SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Cassie Vorster – Africa BDM SDWAN
2
© Fortinet Inc. All Rights Reserved.
Megatrends driving Today’s IT Transformation
Digital Acceleration
69%
52%
Work from Anywhere
67%
Ransomware Target
3
© Fortinet Inc. All Rights Reserved.
Your Imperatives driving your IT Transformation
4
© Fortinet Inc. All Rights Reserved.
Embarking on an SD-WAN journey
means more than
just the selection of an SD-WAN Product.
LAN
Wireless LAN
WAN Wireless WAN
Remote Workers Path to Zero Trust
6
© Fortinet Inc. All Rights Reserved.
SD-WAN
Firewall Segmentation SWG
Router
Ethernet
Controller
SSL
5G
AP
Controller
IPS
ZTNA Proxy
NAC
Appliance Virtual Container SaaS
Actionable Threat
Intelligence
Management
Networking Security
The Foundation of Fortinet’s Vision:
Convergence of Networking and Security
Security
Driven
Networking
7
© Fortinet Inc. All Rights Reserved.
Was all about network
transformation replacing
routers
SD-WAN
Adding security services
Secure
SD-WAN
Gartner: Two Most Topics Discussed with SD-WAN in 2021 – Security and Cloud
Evolution of SD-WAN from Point Product to The Platform
• Build out SD-Branch with
LAN integration
• Build out WAN with 5G
SD-Branch ZTNA & SASE
• ZTNA and SASE
integration
• Multi-cloud and cloud
on-ramp
AIOps
Advanced AIOps & DEM
services
8
© Fortinet Inc. All Rights Reserved.
Transition to Support SD-Branch,
SASE and Zero Trust Edge
Only vendor integrates and manages all
functions with a single management
console
Designed for ALL
WAN Architectures
Only vendor with built-in SD-WAN
ASIC, unrestricted WAN BW
consumption
Transform and
Secure WAN
1st vendor to organically deliver
SD-WAN, NGFW, advanced routing,
ZTNA proxy in one WAN edge
Innovations That Transform Network Edges
Converged Networking and
Security Powered by One OS
Massive Scale,
Performance and App ID
Tight LAN, Wireless LAN,
Wireless WAN, and ZTNA
Integration
9
© Fortinet Inc. All Rights Reserved.
NGFW
Fortinet Secure SD-WAN Powered by One OS, One Management
Manage
Monitor
Analyze
Fabric
Management
Center
FortiManager FortiAnalyzer
First vendor to organically deliver SD-WAN, NGFW, Advanced Routing, ZTNA Enforcement
in One WAN Edge
Converged Networking and Security Powered by One OS
Advanced Routing
SD-WAN ZTNA
Enforcement
Transform
& Secure
WAN
Fortinet Secure SD-WAN
10
© Fortinet Inc. All Rights Reserved.
M
P
L
S
WWAN
From SD-WAN to SD-Branch
Data Center
Campus
Branch
Cloud
SD-WAN
Secure
SD-Branch
Security Driven - Branch
FortiManager
11
© Fortinet Inc. All Rights Reserved.
Content
• Inline AI Sandbox & EDR Behavior
• Polymorphic Anti-Malware | Antivirus
• Mobile Malware
• Credential-stuffing defense
Web
• URL Filtering
• DNS security
• Secure Web Gateway
• Phishing
• Geo-location
• In-line CASB
• Anti-spam
Device (IT | OT | IoT)
• Exploit Protection
• Vulnerability Detection
& Patching
• IPS Known and Zero-Days
• Botnet & C2
Application Security
• Secure Email Gateway
• WAF signatures
• DDOS
• CASB – SaaS Security
• ADC
NOC/SOC
• Decoys
• IOC Ingestion and Search
• Advanced Forensics & Threat Hunting
• AI-powered investigation & Automated
Integrative IR
• Outbreak Detection services (FAZ, FCT, FOS)
• Automated playbooks and remediation
• Fabric Rating Proactive Assessments
and Simplified Migration
Introduction to FortiGuard AI-Powered Security Services
FortiGuard Labs
• Real-Time Security update
• AI & Machine Learning models
developments on both local
and large-scale Cloud-driven
data lakes
• Zero-Day discovery
• Outbreak Alerts
• Threat Monitoring and
Communications
• Industry Alliances
13
© Fortinet Inc. All Rights Reserved.
Fortinet Recognized as a Leader 2021,
12th time, included in this Magic Quadrant
Fortinet Recognized as a Leader Positioned
Highest for Ability to Execute
November 2021 Magic Quadrant™
for Network Firewalls
August 2022 Magic Quadrant™ for
SD-WAN Infrastructure
Bringing 12 years of Security Leadership to Networking Excellence
Same
Management
Same OS
14
© Fortinet Inc. All Rights Reserved.
Gartner’s SDWAN MQ
15
© Fortinet Inc. All Rights Reserved.
Why Fortinet Ranked #1 ?
What is Security-Sensitive WAN Use-case ?
A security-sensitive WAN typical in some
mid- to large-scale organizations focused on
securing branch offices as the main priority,
where network and security procurements
are increasingly converging.
DEFINITION
• Networking and security are integrated
in the same appliance
• Advanced security: IPS, URL
filtering/SWG, SSL inspection, anti
malware, sandboxing & ZTNA
WHY RANKED #1
Data Center
Campus
Branch
Home
Cloud
SaaS
WAN
16
© Fortinet Inc. All Rights Reserved.
Why Fortinet Ranked # 1
What is Remote Worker Use-case ?
Remote workers connecting to the
enterprise network and cloud resources
from remote locations such as their
homes, instead of solely connecting
from the branch.
DEFINITION
• Integrated Zero Trust Network
Access (ZTNA) access proxy
• Lightweight hardware solution for
power users
• Integrated management, visibility and
orchestration with branch network
solutions
WHY RANKED #1
ZTNA
Enforcement
Policy Engine
User Identity and Device Posture ENFORCEMENT
User Identity
Access Specific Applications
Continuous Trust Check
User Contextual Rule Set
Applications Can Be Anywhere
Users Can Be Anywhere
Data Center
Cloud
SaaS
ZTNA
Campus
Branch
Home
Travel
User
17
© Fortinet Inc. All Rights Reserved.
Why Fortinet Ranked # 1
What is Small Branch Use-case ?
Small branch WAN that requires simple and
secure branch networking solutions with ease
of use as a main driver. This use case can be
any number of sites with branch locations,
typically with fewer than 10 people.
Branch Infrastructure Convergence
Switching
Wireless
4G/5G Backhaul
SD-WAN
NGFW
NAC
One Console
One Config file
DEFINITION
• Support for integrated Wi-Fi in a single
orchestration platform
• Integrated orchestration of LAN, WLAN,
WAN and security to simplify
management
• Ensuring service continuity in handling
LTE connections
WHY RANKED #1
19
© Fortinet Inc. All Rights Reserved.
Secure Edge
Connectivity
1
NGFW
Optimize Application
Experience
2
SD-WAN
Secure Remote
Users
3
SASE
With Fortinet’s convergence of security & networking everywhere
Pragmatic Journey to SASE
20
© Fortinet Inc. All Rights Reserved.
Travel Factory
Home Campus
Secure SD-WAN : Flexible Application Steering at Edge
Branch
Edge Compute
Public Cloud
Internet SaaS Data Center
SD
WAN
Network Firewall
Secure SD-WAN
SD-Branch
Application Aware
Intrusion Prevention
Web Filtering
DNS Protection
Sandboxing
In-Line Sandboxing
In-Line CASB
OT and IoT Security
Consistent
Security
Convergence
21
© Fortinet Inc. All Rights Reserved.
Travel Factory
Home Campus
Secure Remote Access – Securely connect remote users
Branch
Edge Compute
Public Cloud
Internet SaaS Data Center
SSE
SD
WAN
Network Firewall
Secure SD-WAN
SD-Branch
SASE
Application Aware
Intrusion Prevention
Web Filtering
DNS Protection
Sandboxing
In-Line Sandboxing
In-Line CASB
OT and IoT Security
Consistent
Security
Convergence
22
© Fortinet Inc. All Rights Reserved.
Travel Factory
Home Campus
Universal ZTNA – Secure user access to applications
Branch
Edge Compute
Public Cloud
Internet SaaS Data Center
SSE
SD
WAN
Network Firewall
Secure SD-WAN
SD-Branch
SASE
Universal ZTNA
Application Aware
Intrusion Prevention
Web Filtering
DNS Protection
Sandboxing
In-Line Sandboxing
Network Access
Control (NAC)
OT and IoT Security
Consistent
Security
Convergence
23
© Fortinet Inc. All Rights Reserved.
Travel Factory
Home Campus Branch
Edge Compute
Public Cloud
Internet SaaS Data Center
SD
WAN
Secure
Services
Edge
Network Firewall
Secure SD-WAN
SD-Branch
SASE
Universal ZTNA
Application Aware
Intrusion Prevention
Web Filtering
DNS Protection
Sandboxing
In-Line Sandboxing
Network Access
Control (NAC)
OT and IoT Security
Consistent
Security
Convergence
“Single Vendor SASE”
Unified SSE Solution
24
© Fortinet Inc. All Rights Reserved.
Transition to support SD-Branch, SASE and Zero Trust Edge
Tight Integration With LAN, WLAN, WWAN, ZTNA
Wireless WAN
Only Vendor Integrates & Manages All Functions with a Single Management
SD-WAN
NGFW
LAN
Wireless LAN
ZTNA
Enhance Operations
and Lower TCO
Accelerate
Troubleshooting
Accelerate Transition to Zero
Trust Edge & SD-Branch
Simplify Architecture
and Management
Extending Security to EVERY Edge

Weitere ähnliche Inhalte

Was ist angesagt?

Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security OverviewAllen Brokken
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptxaungyekhant1
 
Enterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANEnterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANToshal Dudhwala
 
Azure Virtual Desktop Overview.pptx
Azure Virtual Desktop Overview.pptxAzure Virtual Desktop Overview.pptx
Azure Virtual Desktop Overview.pptxceyhan1
 
12 palo alto app-id concept
12 palo alto app-id concept12 palo alto app-id concept
12 palo alto app-id conceptMostafa El Lathy
 
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design ConsiderationsTechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design ConsiderationsRobb Boyd
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internetRony Melo
 
SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?Haris Chughtai
 
10 palo alto nat policy concepts
10 palo alto nat policy concepts10 palo alto nat policy concepts
10 palo alto nat policy conceptsMostafa El Lathy
 
17 palo alto threat prevention concept
17 palo alto threat prevention concept17 palo alto threat prevention concept
17 palo alto threat prevention conceptMostafa El Lathy
 
16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy conceptMostafa El Lathy
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyDavid J Rosenthal
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise Management Associates
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?QOS Networks
 

Was ist angesagt? (20)

What is SASE
What is SASEWhat is SASE
What is SASE
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
Enterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANEnterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WAN
 
Azure Virtual Desktop Overview.pptx
Azure Virtual Desktop Overview.pptxAzure Virtual Desktop Overview.pptx
Azure Virtual Desktop Overview.pptx
 
12 palo alto app-id concept
12 palo alto app-id concept12 palo alto app-id concept
12 palo alto app-id concept
 
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design ConsiderationsTechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
 
Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-review
 
SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?
 
10 palo alto nat policy concepts
10 palo alto nat policy concepts10 palo alto nat policy concepts
10 palo alto nat policy concepts
 
17 palo alto threat prevention concept
17 palo alto threat prevention concept17 palo alto threat prevention concept
17 palo alto threat prevention concept
 
16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
 
4 palo alto licenses
4 palo alto licenses4 palo alto licenses
4 palo alto licenses
 
Zero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOpsZero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOps
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
 

Ähnlich wie Extending Security to EVERY Edge

Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanDATA SECURITY SOLUTIONS
 
SDWAN Introduction presentation & Public Speaking
SDWAN Introduction presentation & Public SpeakingSDWAN Introduction presentation & Public Speaking
SDWAN Introduction presentation & Public Speakingdatnc09
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityRobb Boyd
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANRobb Boyd
 
Unravelling Managed SD-WAN Services
Unravelling Managed SD-WAN ServicesUnravelling Managed SD-WAN Services
Unravelling Managed SD-WAN ServicesRalph Santitoro
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayCisco Canada
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurrezkellahhichem
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdfYounesChafi1
 
Secure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptxSecure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptxYitao Cen
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_diveNur Shiqim Chok
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksArticulate Marketing
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_finalLan & Wan Solutions
 
Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...
Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...
Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...Amazon Web Services
 

Ähnlich wie Extending Security to EVERY Edge (20)

Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
SDWAN Introduction presentation & Public Speaking
SDWAN Introduction presentation & Public SpeakingSDWAN Introduction presentation & Public Speaking
SDWAN Introduction presentation & Public Speaking
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
Fortinet_for_SAP
Fortinet_for_SAPFortinet_for_SAP
Fortinet_for_SAP
 
Secure Your Network for Scale & the Cloud
Secure Your Network for Scale & the CloudSecure Your Network for Scale & the Cloud
Secure Your Network for Scale & the Cloud
 
Unravelling Managed SD-WAN Services
Unravelling Managed SD-WAN ServicesUnravelling Managed SD-WAN Services
Unravelling Managed SD-WAN Services
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
 
Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV
 
Track SD-WAN.pdf
Track SD-WAN.pdfTrack SD-WAN.pdf
Track SD-WAN.pdf
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
 
Secure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptxSecure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptx
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_final
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...
Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...
Contrail SD-WAN and AWS: From the Cloud to the Cloud and Across the Software-...
 

Mehr von itnewsafrica

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...itnewsafrica
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...itnewsafrica
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omniitnewsafrica
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023itnewsafrica
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retailitnewsafrica
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...itnewsafrica
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...itnewsafrica
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...itnewsafrica
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcareitnewsafrica
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcareitnewsafrica
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...itnewsafrica
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platformitnewsafrica
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Betteritnewsafrica
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...itnewsafrica
 

Mehr von itnewsafrica (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omni
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retail
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcare
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcare
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platform
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Better
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
 

Kürzlich hochgeladen

%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...masabamasaba
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationJuha-Pekka Tolvanen
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 

Kürzlich hochgeladen (20)

%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 

Extending Security to EVERY Edge

  • 1. Cassie Vorster – Africa BDM SDWAN
  • 2. 2 © Fortinet Inc. All Rights Reserved. Megatrends driving Today’s IT Transformation Digital Acceleration 69% 52% Work from Anywhere 67% Ransomware Target
  • 3. 3 © Fortinet Inc. All Rights Reserved. Your Imperatives driving your IT Transformation
  • 4. 4 © Fortinet Inc. All Rights Reserved. Embarking on an SD-WAN journey means more than just the selection of an SD-WAN Product. LAN Wireless LAN WAN Wireless WAN Remote Workers Path to Zero Trust
  • 5.
  • 6. 6 © Fortinet Inc. All Rights Reserved. SD-WAN Firewall Segmentation SWG Router Ethernet Controller SSL 5G AP Controller IPS ZTNA Proxy NAC Appliance Virtual Container SaaS Actionable Threat Intelligence Management Networking Security The Foundation of Fortinet’s Vision: Convergence of Networking and Security Security Driven Networking
  • 7. 7 © Fortinet Inc. All Rights Reserved. Was all about network transformation replacing routers SD-WAN Adding security services Secure SD-WAN Gartner: Two Most Topics Discussed with SD-WAN in 2021 – Security and Cloud Evolution of SD-WAN from Point Product to The Platform • Build out SD-Branch with LAN integration • Build out WAN with 5G SD-Branch ZTNA & SASE • ZTNA and SASE integration • Multi-cloud and cloud on-ramp AIOps Advanced AIOps & DEM services
  • 8. 8 © Fortinet Inc. All Rights Reserved. Transition to Support SD-Branch, SASE and Zero Trust Edge Only vendor integrates and manages all functions with a single management console Designed for ALL WAN Architectures Only vendor with built-in SD-WAN ASIC, unrestricted WAN BW consumption Transform and Secure WAN 1st vendor to organically deliver SD-WAN, NGFW, advanced routing, ZTNA proxy in one WAN edge Innovations That Transform Network Edges Converged Networking and Security Powered by One OS Massive Scale, Performance and App ID Tight LAN, Wireless LAN, Wireless WAN, and ZTNA Integration
  • 9. 9 © Fortinet Inc. All Rights Reserved. NGFW Fortinet Secure SD-WAN Powered by One OS, One Management Manage Monitor Analyze Fabric Management Center FortiManager FortiAnalyzer First vendor to organically deliver SD-WAN, NGFW, Advanced Routing, ZTNA Enforcement in One WAN Edge Converged Networking and Security Powered by One OS Advanced Routing SD-WAN ZTNA Enforcement Transform & Secure WAN Fortinet Secure SD-WAN
  • 10. 10 © Fortinet Inc. All Rights Reserved. M P L S WWAN From SD-WAN to SD-Branch Data Center Campus Branch Cloud SD-WAN Secure SD-Branch Security Driven - Branch FortiManager
  • 11. 11 © Fortinet Inc. All Rights Reserved. Content • Inline AI Sandbox & EDR Behavior • Polymorphic Anti-Malware | Antivirus • Mobile Malware • Credential-stuffing defense Web • URL Filtering • DNS security • Secure Web Gateway • Phishing • Geo-location • In-line CASB • Anti-spam Device (IT | OT | IoT) • Exploit Protection • Vulnerability Detection & Patching • IPS Known and Zero-Days • Botnet & C2 Application Security • Secure Email Gateway • WAF signatures • DDOS • CASB – SaaS Security • ADC NOC/SOC • Decoys • IOC Ingestion and Search • Advanced Forensics & Threat Hunting • AI-powered investigation & Automated Integrative IR • Outbreak Detection services (FAZ, FCT, FOS) • Automated playbooks and remediation • Fabric Rating Proactive Assessments and Simplified Migration Introduction to FortiGuard AI-Powered Security Services FortiGuard Labs • Real-Time Security update • AI & Machine Learning models developments on both local and large-scale Cloud-driven data lakes • Zero-Day discovery • Outbreak Alerts • Threat Monitoring and Communications • Industry Alliances
  • 12.
  • 13. 13 © Fortinet Inc. All Rights Reserved. Fortinet Recognized as a Leader 2021, 12th time, included in this Magic Quadrant Fortinet Recognized as a Leader Positioned Highest for Ability to Execute November 2021 Magic Quadrant™ for Network Firewalls August 2022 Magic Quadrant™ for SD-WAN Infrastructure Bringing 12 years of Security Leadership to Networking Excellence Same Management Same OS
  • 14. 14 © Fortinet Inc. All Rights Reserved. Gartner’s SDWAN MQ
  • 15. 15 © Fortinet Inc. All Rights Reserved. Why Fortinet Ranked #1 ? What is Security-Sensitive WAN Use-case ? A security-sensitive WAN typical in some mid- to large-scale organizations focused on securing branch offices as the main priority, where network and security procurements are increasingly converging. DEFINITION • Networking and security are integrated in the same appliance • Advanced security: IPS, URL filtering/SWG, SSL inspection, anti malware, sandboxing & ZTNA WHY RANKED #1 Data Center Campus Branch Home Cloud SaaS WAN
  • 16. 16 © Fortinet Inc. All Rights Reserved. Why Fortinet Ranked # 1 What is Remote Worker Use-case ? Remote workers connecting to the enterprise network and cloud resources from remote locations such as their homes, instead of solely connecting from the branch. DEFINITION • Integrated Zero Trust Network Access (ZTNA) access proxy • Lightweight hardware solution for power users • Integrated management, visibility and orchestration with branch network solutions WHY RANKED #1 ZTNA Enforcement Policy Engine User Identity and Device Posture ENFORCEMENT User Identity Access Specific Applications Continuous Trust Check User Contextual Rule Set Applications Can Be Anywhere Users Can Be Anywhere Data Center Cloud SaaS ZTNA Campus Branch Home Travel User
  • 17. 17 © Fortinet Inc. All Rights Reserved. Why Fortinet Ranked # 1 What is Small Branch Use-case ? Small branch WAN that requires simple and secure branch networking solutions with ease of use as a main driver. This use case can be any number of sites with branch locations, typically with fewer than 10 people. Branch Infrastructure Convergence Switching Wireless 4G/5G Backhaul SD-WAN NGFW NAC One Console One Config file DEFINITION • Support for integrated Wi-Fi in a single orchestration platform • Integrated orchestration of LAN, WLAN, WAN and security to simplify management • Ensuring service continuity in handling LTE connections WHY RANKED #1
  • 18.
  • 19. 19 © Fortinet Inc. All Rights Reserved. Secure Edge Connectivity 1 NGFW Optimize Application Experience 2 SD-WAN Secure Remote Users 3 SASE With Fortinet’s convergence of security & networking everywhere Pragmatic Journey to SASE
  • 20. 20 © Fortinet Inc. All Rights Reserved. Travel Factory Home Campus Secure SD-WAN : Flexible Application Steering at Edge Branch Edge Compute Public Cloud Internet SaaS Data Center SD WAN Network Firewall Secure SD-WAN SD-Branch Application Aware Intrusion Prevention Web Filtering DNS Protection Sandboxing In-Line Sandboxing In-Line CASB OT and IoT Security Consistent Security Convergence
  • 21. 21 © Fortinet Inc. All Rights Reserved. Travel Factory Home Campus Secure Remote Access – Securely connect remote users Branch Edge Compute Public Cloud Internet SaaS Data Center SSE SD WAN Network Firewall Secure SD-WAN SD-Branch SASE Application Aware Intrusion Prevention Web Filtering DNS Protection Sandboxing In-Line Sandboxing In-Line CASB OT and IoT Security Consistent Security Convergence
  • 22. 22 © Fortinet Inc. All Rights Reserved. Travel Factory Home Campus Universal ZTNA – Secure user access to applications Branch Edge Compute Public Cloud Internet SaaS Data Center SSE SD WAN Network Firewall Secure SD-WAN SD-Branch SASE Universal ZTNA Application Aware Intrusion Prevention Web Filtering DNS Protection Sandboxing In-Line Sandboxing Network Access Control (NAC) OT and IoT Security Consistent Security Convergence
  • 23. 23 © Fortinet Inc. All Rights Reserved. Travel Factory Home Campus Branch Edge Compute Public Cloud Internet SaaS Data Center SD WAN Secure Services Edge Network Firewall Secure SD-WAN SD-Branch SASE Universal ZTNA Application Aware Intrusion Prevention Web Filtering DNS Protection Sandboxing In-Line Sandboxing Network Access Control (NAC) OT and IoT Security Consistent Security Convergence “Single Vendor SASE” Unified SSE Solution
  • 24. 24 © Fortinet Inc. All Rights Reserved. Transition to support SD-Branch, SASE and Zero Trust Edge Tight Integration With LAN, WLAN, WWAN, ZTNA Wireless WAN Only Vendor Integrates & Manages All Functions with a Single Management SD-WAN NGFW LAN Wireless LAN ZTNA Enhance Operations and Lower TCO Accelerate Troubleshooting Accelerate Transition to Zero Trust Edge & SD-Branch Simplify Architecture and Management