2. Fortinet Confidential
Fortinet Corporate Overview
• Founded in 2000
• Global presence with 30+ offices worldwide
& 1,200+ employees
– 5,000+ channel partners
– 125,000+ customers
– Majority of the Fortune Global 100
• IPO Nov 2009
• NASDAQ: FTNT
• 2009 revenue of $252 Million
– 19% YoY growth
• World class management team
2
$434
$39
$80
$123
$155
$212
$252
$325
RECEITA FORTINET ($MM)
55% CAGR
$13
03 04 05 06 07 08 09 10 11
3. Fortinet Confidential
21 19 69 113 141
624
1,656
2002 2003 2004 2005 2006 2007 2008
The Threats You Face Continue to Grow
3
Exponential Growth in Malware Threats
(000)
Broad New Hacking Attack
Detected (2/8/2010)
“Hackers in Europe and China successfully
broke into computers at nearly 2,500
companies and government agencies over the
last 18 months in a coordinated global attack
that exposed vast amounts of personal and
corporate secrets to theft..”.
Google Hack Attack Was
Ultra Sophisticated, New
Details Show (1/14/2010)
“Hackers seeking source code from Google,
Adobe and dozens of other high-profile
companies used unprecedented tactics that
combined encryption, stealth programming
and an unknown hole in Internet Explorer,
according to new details..”
In Number In severity
Coordinated and blended attacks
are now a common practice
Increased processing power
required
In Complexity
Motive and intent has moved
from notoriety to financial gain
Cyber security is critical
3.7 4.4
9.9
16.1
23
30.2
1,656
54.6
87.6
2001 2003 2005 2007 2009
U.S. DoD Reported Incidents of Malicious
Cyber Activity (000)
4. Fortinet Confidential
We Pioneered a New Approach
4
The Fortinet SolutionTraditional Network Security Solutions
• Real-time, integrated security intelligence
• ASIC-accelerated performance
• Lower total cost of ownership
• Easy to deploy / manage / use
• Stand-alone, non-integrated security
• Mix of off the shelf systems and applications
• Higher total cost of ownership
• Difficult to deploy / manage / use
5. Fortinet Confidential
Integrated Protection Against Today’s Threats
5
• Overlapping, complementary layers of protection
• Comprehensive, integrated inspection
• Allow but don’t trust any application
• Examine all application content
6. Fortinet Confidential
Customers Worldwide
Seven of Top 10 Fortune 500
Eight of Top 10 Global 500 in EMEA
Eight of Top 10 Global 500 in APAC
Nine of Top 10 Global 500 Commercial & Savings Banks
Seven of Top 10 Global 500 Aerospace & Defense
Two of Top 5 Global 500 Telecommunications
7. Fortinet Confidential
A Reliable Partner
• Proven Industry Leadership
• Since 2000, Fortinet has received more than 100 product & company awards.
• IDC: Overall leader in UTM factory revenue for all of 2009
• Gartner: Leader in Multi-Function Firewall Magic Quadrant
• Frost & Sullivan: 2010 "Fortinet is the established and undisputed leader" of worldwide UTM market
• SC Magazine: 2009 Readers' Trust Award for "Best Integrated Security Solution"
• Certified security
• Five ICSA certifications (Firewall, AV, IPS, IPSec VPN, SSL VPN, Anti-Spam)
• Government Certifications (FIPS-2, Common Criteria EAL4+, JITC IPv6, SCAP)
• ISO 9001 certification
8. Fortinet Confidential
Summary
• Comprehensive solution
• Integrated, strategic security
• Lower TCO
• Less complexity, faster deployment,
easier management
• Real-time security
• 24/7 global updates deliver security
expertise
• Unmatched flexibility
• Deploy the technology you need, where
and when you need it
14. Fortinet Confidential
FortiGate UTM Lineup
• ASIC-based multi-threat security platform
• Common OS across all platforms
• Single management interface
• FortiGuard Services
• Antivirus, IPS, Antispam, Web content filtering,
Application control
14
Enterprise Service Provider & Large EnterpriseSMB & Remote Office
15. Fortinet Confidential15
Purpose-Built Hardware
Specialized OS
Firewall
Flexible Capabilities
Hardened Platform
High Performance
Real-Time Protection
Traffic ShapingVPN
AV IPS AntispamWeb Filter
SSL InspDLP WAN Opt
App Ctrl
FortiGate Multi-Threat Security Platform
FortiGuard Updates
• Purpose-built to deliver overlapping, complementary security
• Provides both flexibility & defense-in-depth capabilities
17. Introduzindo o FortiOS 4.0
Principais benefícios:
Acesso a inovadora tecnologia de segurança, antes
disponivel somente em produtos independentes.
Melhora a segurança através da integração das
tecnologias de segurança.
Consolidação simplifica gerenciamento, economiza
tempo e dinheiro.
Com o lançamento do FortiOS
4.0, a Fortinet está redefinindo
novamente a segurança de rede
através da estensão do escopo
das capacidades da segurança
consolidada com o Fortigate
multi-threat security system
18. Novo no FortiOS
FortiOS 4.0 introduz quatro principais novas
tecnologias na segurança de rede atualmente
oferecida:
Otimização de WAN
Acelera aplicações sobre conexões de WAN e ao mesmo tempo
garante segurança multi-threat
Controle de Applicação
Reconhece trafego baseado na aplicação que está gerando o mesmo
ao invés de se basear em port ou protocol.
Inspeção de SSL
Aumenta o controle de segurança e politica nos trafegos
criptografados.
Prevenção contra vazamento de dados (DLP)
Para identificar e prevenir comunicação de informação sensitiva para
fora das fronteiras da rede
19. Otimização de WAN
Aumenta o desempenho da rede
Reduz dados transmitidos atraves da WAN
Reduz exigencias de banda e recurso de servidores
Melhora a produtividade dos usiários
Reduz custos de rede
Aumenta a performance da rede reduzindo a quantidade
de comunicação de dados transmitido entre aplicações e
servidores na WAN
20. Otimização de WAN em ação
Caching Integrado
Bi-direcional
Integrado com VDOMs
Aplicações comuns
Compartilhamento de
Arquivo (CIFS, FTP)
Email (MAPI with MS
Exchange / MS Outlook)
Web (HTTP / HTTPS)
Genérico (TCP)
Integração com
FortiClient
Usuários Remotos /
móveis sem FortiGate
local
21. Controle de Aplicação
Facilita a inspeção de aplicações usando portas não-padrões, port-hopping, ou tuneis
com aplicações seguras
Controle de politica mais flexivel and bem-granuladas
Aumenta a segurança
Visibilidade mais aprofundada do trafego de rede
Reforça a política de segurança para mais de 1000
aplicações, independente da porta ou protocolo
usado para a comunicação.
22. Lista de Controle de Aplicações
Multiple Applications can
be defined with different
actions and logging
options
24. Inspeção de Tráfego SSL
Inspeciona comunicação oculta
Melhora proteção para servidores
web/app seguros
Melhora a visibilidade no trafego de
rede
Suporta os protocolos HTTPS, POP3S,
SMTPS, e IMAPS
Faz proxy do trafego SSL criptografado,
inspecionando ameaças e aplicando politica para
trafego que é invisivel para outros dispositivos de
segurança.
25. Aplica a politica tradicional de filtro
WEB ao tráfego HTTPS
Filtrando o tráfego HTTPS
Corporate
LAN
Cliente inicia a conexão HTTPS
ao servidor
Interceptada pelo FortiGate
FGT estabelece conexão ao
servidor e faz proxy da
comunicação
Filtro WEB é aplicado no
trafego criptografado
26. Corporate
LAN
Email
(POP3S, IMAPS, SMTPS)
Web
(HTTPS)
Client
Protegendo o servidor SSL
Filtra o trafego SSL-encrypted para prevenir contra intrusos / ataques
Utiliza o mesmo mecanismo para
interceptar & descriptografar o
trafego SSL
Aplica perfil de proteção padrão no
tráfego criptografado.
27. Prevenção de Vazamento de
Dados (DLP)
Sensor DLP
Usado para definir a detecção de
conjunto de regras
Sensor aplicado no perfil de proteção
Ações DLP
Logar, bloquear, arquivar (FortiAnalyzer)
Banir ou quarenternar o usuário
Tipos de arquivos suportados
Texto, PDF, MS Word (até a versão
2007, incluindo)
Tipos adicionais inclusos futuramente
28. Features adicionais do FortiOS 4.0
Politica baseada em Indentidade
FortiOS 4.0 permite aos administradores a capacidade de definir politica
de seguranca para usuários individuais, grupos, endereço IP, rede, ou
protocolo.
Melhorias na Prevenção de Intrusos
Com a detecção passiva de intrusos, suporte ao IPv6, ações de
bloqueios multiplos, e opção de logging para tráfego de ameacas, a
Fortinet levou esta função para um nivel ainda mais efetivo.
Controle e Conformidade de Endpoint
FortiOS 4.0 permite o FortiGate checar a instalação dos agentes de
segurança de endpoint ForitClient. Integridade do HOST (atualizacao de
AV, firewall habilitado, etc.) Pode ser verficado antes de permiter o
dispositivo na rede.
33. Fortinet Confidential
FortiDB
Comprehensive Database Security
• Database discovery and classification
• Vulnerability assessment with remediation advice
• Database activity monitoring (DAM)
• Data loss prevention
• Automation of auditing and compliance
• Change control for metadata changes (DDL) and user privilege
changes (DCL)
• Support for heterogeneous, virtualized environments
35. Fortinet Confidential
FortiMail
• Dedicated antispam appliance
• High-performance mail processing with antispam detection
• Complements antispam/antivirus features in FortiGate
• Flexible deployments
• Transparent, Gateway, or Server modes
• Integrated multi-threat detection
• Antispam, Antivirus, Antispyware, Antimalware
• Preserves productivity, ensures policy compliance, and
protects domain reputation
• Email quarantining and archiving
• User-based quarantine capabilities
• Archiving for analysis and compliance support
• ,
36. Fortinet Confidential
FortiWeb – Web Application Firewall
• Web application firewall
• Secures web-based applications with web application and XML firewalls
• Accelerates web applications through XML/SSL acceleration, session
offloading, and load balancing
• Simplifies deployment and management of web applications with a central
security appliance
• Assists in compliance with industry or government mandates, such as PCI
DSS
37. Fortinet Confidential
FortiWeb
• Three deployment modes to easily integrate FortiWeb
• Transparent inline
• Reverse proxy
• Non-inline
• Web application scanner for PCI DSS 6.5 and 6.6
• Additional layers of protection:
• Protocol enforcement
• Anti web defacement
• Brute force login robot protection
• Authentication offload to accelerate applications
• Advanced URL rewriting capabilities
37
38. Fortinet Confidential
Secure Web applications
Protect Web Services
Ensure Application Availability
Web Application Platform
Web Application Firewall – secures web applications to help customers
meet compliance requirements
XML Firewall – Secures and prevents exploits against XML based web
services
Application Acceleration – Accelerates and ensures timely delivery of web
based content utilizing Fortinet’s ASIC technology
38
FortiWeb – Web Application Firewall
40. Fortinet Confidential
FortiClient
• Host-based security
• Antivirus / antimalware client
• Personal firewall
• Web content filter
• Antispam filtering
• FortiGate integration
• WAN optimization
• IPSec VPN
• Data loss prevention
40
Antivirus
Web
Filtering Antispam
FortiGuard Services
41. Fortinet Confidential
FortiScan-1000B
• Endpoint Vulnerability Assessment and Remediation
• Identifies security vulnerabilities and finds compliance exposures on hosts
and servers
• Audits and monitors across heterogeneous systems
• Delivers patch management with ready to deploy remediation and
enforcement actions
• Aides compliance for regulatory mandates with compliance reports
43. Fortinet Confidential
FortiGuard Services Network
• Real-time updates
• “Push” / “pull” updates for Fortinet customers
• Tied to FortiCare registration system
• Distributed infrastructure
• Multiple servers deployed globally
• Approximately 16 data center locations
• Hierarchical deployment strategy
• Main server update pushes secondary updates
• Gather feedback from worldwide installed base
43
44. Fortinet Confidential
FortiCare Support Services
• FortiCare Knowledge Center
• Around the clock self-service portal
• Technical articles & documentation
• Firmware/software updates
• Technical Support
• 8x5 – Business Hours Support Local Time
• 24x7 – Around the clock coverage for
Priority 1 events
• Online Tracking/Management of Tickets
• Premium Support
• Hardware Repair
• Return to Factory (Return & replace services)
• Advanced Replacement (24 hr return)
• Premium-RMA (4-Hour and Next Day)
Available in Key Geographic Areas
46. Fortinet Confidential
FortiGate Voice Overview
• Integrated Multi Service Business Gateway
• Combines multiple services into a single, integrated business gateway
device, managed by a single console:
• Multi-threat UTM security gateway
• IP Router
• Ethernet Switch
• IP PBX
• Wireless LAN
• VPN with strong encryption
48. Fortinet Confidential
Introducing FortiAP™ Secure Thin Access Points
Secure Wireless Networks
Rogue Access Point (AP) Detection and
Remediation (for PCI compliance)
Granular Endpoint Control
Speedy 802.11n Performance
300 Mbps-600Mbps throughput
Simplify Your Administration
Use existing FortiGate devices for WLAN Control
Turnkey Audit Reports make compliance easier
Save Over Competitive Solutions
Lower Total Cost of Ownership (TCO)
48
Integrated wireless security and access solution
a b g n
50. Fortinet Confidential50
Multi-Threat
Network Security
L7 Application
Control
Rogue AP
Detection
User and Device
Authentication
High Performance
Wifi Radio
Fortified Wireless Space
High-
Performance
Wireless
Networking
Advanced
Network-Based
Security
51. Fortinet Confidential51
Building a Secured Wireless LAN Solution
Secure Wireless
Access Points
Multi-Threat Security
with Integrated
Wireless Controller
Fortified Wireless
Space