SlideShare a Scribd company logo
1 of 53
EFFECTIVE MULTI-VENDOR MANAGEMENT
FORTINET & ALGOSEC JOINT WEBINAR
Yoav Karnibad
Product Manager
AlgoSec
Satish Veerapuneni
Director of Products & Solutions
Fortinet
WELCOME
Have a question? Submit it via the chat tab or email us:
This webinar is being recorded!
The recording will be emailed to you after the webinar
And the slides will be available in the attachments tab
Follow us online !
2
marketing@algosec.com
AGENDA
Fortinet - Intro & Customer Challenges
01
AlgoSec - Intro & Customer Challenges
02
Customer Story
03
3
04 Summary
4
Fortinet: Network Security Leader
Fortinet is among the top 4
public cybersecurity
companies in the world.
Its broad portfolio of solutions spans
Network, Infrastructure, Cloud, and IoT
Security.
$14.3B Mkt Cap ~$1.8B - 2018
(revenue)
* As of March 31, 2019
400,000+
Customers
4.6M+ Appliances
Shipments Worldwide
(+30% units WW)
5
90% of F100Are Fortinet Customers
Telco
Financials/
Banking
Technology
Retail
Aerospace/
Defense
10 of 12
Healthcare
12 of 15
Transportation
3 of 5 9 of 11 3 of 5
9 of 104 of 4 11 of 13 3 of 54 of 5
Financials/Ins Food/Bev
Energy
6
Fortinet: Key Customer Challenges
Requires Visibility and
Intent-Based Segmentation
Attack Surface
BROAD
Requires Orchestration,
Automation, and Response
Vendor Complexity
AUTOMATED
Requires AI-Based
Prevention Across Devices,
Networks, and Applications
Advanced Threats
INTEGRATED
7
Solution: Fortinet Security Fabric
Network
Security
Network
Operations
Q1FY19 v1.4.3
Security
Operations
FortiAnalyzer: Analytics-Powered
Security & Log Management
Advanced
Threat
Detection
Compliance
Workflow
Optimization
FortiManager: Automation-Driven
Network Management
Single Pane-
Of-Glass
Management
Compliance
Workflow
Optimization
8
Human Errors and Misconfigurations
is one of the leading cause of security
breaches and/or network outages
CHALLENGE
Centralized security management and
visibility helps reduce multiple complex
management consoles and enables true
Single Pane with:
• Configuration Management
• Single Console Visibility
• Multi-Factor Authentication
• High Availability
• Flexible Deployment / Pricing
• Zero-Touch Deployment
SOLUTION
1# Single Pane of Glass Management
Branch Office
Branch Office
Branch Office
FortiAnalyzer
HA Cluster
FortiManager
HA Cluster
IOC
HQ
Internet
FortiGuard
Security Services
9
CHALLENGE
Regulation: Compliance Management is usually
a very manual and inefficient process that
involves multiple full-time staff and involves
months to get right.
2# Audit & Compliance
SOLUTION
Simple Reporting and Compliance Controls
Management to enables proving Compliance
proactively
• NIST, CIS Frameworks
• Reports on PCI DSS, SAR etc.
• Audit Logging & RBAC
• Integrated Workflow for Security &
Operations
JAN FEBMARAPRMAYJUN JUL AUGSEPOCTNOVDEC
28%
55%
89%89%
10
Staff Shortage - Enterprises don’t have the
resources to staff the detection and response
of Anomalies
CHALLENGE
Leverage Workflow Optimization technology to
reduce the time to detect and respond to
threats or operational anomalies
• Incident Detection & Response
• ITSM Workflow Applications
• SIEM Integration
• Webhook Integration
• Automation Stitches
SOLUTION
3# Workflow Optimization
FortiManager
HA Cluster
3rd Party
Tools
Response
Actions
FortiAnalyzer
HA Cluster
(Collector)
1
2
3
3
Response
Actions
Collect
Events
Detect Anomalies
11
CHALLENGE
Advanced Threats: Attacks are getting complex
and very hard to detect and that coupled with lack
of skilled staff – it’s challenging to protect the
modern enterprise
4# Advanced Threat Detection
SOLUTION
Analytics Driven threat detection that can detect
any threats and identify them as High, Med or Low
risks for the enterprise
• IoC Detection & Correlation
• Fabric Integrated Detection
• SIEM Integration
FortiGate – Remote Offices
FortiAnalyzer
HA Cluster
FortiAnalyzer
HA Collector
Cluster
12
Single-Pane Orchestration: SD-WAN SLA Monitoring
13
Single-Pane Orchestration: Single Pane NOC & SOC
14
Single-Pane Orchestration: Zero Touch Provisioning
15
Automation: IncidentAnalysis – History Scan
16
Automation: Compliance Reports
Situational Awareness Report
 New report helps with addressing the most
critical needs for compliance preparedness
 Assists in readiness for auditing
 Helps to Prepare, Protect, Detect, Respond
& Recover for a Strong Security Posture
17
Response : Advanced Incident Containment
Incident
FMG API
FGT FGT FGTFGT
18
Response: Best Practice Compliance
Founded 2004
1800+ Enterprise Customers
Serving 20 of the Fortune 50
24/7 Support via 3 Global Centers
Passionate about Customer
Satisfaction
19
CORPORATE OVERVIEW
19
HELPING OVER 1,800 CUSTOMERS WORLDWIDE ALIGN
SECURITY WITH BUSINESS PROCESSES
AlgoSec enables
companies to align
security with their
business processes
Business-driven Agility
Business-driven Visibility
Business-driven Security
BUSINESS DRIVEN SECURITY MANAGEMENT
19
ALGOSEC: KEY CUSTOMER CHALLENGES
Keep System
Secure
Network
Visibility
Maintain
Compliance
Visibility of complex networks
Across on-premise, cloud & SDN
Frequent change requests
Applications migration to the cloud
Staff shortage
Allow ease of compliance and
auditing of the changes
22
And other leading
security vendors
SECURITY SHOULD NOT DELAY THE BUSINESS
POLL #1
How many firewall vendors do you have in your organization?
 1
 2
 3 or more
Please vote using the “Votes“ tab
23
ALGOSEC: KEY CUSTOMER CHALLENGES
Visibility of complex networks
Across on-premise, cloud & SDN
Network
Visibility
24
And other leading
security vendors
MANAGING THE HETEROGENEOUS ENVIRONMENT
And other leading
security vendors
VISIBILITY ACROSS THE ENTIRE HETEROGENEOUS
ENVIRONMENT
Native Cloud Security ModelsVirtual appliance
in the cloud
NGFW on-prem
Private cloud SDN – distributed FW
26
POLL #2
How many policy changes do you have each week on average?
Each line you add to a firewall is counted as a change
 0-10
 10-50
 50-100
 100 or more
Please vote using the “Votes“ tab
27
ALGOSEC: KEY CUSTOMER CHALLENGES
Keep System
Secure
Frequent change requests
Applications migration to the cloud
Staff shortage
28
Automatically detects blocking
devices and changes their policy
MULTI-VENDOR CHANGE ANALYSIS
Rose_Other
Rose_Other
DC_82 Router
DC_42 Router
DC_82 Router
DC_42 Router
DC_42 Router
MULTI-VENDOR CHANGE ANALYSIS
IDENTIFYING RISKS & SEVERITY ON EACH DEVICE
Based on policy analysis & on network traffic analysis
POLICY OPTIMIZATION
POLL #3
How many regulations are you obligated to report?
Each line you add to a firewall is counted as a change
 None
 1
 2 - 4
 More than 4
Please vote using the “Votes“ tab
33
ALGOSEC: KEY CUSTOMER CHALLENGES
Maintain
Compliance
Allow ease of compliance and
auditing of the changes
34
REGULATORY COMPLIANCE REPORT
REGULATORY COMPLIANCE REPORT
37
Customer Story
Request a
network
change
Check for
risks involved
And approve
Plan the
changes
(objects & rules)
Implement
the change on
the devices
Validate
the
change
Identify
Devices in
the flow path
CUSTOMER STORY
38
Validate the
change
Identify
Devices in
the flow
path
Check for
risks
involved
Plan the
Rules
Implement
the change
on the
devices
Request a
network
change
CUSTOMER STORY
AlgoSec can push changes automatically
39
ENABLING TRAFFIC POLICY CHANGES
• Is the traffic from source
to destination enabled?
• Routing
• Firewall rules
40
Cloud
Rose_Other
Rose_Other
DC_82 Router
DC_82 Router
DC_42 Router
DC_42 Router
Rose_Other
Rose_Other
NETWORK ADMINISTRATOR – CONFIRM DEVICES
Rose_Other
Rose_Other
Rose_Other
SECURITY ADMINISTRATOR – APPROVE CHANGES
FireFlow –Security Administrator sees the risks – Approve changes
Rose_Other
NETWORK ADMINISTRATOR – PUSH CHANGES TO DEVICES
Rose_Other
NETWORK ADMINISTRATOR – PUSH CHANGES TO DEVICES
Rose_Other
SUMMARY
&
BENEFITS
Fortinet provides unparalleled broad,
automated and integrated security
protection across segments
01
AlgoSec enables Multi-Vendor
Firewall Management across
heterogeneous and hybrid
enterprises
02
100s of Enterprise Customers find
Fortinet & AlgoSec best together in
their Multi-Vendor Environment
03
47
Prof. Wool Video Courses
https://www.algosec.com/resources
48
Solution Brief Whitepaper
Webinar Slides
© Fortinet Inc. All Rights Reserved.
eBook
https://www.fortinet.com/products/management.html
FortiManager Data Sheet FortiAnalyzer Data Sheet
Q & A
Submit your questions via the chat
Request a Free Evaluation: marketing@algosec.com
51
JOIN OUR COMMUNITY
Follow us for the latest on security policy management trends, tips & tricks,
best practices, thought leadership, fun stuff, prizes and much more!
Subscribe to our YouTube channel for a
wide range of educational videos
presented by Professor Wool
youtube.com/user/AlgoSeclinkedin.com/company/AlgoSec
facebook.com/AlgoSec
twitter.com/AlgoSec
www.AlgoSec.com/blog
ALGOSUMMIT
THE PREMIER EVENT FOR
ALGOSEC CUSTOMERS & CHANNEL PARTNERS
52
Dallas
October 21-24
2019
www.algosec.com/algosummit
UPCOMING
WEBINARS
July 10
Change Automation
July 30
Managing Cisco ACI
THANK YOU!
Questions & Request for Demo:
marketing@algosec.com

More Related Content

What's hot

What's hot (20)

SDN's managing security across the virtual network final
SDN's managing security across the virtual network finalSDN's managing security across the virtual network final
SDN's managing security across the virtual network final
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management Suite
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
 
What's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix ItWhat's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix It
 
Network Security Best Practices - Reducing Your Attack Surface
Network Security Best Practices - Reducing Your Attack SurfaceNetwork Security Best Practices - Reducing Your Attack Surface
Network Security Best Practices - Reducing Your Attack Surface
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Security
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
Protecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero ToleranceProtecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero Tolerance
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
 
Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practices
 

Similar to 2019 06-26 effective multi-vendor management -fortinet algo sec webinar final

Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
AlgoSec
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
AlgoSec
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
hoanv
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE코리아
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
ERPScan
 

Similar to 2019 06-26 effective multi-vendor management -fortinet algo sec webinar final (20)

Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
 
Adaptive Security and Incident Response - A Business-Driven Approach
Adaptive Security and Incident Response - A Business-Driven ApproachAdaptive Security and Incident Response - A Business-Driven Approach
Adaptive Security and Incident Response - A Business-Driven Approach
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?
 
Demystifying Control Towers: What Drives Effectiveness?
Demystifying Control Towers: What Drives Effectiveness?Demystifying Control Towers: What Drives Effectiveness?
Demystifying Control Towers: What Drives Effectiveness?
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
Skybox security
Skybox security Skybox security
Skybox security
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
 
第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス
 
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud Secure
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Uac sales pres_20_apr09-2
Uac sales pres_20_apr09-2Uac sales pres_20_apr09-2
Uac sales pres_20_apr09-2
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
 

More from AlgoSec

More from AlgoSec (11)

The state of the cloud csa survey webinar
The state of the cloud csa survey webinarThe state of the cloud csa survey webinar
The state of the cloud csa survey webinar
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
Cloud migrations made simpler safe secure and successful migrations
Cloud migrations made simpler   safe secure and successful migrationsCloud migrations made simpler   safe secure and successful migrations
Cloud migrations made simpler safe secure and successful migrations
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertification
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organization
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best Practices
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

2019 06-26 effective multi-vendor management -fortinet algo sec webinar final

  • 1. EFFECTIVE MULTI-VENDOR MANAGEMENT FORTINET & ALGOSEC JOINT WEBINAR Yoav Karnibad Product Manager AlgoSec Satish Veerapuneni Director of Products & Solutions Fortinet
  • 2. WELCOME Have a question? Submit it via the chat tab or email us: This webinar is being recorded! The recording will be emailed to you after the webinar And the slides will be available in the attachments tab Follow us online ! 2 marketing@algosec.com
  • 3. AGENDA Fortinet - Intro & Customer Challenges 01 AlgoSec - Intro & Customer Challenges 02 Customer Story 03 3 04 Summary
  • 4. 4 Fortinet: Network Security Leader Fortinet is among the top 4 public cybersecurity companies in the world. Its broad portfolio of solutions spans Network, Infrastructure, Cloud, and IoT Security. $14.3B Mkt Cap ~$1.8B - 2018 (revenue) * As of March 31, 2019 400,000+ Customers 4.6M+ Appliances Shipments Worldwide (+30% units WW)
  • 5. 5 90% of F100Are Fortinet Customers Telco Financials/ Banking Technology Retail Aerospace/ Defense 10 of 12 Healthcare 12 of 15 Transportation 3 of 5 9 of 11 3 of 5 9 of 104 of 4 11 of 13 3 of 54 of 5 Financials/Ins Food/Bev Energy
  • 6. 6 Fortinet: Key Customer Challenges Requires Visibility and Intent-Based Segmentation Attack Surface BROAD Requires Orchestration, Automation, and Response Vendor Complexity AUTOMATED Requires AI-Based Prevention Across Devices, Networks, and Applications Advanced Threats INTEGRATED
  • 7. 7 Solution: Fortinet Security Fabric Network Security Network Operations Q1FY19 v1.4.3 Security Operations FortiAnalyzer: Analytics-Powered Security & Log Management Advanced Threat Detection Compliance Workflow Optimization FortiManager: Automation-Driven Network Management Single Pane- Of-Glass Management Compliance Workflow Optimization
  • 8. 8 Human Errors and Misconfigurations is one of the leading cause of security breaches and/or network outages CHALLENGE Centralized security management and visibility helps reduce multiple complex management consoles and enables true Single Pane with: • Configuration Management • Single Console Visibility • Multi-Factor Authentication • High Availability • Flexible Deployment / Pricing • Zero-Touch Deployment SOLUTION 1# Single Pane of Glass Management Branch Office Branch Office Branch Office FortiAnalyzer HA Cluster FortiManager HA Cluster IOC HQ Internet FortiGuard Security Services
  • 9. 9 CHALLENGE Regulation: Compliance Management is usually a very manual and inefficient process that involves multiple full-time staff and involves months to get right. 2# Audit & Compliance SOLUTION Simple Reporting and Compliance Controls Management to enables proving Compliance proactively • NIST, CIS Frameworks • Reports on PCI DSS, SAR etc. • Audit Logging & RBAC • Integrated Workflow for Security & Operations JAN FEBMARAPRMAYJUN JUL AUGSEPOCTNOVDEC 28% 55% 89%89%
  • 10. 10 Staff Shortage - Enterprises don’t have the resources to staff the detection and response of Anomalies CHALLENGE Leverage Workflow Optimization technology to reduce the time to detect and respond to threats or operational anomalies • Incident Detection & Response • ITSM Workflow Applications • SIEM Integration • Webhook Integration • Automation Stitches SOLUTION 3# Workflow Optimization FortiManager HA Cluster 3rd Party Tools Response Actions FortiAnalyzer HA Cluster (Collector) 1 2 3 3 Response Actions Collect Events Detect Anomalies
  • 11. 11 CHALLENGE Advanced Threats: Attacks are getting complex and very hard to detect and that coupled with lack of skilled staff – it’s challenging to protect the modern enterprise 4# Advanced Threat Detection SOLUTION Analytics Driven threat detection that can detect any threats and identify them as High, Med or Low risks for the enterprise • IoC Detection & Correlation • Fabric Integrated Detection • SIEM Integration FortiGate – Remote Offices FortiAnalyzer HA Cluster FortiAnalyzer HA Collector Cluster
  • 16. 16 Automation: Compliance Reports Situational Awareness Report  New report helps with addressing the most critical needs for compliance preparedness  Assists in readiness for auditing  Helps to Prepare, Protect, Detect, Respond & Recover for a Strong Security Posture
  • 17. 17 Response : Advanced Incident Containment Incident FMG API FGT FGT FGTFGT
  • 19. Founded 2004 1800+ Enterprise Customers Serving 20 of the Fortune 50 24/7 Support via 3 Global Centers Passionate about Customer Satisfaction 19 CORPORATE OVERVIEW 19
  • 20. HELPING OVER 1,800 CUSTOMERS WORLDWIDE ALIGN SECURITY WITH BUSINESS PROCESSES
  • 21. AlgoSec enables companies to align security with their business processes Business-driven Agility Business-driven Visibility Business-driven Security BUSINESS DRIVEN SECURITY MANAGEMENT 19
  • 22. ALGOSEC: KEY CUSTOMER CHALLENGES Keep System Secure Network Visibility Maintain Compliance Visibility of complex networks Across on-premise, cloud & SDN Frequent change requests Applications migration to the cloud Staff shortage Allow ease of compliance and auditing of the changes 22 And other leading security vendors SECURITY SHOULD NOT DELAY THE BUSINESS
  • 23. POLL #1 How many firewall vendors do you have in your organization?  1  2  3 or more Please vote using the “Votes“ tab 23
  • 24. ALGOSEC: KEY CUSTOMER CHALLENGES Visibility of complex networks Across on-premise, cloud & SDN Network Visibility 24 And other leading security vendors
  • 25. MANAGING THE HETEROGENEOUS ENVIRONMENT And other leading security vendors
  • 26. VISIBILITY ACROSS THE ENTIRE HETEROGENEOUS ENVIRONMENT Native Cloud Security ModelsVirtual appliance in the cloud NGFW on-prem Private cloud SDN – distributed FW 26
  • 27. POLL #2 How many policy changes do you have each week on average? Each line you add to a firewall is counted as a change  0-10  10-50  50-100  100 or more Please vote using the “Votes“ tab 27
  • 28. ALGOSEC: KEY CUSTOMER CHALLENGES Keep System Secure Frequent change requests Applications migration to the cloud Staff shortage 28
  • 29. Automatically detects blocking devices and changes their policy MULTI-VENDOR CHANGE ANALYSIS Rose_Other Rose_Other DC_82 Router DC_42 Router DC_82 Router DC_42 Router DC_42 Router
  • 31. IDENTIFYING RISKS & SEVERITY ON EACH DEVICE
  • 32. Based on policy analysis & on network traffic analysis POLICY OPTIMIZATION
  • 33. POLL #3 How many regulations are you obligated to report? Each line you add to a firewall is counted as a change  None  1  2 - 4  More than 4 Please vote using the “Votes“ tab 33
  • 34. ALGOSEC: KEY CUSTOMER CHALLENGES Maintain Compliance Allow ease of compliance and auditing of the changes 34
  • 38. Request a network change Check for risks involved And approve Plan the changes (objects & rules) Implement the change on the devices Validate the change Identify Devices in the flow path CUSTOMER STORY 38
  • 39. Validate the change Identify Devices in the flow path Check for risks involved Plan the Rules Implement the change on the devices Request a network change CUSTOMER STORY AlgoSec can push changes automatically 39
  • 40. ENABLING TRAFFIC POLICY CHANGES • Is the traffic from source to destination enabled? • Routing • Firewall rules 40 Cloud
  • 43. NETWORK ADMINISTRATOR – CONFIRM DEVICES Rose_Other Rose_Other Rose_Other
  • 44. SECURITY ADMINISTRATOR – APPROVE CHANGES FireFlow –Security Administrator sees the risks – Approve changes Rose_Other
  • 45. NETWORK ADMINISTRATOR – PUSH CHANGES TO DEVICES Rose_Other
  • 46. NETWORK ADMINISTRATOR – PUSH CHANGES TO DEVICES Rose_Other
  • 47. SUMMARY & BENEFITS Fortinet provides unparalleled broad, automated and integrated security protection across segments 01 AlgoSec enables Multi-Vendor Firewall Management across heterogeneous and hybrid enterprises 02 100s of Enterprise Customers find Fortinet & AlgoSec best together in their Multi-Vendor Environment 03 47
  • 48. Prof. Wool Video Courses https://www.algosec.com/resources 48 Solution Brief Whitepaper Webinar Slides
  • 49. © Fortinet Inc. All Rights Reserved. eBook https://www.fortinet.com/products/management.html FortiManager Data Sheet FortiAnalyzer Data Sheet
  • 50. Q & A Submit your questions via the chat Request a Free Evaluation: marketing@algosec.com
  • 51. 51 JOIN OUR COMMUNITY Follow us for the latest on security policy management trends, tips & tricks, best practices, thought leadership, fun stuff, prizes and much more! Subscribe to our YouTube channel for a wide range of educational videos presented by Professor Wool youtube.com/user/AlgoSeclinkedin.com/company/AlgoSec facebook.com/AlgoSec twitter.com/AlgoSec www.AlgoSec.com/blog
  • 52. ALGOSUMMIT THE PREMIER EVENT FOR ALGOSEC CUSTOMERS & CHANNEL PARTNERS 52 Dallas October 21-24 2019 www.algosec.com/algosummit UPCOMING WEBINARS July 10 Change Automation July 30 Managing Cisco ACI
  • 53. THANK YOU! Questions & Request for Demo: marketing@algosec.com