $1.9B IPS 2016 $13 Billion ATP $750M WOC $1B SWG $1B IPS $2.1B $2.7B UTM/NGFW UTM/NGFW $5.3B $725M VPN VPN $786M $2.6B FW FW $2.4B 6 Fortinet - Confidential
7 Analyst Perspectives No Consensus around Security Appliances Naming or Functionality - Segmentation Gateways - UTM for SMBs - NGFW for Enterprises - Enterprise Firewalls (NGFW) - SMB Firewalls (UTM) - Branch Office Firewalls - Data Center Firewalls - Integrated Security Appliance - UTM 7
8 Gartner Definitions UTM Standard network stateful firewall functions Remote access and site-to-site virtual private network (VPN) support Web security gateway functionality (anti-malware, URL and content filtering) Network intrusion prevention focused on blocking attacks against unpatched Windows PCs and servers All UTM products contain other security capabilities, such as security, Web application firewalls or data loss prevention. NGFW The firewall market has evolved from simple stateful firewalls to NGFWs, incorporating full-stack inspection to support intrusion prevention, application-level inspection and granular policy control. 8
9 NGFW Market Drivers 1. More and more reports point to infected web sites or web applications as the primary source of infection (Application Control) 2. APTs require a new response mechanism ( Sandboxing Web Filtering) Source: Competitive Landscape: NGFW Appliance Market, WW, Gartner, 4/13.) 3. Advancements in processing power and inspection engines now offer converged security to larger enterprises (Consolidation). 9
10 NGFW Security Capabilities Features/Presets NGFW NGFW+ SWG NGFW+ ATP NGFW (Extend) Security FW/VPN IPS App Control Explicit Proxy Web Filter AntiVirus Sandbox Authentication* Filter DLP Endpoint Control Vulnerability Scan 10
11 Additional Consideration Initiate a multi-year plan to improve your organizations coverage of encrypted traffic and start with inbound and outbound web traffic decrypting SSL traffic on a firewall implies a loss of 74% for throughput. Source: Security Leaders Must Address Threats from Rising SSL Traffic, Gartner, 12/13.) 11
12 12 Focus Areas
13 SSL Performance Faster IPS Engine 3.0 Harnesses the power of the FortiASIC-CP8 10Gbps CP8 2Gbps FortiOS 5.0 FortiOS Figures shown apply to FortiGate-3600C
14 FortiSandbox Deep AV Scan & Real Time 96% RAP before Sandbox No need to Sandbox if caught Cloud Check Real time check on latest malware rating Full Sandbox Catch anything not caught by signature detection Downloaded & Dropped Files Recursively Scanned Forensics Behavior Report Register FortiGate linked to FortiSandbox Integrated ATP Evolution 14 Derek Manky
15 FortiSandbox Deep AV Scan & Real Time 96% RAP before Sandbox No need to Sandbox if caught Cloud Check Real time check on latest malware rating Full Sandbox Catch anything not caught by signature detection Downloaded & Dropped Files Recursively Scanned Forensics Behavior Report Register FortiGate linked to FortiSandbox Integrated ATP Evolution 15 Derek Manky
16 Single Policy Multiple Source decision process Merges IP, User and Device Policies Single Policy to Answer Where, Who and What BYOD Specific access based on device type (limit, block) Captive Portal Single Sign On AND AND Nework Access for Users, Devices and Apps 16 Robin Liao
17 Building a bigger FortiGate Extended Management For remote device management wired access point Manage Only Connection Scalability, increases the number of FortiSwitches that can be managed Encrypted FortiLink Allows for wide area network connectivity for remotely sited switches Internet FortiLink 17
18 NSS Labs Third Party Validation FortiGate 800C FortiGate 3240C FortiGate 3600C 100% Overall Protection» Stability & Reliability» Firewall Enforcement» Security Effectiveness Lowest TCO» $2 / Protected Mbps Lowest Latency» 5 μs latency 64 byte packets Top 2 vendors 96% Overall Protection Passed 100% Evasion Tests 6.25 Gbps IPS performance Ultra low latency 96% Overall Protection Passed 100% Evasion Tests Fortinet Earned Triple Recommend Rating in the Latest NSS Labs Tests 18 ry#path=%252fcompetitive%252f0- Fortinet%252fNSS%2520Labs%2520Reports
19 19 NSS Labs Third Party Validation
20 Fortinet Advantage: Performance Mbps Firewall VPN Gbps NGFW UTM Policy Security 20 Fortinet - Confidential
21 Fortinet Advantage: Simplified Point Products Consolidated Solution Internet Router Web Filtering Internet Firewall AV VPN Switch FortiGate IPS/App Advanced Threat Protection (Sandbox) Data Center Firewall Next Generation Firewall Unified Threat Management 21 Fortinet - Confidential
22 Firewall Solutions Edge or Core Firewall (NGFW) Enterprise Campus Carrier Firewall Platform Cloud/Carrier Data Center Firewall (Core, Perimeter, VM) Data Center INTERNET Branch Firewall (NGFW) Branch Office Client Firewall (VPN) Remote End Points Distributed Enterprise Unified Threat Management (UTM) 22 Fortinet - Confidential
23 Two Types of Competitors Software Based Network Based Limited multifunction Performance Not Scalable for SMB or Telco Missing New Functions (NGFW) Old, Slow & No Focus 23
24 Deployment Scenarios FortiGate 5000 MSSP/ Carrier Data Center PA 7050 FortiGate 1000/ 3000 Enterprise Core PA 4000/ 5000 FortiGate FortiGate Distributed Enterprise SMB PA 2000/ 3000 PA 200/
25 FortiGate 3700D vs. PA 5060 Fortinet has 8X FW Performance Price Firewall Packet Per Second (Mpps) Sessions 160Gbps $100K 100Mpps $168.5K $130K 30M 20Gbps 110Gbps 15Mpps 60Mpps 4Mbps 13M FortiGate 3700D PA G Ports 26
26 Products have Poor Performance FGT 5000 MSSP/ Carrier Check Point FGT 3000 FGT 1000 FGT FGT/FW Data Center Enterprise Core Distributed Enterprise SMB Check Point Check Point Check Point Check Point 4000 Check Point
27 FortiGate 3700D vs. Checkpoint Twice the Performance Half the Price Price Firewall Packet Per Second (Mpps) Sessions 160Gbps $168.5K $100K 100Mpps 110Gbps 60Mpps 30M 13M FortiGate 3700D Check Point w/ SAM 40G Ports 31
28 Products are Confusing & Lack Features FGT 5000 MSSP/ Carrier FGT 3000 Data Center FGT 1000 FGT Enterprise Core Cisco ASA 5585-X Sourcefire 3D8000 Distributed Enterprise FGT/FW Cisco ASA 5500-X SMB Cisco ASA
29 FortiGate 3700D vs Cisco ASA 5585-X SSP20 Fortinet has 16X Performance 160Gbps Price Firewall Sessions Connection Per Second IPS $100K $115K 44M 300K 23 Gbps 10Gbps 1M 50K 2 Gbps FortiGate 3700D Cisco ASA 5585-SSP20 (FW/IPS) 40G Ports 34
30 Products are Falling Way Behind FGT 5000 MSSP/ Carrier SRX 5000 FGT 3000 FGT 1000 FGT FGT/FW Data Center Enterprise Core Distributed Enterprise SMB SRX 3000 SRX 1000 SRX
31 FortiGate 3700D vs. Juniper SRX 3400 Twice the Performance Half the Price Price Firewall Packet Per Second (Mpps) Sessions 160Gbps $168.5K $100K 100Mpps 30M 110Gbps 60Mpps 13M FortiGate 3700D Juniper SRX G Ports 36
32 Packet Per Second Session Capacity Performance Rack Space & Performance vs. Competitors Fortinet FortiGate-5140B Juniper SRX Gbps firewall 15 Mpps 20M sessions Check Point Gbps firewall 50 Mpps 70M sessions Cisco Catalyst 6500 w/ ASA SM 80 Gbps firewall 20 Mpps 40M sessions Palo Alto PA Gbps firewall 105 Mpps 24M sessions 5 x $1.4M = $7M 3 x $1.267M = $3.8M 7 x $550K = $3.8M 5 x $1.253M = $6.3M VS. 7 x $1.4M = $9.8M 2 x $1.267M = $2.5M 3 x $550K = $1.6M 6 x $1.253 = $7.5M 560 Gbps firewall 630 Mpps 280M sessions Price $900K 42 x $1.4M = $58.8M 13 x $1.267M = $16.4M 32 x $550K = $17.6 M 12 x $1.253 = $15M 38 Source: Competitors US/North America Price Lists 2013
33 Feature & Certification Comparison No One Comes Close 39 Fortinet - Confidential
34 Threat Landscape Update & Strategy What is FortiGuard? FORTIGUARD ANTIVIRUS SERVICE FORTIGUARD APPLICATION CONTROL SERVICE FORTIGUARD ANTISPAM SECURITY SERVICE FORTIGUARD INTRUSION PREVENTION SERVICE FORTIGUARD WEB SECURITY SERVICE FORTIGUARD WEB FILTERING SERVICE FORTIGUARD DATABASE SECURITY SERVICE FORTIGUARD VULNERABILITY MANAGEMENT SERVICE FORTIGUARD IP REPUTATION SERVICE FortiGuard Services 40
35 Threat Intelligence and Response 3,100 Application control signatures 75 Terabytes Of Threat Samples 12,500 Vulnerability management signatures Spam s intercepted Attempts to access malicious websites blocked 250 Million Rated websites in 78 categories 1000 Web application firewall attack signatures Network intrusion attempts resisted Website categorization requests Botnet command and control attempts thwarted Malware programs neutralized 70 Intrusion prevention signatures 8,000 Hours of research in labs around the globe 235,000 New and updated antivirus definitions 66 Million New and updated antispam signatures 725,000 URL ratings for web filtering 41
36 End-to-End Security Solutions FortiBalancer FortiADC Coyote Point FortiVoice FortiManager FortiAnalyzer FortiBridge FortiCamera High End FortiGate-5000 & 3000 Mid Range FortiGate-1000 to 100 Desktop FortiGate/FortiWiFi-90 to 20 FortiDNS FortiScan FortiAP FortiSandbox FortiCloud FortiSwitch FortiDDoS FortiClient FortiAuthenticator FortiToken FortiMail FortiCache 42 FortiWeb FortiDB
37 43
38 44 Let s Grow your Businesses Together!
Internal Network Firewall (INFW) Protecting your network from the inside out
Internal Network Firewall (INFW) Protecting your network from the inside out Ted Maniatis, SE Central Canada Fortinet Technologies Data Connectors 2015 Copyright Fortinet Inc. All rights reserved. Agenda
More informationAdvanced Threat Protection Framework: What it is, why it s important and what to do with it
Advanced Threat Protection Framework: What it is, why it s important and what to do with it Doug Manger, Senior Security Engineer dmanger@fortinet.com 1 Copyright 2013 Fortinet Inc. All rights reserved.
More informationSecuring The Enterprise
Securing The Enterprise Fast. Secure. Global. January 2015 Copyright Fortinet Inc. All rights reserved. Cybercrime: Battling a Growth Economy Companies like J.P. Morgan Plan to Double Spending on Cybersecurity
More informationProč a jak splnit literu kybernetického zákona
Proč a jak splnit literu kybernetického zákona Ondrej Stahlavsky Regional Director, CEE 1 PROBLEM: GROWING ATTACK SURFACE 2 PROBLEM: GROWING ATTACK VECTORS An Extensive, Poisoned, Dark, Deep Web 3 PROBLEM:
More informationSecuring your IOT journey and beyond. Alvin Rodrigues Market Development Director South East Asia and Hong Kong. What is the internet of things?
Securing your IOT journey and beyond Alvin Rodrigues Market Development Director South East Asia and Hong Kong 1 What is the internet of things? 2 1 Imagine if Meeting @ 9am 5 mins later Meeting delayed
More informationCLOUD & Managed Security Services
CLOUD & Managed Security Services INFOCOM Security April 1 st 2015, Athens, Greece Angeliki Philippopoulou, MSEE, MBA Regional Sales Manager Copyright Fortinet Inc. All rights reserved. Agenda A few words
More informationOverview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.
Overview Fortinet pioneered an innovative, high performance network security solution that addresses the fundamental problems of an increasingly bandwidth-intensive network environment and a more sophisticated
More informationAdvantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses
Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses Patrick Bedwell VP, Product Marketing 1 Copyright 2014 Fortinet Inc. All rights reserved. Today s Agenda Security
More informationFortiGuard Security Services
FortiGuard Security Services FORTIGUARD SECURITY SERVICES FortiGuard Labs: Securing Your Organization Extensive knowledge of the threat landscape combined with the ability to respond quickly at multiple
More informationThe Evolution of the Enterprise And Enterprise Security
The Evolution of the Enterprise And Enterprise Security Introduction Today's enterprise is evolving rapidly, with new technologies such as consumer-grade mobile devices, internet-based applications and
More informationThe Fortinet Secure Health Architecture
The Fortinet Secure Health Architecture Providing Next Generation Secure Healthcare for The Healthcare Industry Authored by: Mark Hanson U.S. Director Fortinet, Inc. - Healthcare Introduction Healthcare
More informationThe Fortinet Secure Health Architecture
The Fortinet Secure Health Architecture Providing End-to-End Security for Modern Healthcare Organizations Introduction Healthcare providers are migrating from large, independent stand alone organizations
More informationBUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15
SMB Partner Sales Guide 1 Contents BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15 FORTIGUARD SECURITY SERVICES 18 PARTNER
More informationNext-Generation Firewalls: CEO, Miercom
Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology
More informationNetworking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
More informationWatchGuard: Your Security Partner of Choice. Carlos Vieira
WatchGuard: Your Security Partner of Choice Carlos Vieira About WatchGuard Over a decade of security expertise Security is our sole focus Firewall appliance pioneer Headquartered in Seattle, WA Offices
More informationMSSP Advanced Threat Protection Service
SOLUTION BRIEF SOLUTION BRIEF: MSSP ADVANCED THREAT PROTECTION SERVICE MSSP Advanced Threat Protection Service Fortinet Empowers MSSP Delivery of Complete ATP Managed Security Service The Need For ATP
More informationNext Generation Enterprise Network Security Platform
Next Generation Enterprise Network Security Platform November 2014 Lyndon Clough - Territory Sales Manager Derran Guinan Systems Engineer Agenda The Palo Alto Networks story Today s Threat Landscape The
More informationWHITE PAPER. Empowering the MSSP. Part 2: End To End Security Services Ecosystem
WHITE PAPER Empowering the MSSP Part 2: End To End Security Services Ecosystem Introduction Responding to Real World Customer Needs An increasing number of SMBs and enterprises plan to spend more of their
More informationFortinet Advanced Threat Protection- Part 3
Fortinet Advanced Threat Protection- Part 3 Upgrading Your Endpoint Security to Meet Advanced Threats Copyright Fortinet Inc. All rights reserved. Agenda Brief Recap on Breaches and the Need for Advanced
More informationData Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
More informationLast Order Date (LOD) End of Order (EOO) ASM-ET4 Module 06/19/2011 06/19/2015 06/19/2016 ASM-FB4 ASM-FB4-G
Fortinet Product Life Cycle Information Fortinet suggests that customers familiarize themselves with the Fortinet Product Life Cycle Policy. Particularly important to Fortinet customers are the three product
More informationFortigate Features & Demo
& Demo Prepared and Presented by: Georges Nassif Technical Manager Triple C Firewall Antivirus IPS Web Filtering AntiSpam Application Control DLP Client Reputation (cont d) Traffic Shaping IPSEC VPN SSL
More informationHow To Get A Fortinet Security System For Free
Fortinet FortiGate Appliances Earn Coveted Recommend Ratings from NSS Labs in Next Generation Firewall, IPS, and Network Firewall in NSS Labs Group Tests Fortinet s Enterprise-Class Triple Play Fortinet
More informationNext Generation Firewalls and Sandboxing
Next Generation Firewalls and Sandboxing Joe Hughes, Director www.servicetech.co.uk Summary What is a Next Generation Firewall (NGFW)? Threat evolution Features Deployment Best practices What is Sandboxing?
More informationNetwork Security Solution. Arktos Lam
Network Security Solution Arktos Lam Dell Software Group(DSG) 2 Confidential Trend Dell Software addresses key trends Cloud Big data Mobility Security Management Security 3 Software We deliver security
More informationSSL Performance Problems
ANALYST BRIEF SSL Performance Problems SIGNIFICANT SSL PERFORMANCE LOSS LEAVES MUCH ROOM FOR IMPROVEMENT Author John W. Pirc Overview In early 2013, NSS Labs released the results of its Next Generation
More information2012 North American Enterprise Firewalls Market Penetration Leadership Award
2012 2012 North American Enterprise Firewalls Market Penetration Leadership Award 2012 Frost & Sullivan 1 We Accelerate Growth Market Penetration Leadership Award Enterprise Firewalls North America, 2012
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationAchieve Deeper Network Security and Application Control
Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet
More informationAchieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
More informationWhat s Next for Network Security - Visibility is king! Gøran Tømte March 2013
What s Next for Network Security - Visibility is king! Gøran Tømte March 2013 Technology Sprawl and Creep Aren t the Answer More stuff doesn t solve the problem Firewall helpers have limited view of traffic
More informationWHITE PAPER SECURING DISTRIBUTED ENTERPRISE NETWORKS FOR PCI DSS 3.0 COMPLIANCE
WHITE PAPER SECURING DISTRIBUTED ENTERPRISE NETWORKS FOR PCI DSS 3.0 COMPLIANCE Accelerating Compliance and Simplifying Complex Networks Most attacks are focused at cardholder data: According to the 2014
More informationWHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)
WHITE PAPER Protecting Your Network From the Inside-Out Internal Segmentation Firewall (ISFW) Protecting Your Network From the Inside-Out Internal Segmentation Firewall (ISFW) Table of Contents Summary
More informationLab Validation Report
Lab Validation Report Fortinet Advanced Threat Protection Framework Integrated and Automated Detection, Mitigation, and Prevention of Advanced Attacks By Tony Palmer, Senior Lab Analyst and Jack Poller,
More informationWHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)
WHITE PAPER Protecting Your Network From the Inside-Out Internal Segmentation Firewall (ISFW) Protecting Your Network From the Inside-Out Internal Segmentation Firewall (ISFW) Table of Contents Summary
More informationFortiGate 200D Series
DATA SHEET FortiGate 200D Series Secure Protection for the Campus Perimeter and Branch Office FortiGate 200D Series FortiGate 200D, 200D-, 240D, 240D- and 280D- The FortiGate 200D series delivers high-speed
More informationMove over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
More informationSecurity Services. 30 years of experience in IT business
Security Services 30 years of experience in IT business Table of Contents 1 Security Audit services!...!3 1.1 Audit of processes!...!3 1.1.1 Information security audit...3 1.1.2 Internal audit support...3
More informationCisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
More informationVeranderende bedreigingen Security in het virtuele datacenter
Veranderende bedreigingen Security in het virtuele datacenter Dennis Hagens Copyright Fortinet Inc. All rights reserved. Veranderende bedreigingen Security in het virtuele datacenter Dennis Hagens Copyright
More informationHow To Ensure Security In Pc Ds 3.0
Securing Distributed Enterprise Networks for PCI DSS 3.0 Compliance FORTINET White Paper 1 Secure Distributed Healthcare Networks for PCI DSS 3.0 and HIPAA Compliance Accelerating Compliance and Simplifying
More informationEnabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD
Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD FORTINET Enabling Secure BYOD PAGE 2 Executive Summary Bring Your Own Device (BYOD) is another battle in the war between security
More informationCybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com
Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com About Palo Alto Networks We are the network security company World-class
More informationMicrosoft TMG Replacement. How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment
Microsoft TMG Replacement How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment 1. Introduction This document gives an overview of FortiGate features
More informationFortinet Product Life Cycle Information Publication Date: August 26, 2015
Fortinet Life Cycle Information Publication Date: August 26, 2015 Fortinet suggests that customers familiarize themselves with the Fortinet Life Cycle Policy. Particularly important to Fortinet customers
More informationFortinet Secure Wireless LAN
Fortinet Secure Wireless LAN A FORTINET SOLUTION GUIDE www.fortinet.com Introduction to Wireless Security Broad adoption of IEEE 802.11n has created a complex wireless landscape with proliferating mobile
More informationWhy it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager
Why it's time to upgrade to a Next Generation Firewall Dickens Lee Technical Manager Dell History 2 Confidential Dell s legacy Became leading provider of subscription services on optimized appliances Shipped
More informationSourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture
More informationStallion SIA Seminar 2.12.2015 PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager
Stallion SIA Seminar 2.12.2015 PREVENTION FIRST Introducing the Enterprise Security Platform Sami Walle Regional Sales Manager CYBER THREATS ARE GETTING MORE ADVANCED Advanced Persistent Threat Uses a
More informationBeyond the Box: A Strategic Approach Against APTs
Beyond the Box: A Strategic Approach Against APTs Filippo Monticelli Regional Director Italy & Malta CYBERSECURITY SUMMIT 2015 Roma 20/05/2015 Copyright Fortinet Inc. All rights reserved. Complexity of
More informationPlanning a Successful NGFW Migration
1 Introduction 1 3 8 Key Next Generation Firewall Requirements Research from Gartner: Framework for Migrating to a Next-Generation Firewall About Fortinet Planning a Successful NGFW Migration A Guide to
More informationNaujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius
Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius 1 The Evolving Security World The Easy Internet High Degree of IT control Slow rate of change
More informationNext-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
More informationNext-Generation Firewalls: Fact and Fiction Frequently Asked Questions FAQ
Next-Generation Firewalls: Fact and Fiction Frequently Asked Questions FAQ FORTINET Next-Generation Firewalls: Fact and Fiction PAGE 2 Introduction Attackers are increasingly using web-based applications
More informationSecure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
More informationNGFWs will be most effective when working in conjunction with other layers of security controls.
Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such
More informationBYOD: Leveraging Technology Solutions to Alleviate Security and Privacy Concerns
BYOD: Leveraging Technology Solutions to Alleviate Security and Privacy Concerns An Ingram Micro White Paper August 2013 Table of Contents Introduction... 3 The Benefits of BYOD... 3 Data Points to Widespread
More information5 ½ Things That Make a Firewall Next Gen WHITE PAPER
5 ½ Things That Make a Firewall Next Gen WHITE PAPER 5 ½ Things That Make a Firewall Next Gen Table of Contents Introduction 3 #1: Application Awareness and Control 3 #2: User Identity Awareness and Control
More informationIntegrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
More informationWHITE PAPER. Protecting Your Network From the Inside-Out. Internal Network Firewall (INFW)
WHITE PAPER Protecting Your Network From the Inside-Out Internal Network Firewall (INFW) Protecting Your Network From the Inside-Out Internal Network Firewall (INFW) Table of Contents Summary 3 Advanced
More informationWhite Paper. ZyWALL USG Trade-In Program
White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...
More informationThe Economics of Network Security. Michael Del Monte. Economist, Equity Analyst, Recruiter
The Economics of Network Security Michael Del Monte Economist, Equity Analyst, Recruiter General Overview of the Market There are two types of companies out there; those who know they ve been breached,
More informationGame changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
More informationThe Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
More informationNetwork protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
More informationThe Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
More informationGuest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.
Guest Speaker Michael Sutton Chief Information Security Officer Zscaler, Inc. Michael Sutton has dedicated his career to conducting leadingedge security research, building world-class security teams and
More informationBezpečnosť bez kompromisov
Bezpečnosť bez kompromisov Zsolt Géczi, major account manager, Slovakia, CEH Nov 19, 2015, ATOS Technologické Fórum 2015, SK Copyright Fortinet Inc. All rights reserved. Security is Now a Board Room Discussion
More informationFortiGate 100D Series
DATA SHEET FortiGate 100D Series Integrated Security for Small and Medium Enterprises FortiGate 100D Series FortiGate 100D, 140D, 140D-POE and 140D-POE-T1 In order to comply with legislation and secure
More informationTransforming Your WiFi Network Into A Secure Wireless LAN A FORTINET WHITE PAPER. Fortinet White Paper
Transforming Your WiFi Network Into A Secure Wireless LAN A FORTINET WHITE PAPER Introduction There have been a number of moments in the IT and network industry that can be considered as a Paradigm Shift.
More informationFortinet Product Quick Guide
Fortinet Product Quick Guide Ahmad Arafat Senior Security Engineer, Middle East 1 June 6, 2014 Content FortiGate/FortiWiFi FortiAP FortiSwitch FortiClient FortiToken FortiAnalyzer FortiManager FortiSandbox
More informationProduct Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET
Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET ELITE S NEXT GENERATION MANAGED SECURITY SERVICES Security risks to business information systems are expanding at a rapid rate; often,
More informationSimple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
More informationWHITE PAPER. Empowering the MSSP. Part 1: Real World Customer Needs
WHITE PAPER Empowering the MSSP Part 1: Real World Customer Needs Introduction MSSP Foundations for Success An increasing number of companies plan to spend more of their budget with managed security service
More informationIs the Security Industry Ready for SSL Decryption?
Is the Security Industry Ready for SSL Decryption? SESSION ID: TECH-R01 John W. Pirc Chief Technology Officer NSS Labs Inc. @jopirc David DeSanto Director, Product Management NSS Labs Inc. @david_desanto
More informationSOLUTION GUIDE. Maintaining Business Continuity Fighting Today s Advanced Attacks
SOLUTION GUIDE Maintaining Business Continuity Fighting Today s Advanced Attacks Setting the Stage The concept of today s advanced attacks, also known as Advanced Persistent Threats (APTs), has become
More informationAstaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
More informationGateway Security at Stateful Inspection/Application Proxy
Gateway Security at Stateful Inspection/Application Proxy Michael Lai Sales Engineer - Secure Computing Corporation MBA, MSc, BEng(Hons), CISSP, CISA, BS7799 Lead Auditor (BSI) Agenda Who is Secure Computing
More information聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問
聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 主 講 人 : 廖 國 宏 Jerry Liao 職 稱 : 技 術 顧 問 Each attack instance can be slightly different 攻 擊 模 式 有 些 微 的 不 同 Domains are rotated in days, even hours 攻 擊 主 機 位 置
More informationUnified Threat Management Throughput Performance
Unified Threat Management Throughput Performance Desktop Device Comparison DR150818C October 2015 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Products Tested... 6 How We Did
More informationFROM PRODUCT TO PLATFORM
FROM PRODUCT TO PLATFORM DATA EQUIPMENT 2016 Mikkel Bossen Agenda Today s Challenges Data Growth, SSL encryption, Application Growth & SaaS What s hiding in under the surface? Legacy Security is that really
More informationFirewalls: The Next Generation. Rick Coloccia Network Manager coloccia@geneseo.edu
Firewalls: The Next Generation Rick Coloccia Network Manager coloccia@geneseo.edu Session Overview Evolution of the Firewall Packet Filters Stateful Firewalls Application Firewalls Single Appliance No
More informationHow to choose the right NGFW for your organization: Independent 3 rd Party Testing
How to choose the right NGFW for your organization: Independent 3 rd Party Testing Daniel Ayoub, CISSP, CISM, CISA, CEH Manager, Product Marketing Dell Marketing 2 Confidential Marketing vs. Reality 3
More informationNetwork Security. Intertech Associates, Inc.
Network Security Intertech Associates, Inc. Agenda IT Security - Past to Future Security Vulnerabilities Protecting the Enterprise What do we need in each site? Requirements for a Security Architecture
More informationCisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security
White Paper Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security Introduction Organizations that want to harness the power of the web must deal with
More informationBlind as a Bat? Supporting Packet Decryption for Security Scanning
Sponsored by VSS Monitoring Blind as a Bat? Supporting Packet Decryption for Security Scanning November 2012 A SANS Whitepaper Written by: Dave Shackleford Options for SSL Inspection Page 2 Implementing
More informationExtending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
More informationGlobal Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER
Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER FORTINET Global Reputation Monitoring PAGE 2 Overview Fortinet s FortiGuard Security Services delivers two essential
More informationOn and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
More informationThreat-Centric Security for Service Providers
Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product
More informationOne Minute in Cyber Security
Next Presentation begins at 15:30 One Minute in Cyber Security Simon Bryden Overview Overview of threat landscape Current trends Challenges facing security vendors Focus on malware analysis The year? The
More informationContent-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
More informationHow To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
More informationDriving Agility and Security with Data Center Consolidation WHITE PAPER
Driving Agility and Security with Data Center Consolidation WHITE PAPER Introduction Enterprises must become more agile while controlling costs to stay competitive. The true value of IT lies in its ability
More informationNext Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
More informationFortinet Overview Real Time Network Protection. Stefano Chiccarelli Consultant Engineer EMEA schiccarelli@fortinet.com
Fortinet Overview Real Time Network Protection Stefano Chiccarelli Consultant Engineer EMEA schiccarelli@fortinet.com Company Overview First and only maker of ASIC-accelerated Multi-Threat Security Solutions
More informationConnect and Secure Retail
Connect and Secure Retail Tomislav Tucibat, Major accounts Manager Adriatic February 2016 Copyright Fortinet Inc. All rights reserved. 2014: Year of the Retail Data Target 40 million card numbers, 70 million
More information