0 évaluation0% ont trouvé ce document utile (0 vote)
163 vues28 pages
This document discusses Fortinet, a cybersecurity company, and its products and financial performance. It summarizes Fortinet's strong revenue growth over time, large global customer base, and portfolio of security products. It then outlines new features and capabilities in the latest FortiOS 5.0 operating system release that provide more security, control and intelligence for customers.
This document discusses Fortinet, a cybersecurity company, and its products and financial performance. It summarizes Fortinet's strong revenue growth over time, large global customer base, and portfolio of security products. It then outlines new features and capabilities in the latest FortiOS 5.0 operating system release that provide more security, control and intelligence for customers.
This document discusses Fortinet, a cybersecurity company, and its products and financial performance. It summarizes Fortinet's strong revenue growth over time, large global customer base, and portfolio of security products. It then outlines new features and capabilities in the latest FortiOS 5.0 operating system release that provide more security, control and intelligence for customers.
The Power to Control Fortinet Juha Lindstrm Senior Systems Engineer jlindstrom@exclusive-networks.com 2 Fortinet Confidential Fortinet in Figures $434 $39 $80 $123 $155 $212 $252 $325 FORTINET REVENUE ($M) 55% CAGR
Q212 Revenue $129 M 25% Y/Y Growth $13 03 04 05 06 07 08 09 10 11 Strong global footprint 1,800+ employees; 30+ offices worldwide 100% security End-to-end product portfolio 5 th generation of operating system 112 patents; 104 pending Customer-proven solutions 150,000 customers (incl. majority of Global 100) Shipped 1 million+ FortiGate appliances to date Attractive financial model Billings: $475.8 million in 2011, goal: $600 million company in 2012 Cash flow positive & profitable Strong balance sheet: $640+ million in cash - no debt IPO completed in November 2009 FTNT #9 in Barrons Techs Top 10
3 Fortinet Confidential ! 3 4 Fortinet Confidential April 10, 2013 Setting the Y2013 stage 5 Fortinet Confidential Network Trends Wired Connectivity Moving Beyond 10G Ubiquitous Wireless Connectivity Mobile Devices Everywhere Video and Audio Content IPv6 a Reality Background 6 Fortinet Confidential Security Trends Visibility of Traffic Accuracy of Detection Policy Explosion Log Explosion Threats Scale Background 7 Fortinet Confidential No Change Budget Department Size Background 8 Fortinet Confidential April 10, 2013 FortiOS 5.0 9 Fortinet Confidential FortiOS 5 More Security More Control More Intelligence More Power 10 CONFIDENTIAL INTERNAL ONLY Over 150 New Features & Enhancements Fighting Advanced Threats -------------------------------------- ! Client Reputation ! Advanced Anti-malware Protection More Security Securing Mobile Devices ------------------------------------ ! Device Identification ! Device Based Policy ! Endpoint Control More Control Making Smart Policies ------------------------------------- ! Identity Centric Enforcement ! Secured Guest Access ! Visibility & reporting More Intelligence FortiOS 5 Highlights 11 CONFIDENTIAL INTERNAL ONLY Fighting Advanced Threats Client Reputation Advanced Anti-malware Protection
More Security 12 Fortinet Confidential Ranking Client Reputation
Identification Policy Enforcement Multiple Scoring Vectors Reputation by Activity Threat Status Real Time, Relative, Drill-down, Correlated Identify potential zero-day attacks Score Computation Zero Day Attack Detection 13 Fortinet Confidential Zero Day Attack Protection: Client Reputation 14 Fortinet Confidential Multi-pass Filters In-box Enhanced AV Engine Cloud Based AV Service Hardware Accelerated & Code optimized
Real time updated, 3 rd party validated Signature DB Local Lightweight Sandboxing
Behavior / Attribute Based Heuristic Detection
Application Control Botnet Category FortiGuard Botnet IP Reputation DB
Cloud Based Sandboxing Improves threat . detection Advanced Anti-Malware Protection 15 CONFIDENTIAL INTERNAL ONLY Securing Mobile Devices Device Identification Device Based Policy
More Control 16 Fortinet Confidential See It! Control IT
Seamless integration! BYOD Device Identity & Policies Device Based Identity Policies Agentless Agent based Device Identification Access Control Security Application UTM Profiles Awareness 17 Fortinet Confidential Device Identification 18 Fortinet Confidential Authorized Device Device Based Policy ! Securely adopt BYOD ! Setup different security and network usage policies based on device types Personal Device !DMZ !INTERNET DMZ !INTERNET More Control 19 CONFIDENTIAL INTERNAL ONLY Making Smart Policies Identity Centric Enforcement Visibility & Reporting
More Intelligence 20 Fortinet Confidential Identity = Policy External Radius Service Windows AD Citrix Environment = M.Jones = = S.Lim = = V.Baker = = J.Jackson = Captive Portal 802.1x Users identified without additional logins FortiClient DMZ DMZ Users assigned to their policies Identity-Centric Enforcement FSSO
Identity based Policies 21 Fortinet Confidential Single Sign-On and Role Based Policies ! Authorized network access based on user credentials secure network right at entry point ! Reuse captured information for security policies unifies security configurations and offers better user experience. ! Reduce administrative tasks & configuration errors
Marketing, Management Operation, Staff !CMS !INTERNET CMS !INTERNET M.Jones S.Lim SSID: STAFF SSID: MGMT Identity-Centric Enforcement 22 Fortinet Confidential Deep Insights New PDF Formatting Drill-downs Per User Summary
FortiManager FortiCloud
Comprehensive reports Visibility & Reporting 23 CONFIDENTIAL INTERNAL ONLY Next generation ASICS SOC2, CP8, NP6 Lowest TCO
More Power 24 Fortinet Confidential Custom ASICs Foundation For Unmatched Performance FortiASIC FortiASIC FortiASIC Security Processor Network Processor Content Processor Network Interfaces General Purpose CPU Content Processor (ASIC) Accelerate computationally intensive tasks Network Processor (ASIC) Low latency hardware accelerated firewall Security Processor (Hybrid) Multi-core processor combined with CP ASIC
25 Fortinet Confidential Newest ASIC Generation Latency & Throughput ------------------------------------- ! IPS Signatures ! Application Control FortiASIC-CP8 ------------------------------------ ! Mid Range & High End ! IPS Engine Acceleration ! Application Control FortiSOC2 -------------------------------------- ! Entry Level ! Combines NP4LT, CP8 and Dual Core CPU
FortiASIC-NP6 ------------------------------------- ! 40Gbps IPv4 & IPv6 ! Multicast 26 Fortinet Confidential FortiGate 20-1000 Series LARGE ENTERPRISE FortiGate 1000-3000 Series SERVICE PROVIDER SMALL/MEDIUM ENTERPRISE FortiGate 3000-5000 Series FortiManager FortiAnalyzer FortiMail FortiWeb FortiDB FortiScan FortiSwitch FortiDDoS FortiAuthenticator FortiBalancer FortiCache FortiVoice Control the IT Infrastructure 27 Fortinet Confidential NSS IPS Security Value Map FG-3240C Highlights 96% Block Rate 100% Evasion Detection 6.25 Gbps Performance $19 per protected Mbps
28 Fortinet Confidential April 10, 2013 Thank you!