Hybrid IT is Here. Security: First.

Slides:



Advertisements
Similar presentations
Hybrid Management and Security
Advertisements

Accelerate your DevOps with OpenShift by Red Hat
Virtual desktops in the cloud: Experiences from the field
Successfully migrate existing databases to Azure SQL Database
Secure Hyperconnectivity with TeamViewer and Windows technologies
Enterprise Security in Practice
5/21/2018 9:40 PM BRK3021 Learn about modern infrastructure roles in RDS: Next generation Windows desktop & app virtualization Clark Nicholson - Principal.
Azure Machine Learning Deploying and Managing Models in production
Nested Virtualization: A game changer in Hyper-V and Azure
How Microsoft uses Windows Defender ATP–Welcome to a SecOps world!
Azure File Sync Setup, configuration and management
How To Deliver Apps Faster And Secure Them The Microsoft Way
Cloud Security IS Application-Centric Security
Hybrid Management and Security
Use any Amazon S3 application with Azure Blob Storage
Architecting Data Protection for Azure and Beyond with Rubrik
Microsoft Azure: The only consistent Hybrid Cloud
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Enabling Business to Move to the Cloud with Confidence
Developing Hybrid Apps on Microsoft Azure Stack
Windows 10 and the cloud: Why the future needs hybrid solutions
Migrating your IaaS infrastructure from ASM to ARM without downtime
6/19/2018 2:57 AM THR3092 Monitor and investigate actions on your user and data with alerts, insights and reports Binyan Chen Program Manager II, Office.
Tales from the Road to Hybrid Cloud
Azure SDKs and Tools for You
Lessons learned from moving to Microsoft Azure
6/26/2018 2:09 PM THR4002 Achieving Upward Mobility Top 3 Strategies for Migrating Data and Workloads to the Cloud
The power of common identity across any cloud
Secure Remote Access to on-premises Web Apps using Azure AD
Microsoft Ignite /31/ :08 AM
8/6/ :17 AM THR2214 Hybrid Cloud Activated A customer case study optimizing on-premises & Azure performance and cost Mor Cohen-Tal Senior Product.
Threat Management Gateway
Workflow Orchestration with Adobe I/O
Azure Stack – Thinking AND realizing value “beyond the box”
Customize Office 365 Search and create result sources
Find, try and get line-of-business apps on Microsoft AppSource
Eliminate Service Outages with Microsoft Azure and ServiceNow
Automated Response with Windows Defender ATP
Best Practices for Securing Hybrid Clouds
Azure Security in four steps
9/18/ :06 AM BRK2212 Gain visibility into Network performance and availability with Network monitoring solutions in Azure Vijay Tinnanur Abhishek.
Cloud Database Based on SQL Server 2012 Technologies
Prevent Costly Data Leaks from Microsoft Office 365
Continuous Delivery for Microsoft Azure
Port your AWS Knowledge to Azure
Holistic Management for Azure and the Hybrid IT Ecosystem
11/22/2018 1:43 PM THR3005 How to provide business insight from your data using Azure Analysis Services Peter Myers Bitwise Solutions © Microsoft Corporation.
Microsoft Virtual Academy
Mobile Center and VSTS:​ Better together for your Mobile DevOps
Power-up NoSQL with Azure Cosmos DB
Microsoft Virtual Academy
Introduction to ASP.NET Core 1.0
1/2/2019 5:18 PM THR3016 Customer stories: Plan and orchestrate large resource deployments on Azure infrastructure Igal Figlin Principal PM Manager – Azure.
Overview: Dynamics 365 for Project Service Automation
Virtual Reality with Azure and Unity
2/24/2019 7:49 PM BRK2198 Four new Azure management experiences to run your business critical applications Dushyant Gill | Jan Kalis.
Understand your Azure cloud assets dependencies with BMC Discovery
Surviving identity management in a hybrid world
2/25/2019.
System Center Marketing
Breaking Down the Value of A Yammer Post: 20 Things to Do
Getting the most out of Azure resources with Azure Advisor
4/28/2019 3:30 AM THR1061 Learn how Dynamics 365, Office 365 and related applications work together to transform the workplace Donna Edwards Solution Architect.
Consolidate, manage, backup, and secure your cloud content
Designing Bots that Fit Your Organization
Microsoft Virtual Academy
Azure Networking inside and out
Diagnostics and troubleshooting in Azure App Service Support Center
Introduction to the 3rd Gen Fortinet Security Fabric
Microsoft Virtual Academy
Presentation transcript:

Hybrid IT is Here. Security: First. 6/15/2018 7:19 PM THR2298 Hybrid IT is Here. Security: First. John Jacobs VP, Systems Engineering jjacobs@fortinet.com © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Data Networking Timeline 6/15/2018 7:19 PM Data Networking Timeline 1990s Devices are connected State-aware firewall (1994) First dating site: match.com (1995) Today Azure Stack Hybrid IT is Here 2000s Challenge #1: Rapid Scale Application Awareness Public Cloud (2006) 2010s Traditional virtualization vendors stumble Cloud Adoption Accelerates At every point, security is crucial. However, it is most often an afterthought. © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Data Security Timeline Machine to Machine Attacks Network Segmentation Generation 3 Applications and Infrastructure Advanced Targeted Attacks Advanced Threat Protection Malicious Apps Application Control Botnets IP Reputation Malicious Sites URL Filtering Complexity and Threat Potential Generation 2 Attack Vectors Spam Secure Email Gateway Intrusion & Worms Intrusion Prevention Exploits Vulnerability Management Viruses & Spyware Layer 5-7: Antimalware Generation 1 Connectivity Layer 3-4: Firewall Hardware Theft Layer 1-2: Physical 1990s Today

The Legacy Deployment Model Design What services do we need? What is the initial demand? How steep is the growth curve? Build Where and how do we construct service offerings? How long will it take to sign leases?! Deploy Fire up machines and start the work Fine-tune for optimal performance Secure WAIT! Recognize applications Secure the perimeter Segment the inside network

Hybrid cloud A composition of two or more clouds (private, community or public) that remain distinct entities but are bound together, offering the benefits of multiple deployment models* Private Public Hybrid AZURE SECURITY FortiOS FortiGuard 5.6 SaaS Public Cloud IaaS Hybrid Cloud Virtual Cloud Stack Private Cloud FortiGate Virtual Cloud FortiWeb Data Center Virtual Cloud Stack FortiAnalyzer Virtual Cloud Stack FortiManager Modern deployment is intelligent design encompassing all components with immediate service availability FortiCASB *Gartner Research

Shared Responsibility Model for Security Tech Ready 15 6/15/2018 Shared Responsibility Model for Security On-Premise Infrastructure (as a Service) Platform (as a Service) Software (as a Service) Administration Administration Administration Administration Applications Applications Applications Application Data Data Data Data Runtime Runtime Runtime Runtime Managed by: Middleware Middleware Middleware Middleware Customer O/S O/S O/S O/S Virtualization Virtualization Virtualization Virtualization Vendor Servers Servers Servers Servers Storage Storage Storage Storage Networking Networking Networking Networking © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Why Fortinet?

Fortinet: Global Network Security Leader Highlights: 2000 - present 2000 founded in headquartered in Sunnyvale California 4,700+ EMPLOYEES WORLDWIDE 100+ Offices across the globe $1bn Revenue In excess of $1.5B In reserves Continuous Growth Year on year 30% 395 patents 316 in process issued 3.3m Shipped security devices 320k customers This yields 50 billion security events ingested per day around the globe

Enhanced Protection Across the Entire Attack Surface MANAGEMENT ANALYTICS INTELLIGENCE SANDBOX/ATP MOBILE IoT / SCADA WINDOWS MAC CASB PRIVATE PUBLIC METER Endpoint Cloud Network SWITCH ACCESS POINTS WAF EMAIL Access Apps API and Partnerships Security needs a holistic solution from a capable and experienced provider

Security for Cloud Applications and Data Virtualization Private Cloud Hybrid Public Cloud Hybrid Hypervisor Port SDN - Orchestration Integration On-Demand East-West North-South IaaS Cloud Hypervisor NGFW WAF Management Reporting APT Connector API Flow SaaS Cloud Proxy CASI Broker API Fortinet-driven, open standards/API, or partner-led orchestration as applications move Complete flexibility for existing deployments Full Hybrid Solutions

Diverse Platforms in the Cloud Single Management Console FortiGate Enterprise Firewall Application Controls, Anti-Virus, IPS, VPN, Web Filtering, Threat Intel Applications Pay as You Go / On-Demand (Hourly and Annual) FortiWeb Web Application Firewall Protect over SQL Injection, cross-site scripting, forward proxy NGFW WAF Email Manager Reports ATP* Performance Certifications FortiManager Centralized Security Management Consistency and control Bring Your Own Licensing (BYOL) / Annual Perpetual 2-16 vCPU AZURE SECURITY CENTER Virtual Domain (VDOM) Capabilities FortiMail Email Security True security and SPAM filter for O365 On-Demand Orchestration Auto-scaling Fabric Partners Automated Failover Auto-scaling FortiAnalyzer Log Analytics and Forensics Logging, compliance and visibility * FortiSandbox and FortiSIEM in development

Across Hybrid Cloud and Multi-Cloud Environments Secure data connectivity from any public access Application-aware Firewall (NGFW) Web Application Firewall (WAF) Site-to-Site secured traffic tunnel Azure VPN Express Route Firewall direct Remote workers or IoT devices Automated access Azure VPN or firewall direct Massive scale for endpoint growth that only leverage of the cloud can support Any access solution. ALL having complete visibility and consistent security posture

Segmenting End-to-End Traffic in Hybrid IT Mitigate concentration of data and risk in consolidated environments within and across clouds Internet Cloud Internal Network (100 Gbps+) Private Edge Gateway Data Center ISFW External SG3 SG2 SG1 FortiGate-VM On Azure Stack Hypervisor Deploy into flat, open networks w/o disruption Fine-grained policy based on: users/apps/data/more Increased throughput for inspecting east-west traffic Replicate the growing trend of internal network segmentation

Automatic Scaling Protection for Elastic Workloads Maintain user/data privacy while scaling web and social applications at the speed of Azure Auto-scale inspection capacity across networks Auto-provision rules to new workloads Orchestrate physical and virtual service insertion at any location Highly-available firewall clustering Hypervisor Hypervisor Hosted Web servers, databases, application servers, etc.

Trusted interoperation Intelligence Across Platforms BROAD POWERFUL AUTOMATED What does this mean? Shared API Integrated controls Azure Security Center Joint marketing Trusted interoperation Intelligence Across Platforms Microsoft Azure is a member of the ever-growing Fortinet Fabric Program https://www.fortinet.com/partners/partnerships/alliance-partners.html

Test Drive FortiGate NGFW Without Commitment

Fortinet is Here to Secure it. 6/15/2018 7:19 PM Hybrid IT is Here. www.Fortinet.com/azure Booth #1907 azure@fortinet.com Fortinet is Here to Secure it. © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Please evaluate this session Tech Ready 15 6/15/2018 Please evaluate this session From your Please expand notes window at bottom of slide and read. Then Delete this text box. PC or tablet: visit MyIgnite https://myignite.microsoft.com/evaluations Phone: download and use the Microsoft Ignite mobile app https://aka.ms/ignite.mobileapp Your input is important! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6/15/2018 7:19 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.