In today’s complex and dynamic environment with growing digital business demands, IT often struggles to gain adequate visibility and control, and to ensure compliance with security policies and regulatory guidelines. Effective security policy management that accommodates the dynamic nature of today’s organizations is a key challenge for many IT departments.
2. WELCOME
Have a question? Submit it via the chat tab or email us:
This webinar is being recorded!
The recording will be emailed to you after the webinar
And the slides will be available in the attachments tab
Follow us online !
2
marketing@algosec.com
4. 4
Fortinet: Network Security Leader
Fortinet is among the top 4
public cybersecurity
companies in the world.
Its broad portfolio of solutions spans
Network, Infrastructure, Cloud, and IoT
Security.
$14.3B Mkt Cap ~$1.8B - 2018
(revenue)
* As of March 31, 2019
400,000+
Customers
4.6M+ Appliances
Shipments Worldwide
(+30% units WW)
5. 5
90% of F100Are Fortinet Customers
Telco
Financials/
Banking
Technology
Retail
Aerospace/
Defense
10 of 12
Healthcare
12 of 15
Transportation
3 of 5 9 of 11 3 of 5
9 of 104 of 4 11 of 13 3 of 54 of 5
Financials/Ins Food/Bev
Energy
6. 6
Fortinet: Key Customer Challenges
Requires Visibility and
Intent-Based Segmentation
Attack Surface
BROAD
Requires Orchestration,
Automation, and Response
Vendor Complexity
AUTOMATED
Requires AI-Based
Prevention Across Devices,
Networks, and Applications
Advanced Threats
INTEGRATED
8. 8
Human Errors and Misconfigurations
is one of the leading cause of security
breaches and/or network outages
CHALLENGE
Centralized security management and
visibility helps reduce multiple complex
management consoles and enables true
Single Pane with:
• Configuration Management
• Single Console Visibility
• Multi-Factor Authentication
• High Availability
• Flexible Deployment / Pricing
• Zero-Touch Deployment
SOLUTION
1# Single Pane of Glass Management
Branch Office
Branch Office
Branch Office
FortiAnalyzer
HA Cluster
FortiManager
HA Cluster
IOC
HQ
Internet
FortiGuard
Security Services
9. 9
CHALLENGE
Regulation: Compliance Management is usually
a very manual and inefficient process that
involves multiple full-time staff and involves
months to get right.
2# Audit & Compliance
SOLUTION
Simple Reporting and Compliance Controls
Management to enables proving Compliance
proactively
• NIST, CIS Frameworks
• Reports on PCI DSS, SAR etc.
• Audit Logging & RBAC
• Integrated Workflow for Security &
Operations
JAN FEBMARAPRMAYJUN JUL AUGSEPOCTNOVDEC
28%
55%
89%89%
10. 10
Staff Shortage - Enterprises don’t have the
resources to staff the detection and response
of Anomalies
CHALLENGE
Leverage Workflow Optimization technology to
reduce the time to detect and respond to
threats or operational anomalies
• Incident Detection & Response
• ITSM Workflow Applications
• SIEM Integration
• Webhook Integration
• Automation Stitches
SOLUTION
3# Workflow Optimization
FortiManager
HA Cluster
3rd Party
Tools
Response
Actions
FortiAnalyzer
HA Cluster
(Collector)
1
2
3
3
Response
Actions
Collect
Events
Detect Anomalies
11. 11
CHALLENGE
Advanced Threats: Attacks are getting complex
and very hard to detect and that coupled with lack
of skilled staff – it’s challenging to protect the
modern enterprise
4# Advanced Threat Detection
SOLUTION
Analytics Driven threat detection that can detect
any threats and identify them as High, Med or Low
risks for the enterprise
• IoC Detection & Correlation
• Fabric Integrated Detection
• SIEM Integration
FortiGate – Remote Offices
FortiAnalyzer
HA Cluster
FortiAnalyzer
HA Collector
Cluster
16. 16
Automation: Compliance Reports
Situational Awareness Report
New report helps with addressing the most
critical needs for compliance preparedness
Assists in readiness for auditing
Helps to Prepare, Protect, Detect, Respond
& Recover for a Strong Security Posture
19. Founded 2004
1800+ Enterprise Customers
Serving 20 of the Fortune 50
24/7 Support via 3 Global Centers
Passionate about Customer
Satisfaction
19
CORPORATE OVERVIEW
19
20. HELPING OVER 1,800 CUSTOMERS WORLDWIDE ALIGN
SECURITY WITH BUSINESS PROCESSES
21. AlgoSec enables
companies to align
security with their
business processes
Business-driven Agility
Business-driven Visibility
Business-driven Security
BUSINESS DRIVEN SECURITY MANAGEMENT
19
22. ALGOSEC: KEY CUSTOMER CHALLENGES
Keep System
Secure
Network
Visibility
Maintain
Compliance
Visibility of complex networks
Across on-premise, cloud & SDN
Frequent change requests
Applications migration to the cloud
Staff shortage
Allow ease of compliance and
auditing of the changes
22
And other leading
security vendors
SECURITY SHOULD NOT DELAY THE BUSINESS
23. POLL #1
How many firewall vendors do you have in your organization?
1
2
3 or more
Please vote using the “Votes“ tab
23
24. ALGOSEC: KEY CUSTOMER CHALLENGES
Visibility of complex networks
Across on-premise, cloud & SDN
Network
Visibility
24
And other leading
security vendors
26. VISIBILITY ACROSS THE ENTIRE HETEROGENEOUS
ENVIRONMENT
Native Cloud Security ModelsVirtual appliance
in the cloud
NGFW on-prem
Private cloud SDN – distributed FW
26
27. POLL #2
How many policy changes do you have each week on average?
Each line you add to a firewall is counted as a change
0-10
10-50
50-100
100 or more
Please vote using the “Votes“ tab
27
28. ALGOSEC: KEY CUSTOMER CHALLENGES
Keep System
Secure
Frequent change requests
Applications migration to the cloud
Staff shortage
28
32. Based on policy analysis & on network traffic analysis
POLICY OPTIMIZATION
33. POLL #3
How many regulations are you obligated to report?
Each line you add to a firewall is counted as a change
None
1
2 - 4
More than 4
Please vote using the “Votes“ tab
33
34. ALGOSEC: KEY CUSTOMER CHALLENGES
Maintain
Compliance
Allow ease of compliance and
auditing of the changes
34
38. Request a
network
change
Check for
risks involved
And approve
Plan the
changes
(objects & rules)
Implement
the change on
the devices
Validate
the
change
Identify
Devices in
the flow path
CUSTOMER STORY
38
39. Validate the
change
Identify
Devices in
the flow
path
Check for
risks
involved
Plan the
Rules
Implement
the change
on the
devices
Request a
network
change
CUSTOMER STORY
AlgoSec can push changes automatically
39
40. ENABLING TRAFFIC POLICY CHANGES
• Is the traffic from source
to destination enabled?
• Routing
• Firewall rules
40
Cloud
47. SUMMARY
&
BENEFITS
Fortinet provides unparalleled broad,
automated and integrated security
protection across segments
01
AlgoSec enables Multi-Vendor
Firewall Management across
heterogeneous and hybrid
enterprises
02
100s of Enterprise Customers find
Fortinet & AlgoSec best together in
their Multi-Vendor Environment
03
47
48. Prof. Wool Video Courses
https://www.algosec.com/resources
48
Solution Brief Whitepaper
Webinar Slides
50. Q & A
Submit your questions via the chat
Request a Free Evaluation: marketing@algosec.com
51. 51
JOIN OUR COMMUNITY
Follow us for the latest on security policy management trends, tips & tricks,
best practices, thought leadership, fun stuff, prizes and much more!
Subscribe to our YouTube channel for a
wide range of educational videos
presented by Professor Wool
youtube.com/user/AlgoSeclinkedin.com/company/AlgoSec
facebook.com/AlgoSec
twitter.com/AlgoSec
www.AlgoSec.com/blog
52. ALGOSUMMIT
THE PREMIER EVENT FOR
ALGOSEC CUSTOMERS & CHANNEL PARTNERS
52
Dallas
October 21-24
2019
www.algosec.com/algosummit
UPCOMING
WEBINARS
July 10
Change Automation
July 30
Managing Cisco ACI