11/7/2018 1www.secdata.com
Fortinet
Ellis Reed
Pre-Sales Consultant
November 2018
11/7/2018 2www.secdata.com
FORTINET
• Fortinet & SecureData.
• Vendor Introduction
© Copyright Fortinet Inc. All rights reserved.
Integrated Security
Security Debt Reduction
4
We Lead the Industry in Innovation
* As of June 30 2018 Global Patents = 539
Based on patents issued as listed by the US Patent and Trademark Office
5
NSS Labs 3rd-Party Certifications
9Recommendations
out of 9!
Cisco 4
Check Point 3
Palo Alto Networks 4
Most Recent Test Results
9Recommendations
Fortinet Confidential
Updated August 20, 2018
5th year in
a row!
6
7
Research 2016
8
THE PROBLEM
9
Securing the Digitally Transformed Enterprise
“…in the digital era, [security] focus needs to shift from
securing network perimeters to safeguarding data spread
across systems, devices, and the cloud.”
MIT Technology Review, 2017
Mobile Devices
Augmented
Reality/Wearables
IoT Platforms Cloud Computing 3D Printing
Location Detection
Technologies
Smart Sensor
Advanced
Human-machine
Interfaces
Bid Data Analytics
and Advanced
Algorithms
Multi-level Customer
Interaction and
Customer Profiling
10
Digital Attack Surface Expanding and Becoming Invisible
Cloud
Access
Network
BROAD
Attack Surface
Devices
11
Too Many Point Solutions and New Regulations
Security
Consoles
Compliance
Point
Products
CHALLENGES
Very Difficult
Form
Factor
30+
12
Rapidly Changing Advanced Threats and Lack of
Resources and Expertise
Skills
Maturity
Noise
CYBER
BACKGROUND
Critical
Speed
13
Integration Configuration
Automation Visibility
DEBT
Security as debt
14
Security Transformation
By Integration
15
2018 Fortinet Solutions
Network
Security
Multi-Cloud
Security
Endpoint
Security
Email
Security
Web Application
Security
Secure
Unified Access
Advanced
Threat Protection
Management
- Analytics
FortiGate
Enterprise Firewall
FortiGate
Cloud Firewall
Network Security
FortiClient
EPP
FortiWeb
Web Application
Firewall
FortiMail
Secure Email
Gateway
FortiSandbox
Advanced Threat
Protection
FortiAnalyzer
Central Logging /Reporting
FortiManager
Central Security Management
FortiSIEM
Security Information &
Event Management
FortiGate
Virtual Firewall
Network Security
FortiAP
Wireless
Infrastructure
FortiSwitch
Switching
InfrastructureSWG
SD-WAN
IPS
16
17
Security Rating
 Visibility
 Detection
 Control
 Reporting
 Measurement
18
Fabric In Action
19
 According toi Verizon DBIR 2018 Email
accounts for 92.4% of Malware
detections.
 Even if we assume that email is the
most protected vector and therefore will
catch the most Malware it is still far in
the lead.
20
Hacking 101 – Step 1 – Phishing to Credential Theft
21
Hacking 101 – Step 2 – Try Second Vector
22
Reducing Security Debt
Companies still being hacked.
Speed of threats is faster.
Attack surface is broader.
Perimeter is dead.
Complexity is your enemy.
23
Reducing Security Debt
The basics accrue the most debt.
Reduce security debt from the start
Reduce Security debt as part of refresh cycles
The more integration the lower the debt, the better the
TCO and the more secure the outcomes.
Make your enterprise into a attackers nightmare
Integrated Secure Networking - Fortinet
11/7/2018 25www.secdata.com
FORTINET
• Summary of Fortinet’s key message
• Looking forward – ZoneFox
• Questions?

More Related Content

PDF
Cyber Security 4.0 conference 30 November 2016
PDF
CIO Review - Top 20 CyberSecurity
PDF
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
PPTX
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
PPTX
Business Continuity and app Security
PDF
Moving Beyond Zero Trust
PDF
Solution note-cryptoflow-b2 b
KEY
What makes the IT industry tick?
Cyber Security 4.0 conference 30 November 2016
CIO Review - Top 20 CyberSecurity
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Business Continuity and app Security
Moving Beyond Zero Trust
Solution note-cryptoflow-b2 b
What makes the IT industry tick?

What's hot (20)

PDF
Security, Compliance and Cloud - Jelecos
PPTX
Cutting-Edge Network Behavior Audit Technology from BMST
PPTX
IT Live 2018 - Farook Al-Jibouri: Stop The Breach
PDF
What I learned from RSAC 2019
PPTX
Netpluz DDoS Mitigation - Managed Cyber Security
PPTX
Seguridad en Capas: Smart & Actionable Data
PPTX
Jun 15 privacy in the cloud at financial institutions at the object managemen...
PDF
Emerging Technology Risk Series - Internet of Things (IoT)
PDF
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
PDF
Fisma compliance solutions @ cdg.io
PDF
Debunked: 5 Myths About Zero Trust Security
PDF
BITGLASS - DATA BREACH DISCOVERY DATASHEET
PPTX
The Internet of Everything is Here
PPTX
Zero Trust Cybersecurity for Microsoft Azure Cloud
PPTX
Blockchain Defined Perimeter for Cloud Security
PPTX
Zero Trust Framework for Network Security​
PDF
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
PPTX
Conference Security by Design - Gemalto - Security in IoT
PPTX
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Security, Compliance and Cloud - Jelecos
Cutting-Edge Network Behavior Audit Technology from BMST
IT Live 2018 - Farook Al-Jibouri: Stop The Breach
What I learned from RSAC 2019
Netpluz DDoS Mitigation - Managed Cyber Security
Seguridad en Capas: Smart & Actionable Data
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Emerging Technology Risk Series - Internet of Things (IoT)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Fisma compliance solutions @ cdg.io
Debunked: 5 Myths About Zero Trust Security
BITGLASS - DATA BREACH DISCOVERY DATASHEET
The Internet of Everything is Here
Zero Trust Cybersecurity for Microsoft Azure Cloud
Blockchain Defined Perimeter for Cloud Security
Zero Trust Framework for Network Security​
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Conference Security by Design - Gemalto - Security in IoT
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Ad

Similar to Integrated Secure Networking - Fortinet (20)

PPTX
Fortinet Corporate Overview Deck 11.pptx
PPTX
Fortinet Corporate Overview Deck.pptx
PPTX
Fortinet k
PPTX
Simplify SOC Automation with FortiAnalyzer
PPTX
Fortinet Tanıtım
PDF
FireEye Solutions
PDF
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
PDF
PaloAlto Enterprise Security Solution
PDF
Fortinet security fabric
PPTX
Forcepoint Corporate Presentation_Short.pptx
PDF
Windstream Managed Network Security Ebook
PPT
Life After Compliance march 2010 v2
PPTX
General Version 9 21 09
PPTX
Aalto cyber-10.4.18
PDF
Cyber Security Challenges on Latest Technologies
PPTX
Emerging application and data protection for multi cloud
PPTX
Evento 15 aprile
PPTX
Nozomi-Networks-Corporate-Overview-Deck-2025.pptx
PPT
Partner Zymbian & Fortinet webinar on Web2.0 security
PDF
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Fortinet Corporate Overview Deck 11.pptx
Fortinet Corporate Overview Deck.pptx
Fortinet k
Simplify SOC Automation with FortiAnalyzer
Fortinet Tanıtım
FireEye Solutions
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
PaloAlto Enterprise Security Solution
Fortinet security fabric
Forcepoint Corporate Presentation_Short.pptx
Windstream Managed Network Security Ebook
Life After Compliance march 2010 v2
General Version 9 21 09
Aalto cyber-10.4.18
Cyber Security Challenges on Latest Technologies
Emerging application and data protection for multi cloud
Evento 15 aprile
Nozomi-Networks-Corporate-Overview-Deck-2025.pptx
Partner Zymbian & Fortinet webinar on Web2.0 security
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Ad

More from Harry Gunns (17)

PPTX
Why understanding your attack surface matters
PDF
How major changes to the IT landscape are leading to new approaches in security
PPTX
Confusing the myths with some facts
PDF
Weaponised Information - Geoff White
PDF
Not becoming the next cybersecurity headline is difficult, very difficult - S...
PDF
Worry free security breach - Gemalto
PDF
Understanding your own data - Varonis
PDF
Smart security people - Dominic White - SensePost
PDF
Security Debt - Charl van der Walt - SecureData
PDF
Pick a password, any password - Wicus Ross - SensePost
PDF
Navigating the IT landscape - Thomas Meyer - IDC
PDF
Hacking our chairmans inbox - Charl van der Walt - SensePost
PDF
End to End Security - Check Point
PDF
Content is King - Symantec
PDF
Cloud Security Primer - F5 Networks
PDF
Application Framework - Palo Alto Networks
PDF
AI & Machine Learning - Etienne Greeff - SecureData
Why understanding your attack surface matters
How major changes to the IT landscape are leading to new approaches in security
Confusing the myths with some facts
Weaponised Information - Geoff White
Not becoming the next cybersecurity headline is difficult, very difficult - S...
Worry free security breach - Gemalto
Understanding your own data - Varonis
Smart security people - Dominic White - SensePost
Security Debt - Charl van der Walt - SecureData
Pick a password, any password - Wicus Ross - SensePost
Navigating the IT landscape - Thomas Meyer - IDC
Hacking our chairmans inbox - Charl van der Walt - SensePost
End to End Security - Check Point
Content is King - Symantec
Cloud Security Primer - F5 Networks
Application Framework - Palo Alto Networks
AI & Machine Learning - Etienne Greeff - SecureData

Recently uploaded (20)

PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PPTX
Microsoft User Copilot Training Slide Deck
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
giants, standing on the shoulders of - by Daniel Stenberg
Early detection and classification of bone marrow changes in lumbar vertebrae...
Advancing precision in air quality forecasting through machine learning integ...
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Connector Corner: Transform Unstructured Documents with Agentic Automation
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Microsoft User Copilot Training Slide Deck
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
NewMind AI Weekly Chronicles – August ’25 Week IV
Basics of Cloud Computing - Cloud Ecosystem
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
EIS-Webinar-Regulated-Industries-2025-08.pdf
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
LMS bot: enhanced learning management systems for improved student learning e...
Electrocardiogram sequences data analytics and classification using unsupervi...
SGT Report The Beast Plan and Cyberphysical Systems of Control
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf

Integrated Secure Networking - Fortinet