Presentation is loading. Please wait.

Presentation is loading. Please wait.

B&Data Solutions Day 2008 Think Beyond a Virtualized Infrastructure The Network Security Consolidation Imperatives - Protect, Preserve and Reduce Flora.

Similar presentations


Presentation on theme: "B&Data Solutions Day 2008 Think Beyond a Virtualized Infrastructure The Network Security Consolidation Imperatives - Protect, Preserve and Reduce Flora."— Presentation transcript:

1 B&Data Solutions Day 2008 Think Beyond a Virtualized Infrastructure The Network Security Consolidation Imperatives - Protect, Preserve and Reduce Flora Chan Regional Manager, Hong Kong & Macau

2 Fortinet Confidential Virtualized Network Security Network Security Consolidation Imperatives About Fortinet 1 2 3 Agenda

3 Fortinet Confidential  Consolidation of Physical Resources  Reduction in Power Consumption  Control / Provide Growth  Simplify System Maintenance  Optimize Resource Utilization Source: The Economist, May 22 nd 2008 Virtualization Drivers

4 Fortinet Confidential Secure Virtualization: A New Paradigm  Virtualization is the most important solution being implemented in the Enterprise Data Center today.  This creates the need for a ‘security for virtualization’ paradigm that protects virtual environments in ways beyond what is currently available to protect physical environments. Gartner Group: Enterprises that do not leverage virtualization technologies will spend 25% more annually for hardware, software, security, labor, and space for their infrastructure.

5 Fortinet Confidential Network Complexity  Enterprise networks are complex before network security is considered  Implementing traditional internal network security is challenging and costly  Information security policies are commonly defined but implementing to specifications is difficult

6 Fortinet Confidential Network Security Requirements  Performance  Management / Reporting  Flexibility  Content Security  Reliability / Density  Logging / Reporting

7 Fortinet Confidential Network Security Considerations  High availability  Out-of-Band management  Troubleshooting  Product upgrades  Product support  Hardware cost  Added network complexity

8 Fortinet Confidential Fortinet’s Virtualization - Virtual Domains Virtual Domains (VDOMs)  Enable a single FortiGate system to function as multiple independent virtual FortiGate systems Up to 500 VDOMs supported per physical FortiGate device

9 Fortinet Confidential Virtualized Network Security Each VDOM can be configured with custom:  Virtual Routing features (Static, PBR, OSPF, BGP, RIP, Multicast)  Virtual Firewall (All Firewall features)  Virtual VPN (IPSec VPN, SSL VPN, PPTP)  Virtual IPS (Signature/Anomaly based, Protocol decoding)  Virtual Web filtering (84 Web Filter categories)  Virtual Antivirus (HTTP, FTP, SMTP, IMAP, POP3, NNT, ICQ, MSN, Yahoo, AIM)  Virtual Antispam (SMTP, POP3, IMAP)

10 Fortinet Confidential Fortinet’s VDOMs Each VDOM contains its own virtual interfaces, route table, state table, application proxies, and IPS table instances.

11 Fortinet Confidential Virtualized Management Multiple Administrative domains  Administrative Domain (ADOM)  Per customer/device group policy management  Per customer/device report generation  Supports VDOM groups and device groups or combinations of them Fortimanager Admin 2 Device Group 2 Device Group 1 FortiAnalyzer Admin 1 Customer 1 Customer 2

12 Fortinet Confidential Virtualized Reporting  Customizable with Customer/Private Branding  Per VDOM reporting  Per ADOM log access

13 Fortinet Confidential INTERNET Virtualized Network Security Back Bone Switching Centralized Logging and Reporting Out of Band Management w/ Department A HA security solution with Virtual Solutions Department B Department C Project A Project B Project C Server Farm Internet Access Enterprise

14 Fortinet Confidential Virtualized Network Security Benefits FortiGate Virtual Domains provide:  Flexibility for network topology changes  Consolidation of network security resources  Reduction in physical network complexity

15 Fortinet Confidential Agenda Virtualized Network Security Network Security Consolidation Imperatives About Fortinet 1 2 3

16 Fortinet Confidential Consolidation is all Around Us! Just a few examples:  Mobile Phones  Companies  Telecommunications / Video And most importantly:  Network Security

17 Fortinet Confidential Consolidation Market Drivers  Dynamic security landscape  Continued increase in sophistication and prevalence of threats which require multiple security protections  Increased enterprise adoption of Web 2.0 applications and IP-based services provide new methods of attack  Regulatory compliance pressures (SOX, PCI, etc.)  Slowing growth of IT budgets driving higher demands for ROI  Rising complexity and cost of managing and maintaining multiple security solutions  Increased pressure to improve security service while reducing TCO  Corporate concern for the environment/desire to be “green”

18 Fortinet Confidential Financial “Belt Tightening”  Slowing growth of IT budgets driving higher demands for ROI  Rising complexity and cost of managing and maintaining multiple security solutions  Increased pressure to improve security service while reducing TCO ROI = Return on Investment

19 Fortinet Confidential Financial Uncertainty February 12, 2008 “IDC and Forrester Research Inc. lowered their forecasts for information-technology spending this year amid weakening economic data.” —The Wall Street Journal Forecasts for IT Spending Are Cut. (2008, February 12). Wall Street Journal (Eastern Edition), p. B.2.

20 Fortinet Confidential Reducing Footprint “96% of data centers will run out of capacity by 2011” — Emerson Network Power http://www.liebert.com/information_pages/NewsRelease.aspx?id=2386

21 Fortinet Confidential Reducing Footprint  Over 50% of customers consider IT vendors' "greenness" when selecting a supplier.  One-third of customers already consider it "important" to "very important" that IT suppliers have green offerings.  Almost 80% of executives say that Green IT is growing in importance for their organization. Source: The Growing Importance of Green IT: Findings from IDC's U.S. Green IT Survey Nov 2007, Doc #209445

22 Fortinet Confidential Consolidate for Enhanced Security  Comprehensive, integrated security platform  Full breadth of network and content security on a single appliance  Superior threat protection  Integrated threat research; global research team provides 24x7x365 coverage  More effective and efficient security management  Centralized management and reporting  Simplified deployment, configuration and maintenance  Unified logging and reporting

23 Fortinet Confidential Consolidate to Reduce TCO  Lower capital expenditures (CapEx)  Fewer devices to purchase, manage and maintain  Virtualization to manage up to thousands of security profiles from one platform  Lower operational expenditures (OpEx)  Smaller investment on training and support  Simplified management, maintenance, renewals and threat update subscriptions  Long-term investment protection  Future-proof devices: service activation as security needs grow  Per-device license model

24 Fortinet Confidential Consolidate for Environmental Benefits  Smaller hardware footprint  Reduced data center space with multi-threat security appliances and virtualized security chassis  Reduced power consumption over multiple standalone systems  Green impact  Energy/emission reduction across the entire life cycle with less manufacturing, cabling and recycling

25 Fortinet Confidential The Network Security Consolidation Imperatives Preserve Your Investment ∙ Lower CapEx with fewer hardware requirements ∙ Lower OpEx with reduced management complexity ∙ Increase functionality without increasing hardware Reduce Your Footprint ∙ More robust security capabilities with less hardware ∙ More powerful protection with less power consumption ∙ More network defense with less cost of ownership Protect Your Network ∙ Network content-level protection ∙ Data integrity-level protection ∙ Enterprise-level strength

26 Fortinet Confidential A New Security Architecture is Required  Antispam  Reduce unwanted email  Web filters  Eliminated unproductive web-browsing  VPN  Delivering secure remote access  Firewall  Defend against intrusions  Antivirus  Protect email from virus infection  IPS  Protect against malicious attacks VPN IPS Users Servers Firewall Antivirus Antispam URL Filters

27 Fortinet Confidential  Real Disadvantages  Requires multiple products that don’t talk to each other  Increases network complexity and operational costs  Negative impact to environment  Non-optimal security implementation Multiple Point Solutions Add Complexity & Cost  Perceived Advantages  Comprehensive security approach  Quickly react to individual threats VPN IPS Users Servers Firewall Antivirus Antispam URL Filters

28 Fortinet Confidential Fortinet Consolidated Network Security VPN IPS Users Servers Firewall Antivirus Antispam URL Filters  Provides comprehensive security  Minimizes down-time from individual threats  Reduces number of vendors and appliances  Simplifies security management  Coordinates security alerting, logging, and reporting  Improves detection capabilities  Improves TCO

29 Fortinet Confidential Agenda Virtualized Network Security Network Security Consolidations Imperatives About Fortinet 1 2 3

30 Fortinet Confidential Company Overview  Leading provider of ASIC-accelerated Unified Threat Management (UTM) Security Solutions  Company Stats  Founded in 2000 by Ken Xie (Former NetScreen Founder)  Silicon Valley based with offices worldwide  1,000+ employees / 500+ engineers  350,000+ FortiGate devices shipped worldwide  Strong, validated technologies and products  11 patents; 80+ pending  Seven ICSA certifications (FIRST and ONLY security vendor)  Government Certifications (FIPS-2, Common Criteria EAL4+)  Virus Bulletin 100 approved

31 Fortinet Confidential Large Global Installed Base Blue Chip Customers Fortinet products are used by: 20,000+ customers WW The world’s leading enterprises, telcos and service providers Major government education, healthcare and retail institutions

32 Fortinet Confidential Market Leadership & Growth Fortinet pioneered the UTM market & has been the WW UTM market leader for the past 3 years -- source: IDC, 2007  By 2011 UTM will be the largest single market with a CAGR of 26.2%

33 Fortinet Confidential Fortinet Leads Across UTM Market “Fortinet is the leading vendor in the UTM security appliance market” “Fortinet’s UTM product portfolio is seeing success across all price bands, including the high end, which has been the hardest sell for many vendors”

34 Fortinet Confidential EmailSpam X Virusesworms Next-Generation Security Gateways Hacker X FortiGate www.find_a_new_job.com www.free_music.com www.pornography.com Internet Real-Time Content Security at the Network Edge Web filtering / Bannedcontent X IntrusionsPrevention X Instant Message / P2P security X

35 Fortinet Confidential Comprehensive Product Portfolio FortiGate-60A – FortiGate-100A SMB & Remote Office FortiGate-200A – FortiGate-800F Enterprise FortiGate-1000A – FortiGate-5000 Carrier, MSSP & Large Enterprise FortiAnalyzer/FortiManager Centralised Management FortiGate UTM Appliances FortiMail Email Security

36 Fortinet Confidential Fortinet Unique Value Proposition Security Multi-Layered 1 Performance Scalable & Line Speed 2 Cost Low Cap and Op Ex 3 Flexibility Broad Hardware OfferingSecurity Software ModulesSecurity Subscription 4

37 Fortinet Confidential Thank You! For more information, please visit us at: http://www.fortinet.com/ Protect Your Network Reduce Your Footprint Preserve Your Investment


Download ppt "B&Data Solutions Day 2008 Think Beyond a Virtualized Infrastructure The Network Security Consolidation Imperatives - Protect, Preserve and Reduce Flora."

Similar presentations


Ads by Google