True Unified Threat Management Fortigate Technology Positioning
Agenda The legacy network security approach & multi-party UTM The Fortinet approach Maximizing the Fortinet opportunity Summary
Multiple point solutions & multi-party UTM The legacy network security approach Multiple point solutions & multi-party UTM
Resilient architecture Key Points: Main drawbacks Gateway Corporate LAN DLP IPS Anti-Virus Firewall Anti-Spam Web Filter SSL VPN DLP IPS IPS Anti-Virus Anti-Spam Web Filter SSL VPN DLP Firewall Anti-Virus Firewall Anti-Spam Web Filter SSL VPN Multi-Party UTM Resilient architecture Key Points: Main drawbacks Consolidated hardware 100% increase in hardware sprawl Inefficient multiple point solutions = latency & vulnerabilities Legacy firewall Cost savings from reduced utility overheads, training etc First network security technology Very low utilisation of investment – Under 50% A set of individuals, not a team BUT! Considerable sprawl in appliances End result is underperforming, over expensive security posture Limited functionality – Port & Protocol, Allow & Block Similar performance issues due to multiple scanning engines Time consuming environment to administer, multiple consoles Insufficient protection against a multitude of threats Reliance on updates from 3rd party databases Sizeable total cost of ownership… Technical training, power & cooling, costly license programs More advanced protection required No major improvement in efficacy
An integrated network security platform The Fortinet approach An integrated network security platform
Inside Fortigate Advanced Networking Services Virtualisation WAN Opt DLP Wireless App Control Traffic Shaping Advanced Networking Services Firewall SSL VPN Anti-Spam Anti-Virus Web Filter IPS Proprietary Unified Threat Management FortiOS Purpose built Operating System Network ASIC Content ASIC General Purpose CPU Purpose built hardware
Maximising the Fortinet opportunity The unified access layer
Fortigate: Integrated security platform Gateway Corporate LAN WLAN IPS Anti-Virus Anti-Spam Web Filter SSL VPN DLP Firewall Fortigate: Integrated security platform FortiAP: Secure wireless access Fortigate: Secure site to site connectivity FortiToken: Strong authentication for mobile workers The Unified Access Layer
Summary Legacy security Multiple point solutions are inefficient with a high total cost of ownership Leave gaps in the network security posture Multi-party UTM offer similar problems with very little improvement in performance Fortinet Fortinet offers a different approach with purpose built, accelerated hardware High performance at a low price Complimentary Fortinet technologies provide a ‘unified access layer’ for secure connectivity regardless of location or network type True Unified Threat Management