fortinet small business solutions

30
1 Fortinet Small Business Solutions August 2020 Replay: https://attendee.gotowebinar.com/recording/9142486872719300102

Upload: others

Post on 04-Feb-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

1

Fortinet Small Business SolutionsAugust 2020

Replay: https://attendee.gotowebinar.com/recording/9142486872719300102

5

Content Strategy - When to Use, Mix and Match

Small Business <100 Employees <$50M

Novice Audience, Not too familiar with cybersecurity

Mid-Market >100 Employees

Experienced, familiar with cybersecurity

• Simplified messaging and vernacular

• Introductory concepts and trends

• Small handful of products

• Leverages our security-as-a-service offerings

• Advanced concepts and terminology

• Architecture diagrams, how things work

• A lot of product options

• Leverages our on-prem offerings

Growth is Great and Challenging

7

Technology Enables Growth and Increases Risk

Gain new customers Increase loyalty Drive productivity

$

Adding new technology means more need for visibility and control

More integrations means attackers move easier once inside and viruses spread

11

Do I really need to know all this?

I have other things that need my attention…

But Security can be Confusing…

SD-WAN

Endpoint Security

Email Security

Data

Cen

ter

14

Security must be Simple, Effective and Affordable

Has to Work

Validated by 3rd

parties

Complete, holistic solution

Integrated and use AI and ML

15

• Single, cloud-based portal

• Simplified operations and management

• Unified solutions purchased a la carte

• Expand as businesses grow

• Oversee configurations, entitlements, support tickets and licensing across the Fortinet portfolio

• Strong multitenant capacity

Consume Security-as-a-Service

16

A Complete Security Roadmap

NGFW &

SD-WAN

Switches

and Access

Points

Extender

4G Access

SaaS

Security

Email

Security

Endpoint

Protection

Two-Factor

Authentication

Web

Application

Firewall

(WAF)

Public

Cloud

Security

And Much,

Much More

Fortinet

SonicWall

Sophos

CheckPoint

Meraki

Baracuda

WatchGuard

Most widely deployed NGFW on the marketOnly company capable of extending NGFW security

down through Switches and Access Points

Small Business Mid-Size to Enterprise

Secure ConnectivityProtect your data across your network and enable safe access to the cloud

19

Secure Connectivity

FortiGate FortiSwitch FortiAP

High Performance Connectivity

- Plug-and-play installation

- Multiple options to fit needs

• 10x decryption of nearest competitor

Visibility & Control

- Single screen management

- Visibility & control across devices

- Zero Touch Deployment

Validated Security

- Security policies extended to switch port and wireless LAN

- Wired and wireless become FortiGate interfaces

- Automated threat sharing between other Fortinet products

More powerful together

21

Connectivity is Critical, and So is Security

Replace routers with an NGFW

• An NGFW can route traffic more intelligently than a router

– User - Device - Application

– Gives you visibility and control over: who? – what? – with? –how?

• A router cannot analyze incoming traffic for threats like

– Ransomware

– Drive-by-downloads

– Trojans, Viruses and other Malware

– Botnets

• A router cannot decrypt incoming traffic

22

Connectivity is Critical, and So is Security

Switches touch nearly every device

• While the NGFW is the chokepoint, switches help scale

– Do they have enough ports for all your devices?

– Can they handle the bandwidth demanded?

– Can they provide power over Ethernet (PoE) to connected devices?

• Switches don’t normally have security

– If a threat gets in, it quickly spreads

23

Connectivity is Critical, and So is Security

Wireless access points extend the network

• Wireless networks help scale and offer freedom from wires

– Can they handle the bandwidth demanded?

– Can they handle dense user environments?

– Can they support new technology standards?

• Wireless access points don’t normally have security

– Wireless networks are very visible and often extend outside office walls into hallways, courtyards and parking lots

– Basic passwords and device security are easily bypassed

24

Secure Connectivity

• Most widely deployed NGFW on the market

• Lowest cost per protected Mbps

• Integrated Secure SD-WAN

• Wi-Fi 6 Ready

• Indoor and Outdoor options

• Strong connectivity even in dense environments

• Multiple Gigabit ports

• Stackable

• Power over Ethernet options

FortiGate FortiSwitch FortiAP

28

Consolidated Security in a Single Device

Adv. Malware ProtectionProtects against the latest viruses, spyware and

other threats. Includes: Antivirus, Sandboxing,

Anti-Botnet, Virus Outbreak Protection

Intrusion Prevention (IPS)Provides near real-time updates and threat intelligence to proactively block attacks

Quickly create policies to allow, deny, or restrict access to individual applications or entire categories

Application Control

Web & Content FilteringProvides protection through blocking

access to malicious, hacked and

inappropriate websites

VPN (IPsec & SSL)Creates an encrypted tunnel to enable secure remote access for employees and branch locations

29

Automated Threat Sharing and IntelligenceBillions of events analyzed every day

450K customer networksacross all major threat vectors

Informationfeeds200+

100B+ Events

ML and AI platform speeds detection and

protection

Worldwide team of threat hunters, researchers,

analysts, tool developers and data scientists

Firewalls Web

Emails Endpoints

PreventionKnown attacks

DetectionUnknown attacks

IntelligencePlaybooks, IR

30

NSS Labs 3rd-Party CertificationsMost recent test results

9 NSS LabsRecommendations

NGFW 6th year in a row!

NGIPS

DCIPS

DCSG

BPS

BDS

AEP

WAF

SD-WAN

Palo Alto Networks

Check Point

Cisco

Figures as of February 4, 2020

Securing Your Applications in the CloudBuild out your secure cloud-connected office

33

Benefits

• Lower TCO

• Faster time to value

• Easier long-term maintenance

Risks and Challenges

• You are responsible for data and user security as well as ensuring and proving compliance

• Lack visibility and control

• Need to ensure strong connectivity at all times

– Application prioritization

– Enable direct internet access

Benefits and Risk of SaaS

Direct Internet Access

via Secure SD-WANBroadband - Fiber - LTE/3G/4G

Backhauling

• Slower with more latency and lag

• More expensive

34

Benefits and Risk of SaaS - Email

Benefits

• Lower TCO

• Faster time to value

• Easier long-term maintenance

Risks and Challenges

• You are responsible for data and user security as well as ensuring and proving compliance

• Lack visibility and control

• Need to ensure strong connectivity at all times

– Application prioritization

– Enable direct internet access

Direct Internet Access

via Secure SD-WANBroadband - Fiber - LTE/3G/4G

35

Benefits and Risk of SaaS - Email

Benefits

• Lower TCO

• Faster time to value

• Easier long-term maintenance

Risks and Challenges• Popular platforms are attacker priority

• ShurL0ckr

• NoRelationship

• Cerber

• Basic email security isn’t strong enough

• Inadequate analysis of attachment

• No ability to decrypt and analyze

• Can’t analyze embedded links

SE Labs – Email Security Services Protection Jan-March 2020

36

Secure Applications in the Cloud

Secure SD-WAN

- Included with FortiGate

- Better cloud application performance

- Application continuity and failover

Adopt SaaS Securely

- Adv. threat analysis and DLP

- Risk and data usage trends

- Out-of-the-box compliance reporting

Enhanced Email Security

- Adv. threat analysis, anti-spam and phishing

- Attachment decryption and analysis

- Adv. URL filtering and Content Disarm

FortiGate FortiCASB FortiMail Cloud

Secure Your UsersProtect your users whether they are in the

office or on the move

38

Enable Remote Users

Benefits

• More productive workforce

• Easier hiring

• Business continuity

Risks and Challenges

• Are users proactively using VPN?

• How do we remotely deploy updates and patching?

• Are users protected from non-internet based attacks

39

Secure Users

Endpoint Protection

- Adv. Threat analysis for endpoints

- Remote deployment and updates

- Device visibility, status and risk status

Remote Users & VPN

- Secure remote access without sacrificing performance

- Send pre-configured devices to users

- Stop credential theft with 2-Factor authentication

FortiClient Cloud FortiClient / FortiGate

Control CostsStreamline and simplify security, management

and on-going operations

41

Consume Security-as-a-Service - FortiCloud

FortiExtender

Cloud

FortiGate

CloudFortiAP

Cloud

FortiSwitch

Cloud

FortiAnalyzer

Cloud

FortiManager

Cloud

FortiCareFortiMail

Cloud

FortiToken

Cloud

FortiClient

Cloud

FortiWeb

Cloud

FortiCASB FortiPrescence

Cloud

FortiInsight

Cloud

FortiCWP

Cloud

FortiConverter

Cloud

SupportHosted ServicesInfrastructure & Management

• Services purchased individually

• Multitenant capabilities

Simplify On-going Operations & Management

• Managed through a single, unified platform

• Configurations, entitlements, support tickets and licensing

42

1st Step - FortiGate & FortiGate Cloud

FortiGate Cloud

FortiGates

FortiSwitches

FortiAPs

• Free version included with FortiGate with built-in two-factor authentication

• Zero-touch, turnkey FortiGate provisioning

• Optional bulk configuration and deployment capabilities

• Out-of-the-box reports, analytics and customization options

• Isolated instances located in America, Europe and Asia

44

What Next?

Take advantage of free tools

• Free cybersecurity training for your business

• Free Cyber Threat Assessments (CTAPs)

Get more details on• Secure Connectivity

• Securing Applications in the Cloud

• Secure Users and Remote Employees

• Consuming Security-as-a-Service

Contact Hummingbird Networks to learn more about optimizing your small business with Fortinet!

hummingbirdnetworks.com805-522-9123

[email protected]