The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in...
-
Upload
trinhthuan -
Category
Documents
-
view
217 -
download
0
Transcript of The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in...
The Consolidation Imperative
Bryan Wood
October 2010 Halekulani, Honolulu
Seminar presented in conjunction with Busch Consulting
www.buschconsulting.com 808-941-3695 Information Security & network Solutions
www.buschconsulting.com 808-941-3695
Agenda
• Introduction and state of the security market
• Challenges we all face
• Common pitfalls
• Fortinet approach
www.buschconsulting.com 808-941-3695
Fortinet Corporate Overview
• Founded in 2000
• Global presence with 30+ offices
worldwide & 1,200+ employees
– 100,000+ customers
– Majority of the Fortune Global 100
• IPO Nov 2009
• NASDAQ: FTNT
• 2009 revenue of $252 Million
– 19% YoY growth
3
20032005
20072009
$13$39
$80
$123$155
$212
$252
Fortinet Revenue ($MM)
www.buschconsulting.com 808-941-3695
Unified Threat Management
IDC definition: UTM security appliance products which provide multiple security features integrated into one device
By 2011 UTM will be the largest single market, with a CAGR of 26.2%
UTM has already surpassed firewall market
$3.5B
$2.0B
$1.3B
$1.3B
$1.2B
$1.5B
Unified Threat Management
UTM
Intrusion Detection & Prevention
Firewall & VPN
•Antispam
•Antivirus
•Antispyware
•Web Filtering
•IDS
•IPS
•Firewall
•VPN
•IDS
•IPS
•Firewall
•VPN
CAGR 2007-2012
50%
25%
0%
-25%
In 2008,
UTM surpassed
Firewall market
Source: IDC
www.buschconsulting.com 808-941-3695
Thinking Strategically About Security
• Future-proof your security infrastructure − Anticipate change
• Look for opportunities to consolidate without compromise − Reduce complexity
− Increase protection
− Decrease risk
− Lower capex & opex
• Move beyond tactical responses to threats
By 2010, only 10%
of emerging security
threats will require
tactical point solutions,
compared with
80% in 2005.
Source: Gartner
“
“
*Gartner: Cost Cutting While Improving IT Security, March 20, 2008
www.buschconsulting.com 808-941-3695
21 19 69 113 141
624
1,656
2002 2003 2004 2005 2006 2007 2008
The Threats You Face Continue to Grow
6
Exponential Growth in Malware Threats
(000)
Broad New Hacking Attack Detected (2/8/2010) “Hackers in Europe and China successfully
broke into computers at nearly 2,500
companies and government agencies over the
last 18 months in a coordinated global attack
that exposed vast amounts of personal and
corporate secrets to theft..”.
Google Hack Attack Was Ultra Sophisticated, New Details Show (1/14/2010) “Hackers seeking source code from Google,
Adobe and dozens of other high-profile
companies used unprecedented tactics that
combined encryption, stealth programming
and an unknown hole in Internet Explorer,
according to new details..”
In Number In severity
Coordinated and blended attacks
are now a common practice
Increased processing power
required
In Complexity
Motive and intent has moved
from notoriety to financial gain
Cyber security is critical
3.7 4.49.9
16.123
30.2
1,656
54.6
87.6
2001 2003 2005 2007 2009
U.S. DoD Reported Incidents of Malicious
Cyber Activity (000)
www.buschconsulting.com 808-941-3695
Real Threat Protection in Action
7
“Innocent” Video Link:
Redirects to malicious Website
Integrated Web Filtering
Blocks access to malicious Website
Network Antivirus
Blocks download of virus
Intrusion Protection
Blocks the spread of the worm
Solution:
Error message:
“Drops” copy of itself
on system and
attempts to propagate
“Out of date” Flash player error:
“Download” malware file
Problem:
www.buschconsulting.com 808-941-3695
You Have to Do More with Less
• Increase access to backend data and systems
• Decrease risk of unauthorized access
• Increase effectiveness of existing resources and investments
• Reduce complexity of security infrastructure
• Lower operating and capital costs
www.buschconsulting.com 808-941-3695
You Need to Prepare for the Next Threat
• Eliminate potential blind spots
• Demonstrate your policy compliance
• Lower your response time
• Accelerate adoption of best practices and
expert systems
• Reduce the potential for significant loss to
reputation and revenue
9
www.buschconsulting.com 808-941-3695
Thinking Strategically
• Future-proof your security
infrastructure
− Anticipate change in threatscape &
technology
• Look for opportunities to consolidate
without compromise
− Reduce complexity
− Increase protection
− Decrease risk
− Lower CapEx and OpEx
• Move beyond tactical responses to
threats
Common Pitfalls
• Controlled access to firewall
• Documentation of Changes
• Set it and forget it
• Patch management and other updates
• Proper visibility into network activity
• Monitoring of real time activity
• Adequate alert system
www.buschconsulting.com 808-941-3695 12
Purpose-Built Hardware
Specialized OS
Firewall Flexible Capabilities
Hardened Platform
High Performance
Real-Time Protection
Traffic Shaping VPN
AV IPS Antispam Web Filter
SSL Insp DLP WAN Opt
App Ctrl
FortiGate Multi-Threat Security Platform
FortiGuard Updates
• Purpose-built to deliver overlapping, complementary security
• Provides both flexibility & defense-in-depth capabilities
www.buschconsulting.com 808-941-3695
FortiGate UTM Lineup
• ASIC-based multi-threat security platform
• Common OS across all platforms
• Single management interface
• FortiGuard Services
− Antivirus, IPS, Antispam, Web content filtering,
Application control
13
Enterprise Service Provider & Large Enterprise SMB & Remote Office
www.buschconsulting.com 808-941-3695
1
4
100+ threat research professionals
Eight global locations
Automated updates to Fortinet customers
Global software updates
Large knowledgebase of security
8 million antivirus signatures, 90 million
URLs for Web filtering
Robust 24 x 7 x 365 Real-Time Global Intelligence
FortiGuard Subscription Services
Real-Time Security Protection Global Distributed Network
Note
Data as of September 30, 2009
www.buschconsulting.com 808-941-3695
Management and Reporting Tools
• Tightly integrates together to provide core of centralized security
services
• Reporting Platform
• Log Analysis
• Reporting
• Content Archiving / Data Mining
• Network Analyzer
• Log Browser / Real-Time Log
Viewer
• Central File Quarantine
• Vulnerability Assessment
Scanner
• Forensic Analysis
• Management Platform
• Policy / Device Management
• Update Manager
(Firmware / Security
Content)
• VPN Manager
• Script Manager
Thank You
Seminar presented in conjunction with Busch Consulting
www.buschconsulting.com 808-941-3695 Information Security & network Solutions