You are on page 1of 46

Solutions Overview

Brandon Swanson
Channel Account Manager

Fortinet
Fortinet
Confidential
Confidential
Fortinet Corporate Overview

• Founded in 2000 Fortinet Revenue


• Global presence with 30+
offices worldwide
• 5,000+ channel

GR
partners

CA
.8%
• 75,000+ customers

74
(including the
majority of the
Fortune Global 100)
• 1,150+ employees
• IPO Nov 2009
• 2008 sales of ~$212MM
(36% YoY growth)
• World class management
team

Fortinet 2
Confidential
Customers Worldwide

Seven of Top 10 Fortune 500


Five of Top 10 Global 500 in EMEA
Seven of Top 10 Global 500 in APAC
Six of Top 10 Global 500 Commercial & Savings
Banks
Seven of Top 10 Global 500 Aerospace &
Defense
Two of Top 5 Global 500 in IT Services

Fortinet
Confidential
UTM Market Growth
• By 2011 UTM will be the largest
single market with a CAGR of 26.2%
• UTM has already surpassed firewall
market $3 . 1B

$1 . 3B

$2 . 0B
$1 . 2B

$1 . 5B

$1 . 3B

2007 2008 2009


oneered the UTM market and is the2010
WW UTM market
2011leader

Fortinet
Confidential
Why Fortinet?

 Technology

1.ASIC Chips = speed + complete inspection


2.FortiGuard update network = always up to date
3.Custom hardware = purpose built for security
4.Scalable = ready for growth

Cost / Ease of Management

§ Low TCO, no user fees, bundled pricing


§ No third party updates
§ One vendor to deal with support issues/billing
§ Fewer technical resources required to manage

Fortinet 5
Confidential
The Threats You Face Continue to Grow

In Number… In Severity… In Complexity…

Exponential Growth in Malware Threats ¾Motive and intent has moved ¾Coordinated and blended attacks
in thousands from notoriety to financial gain are now a common practice
¾Cyber security is critical ¾Increased processing power
required

Hackers Breach Heartland


Payment Credit Card System
(1/20/2009)
“Heartland Payment Systems (HPY) disclosed
that intruders hacked into the computers it
uses to process 100 million payment card
transactions per month for 175,000
merchants…”

U.S. DoD Reported Incidents of Malicious Electricity Grid in U.S.


Cyber Activity Penetrated by Spies (4/8/2009)
in thousands “Cyberspies have penetrated the U.S.
electrical grid and left behind software
programs that could be used to disrupt the
system, according to current and former
U.S.
national-security South Korea Investigate
officials...”
Possible North Korean Cyber
Attack (7/8/2009)
“A series of coordinated attacks on
government and financial websites
started around the same time North
Korea tested new missiles and faced
fresh sanctions…”

Fortinet 6
Confidential
Your Business Requirements Keep
Growing

Network Throughput Budgetary Constraints Regulatory Pressures

¾Network requirements / demands ¾IT budgets shrinking ¾Industries demanding greater IT


accelerating ¾Security spend increasing compliance
¾Compliance needs coming from
¾Security demands must co-exist
¾ government regulations as well
Change
¾ in External IT Services as business partners / industry
Spending From FY09 to FY10 mandates
10GB % ¾

SOX 404
HIPAA
Enterprise Data Center
Network Throughput of

Multi-GB
FISMA
1GB
EU Data Protection
10MB 100MB Directive

Fortinet 7
Confidential
Y o u H a ve to D o M o re w ith Le ss

• In cre a se a cce ss to b a cke n d d a ta a n d syste m s


• D e cre a se risk o f u n a u th o rize d a cce ss
• In cre a se e ffe ctive n e ss o f e xistin g re so u rce s
a n d in ve stm e n ts
• R e d u ce co m p le xity o f se cu rity in fra stru ctu re
• Lo w e r o p e ra tin g a n d ca p ita lco sts

Fortinet
Confidential
Network security in the past?

VPN

IPS

Firewall Servers

Antivirus

Antispam

Users
URL Filters

Performance Challenges Lack of integration


 Multiple boxes increase overhead processing.  Leads to reduced security
 Software only solutions are slow.

Difficult to Manage Expensive to deploy and maintain


 Multiple management interfaces
 Multiple vendor contracts
 No integration between boxes
 Costly support licensing
 No single vendor for issue resolution
 Increased rack space and power requirements.

Fortinet 9
Confidential
W e H a ve P io n e e re d a N e w A p p ro a ch
The Fortinet Solution

Traditional Network Security Solutions

Real - time , integrated security


intelligence

ASIC - accelerated performance

Low total cost of ownership

Easy to deploy / manage / use


Fortinet 10
Confidential
Layers of Protection Against Today’s
Threats

• Overlapping, complementary layers of PORT 80


protection
UNAUTHORIZED APPLICATION
• Comprehensive, integrated inspectionAUTHORIZED APPLICATION
• Allow but don’t trust any application
• Examine all application content VIRUS
WEB APPLICATION

• WORM

FIREWALL

APPLICATION CONTROL

ANTIVIRUS/ANTISPYWARE
INTRUSION PREVENTION

Fortinet 11
Confidential
R e a l T h re a t P ro te ctio n in A ctio n
Problem:

Error message:
“Drops” copy of itself
PORT 80
“Innocent” Video Link: on system and
Redirects to malicious Website attempts to propagate

“Out of date” Flash player error:


“Download” malware file

Solution:
Integrated Web Filtering FIREWALL
Blocks access to malicious Website

Network Antivirus WEB FILTERING


Blocks download of virus

ANTIVIRUS
Intrusion Protection
Blocks the spread of the worm INTRUSION PROTECTION

Fortinet 12
Confidential
A R e lia b le P a rtn e r

• Proven Industry Leadership


• Since 2000, Fortinet has received more than 100 product & company
awards.
• IDC: Overall leader in UTM factory revenue for all of 2008
• Frost & Sullivan: 2008 Award for Market Leadership in Unified Threat
Management (UTM)
• Frost & Sullivan: 2008 "Global Competitive Strategy Leadership of the Year"
• SC Magazine: 2008 Readers' Trust Award for "Best Integrated Security Solution".

• Certified security
• Five ICSA certifications (Firewall, AV, IPS, IPSec VPN, VPN, Anti-Spam)
Fortinet
• Government
Confidential Certifications (FIPS-2, Common Criteria EAL4+)
S u m m a ry

• Comprehensive
solution
• Integrated, strategic
security
• Lower TCO
• Less complexity and
easier management
• Real - time security
• 24/7 global updates
• Strategic
flexibility
• Fit your timeline and
budget

Fortinet
Confidential
Product Portfolio

UTM Security Management Data Security


FortiManager
FortiGate Centralized Mgmt FortiDB
Network Security Database
Platform Security
FortiAnalyzer
Logging & Reporting

Security Services Application Security


Host Security
FortiClient FortiMail
FortiGuard Host Security Email Security
Real time Solution
Security FortiWeb
Services FortiScan XML & Web
Asset Application Security
Vulnerability
Mgmt

Fortinet
Confidential
FortiGate Product Lineup

UTM Security Management Data Security


FortiManager
FortiGate Centralized Mgmt FortiDB
Network Security Database
Platform Security
FortiAnalyzer
Logging & Reporting

Security Services Application Security


Host Security
FortiClient FortiMail
FortiGuard Host Security Email Security
Real time Solution
Security FortiWeb
Services FortiScan XML & Web
Asset Application Security
Vulnerability
Mgmt

Fortinet
Confidential
FortiGate
ANTIVIRUS WIRELESS DATABASE

• Integrated security
appliance VPN
FIREWALL ANTISPAM
• Network threat detection
• Application-aware screening
• Accelerated performance FORTIOS FORTIASIC

• Custom ASIC
• Platforms for every market ASIC

segment IPS DLP ROUTING


• Non-user licensing
• Performance-based models
 WAN APPLICATION WEB
OPTIMIZATION CONTROL FILTERING

Fortinet 17
Confidential
FortiGate
Regular Wireless Models Hard Drive Model

FortiGate 30B FortiWiFi 30B

FortiGate 50B FortiWiFi 50B FortiGate 51B

FortiGate 60B FortiWiFi 60B

FortiGate 80C FortiGate 82C

FortiGate 80CM FortiWiFi 80CM

FortiGate 110C FortiGate 111C

FortiGate 310B ASM-S08

FortiGate 620C ASM-S08

Fortinet 18
Confidential
H a rd w a re a n d S e rvice s B u n d le s

Hardware

Support Maintenance Security and


OS Updates

One Full Year

User
fees

Bundles also available for our FortiMail product line.

Fortinet
Confidential
Fo rtiG a te U T M Lin e u p

• A S IC -b a se d m u lti-th re a t se cu rity
p la tfo rm
• C o m m o n O S a cro ss a llp la tfo rm s
• S in g le m a n a g e m e n t in te rfa ce
• Fo rtiG u a rd S e rvice s
• Antivirus, IPS, Antispam, Web content
filtering

SMB & Remote Office Enterprise Service Provider & Large Enterprise

Fortinet 20
Confidential
Product Portfolio

UTM Security Management Data Security


FortiManager
FortiGate Centralized Mgmt FortiDB
Network Security Database
Platform Security
FortiAnalyzer
Logging & Reporting

Security Services Application Security


Host Security
FortiClient FortiMail
FortiGuard Host Security Email Security
Real time Solution
Security FortiWeb
Services FortiScan XML & Web
Asset Application Security
Vulnerability
Mgmt

Fortinet
Confidential
Central Reporting

 FortiAnalyzer™ appliances
• Logging and Reporting
• Alarming of violations
• Configurable Thresholds
• Event Correlation
• Network data statistics
• Report scheduler
• Automated report distribution

C e n tra l
M anagem ent
FortiManager™ appliances
centralizes functions for:
§Product Deployments
§Real-time Monitoring
§Device/Policy Maintenance
§Device/Security Updates

Fortinet
Confidential
Fo rtiA n a lyze r a n d Fo rtiM a n a g e r

• T ig h tly in te g ra te s to g e th e r to p ro vid e co re o f
ce n tra lize d se cu rity se rvice s
•Fo rtiA n a lyze r •FortiManager
•Log Analysis •Policy /
•Reporting Device
Management
•Content
Archiving / •Update
Data Mining Manager
(Firmware /
•Network Analyzer Security
•Log Browser / Content)
Real-Time Log •VPN Manager
Viewer
•Script
•Central File Manager
Quarantine

•Vulnerability
Assessment •
Scanner
•Forensic
Analysis
Fortinet
Confidential
Product Portfolio

UTM Security Management Data Security


FortiManager
FortiGate Centralized Mgmt FortiDB
Network Security Database
Platform Security
FortiAnalyzer
Logging & Reporting

Security Services Application Security


Host Security
FortiClient FortiMail
FortiGuard Host Security Email Security
Real time Solution
Security FortiWeb
Services FortiScan XML & Web
Asset Application Security
Vulnerability
Mgmt

Fortinet
Confidential
FortiMail

• Dedicated antispam appliance


• High-performance mail processing with
antispam detection
• Complements antispam/antivirus features in
FortiGate
• Integrated multi-threat detection
• Antispam, Antivirus, Antispyware,
Antimalware
• Preserves productivity, ensures policy
compliance, and protects domain
reputation
• Flexible deployments
• Transparent, Gateway, or Server modes
• Email quarantining and archiving
• User-based quarantine capabilities
• Archiving for analysis and compliance
support
Fortinet
Confidential
Fo rtiW e b

• W e b a p p lica tio n fire w a ll


• S e cu re s w e b -b a se d a p p lica tio n s w ith w e b a p p lica tio n
a n d X M L fire w a lls
• A cce le ra te s w e b a p p lica tio n s th ro u g h X M L / S S L
a cce le ra tio n , se ssio n o fflo a d in g , a n d lo a d b a la n cin g
• S im p lifie s d e p lo ym e n t a n d m a n a g e m e n t o f w e b
a p p lica tio n s w ith a ce n tra lse cu rity a p p lia n ce
• A id e s co m p lia n ce w ith P C I a n d re g u la to ry m a n d a te s

Fortinet
Confidential
Product Portfolio

UTM Security Management Data Security


FortiManager
FortiGate Centralized Mgmt FortiDB
Network Security Database
Platform Security
FortiAnalyzer
Logging & Reporting

Host Security
Security Services Application Security
FortiClient FortiMail
FortiGuard Host Security Email Security
Real time Solution
Security FortiScan FortiWeb
FortiScan
Services Asset Vulnerability XML & Web
Asset Vulnerability Mgmt Application Security
Mgmt

Fortinet
Confidential
FortiClient
FortiGuard Services
Web
Antivirus Filtering Antispam
• Host-based security
• Antivirus / antimalware client
• Personal firewall
• Web content filter
• Antispam filtering
• FortiGate integration
• WAN optimization
• IPSec VPN
• Data loss prevention

Fortinet 28
Confidential
FortiScan-1000B

• Endpoint vulnerability assessment and


remediation
• Identifies security vulnerabilities and finds
compliance exposures on hosts and servers
• Audits and monitors across heterogeneous systems
• Delivers patch management with ready to deploy
remediation and enforcement actions
• Aides compliance for regulatory mandates with
compliance reports

Fortinet
Confidential
Product Portfolio

UTM Security Management Data Security


FortiManager
FortiGate Centralized Mgmt FortiDB
Network Security Database
Platform Security
FortiAnalyzer
Logging & Reporting

Security Services Application Security


Host Security
FortiGuard FortiMail
Real time Security FortiClient
Services Host Security Email Security
Solution
FortiWeb
FortiScan XML & Web
Asset Application Security
Vulnerability
Mgmt

Fortinet
Confidential
FortiGuard Services Network

Web
• Real-time updates Filtering IPS

• “Push” / “pull” updates for Fortinet Antivirus


customers Antispam

• Tied to FortiCare registration system


• Distributed infrastructure
• Multiple servers deployed globally
• Approximately 16 data center locations
• Hierarchical deployment strategy

• Gather feedback from worldwide


installed base

Fortinet 31
Confidential
Product Services

Product FortiGuard Services Available

FortiGate Antivirus
Antispam

Web filtering

Intrusion Prevention Service

Vulnerability management services


FortiAnalyzer
FortiMail Antispam
Antivirus

FortiDB Security Service


FortiDB
FortiClient Antivirus
Antispam

Web filtering

Not applicable
FortiWeb
FortiScan  Vulnerability management services

Fortinet 32
Confidential
Thank You

Fortinet
Fortinet
Confidential
Confidential
Product Lines with
photos

Fortinet
Fortinet
Confidential
Confidential
FortiManager Appliances

FortiManager-100 Small Deployments


ü 10 FortiGate devices
ü 2,500 FortiClient agents

FortiManager-400B Small-to-Medium Deployments


ü 200 FortiGate devices
ü 10,000 FortiClient agents

FortiManager-1000C Small-to-Medium Deployments


ü 800 FortiGate devices
ü 25,000 FortiClient agents

FortiManager-3000C Large Deployments


ü 5,000 FortiGate devices
ü 120,000 FortiClient agents

FortiManager-5001A Small-to-Medium Deployments


ü 4,000 Fortinet devices
ü 100,000 FortiClient agents

Fortinet
Confidential
FortiAnalyzer Appliances

FortiAnalyzer-100C
For Small Sized üUp to 100 network devices
Deployments üUp to 100 FortiClient agents

FortiAnalyzer-400B
For Medium Sized üUp to 200 network devices
Deployments üUp to 2000 FortiClient agents

FortiAnalyzer-1000B
For Medium-to-Large üUp to 2,000 network devices
Sized Deployments üUnrestricted FortiClient agents

FortiAnalyzer-2000B
For Medium-to-Large üUp to 2,000 network devices
Sized Deployments üUnrestricted FortiClient agents

FortiAnalyzer-4000A
üUp to 2,000network devices
For Large Sized
Deployments üUnrestricted FortiClient agents

Fortinet
Confidential
FortiMail Family

FortiMail-100 Recommended for up to 1,000 users


Small Business Deployments
250GB HDD
Up to 54,000 emails/hour (Full inspection)

Recommended for 10,000 users


FortiMail-400B SME Deployments
1 x 500 GB HDD (expandable to 2 x 500 GB)
Up to 185,400 emails/hour (Full inspection)
RAID Support

Recommended for up to 50,000 users


FortiMail-2000B Large Enterprise Deployments
2 x 1 TB HDD (expandable to 6 x 1 TB)
Up to 1.0 million emails/hour (Full inspection)
RAID Support
Redundant/Hot-Swappable Power Supplies

Recommended for up to 50,000 users


FortiMail-5001A Large Enterprise/ Service Provider Deployments
Up to 1.1 million emails/hour (Full-Inspection)
FG-5000 series chassis compatible
ATCA chassis compatible

Fortinet
Confidential
Case Studies

Fortinet
Fortinet
Confidential
Confidential
Case Study: Distributed Enterprise

§US Distributed Retail Auto §Challenge


Service Chain PCI compliance
Fortune 500 company Efficient management
800+ Remote retail Physical footprint
locations

§Why We Won
Ease of management
Robust network security
functionality
Lower TCO vs. peers

§Who We Beat
Cisco, Juniper

§Features: Firewall, VPN, Web
Filtering

Fortinet 
Confidential 39
Case Study: Enterprise

§Leading Financial §Challenge


Institution Large operating / IT costs
Multi-billion dollar Point product complexity
transaction platform
Auditing
1200+ customers

Thousands of daily
transactions §Why We Won
Raw performance
Consolidated features
Effective security

§Who We Beat
Cisco, Juniper

§Features: Firewall, VPN,
Antivirus, Antispam

Fortinet
Confidential 40
Case Study: Service Provider

§Leading Telecom §Challenge


Service Provider Delivery of managed
Multi-product and multi- enterprise grade security
service $20Bn+ telecom service
provider Custom features to each
Millions of Mobile, individual customer
Consumer, and Business Enterprise sec. for data
Customers centers

§Why We Won
Performance
Virtualization capabilities
Flexible feature set

§Who We Beat
Cisco, Check Point, Juniper,
Symantec, Trend Micro

§Features: Firewall, VPN,
Antivirus, Antispam

Fortinet 41
41
Confidential 41
Fortinet’s Comprehensive Solutions

Fortinet 42
Confidential
Appendix

Fortinet
Fortinet
Confidential
Confidential
Disruptive Technology Platform

FortiASIC FortiOS

¾ASICs accelerate FortiOS security ¾Custom built operating system


and network functions ¾Architected for security and
¾Enables faster performance networking demands
against competitors ¾Leverages custom hardware
¾Multiple ASICs (CP and NP) platform
targeting key functions ¾Mature OS - At version 4.0 today
¾Mature design across CP and NP

Fortinet 44
Confidential
Real-World Consequences

ChoicePoint 163K Consumers Biggest Breach In British History


$15M fine largest in FTC history 4.5M Monster.co.uk users
2006 2009

Billions Billions
Lost Lost

Heartland Data Breach: 9 Major Retailers incl. TJ


MasterCard, Visa Impose Hefty Fines Maxx Hacked
Processor says it Has Already Spent $12.5 Million… 41M cards, $118 Million
2009 2008

Fortinet
Confidential
UTM Market Leadership Across the
Board

“Fortinet is the leading


“ Fortinet is a “ Leader ” in Fortinet Named ONLY “ Market
vendor in the UTM security Gartner ’ s Multi - Function Leader ” in Frost & Sullivan
appliance market . Firewall Segment World UTM Report
Magic Quadrant
Worldwide UTM Market Share by Vendor
Multi-Function Firewall, UTM Market Competitive Landscape, 2007 (3
1Q 2009 (1)
H1 2009 (2)

Source
(1)IDC Quarterly Appliance Tracker, June 2009 (based on revenues)
(2)Gartner, Inc., “1H09 MultiFunction Firewall Magic Quadrant” by G. Young and A. Hils, June X, 2009.
(3)2007 Frost & Sullivan Award for “Market Leadership in UTM” and “Global Competitive Strategy Leadership of the Year"
Fortinet 46
Confidential

You might also like