2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
- 2. WELCOME
Have a question? Submit it via the chat tab or email us:
This webinar is being recorded!
The recording will be emailed to you after the webinar
And the slides will be available in the attachments tab
Follow us online !
2
marketing@algosec.com
- 3. AGENDA
Fortinet - Intro & Customer Challenges
01
AlgoSec - Intro & Customer Challenges
02
Customer Story
03
3
04 Summary
- 4. 4
Fortinet: Network Security Leader
Fortinet is among the top 4
public cybersecurity
companies in the world.
Its broad portfolio of solutions spans
Network, Infrastructure, Cloud, and IoT
Security.
$14.3B Mkt Cap ~$1.8B - 2018
(revenue)
* As of March 31, 2019
400,000+
Customers
4.6M+ Appliances
Shipments Worldwide
(+30% units WW)
- 5. 5
90% of F100Are Fortinet Customers
Telco
Financials/
Banking
Technology
Retail
Aerospace/
Defense
10 of 12
Healthcare
12 of 15
Transportation
3 of 5 9 of 11 3 of 5
9 of 104 of 4 11 of 13 3 of 54 of 5
Financials/Ins Food/Bev
Energy
- 6. 6
Fortinet: Key Customer Challenges
Requires Visibility and
Intent-Based Segmentation
Attack Surface
BROAD
Requires Orchestration,
Automation, and Response
Vendor Complexity
AUTOMATED
Requires AI-Based
Prevention Across Devices,
Networks, and Applications
Advanced Threats
INTEGRATED
- 7. 7
Solution: Fortinet Security Fabric
Network
Security
Network
Operations
Q1FY19 v1.4.3
Security
Operations
FortiAnalyzer: Analytics-Powered
Security & Log Management
Advanced
Threat
Detection
Compliance
Workflow
Optimization
FortiManager: Automation-Driven
Network Management
Single Pane-
Of-Glass
Management
Compliance
Workflow
Optimization
- 8. 8
Human Errors and Misconfigurations
is one of the leading cause of security
breaches and/or network outages
CHALLENGE
Centralized security management and
visibility helps reduce multiple complex
management consoles and enables true
Single Pane with:
• Configuration Management
• Single Console Visibility
• Multi-Factor Authentication
• High Availability
• Flexible Deployment / Pricing
• Zero-Touch Deployment
SOLUTION
1# Single Pane of Glass Management
Branch Office
Branch Office
Branch Office
FortiAnalyzer
HA Cluster
FortiManager
HA Cluster
IOC
HQ
Internet
FortiGuard
Security Services
- 9. 9
CHALLENGE
Regulation: Compliance Management is usually
a very manual and inefficient process that
involves multiple full-time staff and involves
months to get right.
2# Audit & Compliance
SOLUTION
Simple Reporting and Compliance Controls
Management to enables proving Compliance
proactively
• NIST, CIS Frameworks
• Reports on PCI DSS, SAR etc.
• Audit Logging & RBAC
• Integrated Workflow for Security &
Operations
JAN FEBMARAPRMAYJUN JUL AUGSEPOCTNOVDEC
28%
55%
89%89%
- 10. 10
Staff Shortage - Enterprises don’t have the
resources to staff the detection and response
of Anomalies
CHALLENGE
Leverage Workflow Optimization technology to
reduce the time to detect and respond to
threats or operational anomalies
• Incident Detection & Response
• ITSM Workflow Applications
• SIEM Integration
• Webhook Integration
• Automation Stitches
SOLUTION
3# Workflow Optimization
FortiManager
HA Cluster
3rd Party
Tools
Response
Actions
FortiAnalyzer
HA Cluster
(Collector)
1
2
3
3
Response
Actions
Collect
Events
Detect Anomalies
- 11. 11
CHALLENGE
Advanced Threats: Attacks are getting complex
and very hard to detect and that coupled with lack
of skilled staff – it’s challenging to protect the
modern enterprise
4# Advanced Threat Detection
SOLUTION
Analytics Driven threat detection that can detect
any threats and identify them as High, Med or Low
risks for the enterprise
• IoC Detection & Correlation
• Fabric Integrated Detection
• SIEM Integration
FortiGate – Remote Offices
FortiAnalyzer
HA Cluster
FortiAnalyzer
HA Collector
Cluster
- 16. 16
Automation: Compliance Reports
Situational Awareness Report
New report helps with addressing the most
critical needs for compliance preparedness
Assists in readiness for auditing
Helps to Prepare, Protect, Detect, Respond
& Recover for a Strong Security Posture
- 19. Founded 2004
1800+ Enterprise Customers
Serving 20 of the Fortune 50
24/7 Support via 3 Global Centers
Passionate about Customer
Satisfaction
19
CORPORATE OVERVIEW
19
- 21. AlgoSec enables
companies to align
security with their
business processes
Business-driven Agility
Business-driven Visibility
Business-driven Security
BUSINESS DRIVEN SECURITY MANAGEMENT
19
- 22. ALGOSEC: KEY CUSTOMER CHALLENGES
Keep System
Secure
Network
Visibility
Maintain
Compliance
Visibility of complex networks
Across on-premise, cloud & SDN
Frequent change requests
Applications migration to the cloud
Staff shortage
Allow ease of compliance and
auditing of the changes
22
And other leading
security vendors
SECURITY SHOULD NOT DELAY THE BUSINESS
- 23. POLL #1
How many firewall vendors do you have in your organization?
1
2
3 or more
Please vote using the “Votes“ tab
23
- 24. ALGOSEC: KEY CUSTOMER CHALLENGES
Visibility of complex networks
Across on-premise, cloud & SDN
Network
Visibility
24
And other leading
security vendors
- 26. VISIBILITY ACROSS THE ENTIRE HETEROGENEOUS
ENVIRONMENT
Native Cloud Security ModelsVirtual appliance
in the cloud
NGFW on-prem
Private cloud SDN – distributed FW
26
- 27. POLL #2
How many policy changes do you have each week on average?
Each line you add to a firewall is counted as a change
0-10
10-50
50-100
100 or more
Please vote using the “Votes“ tab
27
- 28. ALGOSEC: KEY CUSTOMER CHALLENGES
Keep System
Secure
Frequent change requests
Applications migration to the cloud
Staff shortage
28
- 32. Based on policy analysis & on network traffic analysis
POLICY OPTIMIZATION
- 33. POLL #3
How many regulations are you obligated to report?
Each line you add to a firewall is counted as a change
None
1
2 - 4
More than 4
Please vote using the “Votes“ tab
33
- 34. ALGOSEC: KEY CUSTOMER CHALLENGES
Maintain
Compliance
Allow ease of compliance and
auditing of the changes
34
- 38. Request a
network
change
Check for
risks involved
And approve
Plan the
changes
(objects & rules)
Implement
the change on
the devices
Validate
the
change
Identify
Devices in
the flow path
CUSTOMER STORY
38
- 39. Validate the
change
Identify
Devices in
the flow
path
Check for
risks
involved
Plan the
Rules
Implement
the change
on the
devices
Request a
network
change
CUSTOMER STORY
AlgoSec can push changes automatically
39
- 40. ENABLING TRAFFIC POLICY CHANGES
• Is the traffic from source
to destination enabled?
• Routing
• Firewall rules
40
Cloud
- 44. SECURITY ADMINISTRATOR – APPROVE CHANGES
FireFlow –Security Administrator sees the risks – Approve changes
Rose_Other
- 47. SUMMARY
&
BENEFITS
Fortinet provides unparalleled broad,
automated and integrated security
protection across segments
01
AlgoSec enables Multi-Vendor
Firewall Management across
heterogeneous and hybrid
enterprises
02
100s of Enterprise Customers find
Fortinet & AlgoSec best together in
their Multi-Vendor Environment
03
47
- 48. Prof. Wool Video Courses
https://www.algosec.com/resources
48
Solution Brief Whitepaper
Webinar Slides
- 49. © Fortinet Inc. All Rights Reserved.
eBook
https://www.fortinet.com/products/management.html
FortiManager Data Sheet FortiAnalyzer Data Sheet
- 50. Q & A
Submit your questions via the chat
Request a Free Evaluation: marketing@algosec.com
- 51. 51
JOIN OUR COMMUNITY
Follow us for the latest on security policy management trends, tips & tricks,
best practices, thought leadership, fun stuff, prizes and much more!
Subscribe to our YouTube channel for a
wide range of educational videos
presented by Professor Wool
youtube.com/user/AlgoSeclinkedin.com/company/AlgoSec
facebook.com/AlgoSec
twitter.com/AlgoSec
www.AlgoSec.com/blog
- 52. ALGOSUMMIT
THE PREMIER EVENT FOR
ALGOSEC CUSTOMERS & CHANNEL PARTNERS
52
Dallas
October 21-24
2019
www.algosec.com/algosummit
UPCOMING
WEBINARS
July 10
Change Automation
July 30
Managing Cisco ACI