fortinetoverview - best tool srlenterprise firewall fortigate cloud firewall network security...
Post on 22-May-2020
17 Views
Preview:
TRANSCRIPT
© Copyright Fortinet Inc. All rights reserved.
Fortinet Overview
Giorgio D’Armento
Distribution Led Business Manager Italy
10 Ottobre 2018
2
Fortinet: Global Network Security LeaderHighlights: 2000 - present
6,000+
EMPLOYEES WORLDWIDE
100+OFFICESACROSSTHE GLOBE
+500PATENTS
291 INPROCESS
ISSUED
+4mSHIPPEDSECURITYDEVICES
360KCUSTOMERS
$1.5bnREVENUE 2017
2000BY KEN XIE
FOUNDED IN
HEADQUARTERED IN
SUNNYVALECALIFORNIA
3
We Lead the Industry in Innovation
* As of June 30 2018 Global Patents = 539
Based on patents issued as listed by the US Patent and Trademark Office
4
MAGIC QUADRANT UTM 2018
5
MAGIC QUADRANT NGFW 2018
6
Elementi caratteristici delle nostre aziende..e delle ns vite..
Number of applications
175 Miliardi (WW, 2017) Source: App Annie
+60% respect to 2015
Tempo speso dall utente on app
1,5 mese ogni anno (WW, 2017) Source : App Annie
Tempo speso in video streaming
+100% rispetto al 2015 (WW, 2017) Source :App Annie
Cloud Market
Euros 2,0 Miliardi (Italia, 2017) Source :Osservatorio Cloud & ICT as a Service 2017|
Diffusione di smartphones
Terzo paese al mondo (Italia, 2017) Source : Agenzia We Are Social 2017
Social&Work! (notifiche social)
-28% tempo per produrre (WW,
2017) Source :Inside Marketing|
7
INTOCCABILI…QUASI…
8
[Security Transformation]
SXÈ l’integrazione della Sicurezza in tutte le aree della “Digital Technology” con
conseguente modifiche fondamentali al modo in cui la sicurezza è progettata,
implementata e gestita.
Un cambiamento fondamentale è necessario!
9
IL PRESENTE DELLA CONCEZIONE DI SICUREZZA
… SICUREZZA È :
SENSAZIONE = … SENSO DI …
PROTEZIONE = CI DÀ PIÙ …
Vedo, dunque CONTROLLO = SCEGLIERE...
LIBERTÀ!
10
A Security Architecture that is:
NETWORK
MULTI-CLOUD
PARTNER API
EMAILUNIFIED ACCESS
IOT-ENDPOINT
WEB APPS
ADVANCED THREAT PROTECTION
MANAGEMENT-ANALYTICS
AUTOMATED
Provides Visibility and Protection Across the Entire Digital Attack
Surface
Multiple Technologies Working Together for the Detection of Advanced Threats
Embedded Intelligence for Automatic Response & Continuous Trust
Assessment
BROAD INTEGRATED
The Fortinet Security Fabric
11
Multi
CloudEmail Applications
Web Unified
Access
Management
AnalyticsThreat
Protection
Advanced
Endpoint
IoT
NetworkSecurity
Multi-Cloud Security
EndpointSecurity
Email Security
Web Application Security
SecureUnified Access
Advanced Threat Protection
Management& Analytics
FortiGate
Enterprise Firewall
FortiGate Cloud Firewall
Network Security
FortiClient
EPP
FortiWeb
Web Application
Firewall
FortiMail
Secure Email
Gateway
FortiSandbox
Advanced Threat
Protection
FortiAnalyzer
Central Logging
/Reporting
FortiManager
Central Security
Management
FortiSIEM
Security Information &
Event Management
FortiGate Virtual
Firewall
Network Security
FortiAP
Wireless
Infrastructure
FortiSwitch
Switching Infrastructure
The Technologies Behind the Marketing
12
Controllo solo quello che vedo..
13
Dagli amici mi guardi (ISFW) che dai nemici…
INTERNAL SEGMENTATION FIREWALL
14
SICUREZZA NEL COMPARTO PRODUTTIVO:FORTINET’S APPROACH TO INDUSTRIAL CONTROL SECURITY
First Line of Defense: Secure the IT Side
GATEWAY BETWEEN
IT AND OT
IT OT
The most likely first
point of attack
15
Proactive and In-Depth ICS Security – Step 3
▪ The solution combines Nozomi Networks’
ICS technology with Fortinet’s extensive
network security expertise.
▪ Nozomi Networks’ ICS protocol monitoring
capabilities profile the behavior of industrial
devices and detect anomalies and critical
states in the ICS network.
▪ If an anomaly or suspicious behavior is
detected, the Nozomi device, generates an
alert
▪ SCADAGuardian, can automatically modify
the right policy in FortiGate to mitigate the
issue.
▪ The joint solution provides advanced
visibility, monitoring, alerting, reporting,
troubleshooting, and forensic capabilities.
KEY BENEFITS
✓ Minimize system down time and data loss
✓ Optimize business continuity
✓ Deeper understanding of the ICS protocols and processes
✓ Visibility into the ICS network
16
CI RICONOSCIAMO IN QUESTO ?
Priorità #1 è la crescitadel vostrobusiness
Da ovunque vi trovate e su ognidevide (BYOD
incluso)
Avete limitaterisorse interne
di IT
Avete bisogno di un continuo accesso aisistemi di business
Avete bisogno di una soluzione
semplice, affidabile e cost
effective!
Sei un obiettivopotenziale di un
hacker?
17
LA RETE IT DEL TUO CLIENTE È TIPO QUESTA…
Security
BYOD?
È difficile mantenerla e controllarla ?
Connected UTM by FortinetUn approccio pragmatico : Completo, Flessibile, Scalabile
19
THE FORTINET WAY
Sicurezza integrata con ogni nuova connessione di rete
Managed Services by your preferred partner
Connected UTM
UTM I Wifi I Switch I Client
FortiGateFortiSwitchFortiSwitchFortiWiFi
FortiClient
FortiCloud
20
CONNECTED UTM PER OGNI TUA ESIGENZA
Sicurezza e semplicità per l’intera rete IT
GESTITI CENTRALMENTE VIA FORTIGATE O FORTICLOUD
FortiGate
Market Leader UTM
• Top-rated Protection
• Plug & Play Operation
• POE / Wi-Fi
FortiAP
Integrato e a prezziaccessbili
• 802.11ac
• Up to 1.3 Gbps
• Application prioritization
FortiClient
Efficace e discreto
• Top-rated Protection
• Works on and off network
• Win, Mac, iOS & Android
FortiSwitch
Gestito Centralmente
• Layer 2/3
• 8,24,32,48,64 ports
• POE / POE+
21
CONNECTED UTM PER OGNI TUA ESIGENZA
FortiCloud
SaaS Management
Security Status at a Glance
• Log Storage in the Cloud
• Compliance and Other
•IoC Indicator of Compromises
•FortiCASB
• Reports
• Additional Security Services
•Security Rating Services
•FortiSandbox in Cloud
22
COME POTRÀ EVOLVERE LA SICUREZZA ?
… SICUREZZA È :
SENSAZIONE = … SENSO DI …
PROTEZIONE = CI DÀ PIÙ …
Vedo, dunque CONTROLLO = SCEGLIERE...
LIBERTÀ!
23
OLTRE IL PRESENTE ... BEST TALK 2028..
LIBERTÀ DI FARE AZIONI VITALI CON CONSAPEVOLEZZA..
Microchip nel cubetto di ghiaccio che analizza la qualità dei liquidi,
prima di assumerli.
Collegato al mio i-watch e ad un sistema di sicurezza (at home)
che mi da un alert se vengono superate le soglie di elementi
inquinanti con servizio di Reputation dei liquidi che assumo e che
vengono riconosciuti dalla storicità delle mie azioni..
24
BONUS TRACK BEST TALK EVENT 2028!
CYBER THREAT ASSESSMENT REPORT
7-8 giorni di analisi / ascolto del traffico
Tutti I servizi di sicurezza attivi
Report di Security Assessment da Best Tool!
25
ANATOMIA DI UN CTAP REPORT
Deployment Details
and MethodologyExecutive Summary
Recommended
Actions
Security and Threats
(Applications)
Cover Page Industry Comparables
Security and Threats
(Malware)Sandbox Analysis
Results
26
ANATOMIA DI UN CTAP REPORT (continued)
User Productivity
(SaaS/IaaS Usage)User Productivity
(Web Usage)
Network Utilization
(Bandwidth)
FortiGuard Services
User Productivity
(Application Usage)
User Productivity
(Websites Frequented)
Network Utilization
(Sizing Information)
Network Utilization
(Firewall Statistics)
Security and Threats
(Encryption/Sources)
EXECUTIVE SUMMARY
28
EXECUTIVE SUMMARY
▪ Security and Threat Prevention
» Note the total number of attacks and evasive (proxy) applications detected. Use
this information to point out that there are inbound attacks passing through and
outbound proxy applications circumventing their existing firewall.
▪ User Productivity
» More informative, use this information to talk about how a FortiGate is more
than a security device, it can point out traffic patterns and provide visibility into
network usage – e.g. which applications are violating corporate use policies
▪ Network Utilization
» A CTAP assessment can give insight into network utilization and bandwidth
bottlenecks. That said, point out that FortiGates are known for their
performance and include FortiASICs designed to accelerate traffic
outperforming competitive solutions in 3rd party tests (such as by NSS Labs)
29
Giorgio D’Armento Distribution Led Business Manageremail gdarmento@fortinet.comMobile 335 6519599
GRAZIE !
top related