The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in...

16
The Consolidation Imperative Bryan Wood October 2010 Halekulani, Honolulu Seminar presented in conjunction with Busch Consulting www.buschconsulting.com 808-941-3695 Information Security & network Solutions

Transcript of The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in...

Page 1: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

The Consolidation Imperative

Bryan Wood

October 2010 Halekulani, Honolulu

Seminar presented in conjunction with Busch Consulting

www.buschconsulting.com 808-941-3695 Information Security & network Solutions

Page 2: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

www.buschconsulting.com 808-941-3695

Agenda

• Introduction and state of the security market

• Challenges we all face

• Common pitfalls

• Fortinet approach

Page 3: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

www.buschconsulting.com 808-941-3695

Fortinet Corporate Overview

• Founded in 2000

• Global presence with 30+ offices

worldwide & 1,200+ employees

– 100,000+ customers

– Majority of the Fortune Global 100

• IPO Nov 2009

• NASDAQ: FTNT

• 2009 revenue of $252 Million

– 19% YoY growth

3

20032005

20072009

$13$39

$80

$123$155

$212

$252

Fortinet Revenue ($MM)

Page 4: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

www.buschconsulting.com 808-941-3695

Unified Threat Management

IDC definition: UTM security appliance products which provide multiple security features integrated into one device

By 2011 UTM will be the largest single market, with a CAGR of 26.2%

UTM has already surpassed firewall market

$3.5B

$2.0B

$1.3B

$1.3B

$1.2B

$1.5B

Unified Threat Management

UTM

Intrusion Detection & Prevention

Firewall & VPN

•Antispam

•Antivirus

•Antispyware

•Web Filtering

•IDS

•IPS

•Firewall

•VPN

•IDS

•IPS

•Firewall

•VPN

CAGR 2007-2012

50%

25%

0%

-25%

In 2008,

UTM surpassed

Firewall market

Source: IDC

Page 5: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

www.buschconsulting.com 808-941-3695

Thinking Strategically About Security

• Future-proof your security infrastructure − Anticipate change

• Look for opportunities to consolidate without compromise − Reduce complexity

− Increase protection

− Decrease risk

− Lower capex & opex

• Move beyond tactical responses to threats

By 2010, only 10%

of emerging security

threats will require

tactical point solutions,

compared with

80% in 2005.

Source: Gartner

*Gartner: Cost Cutting While Improving IT Security, March 20, 2008

Page 6: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

www.buschconsulting.com 808-941-3695

21 19 69 113 141

624

1,656

2002 2003 2004 2005 2006 2007 2008

The Threats You Face Continue to Grow

6

Exponential Growth in Malware Threats

(000)

Broad New Hacking Attack Detected (2/8/2010) “Hackers in Europe and China successfully

broke into computers at nearly 2,500

companies and government agencies over the

last 18 months in a coordinated global attack

that exposed vast amounts of personal and

corporate secrets to theft..”.

Google Hack Attack Was Ultra Sophisticated, New Details Show (1/14/2010) “Hackers seeking source code from Google,

Adobe and dozens of other high-profile

companies used unprecedented tactics that

combined encryption, stealth programming

and an unknown hole in Internet Explorer,

according to new details..”

In Number In severity

Coordinated and blended attacks

are now a common practice

Increased processing power

required

In Complexity

Motive and intent has moved

from notoriety to financial gain

Cyber security is critical

3.7 4.49.9

16.123

30.2

1,656

54.6

87.6

2001 2003 2005 2007 2009

U.S. DoD Reported Incidents of Malicious

Cyber Activity (000)

Page 7: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

www.buschconsulting.com 808-941-3695

Real Threat Protection in Action

7

“Innocent” Video Link:

Redirects to malicious Website

Integrated Web Filtering

Blocks access to malicious Website

Network Antivirus

Blocks download of virus

Intrusion Protection

Blocks the spread of the worm

Solution:

Error message:

“Drops” copy of itself

on system and

attempts to propagate

“Out of date” Flash player error:

“Download” malware file

Problem:

Page 8: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

www.buschconsulting.com 808-941-3695

You Have to Do More with Less

• Increase access to backend data and systems

• Decrease risk of unauthorized access

• Increase effectiveness of existing resources and investments

• Reduce complexity of security infrastructure

• Lower operating and capital costs

Page 9: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

www.buschconsulting.com 808-941-3695

You Need to Prepare for the Next Threat

• Eliminate potential blind spots

• Demonstrate your policy compliance

• Lower your response time

• Accelerate adoption of best practices and

expert systems

• Reduce the potential for significant loss to

reputation and revenue

9

Page 10: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

www.buschconsulting.com 808-941-3695

Thinking Strategically

• Future-proof your security

infrastructure

− Anticipate change in threatscape &

technology

• Look for opportunities to consolidate

without compromise

− Reduce complexity

− Increase protection

− Decrease risk

− Lower CapEx and OpEx

• Move beyond tactical responses to

threats

Page 11: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

Common Pitfalls

• Controlled access to firewall

• Documentation of Changes

• Set it and forget it

• Patch management and other updates

• Proper visibility into network activity

• Monitoring of real time activity

• Adequate alert system

Page 12: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

www.buschconsulting.com 808-941-3695 12

Purpose-Built Hardware

Specialized OS

Firewall Flexible Capabilities

Hardened Platform

High Performance

Real-Time Protection

Traffic Shaping VPN

AV IPS Antispam Web Filter

SSL Insp DLP WAN Opt

App Ctrl

FortiGate Multi-Threat Security Platform

FortiGuard Updates

• Purpose-built to deliver overlapping, complementary security

• Provides both flexibility & defense-in-depth capabilities

Page 13: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

www.buschconsulting.com 808-941-3695

FortiGate UTM Lineup

• ASIC-based multi-threat security platform

• Common OS across all platforms

• Single management interface

• FortiGuard Services

− Antivirus, IPS, Antispam, Web content filtering,

Application control

13

Enterprise Service Provider & Large Enterprise SMB & Remote Office

Page 14: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

www.buschconsulting.com 808-941-3695

1

4

100+ threat research professionals

Eight global locations

Automated updates to Fortinet customers

Global software updates

Large knowledgebase of security

8 million antivirus signatures, 90 million

URLs for Web filtering

Robust 24 x 7 x 365 Real-Time Global Intelligence

FortiGuard Subscription Services

Real-Time Security Protection Global Distributed Network

Note

Data as of September 30, 2009

Page 15: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

www.buschconsulting.com 808-941-3695

Management and Reporting Tools

• Tightly integrates together to provide core of centralized security

services

• Reporting Platform

• Log Analysis

• Reporting

• Content Archiving / Data Mining

• Network Analyzer

• Log Browser / Real-Time Log

Viewer

• Central File Quarantine

• Vulnerability Assessment

Scanner

• Forensic Analysis

• Management Platform

• Policy / Device Management

• Update Manager

(Firmware / Security

Content)

• VPN Manager

• Script Manager

Page 16: The Consolidation Imperative - … · The Consolidation Imperative ... Seminar presented in conjunction with Busch Consulting ... Network Antivirus Blocks download of virus

Thank You

Seminar presented in conjunction with Busch Consulting

www.buschconsulting.com 808-941-3695 Information Security & network Solutions