fortinetoverview - best tool srlenterprise firewall fortigate cloud firewall network security...

Post on 22-May-2020

20 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

© Copyright Fortinet Inc. All rights reserved.

Fortinet Overview

Giorgio D’Armento

Distribution Led Business Manager Italy

10 Ottobre 2018

2

Fortinet: Global Network Security LeaderHighlights: 2000 - present

6,000+

EMPLOYEES WORLDWIDE

100+OFFICESACROSSTHE GLOBE

+500PATENTS

291 INPROCESS

ISSUED

+4mSHIPPEDSECURITYDEVICES

360KCUSTOMERS

$1.5bnREVENUE 2017

2000BY KEN XIE

FOUNDED IN

HEADQUARTERED IN

SUNNYVALECALIFORNIA

3

We Lead the Industry in Innovation

* As of June 30 2018 Global Patents = 539

Based on patents issued as listed by the US Patent and Trademark Office

4

MAGIC QUADRANT UTM 2018

5

MAGIC QUADRANT NGFW 2018

6

Elementi caratteristici delle nostre aziende..e delle ns vite..

Number of applications

175 Miliardi (WW, 2017) Source: App Annie

+60% respect to 2015

Tempo speso dall utente on app

1,5 mese ogni anno (WW, 2017) Source : App Annie

Tempo speso in video streaming

+100% rispetto al 2015 (WW, 2017) Source :App Annie

Cloud Market

Euros 2,0 Miliardi (Italia, 2017) Source :Osservatorio Cloud & ICT as a Service 2017|

Diffusione di smartphones

Terzo paese al mondo (Italia, 2017) Source : Agenzia We Are Social 2017

Social&Work! (notifiche social)

-28% tempo per produrre (WW,

2017) Source :Inside Marketing|

7

INTOCCABILI…QUASI…

8

[Security Transformation]

SXÈ l’integrazione della Sicurezza in tutte le aree della “Digital Technology” con

conseguente modifiche fondamentali al modo in cui la sicurezza è progettata,

implementata e gestita.

Un cambiamento fondamentale è necessario!

9

IL PRESENTE DELLA CONCEZIONE DI SICUREZZA

… SICUREZZA È :

SENSAZIONE = … SENSO DI …

PROTEZIONE = CI DÀ PIÙ …

Vedo, dunque CONTROLLO = SCEGLIERE...

LIBERTÀ!

10

A Security Architecture that is:

NETWORK

MULTI-CLOUD

PARTNER API

EMAILUNIFIED ACCESS

IOT-ENDPOINT

WEB APPS

ADVANCED THREAT PROTECTION

MANAGEMENT-ANALYTICS

AUTOMATED

Provides Visibility and Protection Across the Entire Digital Attack

Surface

Multiple Technologies Working Together for the Detection of Advanced Threats

Embedded Intelligence for Automatic Response & Continuous Trust

Assessment

BROAD INTEGRATED

The Fortinet Security Fabric

11

Multi

CloudEmail Applications

Web Unified

Access

Management

AnalyticsThreat

Protection

Advanced

Endpoint

IoT

NetworkSecurity

Multi-Cloud Security

EndpointSecurity

Email Security

Web Application Security

SecureUnified Access

Advanced Threat Protection

Management& Analytics

FortiGate

Enterprise Firewall

FortiGate Cloud Firewall

Network Security

FortiClient

EPP

FortiWeb

Web Application

Firewall

FortiMail

Secure Email

Gateway

FortiSandbox

Advanced Threat

Protection

FortiAnalyzer

Central Logging

/Reporting

FortiManager

Central Security

Management

FortiSIEM

Security Information &

Event Management

FortiGate Virtual

Firewall

Network Security

FortiAP

Wireless

Infrastructure

FortiSwitch

Switching Infrastructure

The Technologies Behind the Marketing

12

Controllo solo quello che vedo..

13

Dagli amici mi guardi (ISFW) che dai nemici…

INTERNAL SEGMENTATION FIREWALL

14

SICUREZZA NEL COMPARTO PRODUTTIVO:FORTINET’S APPROACH TO INDUSTRIAL CONTROL SECURITY

First Line of Defense: Secure the IT Side

GATEWAY BETWEEN

IT AND OT

IT OT

The most likely first

point of attack

15

Proactive and In-Depth ICS Security – Step 3

▪ The solution combines Nozomi Networks’

ICS technology with Fortinet’s extensive

network security expertise.

▪ Nozomi Networks’ ICS protocol monitoring

capabilities profile the behavior of industrial

devices and detect anomalies and critical

states in the ICS network.

▪ If an anomaly or suspicious behavior is

detected, the Nozomi device, generates an

alert

▪ SCADAGuardian, can automatically modify

the right policy in FortiGate to mitigate the

issue.

▪ The joint solution provides advanced

visibility, monitoring, alerting, reporting,

troubleshooting, and forensic capabilities.

KEY BENEFITS

✓ Minimize system down time and data loss

✓ Optimize business continuity

✓ Deeper understanding of the ICS protocols and processes

✓ Visibility into the ICS network

16

CI RICONOSCIAMO IN QUESTO ?

Priorità #1 è la crescitadel vostrobusiness

Da ovunque vi trovate e su ognidevide (BYOD

incluso)

Avete limitaterisorse interne

di IT

Avete bisogno di un continuo accesso aisistemi di business

Avete bisogno di una soluzione

semplice, affidabile e cost

effective!

Sei un obiettivopotenziale di un

hacker?

17

LA RETE IT DEL TUO CLIENTE È TIPO QUESTA…

Security

BYOD?

È difficile mantenerla e controllarla ?

Connected UTM by FortinetUn approccio pragmatico : Completo, Flessibile, Scalabile

19

THE FORTINET WAY

Sicurezza integrata con ogni nuova connessione di rete

Managed Services by your preferred partner

Connected UTM

UTM I Wifi I Switch I Client

FortiGateFortiSwitchFortiSwitchFortiWiFi

FortiClient

FortiCloud

20

CONNECTED UTM PER OGNI TUA ESIGENZA

Sicurezza e semplicità per l’intera rete IT

GESTITI CENTRALMENTE VIA FORTIGATE O FORTICLOUD

FortiGate

Market Leader UTM

• Top-rated Protection

• Plug & Play Operation

• POE / Wi-Fi

FortiAP

Integrato e a prezziaccessbili

• 802.11ac

• Up to 1.3 Gbps

• Application prioritization

FortiClient

Efficace e discreto

• Top-rated Protection

• Works on and off network

• Win, Mac, iOS & Android

FortiSwitch

Gestito Centralmente

• Layer 2/3

• 8,24,32,48,64 ports

• POE / POE+

21

CONNECTED UTM PER OGNI TUA ESIGENZA

FortiCloud

SaaS Management

Security Status at a Glance

• Log Storage in the Cloud

• Compliance and Other

•IoC Indicator of Compromises

•FortiCASB

• Reports

• Additional Security Services

•Security Rating Services

•FortiSandbox in Cloud

22

COME POTRÀ EVOLVERE LA SICUREZZA ?

… SICUREZZA È :

SENSAZIONE = … SENSO DI …

PROTEZIONE = CI DÀ PIÙ …

Vedo, dunque CONTROLLO = SCEGLIERE...

LIBERTÀ!

23

OLTRE IL PRESENTE ... BEST TALK 2028..

LIBERTÀ DI FARE AZIONI VITALI CON CONSAPEVOLEZZA..

Microchip nel cubetto di ghiaccio che analizza la qualità dei liquidi,

prima di assumerli.

Collegato al mio i-watch e ad un sistema di sicurezza (at home)

che mi da un alert se vengono superate le soglie di elementi

inquinanti con servizio di Reputation dei liquidi che assumo e che

vengono riconosciuti dalla storicità delle mie azioni..

24

BONUS TRACK BEST TALK EVENT 2028!

CYBER THREAT ASSESSMENT REPORT

7-8 giorni di analisi / ascolto del traffico

Tutti I servizi di sicurezza attivi

Report di Security Assessment da Best Tool!

25

ANATOMIA DI UN CTAP REPORT

Deployment Details

and MethodologyExecutive Summary

Recommended

Actions

Security and Threats

(Applications)

Cover Page Industry Comparables

Security and Threats

(Malware)Sandbox Analysis

Results

26

ANATOMIA DI UN CTAP REPORT (continued)

User Productivity

(SaaS/IaaS Usage)User Productivity

(Web Usage)

Network Utilization

(Bandwidth)

FortiGuard Services

User Productivity

(Application Usage)

User Productivity

(Websites Frequented)

Network Utilization

(Sizing Information)

Network Utilization

(Firewall Statistics)

Security and Threats

(Encryption/Sources)

EXECUTIVE SUMMARY

28

EXECUTIVE SUMMARY

▪ Security and Threat Prevention

» Note the total number of attacks and evasive (proxy) applications detected. Use

this information to point out that there are inbound attacks passing through and

outbound proxy applications circumventing their existing firewall.

▪ User Productivity

» More informative, use this information to talk about how a FortiGate is more

than a security device, it can point out traffic patterns and provide visibility into

network usage – e.g. which applications are violating corporate use policies

▪ Network Utilization

» A CTAP assessment can give insight into network utilization and bandwidth

bottlenecks. That said, point out that FortiGates are known for their

performance and include FortiASICs designed to accelerate traffic

outperforming competitive solutions in 3rd party tests (such as by NSS Labs)

29

Giorgio D’Armento Distribution Led Business Manageremail gdarmento@fortinet.comMobile 335 6519599

GRAZIE !

top related