運用 來強化網路安全與效能 multi-threat security systems
DESCRIPTION
運用 來強化網路安全與效能 Multi-Threat Security Systems. FortiNet 公司簡介. IDC “Fortinet Ranked the Fastest Growing Major Security Vendor” Unified Threat Management (UTM) Security Solutions Company Stats Founded in 2000 by Ken Xie (Former Netscreen Founder) - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/1.jpg)
Fortinet Confidential
運用 來強化網路安全與效能Multi-Threat Security Systems
![Page 2: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/2.jpg)
![Page 3: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/3.jpg)
![Page 4: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/4.jpg)
![Page 5: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/5.jpg)
![Page 6: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/6.jpg)
FortiNet 公司簡介• IDC “Fortinet Ranked the Fastest Growing Major Security Vendor”
• Unified Threat Management (UTM) Security Solutions
• Company Stats
• Founded in 2000 by Ken Xie (Former Netscreen Founder)
• Headquarters@Sunnyvale, California, Silicon Valley, offices worldwide
• Funding to Date
• 1000 employees / > half in R&D, more than 100 SE in field
• 300,000+ FortiGate devices shipped worldwide
• Market Leadership
• Six ICSA certifications (FIRST and ONLY security vendor)
• Government Certifications (FIPS-2, Common Criteria EAL4+)
• Virus Bulletin 100 approved (2005 to 2008)
• 60+ Industry Awards
![Page 7: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/7.jpg)
架構簡化 , 安全更升級
7
The Fortinet SolutionTraditional Network Security Solutions
• Real-time, integrated security intelligence
• ASIC-accelerated performance• Lower total cost of ownership• Easy to deploy / manage / use
• Stand-alone, non-integrated security • Mix of off the shelf systems and
applications• Higher total cost of ownership• Difficult to deploy / manage / use
![Page 8: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/8.jpg)
Worldwide UTM Market ShareQ3 2009 (1)
UTM Market Competitive Landscape, 2009(4)
Low Market Penetration High
Niche ParticipantSpecialist
Contender
Challenger
Market Leader
Low
High
Abilityto
Deliver
8
(1) IDC Worldwide Security Appliances Tracker, December 2009 (market share based on factory revenue)(2) Arrows represent change in UTM market share (defined as factory revenue) from Q1 2009 to Q2 2009(3) Gartner, Inc., “Magic Quadrant for SMB Multifunction Firewalls”, June 2009(4) Frost & Sullivan, “World Unified Threat Management, Products Market 2009”, 2010
Notes
Rank Company Market Share (%) (2)
1 14.4
2 Juniper 10.7
3 McAfee 8.1
4 SonicWALL 7.6
5 Check Point 6.2
6 Cisco 5.4
7 Crossbeam 3.2
8 Other 38.7
Total 100.0
Magic Quadrant for SMBMulti-Function Firewalls (3)
![Page 9: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/9.jpg)
![Page 10: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/10.jpg)
![Page 11: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/11.jpg)
![Page 12: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/12.jpg)
![Page 13: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/13.jpg)
![Page 14: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/14.jpg)
![Page 15: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/15.jpg)
![Page 16: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/16.jpg)
![Page 17: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/17.jpg)
![Page 18: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/18.jpg)
![Page 19: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/19.jpg)
![Page 20: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/20.jpg)
![Page 21: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/21.jpg)
![Page 22: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/22.jpg)
![Page 23: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/23.jpg)
![Page 24: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/24.jpg)
![Page 25: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/25.jpg)
![Page 26: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/26.jpg)
![Page 27: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/27.jpg)
![Page 28: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/28.jpg)
FortiGate 提供高效能 , 高網路安全防機制
9
FIREWALL
APPLICATIONCONTROL
WIRELESS DATABASE
ANTISPAM VPN
FORTIOSFORTIASIC
WEB FILTERING
DLP ROUTING
WANOPTIMIZATION
ANTIVIRUS
IPS
![Page 29: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/29.jpg)
一指間掌握網路即時狀況
•管理操作簡易•中文親和介面•明確掌握網路狀況
AV/IPS/WF/SPAM blocked
CPU/Memory resource usage
Device information
Concurrent connect sessions
![Page 30: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/30.jpg)
正體中文操作介面• FortiOS + FortiASIC
• 提供親切便利的使用介面 , 操作支援多國語言 ( 正體中文 )
• 支援 IPV6• 提供智慧型型垃圾郵件特徵比對• Greyware / Spyware 防禦• 提供不當網頁內容過濾 , 並過濾釣魚網站
• IM/P2P 控制與監管• 可同時設定 NAT/Route 及
Transparent 模式• 支援高可靠度 (High Availability)
進階技術能力 (1)
豐富而完整的功能
不當網頁
釣魚網站封鎖與限定流量
監控與管制 IM
![Page 31: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/31.jpg)
進階技術能力 (2)
支援 Radius 及 LDAP 內建 SSL VPN
設定掃瞄協定及掃檔大小
支援 sip 和 sccp
![Page 32: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/32.jpg)
![Page 33: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/33.jpg)
![Page 34: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/34.jpg)
![Page 35: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/35.jpg)
![Page 36: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/36.jpg)
![Page 37: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/37.jpg)
![Page 38: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/38.jpg)
![Page 39: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/39.jpg)
![Page 40: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/40.jpg)
阻擋現今遭受到的網路威脅 Application-Based Attacks Can Bypass Firewalls
40
“Innocent” Video Link:Redirects to malicious WebsiteOr innocent site, hosting content
Integrated Web FilteringBlocks access to malicious Website
Network AntivirusBlocks download of virus
Intrusion ProtectionStops the worm from phoning home
Solution:
Error message:“Drops” copy of itself on system and attempts to propagate
“Out of date” Flash player error:“Download” malware file
Problem:
![Page 41: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/41.jpg)
![Page 42: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/42.jpg)
U.S. and Canadian Federal Government Certifications
Common Criteria EAL 4+Certified for Common Criteria for Information Security Technology
FIPS 140-2 Level 2Meets Security requirements for Cryptographic modules
![Page 43: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/43.jpg)
Global Government Customers who have Evolved
Example CustomersExample Customers
Fortinet products are used by:
• The world’s leading enterprises, telcos and service providers
• Major government, education, healthcare and retail institutions
• 250,000+ units deployed
![Page 44: 運用 來強化網路安全與效能 Multi-Threat Security Systems](https://reader033.vdocuments.site/reader033/viewer/2022061501/56815567550346895dc33268/html5/thumbnails/44.jpg)
THANK YOU
For More Information about Fortinet products visit Fortinet.com or contact your Fortinet representative.