1 / 26

Fortinet and Hawaiian Telcom

Fortinet and Hawaiian Telcom. Mike Wysocki - Sales mwysocki@fortinet.com 310.536.0039 Daryl Jung - SE djung@fortinet.com 626.592.3789. Regulatory Pressures. Budgetary Constraints. Network Throughput. Network Throughput of Enterprise Data Center. Your Business Requirements Keep Growing.

nen
Download Presentation

Fortinet and Hawaiian Telcom

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Fortinet and Hawaiian Telcom Mike Wysocki - Salesmwysocki@fortinet.com 310.536.0039 Daryl Jung - SEdjung@fortinet.com 626.592.3789

  2. Regulatory Pressures Budgetary Constraints Network Throughput Network Throughput of Enterprise Data Center Your Business Requirements Keep Growing • Network requirements / demands accelerating • Security demands must co-exist • Industries demanding greater IT compliance • Compliance needs coming from government regulations as well as business partners / industry mandates • IT budgets shrinking • Security spend increasing Change in External IT Services Spending From FY09 to FY10 % 10GB SOX 404 HIPAA Multi-GB FISMA 1GB 100MB 10MB EU Data Protection Directive

  3. The Result: More Expense, Less Security, Less Control “I.T. departments must manage a growing array of specialized security technologiesthat may or may not work togetherto help security departments detect and halt attacks.” “Security Professionals Say Network Breaches Are Rampant” Ponemon Institute Survey New York Times 6/22/11

  4. Reducing Complexity Is Critical Q: What are the top security-related challenges your organization is facing? (base: of those that are involved in Security investments) • Source: Navigating IT: Objective & Obstacles Infoworld, May, 2011

  5. 12 Steps to Great Security (find 3 issues) • Simple Written Security Policy • Database and Network Vulnerability Assessments • Patch and Appliance Management • Redundancy: High-Availability & WAN-WAN • Grouping of Divisions… Data Leak Prevention • Content Filtering…Application Control • Integrated Anti-Virus/Gateway Anti-Virus • Log Reporting • Anti-Spam/Spyware • Secure your Tele-Commuters • Secure Wireless Access Points • ICSA/IPsec Firewall (with logging) & Intrusion Prevention

  6. The “Basic” Problems • Policy • Improve employee productivity • Meet regulatory requirements • Protection • Protect assets • Guard against threats • Process • Enable business growth • Increase efficiency

  7. Staggering Statistics • Internet users spent an average of 6 hours (100% increase from a year ago) on social networking sites & the average US worker spends almost 5.5 hours a month visiting social network sites from the office. • Nielson Reports: Internet & Social Media Consumer Insights, May ’10 • The use of social media at work is increasing with nearly 7% of all business Internet traffic going to Facebook, according to new analysis by managed security firm, Network Box. • BizReport: Social Media Cuts into Internet Bandwidth Consumption, April ’10 7

  8. Controlling Web Applications • Allow Facebook, but block Facebook applications • Farmville • Facebook Chat • Facebook Video • Allow YouTube, but block YouTube download • Allow Google Maps, but block Google Web Talk

  9. What are the Risks? • Lack of visibility and control • Many businesses are limited in their control of social networking. They use URL filters to either allow complete access to restrict the entire application. • Widening attack surface • Malicious code “is not just coming from the dark corners of the web,” like pornography, gaming and pharmaceutical sites. Its estimated that 77 percent is coming from legitimate sites. • Data loss potential • Social networking sites are all about collaboration and sharing—potentially even of sensitive data. Today, there is little control over data loss in social media arenas because policies do not typically cover what users contribute.

  10. Thinking Strategically About Security • Future-proof your security infrastructure • Anticipate change in threat scape • Look for opportunities to consolidate without compromise • Reduce complexity • Increase protection • Decrease risk • Lower CapEx & OpEx “ By 2010, only 10% of emerging security threats will require tactical point solutions, compared with 80% in 2005. Source: Gartner “

  11. The Result: Market Leadership Worldwide UTM Market Share Q3 20111 Magic Quadrant for Unified Threat Management2 IDC Worldwide Security Appliances Tracker, Sept 2011 (market share based on factory revenue) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, March 2012

  12. Fortinet: A New Approach TRADITIONAL SOLUTIONS Cumbersome and costly THE FORTINET SOLUTION Simple and cost-effective

  13. Anatomy of the FortiGate Solution FortiOS is the security hardened operating system that powers all FortiGate multi-threat security systems.

  14. FortiGate: Integrated Architecture FortiGuard™ Updates Real-Time Protection Fully Integrated Security & Networking Technologies Web Filter Antispam App Ctrl VM AV IPS Firewall VPN DLP WAN Opt Traffic Shaping WLAN VoIP SSL Insp HA Load Balancing SpecializedOS Hardened Platform Purpose-Built Hardware High Performance FortiCare™ FortiGuard Labs Support and Services • Purpose-built to deliver overlapping, complementary security • Provides both flexibility & defense-in-depth capabilities

  15. Centralized Visibility and Control:FortiManager & FortiAnalzyer • Single Pane of Glass Management • Global policy enforcement across 5 or 5,000 devices • Increased flexibility with granular role-based administration • Simplified configuration of Firewall, IPS, Application Controls and other protections • Centralized Analysis and Reporting • Continuous monitoring across the enterprise • Greater visibility into real-time incidents • Monitor activity by users identity • Automate compliance reporting

  16. Real Threat Protection in Action Problem: PORT 80 Error message: “Drops” copy of itself on system and attempts to propagate “Innocent” Video Link: Redirects to malicious Website “Out of date” Flash player error: “Download” malware file Solution: FIREWALL Integrated Web Filtering Blocks access to malicious Website Network Antivirus Blocks download of virus WEB FILTERING ANTIVIRUS Intrusion Protection Blocks the spread of the worm INTRUSION PROTECTION

  17. Threat Protection Solution for IM & P2P • Access Control • Enforce appropriate user access only • Limit IM functionalities (eg. File transfer) • Monitoring & Audit • Detailed conversation & File transfer logging • IM Message content archiving • Antivirus • Detects and block infected File transfers • Enforce File blocking by extensions • Attack Prevention • IPS signatures that stop attacks using known vulnerabilities of IM clients

  18. FortiGuard: Research, Updates, Services • FortiGuard Research: • Rootkits: Kernel Hooks • Botnets: Dynamic Monitoring, Spambots, New Malware Protocols • Malware: Code Techniques-PDF/Flash/Doc • Security: Exploits & Vulnerabilities, Zero Day Detection • Packer Research: Unpacking, Generic Detection • FortiGuard Services: • AV Signatures – 4x Daily • IPS Signatures – 2x Daily • Antispam/Web Content Filtering – Real Time • Sample Collection • Signature Creation • Alerts & Escalation • Global Distribution Network: • Application Control • Vulnerability Management • Antispam • Web Filtering • Intrusion Prevention • Antivirus

  19. Greening of IT…. Firewall / VPN IPS Antivirus Web Filtering FortiGate Appliance ¼ Physical Space ¼ Power Consumption = =

  20. Comprehensive Product Portfolio Powerful Centralized Management & Reporting Carrier, MSSP & Large Enterprise Enterprise FortiGate-1000A – FortiGate-5000 SMB & Remote Office FortiGate-200A – FortiGate-800F FortiGate-50B – FortiGate-100A Secure E-Mail & Client Software

  21. Global Installed Base • Fortinet at a glance: • 100,000+ customers • 900,000 appliances shipped • The world’s leading enterprises, telcos and service providers • Major government education, healthcare and retail institutions

  22. Why is Fortinet Successful in Hawaii? • Trained Partners – Hawaiian Telcom • Availability – 4 to 5 times a year in Hawaii for client meetings • Engineering Refreshers – 11 Since 2008 – No Cost (except parking) • Diverse island client base… • Enterprise • Hospitality • State and Local • K-12 • Retail • Higher Education

  23. Why Fortinet? Technology • ASIC Chips = speed + complete inspection • FortiGuard update network = always up to date • Custom hardware = purpose built for security • Scalable = ready for growth • Value = ability to replace multiple products in your network Cost / Ease of Management • Low TCO, no user fees, bundled pricing • No third party updates • One vendor to deal with support issues/billing • Fewer technical resources required to manage

  24. Fortinet Corporate Overview • Market Leader • UTM - Fast-growth security segment • Advanced technology and products • 101+ patents; 113+ pending • Strong global footprint • 1,700+ employees; 40 offices worldwide • Blue chip customer base • Over 125,000 customers (incl. majority of Global 100) • Exceptional financial model • FY11 revenues: $434M (34% YoY growth) • Q1/12 revenues: $117M (26% YoY growth) • Strong balance sheet: $600M+ in cash; no debt • IPO - November 2009 $434 FORTINET REVENUE ($MM) 55% CAGR $325 $252 $212 $155 $123 $80 $39 $13 03 04 05 06 07 08 09 10 11

  25. 4 Points = 1 Solution • Comprehensive solution • Integrated, strategic security • Lower TCO • Less complexity and easier management • Real-time security • 24/7 global updates • Strategic flexibility • Fit your timeline and budget

  26. Thank You www.fortinet.com

More Related