Fortinet is a global security company founded in 2000 with over 1,300 employees and 5,000 channel partners serving over 100,000 customers worldwide. Their flagship product, FortiGate, is an integrated security appliance that provides firewall, VPN, intrusion prevention, antivirus, web filtering and other network security functions in a single device. FortiGate appliances leverage Fortinet's proprietary ASICs and FortiOS operating system to deliver high performance security with lower total cost of ownership compared to standalone point solutions. Fortinet has experienced strong growth with 2010 revenue of $325 million, up 29% year-over-year.
12. Clear, Continuous Focus Since 2000 Proven Leadership Security consolidation Industry-leading performance Reduce TCO Vision That Drives Us Today Anticipate & innovate Push the performance envelope Make the competition follow our lead 3
13. 4 The Fortinet Solution Traditional Network Security Solutions Stand-alone, non-integrated security Mix of off the shelf systems and applications Higher total cost of ownership Difficult to deploy / manage / use Real-time, integrated security intelligence ASIC-accelerated performance Lower total cost of ownership Easy to deploy / manage / use We Pioneered a New Approach
14. Consolidated Security 5 The Evolution of the Firewall Fortinet Delivers Complete Protection SSL Inspection Real-Time Threat Updates Endpoint Protection/ NAC Data Loss Prevention Antispam/ Antivirus Vulnerability Mgmt Virtual Appliance/ Virtual Domains Web Filtering VPN Application Control IPS Firewall WAN Optimization/ Traffic Shaping Wireless Controller/Wireless LAN SSL Inspection VoIP IPv6, Dynamic Routing
15. Market Leadership Across the Board Magic Quadrant for Unified Threat Management (2) UTM Market Competitive Landscape, 2009(3) Worldwide UTM Market Share Q4 2010 (1) High AbilitytoDeliver Low Low Market Penetration High Market Leader Contender Niche Participant Challenger Specialist Notes IDC Worldwide Security Appliances Tracker, March 2011 (market share based on factory revenue) Gartner, Inc., “Magic Quadrant for Unified Threat Management”, October 2010 Frost & Sullivan, “World Unified Threat Management, Products Market 2009”, 2010 6
16. Results of Singular Focus Delivering Effective, Consolidated Security Best in class protection in a single device Complete content protection Leading the Market Performance Depth of services Ensuring Flexibility Integrated technologies Simple pricing model Protecting All Segments From carrier to SOHO 7
17. Do More with Less Increase access to data and systems Decrease risk of unauthorized access Increase effectiveness of existing resources and investments Reduce complexity of security infrastructure Lower operating and capital costs 8
18. Prepare for the Next Threat 9 Eliminate potential blind spots Demonstrate policy compliance Lower response time Accelerate adoption of best practices and expert systems Reduce the potential for significant loss to reputation and revenue
19. Thinking Strategically Make your security infrastructure future-ready Anticipate change in threat landscape and technology Look for opportunities to consolidate without compromise Reduce complexity Increase protection and performance Centralized management and control Single pane of glass 10
35. Performance Advantage OTHER VENDORS High Performance Multiple Processing Engines Slow PerformanceSingle Processing Engine Multi-Core CPU Multi-Core CPU 16
36. FortiOS Fully Integrated Technologies Manage all policy enforcement from a central console Single Inspection of Packets Delivers greater efficiency and intelligence Deployment Ease & Flexibility Same console for all FortiGate platforms, all technologies Ability to deploy technologies where needed IPv6 Ready 17
39. Real-time FortiGuard subscription service Competitive Advantages 19 Comprehensive High-performance FortiASIC network processor FortiOS operating system CP 7 NP 4 SOC FortiCare customer support FortiASIC content processor
40. Customers Worldwide 7 of the top 10 Fortune companies in Americas 8 of the top 10 Fortune companies in EMEA 9 of the top 10 Fortune companies in APAC 10 of the top 10 Fortune Telecommunications companies 9 of the top 10 Fortune Retail & Commercial Banks 7 of top 10 Fortune Aerospace & Defense 20
41. A Proven Partner Proven Industry Leadership Since 2000, Fortinet has received more than 100 product & company awards. IDC: Overall leader in UTM factory revenue for all of 2009 Gartner: Leader in Unified Threat Management Magic Quadrant Frost & Sullivan: 2010 "Fortinet is the established and undisputed leader" of worldwide UTM market SC Magazine: 2009 Readers' Trust Award for "Best Integrated Security Solution” Certified security Seven ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam, WAF) Government Certifications (FIPS-2, Common Criteria EAL4+, JITC IPv6, SCAP) ISO 9001 certification 21
42.
43. Drive our highly scalable FortiASIC architecture to continue to provide the highest performance our customers demand.
44. Deliver a unique set of tightly integrated security solutions offering the most comprehensive feature set to protect against current and predict new security threats.
67. Summary Consolidated Security Complete content protection Unmatched Performance Purpose-built hardware and software Lower TCO Less complexity, faster deployment, easier management Real-time security 24/7 global updates deliver security expertise
Editor's Notes
First, a brief overview of Fortinet.
Our focus has always been on consolidating stand-alone security and networking technologies to improve performance, increase protection, and reduce costs
As firewalls have evolved, additional technologies have been added to the core firewall technology to provide additional functionality and protect against new threats.FortiGate consolidated security platforms have been at the forefront of this evolutionary process. We have led the market with our ability to anticipate changes to the threat landscape by adding new functionality and technologies into our UTM platform. For example, FortiGate platforms have had the ability to identify applications independent of port or protocol since FortiOS 3.0, well ahead of other vendors. There has been a lot of noise in the market around ‘next generation’ firewalls. NGFWs are a subset of UTM, as they provide a limited feature set compared with the FortiGate UTM platform. This slide highlights the difference between the limited feature-set of NGFWs and the FortiGate UTM platform.
We continue to focus on leading the market with advanced technology and products.Currently have 50+ patents awarded; 100+ pending
We know that on a daily basis, you’re having make hard choices on how to do more without spending more. You are under pressure to open up more of your data to employees, customers, partners, and vendors; at the same time you’re expected to reduce the potential of unauthorized access to your data and backend systems. You’re also expected to make your existing staff and security technologies more effective, and to do it while spending lessAnd, we know you’re expected to lower your expenses
Increase access to data and systemsDecrease risk of unauthorized accessIncrease effectiveness of existing resources and investmentsReduce complexity of security infrastructureLower operating and capital costsYou also need to make sure you’re prepared for what’s coming next month or next year. You are looking into the future: Identify and close the gaps in your security strategy Measure the positive change in your security posture Ensure that you can respond quickly to changes in the threatscape or actual attacksLeverage the expertise of your vendorsLast but not least, ensure that the worst case scenario doesn’t happen.
Complete content protection enables you to keep up with the changing threatscape without having to purchase more technology. More than simply identifying applications and allowing or denying the traffic. It is application control coupled with content-based policy enforcement. The criminals are using sophisticated techniques to evade traditional countermeasures. By relying on a single platform with multiple technologies, you get the benefit of layers of security without the performance penalty. You also get the benefit of our global threat research team’s expertise, which means less reliance on your IT staff’s ability to configure the technology to anticipate new threats. Fortinet continuously updates our inspection engines to ensure that our customers are fully protected against the latest threats automatically.
FortiASIC CPContent Processor – System Level acceleration. Main functions include VPN key generation, SSL offload.Accelerates pattern matching FortiASIC NPNetwork Processor – Accelerates security services at the network interface LevelMain functions include forwarding and IPSec processingDelivers wire-rate offloading , with switch-type latency for 64 byte packets. FortiASIC SPSecurity Processor – Interface/System LevelProvides interface level IPS Engine and multicast accelerationIPS Engine has additional support for Flow-AV and Application Control functions
IPv6:Content protection, routing, management in place
FORTINET BUILT AND OWNS ALL 3 KEY UTM COMPONENTS – INTEGRATED SECURITY TECHNOLOGIES, HIGH-SPEED ASICS, AND GLOBAL SUBSCRIPTION UPDATE SERVICES -- WHICH PROVIDES US WITH A COMPETITIVE ADVANTAGE. WE BELIEVE THAT NONE OF OUR COMPETITORS PROVIDE A SOLUTION THAT INCORPORATES ALL THESE 3 UTM KEY COMPONENTS. OUR FORTIOS OPERATING SYSTEM ENABLES US TO EFFICIENTLY DELIVER MULTI-THREAT, COMPREHENSIVE SECURITY.OUR FORTIASICs ADD SIGNIFICANT PROCESSING POWER ADVANTAGE OVER THE SOFTWARE APPROACH, ACCELERATING FORTIGATE UTM PERFORMANCE.OUR FORTIGUARD INFRASTRUCTURE PROVIDES PROTECTION IN REAL-TIME - ESSENTIALLY PROVIDING A RECURRING, SUBSCRIPTION BUSINESS ON TOP OF OUR FORTIGATE APPLIANCES.SOME OF OUR COMPETITORS MAY BE ABLE COMPETE WITH INDIVIDUAL ELEMENTS OF OUR UTM SOLUTION - BUT IN OUR VIEW NO ONE CAN DELIVER THE ENTIRE SOLUTION AS WE ARE DOING TODAY. FOR EXAMPLE:SECURITY VENDORS SUCH AS CHECK POINT AND MCAFEE OFFER A BROAD SET OF FEATURES, BUT DO A POOR JOB OF INTEGRATING THEM, AND DON’T COME CLOSE ON PERFORMANCE NETWORKING VENDORS SUCH AS CISCO AND JUNIPER ARE OK ON PERFORMANCE, BUT THEIR FIREWALL AND VPNS MISS ALL THE VIRUS AND BAD CONTENT-BASED ATTACKS.WE BELIEVE WE HAVE THE BEST TECHNOLOGY COVERING ALL THE KEY UTM FUNCTIONS, AND FROM A PERFORMANCE AND INTEGRATION PERSPECTIVE, NO ONE EVEN COMES CLOSE TO FORTINET.
Now let’s look at our broader market opportunity and Growth strategies.First, as I mentioned before, the UTM market is expected to grow from $1.3Billion in 2007 to $3.5Billion by 2012 -- one of the highest growth billion dollar markets in the IT security space – nearly 22.3% CAGR through 2012. Fortinet already has the leading UTM market position and a large technology advantage here, which we believe will enable us to keep gaining UTM market share from our existing 15.4% today.Second, as we continue to innovate into additional technologies such as Application Control, DLP and WAN Acceleration, it allows us to not only continue our UTM market leadership, but also to further enhance the UTM value proposition and encroach on the traditional network security market. Our leadership in UTM can uniquely positions us to take advantage of opportunities in the broader network security market as customers who are purchasing traditional VPN, IDP or Firewall/VPN products migrate to a UTM solution. In the broader $6.8 security market, we also have an opportunity to grow within existing market segments that we play in today to a lesser degree. Thus, this provides us with a broader $10.5Bn network security market opportunity to go after. We plan to do this through a growth strategy that includes : Continuing to invest in R&D to deliver innovation that will both extends our UTM market leadership and help us expand into new security markets , if we choose.Grow our sales force and channel to capture new customers and share of the enterprise, government and service provider markets.