Présentation Fortinet

Slides:



Advertisements
Similar presentations
Stonesoft Roadmap WHAT FEATURES WILL COME IN
Advertisements

Simon Garcia Jaramillo Network Administrator ATS Automation Tooling Systems.
National Symposium for Command & Control and Cyber Security
Unified Logs and Reporting for Hybrid Centralized Management
Introduction to Fortinet Unified Threat Management
MIGRATION FROM SCREENOS TO JUNOS based firewall
Endpoint Control. Module Objectives By the end of this module participants will be able to: Define application detection lists to monitor applications.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Network security Product Group 2 McAfee Network Security Platform.
Threat Landscape Ryan Kane – SWAT Specialist - Secure Wireless, & Access Technologies Data Connectors ABQ December 2015.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Despite of spending high on digital information security, organizations still remain exposed to external threats. However, data center providers are helping.
Some Great Open Source Intrusion Detection Systems (IDSs)
Cloud Agility with Performance Bridging the Performance Gap for Virtual Network Infrastructure Paul Andersen Sr. Marketing Director.
OFFICE 365 APP BUILDER PROFILE: Druva
SDN & NFV Driving Additional Value into Managed Services.
Fortinet Security Fabric
Barracuda NG Firewall ™
La sécurité Globale de votre SI du Poste de Travail au Cloud
2017 Security Predictions from FortiGuard Labs
Sophos Central for partners and customers: overview and new features
BUILD SECURE PRODUCTS AND SERVICES
FortiCloud Hosted security analytics, log retention, and management
IoT Security Part 2, The Malware
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
Let's talk about Linux and Virtualization in 'vLAMP'
Fortinet Overview Consolidated Security
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Barracuda Web Security Flex
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
DocFusion 365 Intelligent Template Designer and Document Generation Engine on Azure Enables Your Team to Increase Productivity MICROSOFT AZURE APP BUILDER.
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
New Heights by Guiding Them into the Cloud
Hybrid IT is Here. Security: First.
Active Cyber Security, OnDemand
Cherwell Service Management is an IT Service Management Solution that Makes it Easier for Users to Capitalize on Power of Microsoft Azure MICROSOFT AZURE.
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
CCNET Managed Services
Built Using the Powerful Microsoft Azure Platform, Mailytics Gives Marketers Competitor Data and Campaign Analysis to Better Develop Strategies MICROSOFT.
Hosted on Azure, LoginRadius’ Customer Identity
Security Fabric Salon MedIT 2017
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.
Oscar AP by Massive Analytic: A Precognitive Analytics Platform for Effortless Data-Driven Decisions. Now Available in Azure Marketplace MICROSOFT AZURE.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
AKAMAI INTELLIGENT PLATFORM™
DeFacto Planning on the Powerful Microsoft Azure Platform Puts the Power of Intelligent and Timely Planning at Any Business Manager’s Fingertips Partner.
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
MyCloudIT Enables Partners to Drive Their Cloud Profitability Using CSP-Enabled Desktop Hosting Automation with Microsoft Azure and Office 365 MICROSOFT.
Check Point Connectra NGX R60
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Carl Data Solutions Collects Utility Sensor and Meter Data to Provide Advanced Reporting, Alarming, and Analytics with Microsoft Azure MICROSOFT AZURE.
dotmailer: A Marketing Automation Platform with at its Core
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
Appcelerator Arrow: Build APIs in Minutes. Connect to Any Data Source
Healthcare Cloud Security Stack for Microsoft Azure
NSX Data Center for Security
Reportin Integrates with Microsoft Office 365 to Provide an End-to-End Platform for Financial Teams That Simplifies Report Creation and Management OFFICE.
Guarantee Hyper-V, System Center Performance and Autoscale to Microsoft Azure with Application Performance Control System from VMTurbo MICROSOFT AZURE.
Increase and Improve your PC management with Windows Intune
Coordinated Security Response
Zendos Tecnologia Utilizes the Powerful, Scalable
Features Overview.
Introduction to the 3rd Gen Fortinet Security Fabric
COMPANY PROFILE: REELWAY
OU BATTLECARD: Oracle Identity Management Training
OU BATTLECARD: Oracle Systems Learning Subscription
Presentation transcript:

Présentation Fortinet Welcome Présentation Fortinet 8:00 – 8:30 Café 8:30 – 9:05 Présentation 1 – Fabric Security 9:05 – 9:20 pause 9:20 – 10:00 Présentation 2 Ransomware Protection Wrap up

Fortinet Security Fabric Jonathan Rod Systems engineer, CISSP

Current strategies original marketing => What do we have strategies on firewalling today ? Some strategies rely on marketing or trying to make the box easier to sell. Nice GUI, nice reports, brilliant features. Marketing can do marvelous things ;-) Others go for more features or advanced features but they narrow the target.

What is the “Fortinet Security Fabric” ? Secure Access Network Security Application Security Cloud Security Client Security Mail Server AV WAF AS Wifi EndPpoint MGMT It is a strategy, a vision. Some may say it is pure marketing but it is not. Technically it is a collaboration of products which provides more features for the customer. It is also a collaboration between sales and technical presales to make projects bigger and providing more security Here are the examples for the collaboration between the products. The concept is quite effective as we currently get great wins against competition (+provide examples). The idea is to propose the best global security solution providing highly integrated products : easy to deploy, install, use and analyse. Customers are proposed a higher level of security for the same price. Fortinet customers are more intended to purchase a Fortisandbox than other technologies. It integrates with fortimail, fortiweb, forticlient, … and any new future acquired device can take advantage of the sandbox.

Key Fabric Attributes Scalability Scalable Aware Secure Actionable Open

Scalable from Access to Data Center, IoT to Cloud hardware Cloud Networks come in all shapes and sizes and are never static during their lifetime. Only Fortinet provides such a wide range of products: we provide products in several versions such as VMware, Cloud, hardware, etc, different sizes. Fortinet is the only constructor which provides all home made products. It is really an advantage because there is no agreement with third parties which can be broken. We keep a hand on the technology to make sure it always integrates with others. Finally prices are much more aggressive making the global project fit the initial budget. Fortinet wide range of products helps administrators to change their units and relocate them according to their needs

FortiGate Product Range Personality, Performance and Scalability CCFW DCFW ISFW CFW/VMFW NGFW / NGIPS DEFW UTM Software & Services Product Range Entry Level Mid Range High End Virtual Appliances CPU SoC NP CP Multi Core CPU NP CP Multi Core CPU Multi Core CPU Chassis System 1 Gbps 10 Gbps 10 Gbps - 50 Gbps 50 Gbps - 1 Tbps H/W Dependent 1000-2000 Series 600-900 Series VM Series 100-500 Series 3000 Series 5000 Series 7000 Series 60-90 Series 30-50 Series FortiGuard Security Services FortiOS Operating System FortiCare Support Services

Key Fabric Attributes Scalable Aware Secure Actionable Open

CTI: Cyber Threat Intelligence SOC Feeds CLOUD ANALYZERS IOC SERVICES Collect CTI from worldwide deployments Analyze against worldwide or regional baselines Identify targeted attacks or anomalies IOC Discovery (FortiAnalyzer 5.4.1) Reporting Management Automation Services for Enterprise & MSP SOC

FortiGuard Threat Intelligence Projects CISCP & NCCIC DHS: CISCP – On target for participation after we sign CRADA. Over 45 organizations and 13 ISACS.

Fortinet/NATO NCI Cyber Alliance

Collect, Gather, Analyze different information Mail Server SOC Feeds CLOUD ANALYZERS IOC SERVICES Collect CTI from worldwide deployments Analyze against worldwide or regional baselines Identify targeted attacks or anomalies IOC Discovery (FortiAnalyzer 5.4.1) Reporting Management Automation Services for Enterprise & MSP SOC All solutions spread over the network and building the fabric will bring information from different perspective. Ex: An infected PC connected to the LAN provides a rogue SSID. The attacker uses it to send an email from the local device to the mail server with a zero day virus file as attachment. FortiAP detects the rogue AP, the firewall detects that a packet used the rogue AP to enter the network, the fortimail detects the mail is not legitimate and the sandbox detects the file is a 0-day virus. Fortiview gathers the information and makes it easier to analyze. Fortiview on Fortisandbox and wifi clients (different graphics…)

Learning Mode New learn mode helps admins to configure policy to simply monitor and analyze traffic. A report is available locally as well as the CTAP report.

Key Fabric Attributes Scalable Aware Secure Actionable Open

Enabling the Security Fabric : 1+1=3 more features ! standalone Partner FortiWeb FortiMail FortiClient FortiGate Advanced Threat Protection 1+1=3 When collaborating, the level of security gets much higher because the collaboration provides more features. For example, when in standalone mode, the fortisandbox emulates an environment and test a file. It generates an alert if a virus is discovered. Now let's action the fabric with other products. When in combination with a forticlient or fortimail, more features are added. The virus is kept until a medication is provided to all equipments !!! This is something you can not get if you use other third party products such as Fireye.

Unified Security Across all of the Network FORTIMANAGER FORTISIEM Enabling the Security Fabric provides your network with more security features which you could not get with third party products. You now have a full expert and dedicated product defending your network against all attacks. Fortinet customers are more intended to purchase a Fortisandbox than other technologies because it is full integrated and easy to deploy, maintain, learn, and so on. It integrates with fortimail, fortiweb, forticlient, … and propose a solution with the highest level for security. Security is unified with FortiSiem or forticloud or fortiManager which has no equivalent on the market (unified GUI, ability to configure the products...)

Key Fabric Attributes Access to Data Center, IoT to Cloud Scalable Aware Secure Actionable Open

Fabric Attribute 4: Actionable Threat Intelligence Support Services Migration to Cloud Based Systems FortiCare FortiGuard Plus Security Reporting Service Threat Detection Service Access to FortiGuard Experts for Product and Threat Support Portal Correlating Data From Across the Fabric with geography, industry and size specific intelligence Local Threat Intelligence From FortiGuard Labs Big Data Analytics of consolidated Logs for patterns of activity associated with advanced threats IaaS IoT Mobile The FortiGuard Premier Signature Service provides enhanced virus detection and threat analysis support to help mitigate breaking and advanced persistent threats. With the FortiGuard Premier Signature Service, you can submit requests for custom AV, IPS, or Application Control signatures on a 24x7 basis for prioritized support with guaranteed response times. Updated signatures are initially provided through Fortinet's support site and later included in FortiGuard distribution network's automatic updates. With granularity of level 1, 2 or 3. Access WAN Data Center SaaS PoS Windows

Key Fabric Attributes Access to Data Center, IoT to Cloud Scalable Aware Secure Actionable Open

Multiple Levels of Fabric API’s for Partner Integration Eco System Alliance Partners SIEM Management Fortinet Security Fabric Endpoint SDN No one company can do everything themselves. It takes an extensive eco-system of products and technologies to meet all of the challenges. And as the challenges grow and change so will the eco-system. This eco-system is enabled through the FSF and its series of APIs. Virtual Cloud

Ecosystem Integration Points Cloud SDN Sandbox Test/SSO System Integrator SIEM Management These are just some of the organizations that Fortinet works with to ensure that the FSF is robust to meet the challenges are customers are facing. The extension of the Fabric into the Alliance system is very important. Customers have different infrastructure platforms and Security products which are an essential part of their defense capability. We have developed a variety of API’s to allows Alliance partners to connect to the Fabric. The Integration Points include Hypervisor SDN Orchestration Cloud Sandbox Logging Policy Management Once part of the Fabric Threat Information can be shared along with Mitigation instructions. Obviously the depth of integration will determine the capability.