Icon Library Release notes

Slides:



Advertisements
Similar presentations
Intrusion Prevention anno 2012: Widening the IPS concept.
Advertisements

Innovative, Best-in-Class Technologies and Products
1 © Copyright 2013 Fortinet Inc. All rights reserved. Комплексная экосистема безопасности Мирослав Мищенко Менеджер по работе с ключевыми клиентами.
1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager.
True Unified Threat Management
What's new in Threat Management Gateway (TMG) 2010 Ronald Beekelaar
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Simon Garcia Jaramillo Network Administrator ATS Automation Tooling Systems.
Diagram & Icon Library Febuary 2009 Copyright © 2009 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and.
© 2008 McAfee, Inc. “Endpoint” Security Defining the endpoints and how to protect them.
National Symposium for Command & Control and Cyber Security
Introduction to Fortinet Unified Threat Management
LittleOrange Internet Security an Endpoint Security Appliance.
Rodney Neal Office 365 for Education Montgomery County Schools
Course 201 – Administration, Content Inspection and SSL VPN
University of Maryland I.T. Security Gerry Sneeringer IT Security Officer
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Course 201 – Administration, Content Inspection and SSL VPN
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
FortiClient Solutions Endpoint Security Anytime, Anywhere
Fortinet An Introduction
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
Fortinet An Introduction
ShareTech 2015 Next-Gen UTM.
Selling in the Telco sector JOSE GRANDMOUGIN EMEA SENIOR CONSULTANT
1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE.
Copyright 2009 Trend Micro Inc. 1 Classification 10/10/ New Trend Micro Security Suites for Enterprise and Medium Business Pre-Briefing for January.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Desktop Security: Making Sure Your Office Environment is Secure.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Threat Landscape Ryan Kane – SWAT Specialist - Secure Wireless, & Access Technologies Data Connectors ABQ December 2015.
Icon Library Slide 11 – Release notes
Sahltraining.com ENG.TAMER ZEIN Twitter.com/SAHLtraining Facebook.com/SAHLtraining
© Copyright Fortinet Inc. All rights reserved. The Fortinet Secured Network Матенко Александр,
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
What’s New in Fireware v WatchGuard Training.
Fortinet Confidential End-to-End Strategic Security Bryan Wood Manager – Western Channel Sales October 14th, 2009.
1 CONFIDENTIAL – INTERNAL ONLY1 Fortinet Confidential June 23, 2016 Securing The Cloud & Data Center.
Fortinet Overview &Advanced Threat Protection Ecosystem 22/10/2015
La sécurité Globale de votre SI du Poste de Travail au Cloud
2017 Security Predictions from FortiGuard Labs
The Changing World of Endpoint Protection
FortiCloud Hosted security analytics, log retention, and management
Security fabric Today’s world demands security without compromise.
Présentation Fortinet
Fortinet Overview Consolidated Security
Ilija Jovičić Sophos Consultant.
Securing Today’s Multi-Dimensional Cloud
Fortinet Company Overview
Barracuda Web Security Flex
Hybrid IT is Here. Security: First.
Security Fabric Salon MedIT 2017
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
NSE4-5.4 Dumps
© Copyright Fortinet Inc. All rights reserved. Anatomy of a SKU Q
Matt G change over point ?
IS4550 Security Policies and Implementation
NSE5 Dumps PDF Fortinet Network Security Expert 5 Written Exam (500) NSE5 DumpsNSE5 BraindumpsNSE5 Questions AnswersNSE5 Study Material.
UNM Enterprise Firewall
Transform your school with the power of the cloud
Secure once, run anywhere Simplify your security with Sophos
Bohuslav Partyk, Product Manager
Introduction to the 3rd Gen Fortinet Security Fabric
In the attack index…what number is your Company?
AT&T Firewall Battlecard
Diagram & Icon Library Febuary 2009
Presentation transcript:

Icon Library 12.30.14 Release notes 12.30.14 12.22.14 Slide 6 – Added FortiFone isometric, FortiGate Rugged isometric Slide 7 – Added FortiRecorder, simplified and isometric, FortiSwitch Rugged isometric Slide 8 – Added FortiVoice, simplified and isometric, Generic Rugged Isometrics Slide 8 - Added generic FortiWiFi isometric icon Slide 10 - Added Firewall and VPN Protection Technology Icons Added Generic Known and Generic Unknown Threat Icons 12.30.14

COMPANY – Logos

PLATFORM – Core Elements DARK LIGHT OPAQUE DARK LIGHT OPAQUE DARK LIGHT OPAQUE FortiGuard FortiASIC CP8 FortiOS 5.4 FortiCare FortiASIC DP2 FortiOS 5.2 FortiOS FortiASIC NP6 FortiOS 5.0 FortiASIC FortiASIC SoC2 FortiOS Editable X.X X.X X.X FortiASIC TP2 FortiASIC XP1 FortiASIC Editable Edit Edit Edit

PRODUCTS – 1 See slide 9 FortiADC FortiAnalyzer FortiAP DARK LIGHT VM DARK VM LIGHT CLOUD DARK CLOUD LIGHT RUGGED DARK RUGGED LIGHT STYLIZED ISO DESKTOP ISO 1U ISO 2U ISO 3U ISO ALT-1 ISO ALT-2 ISO ALT-3 FortiADC FortiAnalyzer FortiAP See slide 9 FortiAuthenticator FortiBridge FortiCache FortiCamera FortiCall

PRODUCTS – 2 FortiClient - Desktop FortiClient - Laptop DARK LIGHT VM DARK VM LIGHT CLOUD DARK CLOUD LIGHT RUGGED DARK RUGGED LIGHT STYLIZED ISO DESKTOP ISO 1U ISO 2U ISO 3U ISO ALT-1 ISO ALT-2 ISO ALT-3 FortiClient - Desktop FortiClient - Laptop FortiClient - Mobile FortiCloud FortiDB FortiDDoS FortiDeploy FortiExtender

PRODUCTS – 3 FortiFone FortiGate FortiGate Chassis Blade DARK LIGHT VM DARK VM LIGHT CLOUD DARK CLOUD LIGHT RUGGED DARK RUGGED LIGHT STYLIZED ISO DESKTOP ISO 1U ISO 2U ISO 3U ISO ALT-1 ISO ALT-2 ISO ALT-3 FortiFone FortiGate FortiGate Chassis Blade FortiGate Voice FortiGlobal FortiMail FortiManager FortiPresence

PRODUCTS – 4 FortiPrivateCloud FortiRecorder FortiRPS FortiSandbox DARK LIGHT VM DARK VM LIGHT CLOUD DARK CLOUD LIGHT RUGGED DARK RUGGED LIGHT STYLIZED ISO DESKTOP ISO 1U ISO 2U ISO 3U ISO ALT-1 ISO ALT-2 ISO ALT-3 FortiPrivateCloud FortiRecorder FortiRPS FortiSandbox FortiSIEM FortiSwitch FortiTap FortiTester

PRODUCTS – 5 FortiToken FortiVoice FortiWAN FortiWeb FortiWiFi DARK LIGHT VM DARK VM LIGHT CLOUD DARK CLOUD LIGHT RUGGED DARK RUGGED LIGHT STYLIZED ISO DESKTOP ISO 1U ISO 2U ISO 3U ISO ALT-1 ISO ALT-2 ISO ALT-3 FortiToken FortiVoice FortiWAN FortiWeb FortiWiFi Generic Fortinet RUGGED Rugged Outdoor AP Outdoor AP Remote AP Indoor AP (No Antennas) Indoor AP (Antennas) Other form factors FortiAP NOTE: Images were enlarged to show detail. These are not at same scale as server icons.

THREATS & THREAT SERVICES – 1 FortiGuard Service Generic Protection Technology FortiGuard Service PROTECTION TECHNOLOGY Generic Protection Technology DARK LIGHT OPAQUE LIGHT DARK DARK LIGHT OPAQUE LIGHT DARK Anti-botnet IP Reputation Intrusion Prevention Application Control Antivirus Web Application Security Vulnerability Management Advanced Threat Protection Anti-spam Database Protection Web Filtering

THREATS & THREAT SERVICES – 2 Base Image Threat Generic Protection Technology GREY RED DARK LIGHT GREY RED LIGHT DARK Botnet Malicious URL Firewall Hacker, Cybercriminal, Botmaster, ID Thief… Malicious App VPN Malware Malicious Code Vulnerability Exploit Generic Known Threat Spam/Phishing Message Generic Unknown Threat

NETWORK ELEMENTS – Buildings 1 FLAT ISOMETRIC FLAT ISOMETRIC Branch Office Retail Large Mid-Enterprise Retail Small Enterprise Small Business Headquarters Residential

NETWORK ELEMENTS – Buildings 2 FLAT ISOMETRIC FLAT ISOMETRIC Government Church University Hospital School Power Plant Bank Manufacturing

NETWORK ELEMENTS – Vertical Related Coming soon

NETWORK ELEMENTS – Other Computers, users, other devices, more coming soon