Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses



Similar documents
Connect and Secure Retail

The Fortinet Secure Health Architecture

High Performance NGFW Extended

The Fortinet Secure Health Architecture

WHITE PAPER SECURING DISTRIBUTED ENTERPRISE NETWORKS FOR PCI DSS 3.0 COMPLIANCE

Internal Network Firewall (INFW) Protecting your network from the inside out

How To Ensure Security In Pc Ds 3.0

Securing your IOT journey and beyond. Alvin Rodrigues Market Development Director South East Asia and Hong Kong. What is the internet of things?

Cloud Managed Security with Meraki MX

Transforming Your WiFi Network Into A Secure Wireless LAN A FORTINET WHITE PAPER. Fortinet White Paper

Securing The Enterprise

How To Secure Your Store Data With Fortinet

CLOUD & Managed Security Services

Fortigate Features & Demo

Network Security Solution. Arktos Lam

Unified Threat Management, Managed Security, and the Cloud Services Model

Overview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.

Is Your Network Ready for the ipad?

Cisco Meraki solution overview Cisco and/or its affiliates. All rights reserved.

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

Keeping the Store Open: Fighting the Cyber Criminal in the Retail World

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

The Evolution of the Enterprise And Enterprise Security

BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15

Fortinet Secure Wireless LAN

Building Wireless Networks. Tariq Hasan Regional Sales Manager, MENA Wireless Network Solutions Motorola Solutions

Secure Access Architecture

Meraki: Introduction to Cloud Networking

Advanced Threat Protection Framework: What it is, why it s important and what to do with it

Fortinet Advanced Threat Protection- Part 3

High performance security for low-latency networks

Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

Cisco Small Business ISA500 Series Integrated Security Appliances

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX60 MX60W MX80 MX100 MX400 MX600

Simple security is better security Or: How complexity became the biggest security threat

Cisco Virtual Office Express

Data Center security trends

Introduction to Cloud Networking. Meraki Solution Overview

SOLUTIONS GUIDE. Secure Wireless LAN Solutions Guide. Complete Wi-Fi Security for Any Network Topology

Managed WiFi. Choosing the Right Managed WiFi Solution for your Organization. Get Started Now: to learn more.

Next Generation Enterprise Network Security Platform

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX64 MX64W MX84 MX100 MX400 MX600

Next-Generation Firewalls: Fact and Fiction Frequently Asked Questions FAQ

What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe

Enterprise Cloud Manager

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Network Firewall (INFW)

Using SDN-OpenFlow for High-level Services

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

SourceFireNext-Generation IPS

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Mobile Configuration Profiles for ios Devices Technical Note

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

10 easy steps to secure your retail network

Partner with the UK s leading. Managed Security Service Provider

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

Please report errors or omissions in this or any Fortinet technical document to

Uninterrupted Internet:

Securing Next Generation Education A FORTINET WHITE PAPER

Move over, TMG! Replacing TMG with Sophos UTM

BYOD Networks for Kommuner

Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service

FortiGate/FortiWiFi 60D Series

Enterprise Solutions. Solutions for Enterprise Customers Data, Voice, Security. Get Started Now: to learn more.

Network Intrusion Prevention Systems (IPS) Frequently Asked Questions FAQ

Sophos Roadshow. Complete Security Vision

Cisco Wireless Portfolio

SOLUTION GUIDE. Secure Access Architecture. Enterprise Network Access with Complete Security

Network protection and UTM Buyers Guide

Next Gen Firewall and UTM Buyers Guide

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

FortiGate/FortiWiFi 90D Series

TECHNICAL NOTE. FortiGate Traffic Shaping Version

Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE

Cisco IOS Advanced Firewall

Cyberoam Next-Generation Security. 11 de Setembro de 2015

A Blueprint to the Future of Managed Services Direction of Managed Services with Cloud Initiatives

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

CradleCare Support Agreement The Peace of Mind Plan

FortiOS Handbook - Getting Started VERSION 5.2.2

Lucent VPN Firewall Security in x Wireless Networks

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

Transcription:

Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses Patrick Bedwell VP, Product Marketing 1 Copyright 2014 Fortinet Inc. All rights reserved.

Today s Agenda Security Trends, Challenges, and Strategies Benefits of Security Consolidation Consolidation Case Studies Managed Security Services for Small and Midsize Businesses Q&A 2

Security Trends, Challenges 3 Copyright 2014 Fortinet Inc. All rights reserved.

5 Small/Mid-Size Business Security Trends in 2014 1. Full disclosure no longer optional» Anticipate a breach 2. The ABC threat: APTs, BYOD and Cloud» Intersection of advanced threats, mobile devices, cloud security 3. PRISM Fallout» Protecting data privacy is critical 4. The network perimeter is dead; long live the network perimeter» Virtualization and SDN 5. "Open-source" malware» Malware families to become open source platforms Source: www.pcpro.co.uk 4

Typical Small/Mid-Size Business Network Evolution Stand-Alone Technologies Add Complexity Firewalls VPN WAN Opt Internet Router Firewall Web Filtering Antivirus Antimalware Switch Web Filtering WAN Accelerator AV Server WiFi Switches VPN WiFi Wireless 5

Additional Small / Mid-Size Business Challenges Multiple Security & Network Technologies Deployed Access Technology» Ethernet, Wireless, Voice Hosted Data Center, Outsourced Services Limited IT Experience Limited space Compliance Requirements»PCI, HIPAA, State data privacy laws 6

Additional Challenges for Distributed Networks Hundreds of Locations More Access Technologies»Ethernet, Wireless, Access for Kiosk systems / POS, Customer WiFi Access More WAN Technologies More VPN Connections»Aggregation to Central Data Center 7

The Effect of Mobility on Your Network Packet Size Decreases Traffic Patterns Vary Connections per Second Increase More Bandwidth- Intensive Traffic Type Application Characteristic Instant Messaging ichat, SMS Intermittent Small packets VoIP Skype, FaceTime Continuous Small packets Streaming YouTube, Pandora Continuous Large packets Social Networks Facebook, Twitter Intermittent Small packets Web Browsing Firefox, Chrome, Safari Intermittent Large packets Cloud icloud, Dropbox Intermittent Large Packets Email Gmail, Outlook Intermittent Large Packets 8

The Cloud & Outsourcing ~40 percent of S/MBs spent more than one-third of IT budgets on cloud and managed infrastructure services in 2013 Will acquire paid public cloud services by 2015:»70% of midmarket businesses with 100-999 employees»40% of small businesses with 20-99 employees Source: Gartner 9

Benefits of Consolidation Consolidation without compromise 10 Copyright 2014 Fortinet Inc. All rights reserved.

Three Primary Benefits of Consolidation Wired and Wireless Networks Security»Increase visibility and control, consistent policy enforcement Performance»Add services without becoming a bottleneck TCO»Eliminate stand-alone wireless controller, other security devices 11

Fortinet Unified Threat Management Consolidates all security devices into one Expandable network security platform as organization grows Internet 3G/4G Backup App Control Router Antivirus Firewall Web Filtering WAN Opt FortiGate- UTM Wireless AP»More services»more connectivity Switch»More capacity 12

Connected UTM Optimizing Complex Networks Integrated, Consolidated Security UTM, WiFi, Switching, Authentication, End Point Security Within a Single FortiGate device Integrated Security Access & Connectivity Wireless Access Points 3G4G Access, Switches, IP devices Managed by single FortiGate device Access & Connectivity 13

Fortinet Advantage: Performance Mbps Firewall VPN Gbps NGFW UTM Policy Security 14 Fortinet - Confidential

Fortinet Advantage: Integrated Security FortiOS 5 Comprehensive Feature Set Firewall VPN IPS App. Control L2/L3 & Routing WAN Opt. Server LB IPv6 Web Filter AV Email Filter DLP Traffic Shaping Identity & Access SECURITY NETWORKING High Availability Virtual Systems Log & Report Monitoring Endpoint Control Token Server WiFi/Switch Controller Vuln. Scanning MANAGEMENT EXTENSION 15

How to Achieve Success 16 Copyright 2014 Fortinet Inc. All rights reserved.

Case Study: Store of the Future Retail Project to protect and simplify several retail locations Stores Internet Data Center Challenge PCI Compliance Rogue AP detection / Data segmentation Business Continuity Support Cable, DSL, Cellular & v.90 Scalable Why We Won Met PCI and data protection requirements Rogue AP detection, AV, IPS Enabled Store of the Future Secure guest access, VOIP, digital signage, wireless inventory, kiosks, wired POS Who We Beat Cisco 17 17

Overview of Connected UTM Technologies Global Threat Protection FortiGuard Labs Global Management FortiManager FortiAnalyzer FortiCloud FortiExtender WAN FortiAP (Wireless Access Points) FortiGate-140D-POE 4G Extension Integrated Security Rogue AP Detection for PCI Guest WiFi with safe surfing and QOS Retail Analytics Wireless Point of Sale Handheld Medical Devices ipad-based Apps FortiCam FortiSwitch (PoE Option) FortiVoice Kiosks Data segmentation 18

The Benefits of Connected UTM for Small / Mid-Size Businesses Perform Protect Simplify Consolidate Extend Throughput Latency Network End Point Local Area Wide Area Switch Wireless Authentication Voice Video Manage & Report Threat Intelligence 19

20 Thank You