B&Data Solutions Day 2008 Think Beyond a Virtualized Infrastructure The Network Security Consolidation Imperatives - Protect, Preserve and Reduce Flora.

Slides:



Advertisements
Similar presentations
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Advertisements

Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Introduction to Unitas Global Managed IT Infrastructure Service Provider February 2012 North America Los Angeles, USA
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
C ONFIDENTIAL July COM and LineSider bring OverDrive to Managed Service Providers.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
Unified Logs and Reporting for Hybrid Centralized Management
Introduction to Fortinet Unified Threat Management
Blue Coat: Your partner to sales success Nigel Hawthorn VP EMEA Marketing
Citrix Partner Update The Citrix Delivery Centre.
MIGRATION FROM SCREENOS TO JUNOS based firewall
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicPresentation_ID 1 Cisco Systems IP Interoperability and Collaboration System (IPICS) Rick Santina.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Norman SecureSurf Protect your users when surfing the Internet.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Current trends in data centre outsourcing
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Fortinet Confidential Bangalore 4 th December 2009 Vishak Raman Regional Director – SAARC & KSA “Security Virtualization”
Effectively Explaining the Cloud to Your Colleagues.
Motorola Mobility Services Platform
WELCOME!. Page: 2 Agenda One is impressive – two make a powerful team! Networking solutions, the Extreme way Coffee Break Security solutions, the NetScreen.
Extreme Networks Confidential and Proprietary. © 2010 Extreme Networks Inc. All rights reserved.
Barracuda Load Balancer Server Availability and Scalability.
1 MICHAEL BANIC VP ENTERPRISE MAKETING. THE NEW DATA CENTER NETWORK.
Fortinet An Introduction
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Joseph Ferracin Director IT Security Solutions Managing Security.
The Virtualized Enterprise MORE FUNCTIONALITY AND REDUCED IT SPEND Speaker: Frank Grillo EVP of Marketing CYPRESS COMMUNICATIONS.
Systems and Next Generation Collaboration Kevin Woods Director of Marketing and Product Management Mirapoint Inc.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
SOLUTIONS FOR THE EFFICIENT ENTERPRISE Sameer Garde Country GM,India.
Vantage Report 3.0 Product Sales Guide
ADTRAN: The Network Access Company. 2 Telecommunications u Multi-billion dollar industry u Voice and digital data transmission u Carrier and End User.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Grow with Cisco’s Made-for-Midmarket Portfolio Inspire Growth, Productivity,
Marty Sanders, VP of Americas Economic Benefits of Deploying Disruptive Hyperconvergence Technology September 2015.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Network security Product Group 2 McAfee Network Security Platform.
2015 Security Conference Dave Gill Intel Security.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Microsoft and Symantec
verifone HQtm Estate Management Solution
© 2015 Avaya Inc. All rights reserved Introduction Transition + Transform addresses the urgent unified communication and collaboration (UC&C) needs.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Secure Services Shared Hosted MS Exchange 2010.
Fortinet Confidential End-to-End Strategic Security Bryan Wood Manager – Western Channel Sales October 14th, 2009.
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
ShoreTel Virtualization February, © 2014 ShoreTel, Inc. All rights reserved worldwide. Unified Communications Deployment Model 1 Secure Reliable.
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
AT&T Premises-Based Firewall Enhanced SBS Solution
What is Cloud Computing - How cloud computing help your Business?
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Network Function Virtualization Market to reach $70bn by 2024: Global Market.
Tailor slide to customer industry/pain points
Check Point Connectra NGX R60
Managing Chaos: Data Movement in 2014 Steve Jordan
Cloud Security for Endpoints
IMS & Wireline to Wireless Convergence
Office 365 and Microsoft Project Integrations for HULAK Project Management Software Enable Teams to Remain Productive and Within Budget OFFICE 365 APP.
Agenda The current Windows XP and Windows XP Desktop situation
Presentation transcript:

B&Data Solutions Day 2008 Think Beyond a Virtualized Infrastructure The Network Security Consolidation Imperatives - Protect, Preserve and Reduce Flora Chan Regional Manager, Hong Kong & Macau

Fortinet Confidential Virtualized Network Security Network Security Consolidation Imperatives About Fortinet Agenda

Fortinet Confidential  Consolidation of Physical Resources  Reduction in Power Consumption  Control / Provide Growth  Simplify System Maintenance  Optimize Resource Utilization Source: The Economist, May 22 nd 2008 Virtualization Drivers

Fortinet Confidential Secure Virtualization: A New Paradigm  Virtualization is the most important solution being implemented in the Enterprise Data Center today.  This creates the need for a ‘security for virtualization’ paradigm that protects virtual environments in ways beyond what is currently available to protect physical environments. Gartner Group: Enterprises that do not leverage virtualization technologies will spend 25% more annually for hardware, software, security, labor, and space for their infrastructure.

Fortinet Confidential Network Complexity  Enterprise networks are complex before network security is considered  Implementing traditional internal network security is challenging and costly  Information security policies are commonly defined but implementing to specifications is difficult

Fortinet Confidential Network Security Requirements  Performance  Management / Reporting  Flexibility  Content Security  Reliability / Density  Logging / Reporting

Fortinet Confidential Network Security Considerations  High availability  Out-of-Band management  Troubleshooting  Product upgrades  Product support  Hardware cost  Added network complexity

Fortinet Confidential Fortinet’s Virtualization - Virtual Domains Virtual Domains (VDOMs)  Enable a single FortiGate system to function as multiple independent virtual FortiGate systems Up to 500 VDOMs supported per physical FortiGate device

Fortinet Confidential Virtualized Network Security Each VDOM can be configured with custom:  Virtual Routing features (Static, PBR, OSPF, BGP, RIP, Multicast)  Virtual Firewall (All Firewall features)  Virtual VPN (IPSec VPN, SSL VPN, PPTP)  Virtual IPS (Signature/Anomaly based, Protocol decoding)  Virtual Web filtering (84 Web Filter categories)  Virtual Antivirus (HTTP, FTP, SMTP, IMAP, POP3, NNT, ICQ, MSN, Yahoo, AIM)  Virtual Antispam (SMTP, POP3, IMAP)

Fortinet Confidential Fortinet’s VDOMs Each VDOM contains its own virtual interfaces, route table, state table, application proxies, and IPS table instances.

Fortinet Confidential Virtualized Management Multiple Administrative domains  Administrative Domain (ADOM)  Per customer/device group policy management  Per customer/device report generation  Supports VDOM groups and device groups or combinations of them Fortimanager Admin 2 Device Group 2 Device Group 1 FortiAnalyzer Admin 1 Customer 1 Customer 2

Fortinet Confidential Virtualized Reporting  Customizable with Customer/Private Branding  Per VDOM reporting  Per ADOM log access

Fortinet Confidential INTERNET Virtualized Network Security Back Bone Switching Centralized Logging and Reporting Out of Band Management w/ Department A HA security solution with Virtual Solutions Department B Department C Project A Project B Project C Server Farm Internet Access Enterprise

Fortinet Confidential Virtualized Network Security Benefits FortiGate Virtual Domains provide:  Flexibility for network topology changes  Consolidation of network security resources  Reduction in physical network complexity

Fortinet Confidential Agenda Virtualized Network Security Network Security Consolidation Imperatives About Fortinet 1 2 3

Fortinet Confidential Consolidation is all Around Us! Just a few examples:  Mobile Phones  Companies  Telecommunications / Video And most importantly:  Network Security

Fortinet Confidential Consolidation Market Drivers  Dynamic security landscape  Continued increase in sophistication and prevalence of threats which require multiple security protections  Increased enterprise adoption of Web 2.0 applications and IP-based services provide new methods of attack  Regulatory compliance pressures (SOX, PCI, etc.)  Slowing growth of IT budgets driving higher demands for ROI  Rising complexity and cost of managing and maintaining multiple security solutions  Increased pressure to improve security service while reducing TCO  Corporate concern for the environment/desire to be “green”

Fortinet Confidential Financial “Belt Tightening”  Slowing growth of IT budgets driving higher demands for ROI  Rising complexity and cost of managing and maintaining multiple security solutions  Increased pressure to improve security service while reducing TCO ROI = Return on Investment

Fortinet Confidential Financial Uncertainty February 12, 2008 “IDC and Forrester Research Inc. lowered their forecasts for information-technology spending this year amid weakening economic data.” —The Wall Street Journal Forecasts for IT Spending Are Cut. (2008, February 12). Wall Street Journal (Eastern Edition), p. B.2.

Fortinet Confidential Reducing Footprint “96% of data centers will run out of capacity by 2011” — Emerson Network Power

Fortinet Confidential Reducing Footprint  Over 50% of customers consider IT vendors' "greenness" when selecting a supplier.  One-third of customers already consider it "important" to "very important" that IT suppliers have green offerings.  Almost 80% of executives say that Green IT is growing in importance for their organization. Source: The Growing Importance of Green IT: Findings from IDC's U.S. Green IT Survey Nov 2007, Doc #209445

Fortinet Confidential Consolidate for Enhanced Security  Comprehensive, integrated security platform  Full breadth of network and content security on a single appliance  Superior threat protection  Integrated threat research; global research team provides 24x7x365 coverage  More effective and efficient security management  Centralized management and reporting  Simplified deployment, configuration and maintenance  Unified logging and reporting

Fortinet Confidential Consolidate to Reduce TCO  Lower capital expenditures (CapEx)  Fewer devices to purchase, manage and maintain  Virtualization to manage up to thousands of security profiles from one platform  Lower operational expenditures (OpEx)  Smaller investment on training and support  Simplified management, maintenance, renewals and threat update subscriptions  Long-term investment protection  Future-proof devices: service activation as security needs grow  Per-device license model

Fortinet Confidential Consolidate for Environmental Benefits  Smaller hardware footprint  Reduced data center space with multi-threat security appliances and virtualized security chassis  Reduced power consumption over multiple standalone systems  Green impact  Energy/emission reduction across the entire life cycle with less manufacturing, cabling and recycling

Fortinet Confidential The Network Security Consolidation Imperatives Preserve Your Investment ∙ Lower CapEx with fewer hardware requirements ∙ Lower OpEx with reduced management complexity ∙ Increase functionality without increasing hardware Reduce Your Footprint ∙ More robust security capabilities with less hardware ∙ More powerful protection with less power consumption ∙ More network defense with less cost of ownership Protect Your Network ∙ Network content-level protection ∙ Data integrity-level protection ∙ Enterprise-level strength

Fortinet Confidential A New Security Architecture is Required  Antispam  Reduce unwanted  Web filters  Eliminated unproductive web-browsing  VPN  Delivering secure remote access  Firewall  Defend against intrusions  Antivirus  Protect from virus infection  IPS  Protect against malicious attacks VPN IPS Users Servers Firewall Antivirus Antispam URL Filters

Fortinet Confidential  Real Disadvantages  Requires multiple products that don’t talk to each other  Increases network complexity and operational costs  Negative impact to environment  Non-optimal security implementation Multiple Point Solutions Add Complexity & Cost  Perceived Advantages  Comprehensive security approach  Quickly react to individual threats VPN IPS Users Servers Firewall Antivirus Antispam URL Filters

Fortinet Confidential Fortinet Consolidated Network Security VPN IPS Users Servers Firewall Antivirus Antispam URL Filters  Provides comprehensive security  Minimizes down-time from individual threats  Reduces number of vendors and appliances  Simplifies security management  Coordinates security alerting, logging, and reporting  Improves detection capabilities  Improves TCO

Fortinet Confidential Agenda Virtualized Network Security Network Security Consolidations Imperatives About Fortinet 1 2 3

Fortinet Confidential Company Overview  Leading provider of ASIC-accelerated Unified Threat Management (UTM) Security Solutions  Company Stats  Founded in 2000 by Ken Xie (Former NetScreen Founder)  Silicon Valley based with offices worldwide  1,000+ employees / 500+ engineers  350,000+ FortiGate devices shipped worldwide  Strong, validated technologies and products  11 patents; 80+ pending  Seven ICSA certifications (FIRST and ONLY security vendor)  Government Certifications (FIPS-2, Common Criteria EAL4+)  Virus Bulletin 100 approved

Fortinet Confidential Large Global Installed Base Blue Chip Customers Fortinet products are used by: 20,000+ customers WW The world’s leading enterprises, telcos and service providers Major government education, healthcare and retail institutions

Fortinet Confidential Market Leadership & Growth Fortinet pioneered the UTM market & has been the WW UTM market leader for the past 3 years -- source: IDC, 2007  By 2011 UTM will be the largest single market with a CAGR of 26.2%

Fortinet Confidential Fortinet Leads Across UTM Market “Fortinet is the leading vendor in the UTM security appliance market” “Fortinet’s UTM product portfolio is seeing success across all price bands, including the high end, which has been the hardest sell for many vendors”

Fortinet Confidential Spam X Virusesworms Next-Generation Security Gateways Hacker X FortiGate Internet Real-Time Content Security at the Network Edge Web filtering / Bannedcontent X IntrusionsPrevention X Instant Message / P2P security X

Fortinet Confidential Comprehensive Product Portfolio FortiGate-60A – FortiGate-100A SMB & Remote Office FortiGate-200A – FortiGate-800F Enterprise FortiGate-1000A – FortiGate-5000 Carrier, MSSP & Large Enterprise FortiAnalyzer/FortiManager Centralised Management FortiGate UTM Appliances FortiMail Security

Fortinet Confidential Fortinet Unique Value Proposition Security Multi-Layered 1 Performance Scalable & Line Speed 2 Cost Low Cap and Op Ex 3 Flexibility Broad Hardware OfferingSecurity Software ModulesSecurity Subscription 4

Fortinet Confidential Thank You! For more information, please visit us at: Protect Your Network Reduce Your Footprint Preserve Your Investment