True Unified Threat Management

1 True Unified Threat ManagementFortigate Technology Positioning 2 Agenda The legacy networ...
Author: Dianna Whillock
0 downloads 18 Views

1 True Unified Threat ManagementFortigate Technology Positioning

2 Agenda The legacy network security approach & multi-party UTMThe Fortinet approach Maximizing the Fortinet opportunity Summary

3 Multiple point solutions & multi-party UTMThe legacy network security approach Multiple point solutions & multi-party UTM

4 Resilient architecture Key Points: Main drawbacksGateway Corporate LAN DLP IPS Anti-Virus Firewall Anti-Spam Web Filter SSL VPN DLP IPS IPS Anti-Virus Anti-Spam Web Filter SSL VPN DLP Firewall Anti-Virus Firewall Anti-Spam Web Filter SSL VPN Multi-Party UTM Resilient architecture Key Points: Main drawbacks Consolidated hardware 100% increase in hardware sprawl Inefficient multiple point solutions = latency & vulnerabilities Legacy firewall Cost savings from reduced utility overheads, training etc First network security technology Very low utilisation of investment – Under 50% A set of individuals, not a team BUT! Considerable sprawl in appliances End result is underperforming, over expensive security posture Limited functionality – Port & Protocol, Allow & Block Similar performance issues due to multiple scanning engines Time consuming environment to administer, multiple consoles Insufficient protection against a multitude of threats Reliance on updates from 3rd party databases Sizeable total cost of ownership… Technical training, power & cooling, costly license programs More advanced protection required No major improvement in efficacy

5 An integrated network security platformThe Fortinet approach An integrated network security platform

6 Inside Fortigate Advanced Networking ServicesVirtualisation WAN Opt DLP Wireless App Control Traffic Shaping Advanced Networking Services Firewall SSL VPN Anti-Spam Anti-Virus Web Filter IPS Proprietary Unified Threat Management FortiOS Purpose built Operating System Network ASIC Content ASIC General Purpose CPU Purpose built hardware

7 Maximising the Fortinet opportunityThe unified access layer

8 Fortigate: Integrated security platformGateway Corporate LAN WLAN IPS Anti-Virus Anti-Spam Web Filter SSL VPN DLP Firewall Fortigate: Integrated security platform FortiAP: Secure wireless access Fortigate: Secure site to site connectivity FortiToken: Strong authentication for mobile workers The Unified Access Layer

9 Summary Legacy securityMultiple point solutions are inefficient with a high total cost of ownership Leave gaps in the network security posture Multi-party UTM offer similar problems with very little improvement in performance Fortinet Fortinet offers a different approach with purpose built, accelerated hardware High performance at a low price Complimentary Fortinet technologies provide a ‘unified access layer’ for secure connectivity regardless of location or network type True Unified Threat Management