Selling Fortinet to financial sector Kanwar Loyal Finance Specialist Date.

Slides:



Advertisements
Similar presentations
THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Advertisements

The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
True Unified Threat Management
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Misys Treasury & Capital Markets
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
BUSINESS WITH CONFIDENCE icaew.com A presentation by Clive Lewis Head of Enterprise, ICAEW Managing the recovery and ensuring growth.
The IT question in a downturn! Natalie Ayres IT for the M Business 08
ETrust End to End Security Management Bernd Dultinger Sales Manager South CEE & Turkey.
Copyright © 2004 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill /Irwin Chapter One Introduction.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
Security Controls – What Works
MSIT 458: Information Security & Assurance By Curtis Pethley.
Unified Logs and Reporting for Hybrid Centralized Management
Introduction to Fortinet Unified Threat Management
1 Chapter 12 Planning for Electronic Business: Resource and Implementation Issues.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
Morgan Stanley December 7th, 2004 By Adam Freda.
1 Chapter 12 Planning for Electronic Business: Resource and Implementation Issues.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Functions and Forms of Banking Outline –What is a bank? –What do banks do for their customers? –Why do banks perform those services? –How do banks compare.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Managing Virtual Environments: Big Deal or No-brainer? Andi Mann Research Director Enterprise Management Associates.
Banking Clouds V International Youth Banking Forum.
GROCERY INDUSTRY, PRIVATE BRANDS AND ITS EVOLUTION Joe McKie, Vice President, Private Brands Food Marketing Institute.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
[Name / Title] [Date] Effective Threat Protection Strategies.
©2007, The McGraw-Hill Companies, All Rights Reserved Chapter One Introduction.
Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill /Irwin Chapter One Introduction.
Integrated Risk architecture: Implementation Issues FICCI - IBA conference on “Global Banking – paradigm shift” on October 5 th 2005.
Opening Keynote Presentation An Architecture for Intelligent Trading  Alessandro Petroni – Senior Principal Architect, Financial Services, TIBCO Software.
Financial Markets and Institutions. Financial Markets Financial markets provide for financial intermediation-- financial savings (Surplus Units) to investment.
Dell Connected Security Solutions Simplify & unify.
1-1 CHAPTER 1 An Overview of Financial Management.
How to Guide Customers through the Software + Services Decision Making Process PHIL MEYER Software Services – Technology Specialist
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
THE CIO ROLE ON THE NEW FINANCIAL ENVIRONMENT Gustavo de Souza Fosse Banco do Brasil Board of Technology Organized by:
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
The Privatisation of Royal Mail Presentation to ICEA by David Stubbs.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Network security Product Group 2 McAfee Network Security Platform.
Financial Markets and Institutions 6th Edition
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
Third Quarter 2001 Financial Results October 17, 2001.
HUAWEI TECHNOLOGIES CO., LTD. Huawei FusionSphere Key Messages – Virtualization, Cloud Data Center, and NFVI.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Proposal and Company Information Document CONTENT About Indagatio Research Our Research Offerings Why Indagatio Research Our Work Process Project Snapshot.
Total Enterprise Mobility Comprehensive Management and Security
The Derivitec Risk Portal Provides Powerful, Cost-Effective Risk Management Solutions, Powered by Azure, that Deploy in Minutes MICROSOFT AZURE ISV PROFILE:
AT&T Premises-Based Firewall Enhanced SBS Solution
Virtualization & Security real solutions
ESG 2010 IT Spending Intentions Survey
Managing Chaos: Data Movement in 2014 Steve Jordan
Contact Center Security Strategies
DATS International Portfolio.
Introduction to the 3rd Gen Fortinet Security Fabric
Presentation transcript:

Selling Fortinet to financial sector Kanwar Loyal Finance Specialist Date

AGENDA Market conditions Fortinet for Financial institutions Finance drivers and positioning Q and A

The Market – Leaner Economic Climate Greatest hit but first to recover. Single biggest contributor to G7GDP (14% UK GDP, 2007 Risk averse selling. Banking IT Strategy under duress. Cost cutting and asset sweating will dominate IT decision-makers in 2009, Long-term strategic view on IT security and compliance will delay projects. Bank mergers IT integration projects taking priority over new investment. Introducing competition and uncertainty. CxO greater scrutiny of budget sign off, leading to delays and back burner projects.

Investment Banking revival Bank2008 pre-tax profitQ pre-tax profit JPMorgan-Chase€-791m€1055m UBSSfr.-19.2bnSfr.-1.8bn Barclays Capital€1.41bn€ 989 Deutsche Bank€-6.76bn€ 59.7m Goldman Sachs€ 1.3bn€ 545.5m

Yesterdays’ news Royal Bank of Scotland to spend € 6.5bn on IT J.P. Morgan Chase & Co. said third-quarter earnings rose sevenfold to $3.59 billion (€ 2.43 B) Goldman Sachs release figures today Stock markets are climbing again!! Yesterday - new record high

Fortinet value proposition to Finance Requirements & Trends Exposure to Risk – Tougher regulation. Audit points and compliance. Accelerate and secure market data Making Banks money. Competitive edge.- low latency- Arbitrage trading High performance trading Saving money. Capital and Operational efficiencies. Strategic sourcing. Consolidation M&A Cost saving initiatives. Security Virtualisation. FortiClient FortiScan FortiMail FortiWeb FortiDB FortiGate Fortinet High performance platform

Fortinet Delivering Low Latency Trading Low latency trading at the edge. Dealing with high-volume quant trading and stat arbs. Equities, derivatives and FX. Aggressive algorithm trading. Competitive edge - Better trading and portfolio decisions Every day capital markets firms must capture, store and process vast volumes of market and trade-related data with very low latency. Deliver market information to individuals at any location so they can make better trading and portfolio decisions across the entire trade lifecycle. Milliseconds will matter Low latency will be key for trading firms

Fortinet Low Latency Network Acceleration Low latency data acceleration with security in mind. ASIC/FPGA/Dual Processor architecture for line rate data processing and forwarding. Custom architecture delivering Firewalling up to 182 Gbps. Latency across ingress/egress sub 5 microseconds. Zero packet loss ensuring integrity of low latency data transfer. Equity and derivatives – 10Gbps/20Gbps and beyond solution Giving traders the competitive edge with best performance platform!!

Fortinet Accelerating Market Feeds  Multicast is a distribution application for market data services.  Effects exchanges and banks.  Risk to banks who do not secure.  1Gbps to 10gbps secure solution – no packet drop  Fortinet solution delivers:- Security Performance ROI

Fortinet Risk & Compliance Solution Risk and exposure – audit points who will sign the risk off? Assets / Databases / Applications Protection Awareness and controls need to be in place. Clear process to be defined Audit points Database and Assets - Controls, configuration, Vulnerabilities Database Auditing and Monitoring

High Performance Switching A New approach to 10GE DATACENTRE, purpose built with performance and scale in design. Lowest latency switching Highest scalability and availability – significant performance advantage Easy to deploy Chassis based Appliance Best price / performance

Simplification and Consolidation Cost cutting is essential month ROI Operational efficiency Systems, people, suppliers, event correlation, reporting, management, applications, network, data reduced risk! Strategic sourcing Strategic V’s Tactical.

Summary – Fortinet Business Value Compliance & Risk PCI/SOX/FSA/BASEL 2 Making money Latency reduction on trading flows Delivering market data Saving Money CAPEX/OPEX reduction – DO MORE with LESS Consolidation / Simplification / Virtualisation Strategic sourcing – Single vendor providing broad security offering and switching

Continued sophistication and prevalence of threats, requiring multiple security protections Regulatory compliance pressures (SOX, PCI, etc.) Impact of security breaches on business Higher performance to cope with evolution of business applications Distributed networks & mobile users Top concerns in IT Security Dynamic Threat Landscape IT Budget: Do more with less Complexity and cost of managing multiple security solutions Increased pressure to improve security service while reducing TCO Footprint Reduction Multiple Physical / Data Center Carbon Business Continuity

Navigating the Security Landscape Virtual Private Network (VPN) “Secure” private traffic across public networks Network Security Firewall “External” threat protection Application Security Application Firewall Protection for WebServices Applications Data Leak Prevention Preventing unautorized documents leaving the network Antivirus / Antimalware Detection and removal of malicious application content Content Security Web filtering Protection from harmful web sites and web content DataBase Security Protecting DBs from internal Threats Intrusion Prevention System (IPS) Monitoring and active protection from malicious traffic Messaging security Detection and protection from malicious Application Control Regardless the protocol or port being used

Summary Industry-leading security vendor End-to-end IT Security portfolio Best performance for security and switchingReduce risk, accelerate market data and reduce costSolutions that offer banks the competitive edge

Questions?