Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1 Fortinet - Confidential
Copyright 2013 Fortinet Inc. All rights reserved.
DISCLAIMER
This document and information and ideas herein may not be disclosed, copied, reproduced or
distributed to anyone outside Fortinet, Inc. without prior written consent of Fortinet, Inc.
This information is pre-release and forward looking and therefore is subject to change without
notice.
The purpose of this document is to provide a statement of the current direction of Fortinets
product strategy and product marketing efforts.
Please note that this Product Roadmap is neither intended to bind Fortinet to any particular
course of product marketing and development nor to constitute a part of the license agreement
or any contractual agreement with Fortinet or its subsidiaries or affiliates.
2 Fortinet - Confidential
Agenda
Introduction
Target market, opportunity size, requirements
What we offer
Solution description, benefits, new appliances
More detail
A look at the product, how it compares, a word of
caution
Recap
Partner calls to action, plus Q&A
3 Fortinet - Confidential
Market Opportunity
Advanced Threat Protection
Today's cybercrime environment has evolved from quick smash-and-grab tactics to the more refined
"long con"; criminal organizations, and even governments, now create specialized malware, intended for
a select target or groups of targets, with the ultimate goal of becoming embedded in the target's
infrastructureWhile methods vary, the commonality of these specialized attacks is that they are
created to avoid detection by mainstream security technologies, such as antivirus, firewalls, and content
inspection gateways. Following the emergence of these specialized threats over the past several years
is a new category of security technology aimed at detecting, analyzing, and preventing these threats;
IDC defines this market as specialized threat analysis and protection (STAP).
4 Fortinet - Confidential
Market Requirements
Advanced Threat Protection For the Enterprise
5 Fortinet - Confidential
Market Requirements
Advanced Threat Protection For the Enterprise
6 Fortinet - Confidential
Advanced Threat Protection
7 Fortinet - Confidential
FortiSandbox Advanced Threat Protection
Multi-tiered file processing optimizes resource usage to improve security, capacity and
performance
Call Back Detection Identifies the ultimate aim, call back and exfiltration
FortiGuard verified
8 Fortinet - Confidential
Solution Description
Advanced Threat Protection For the Enterprise
Network
FortiSandbox for Payload Analysis
Run objects in a contained environment, analyzing activity
Provide a malicious or low, medium or high risk rating
Uncover threat lifecycle information and allows information
sharing with FortiGuard experts for protection updates AV Anti- Web Code OS
Botnet Filtering Emulation Sandbox
Note: most all functions above can be handled by FortiSandbox alone, but for
existing customers leveraging in-place FortiGate is recommended
9 Fortinet - Confidential
FortiSandbox 1000D/3000D
FSA-1000D FSA-3000D
Highlights: Highlights:
Up to 8 VMs supported, 1000 files/day Up to 32 VMs supported, TBD files/day
Handles all protocols, plus sandboxing Handles all protocols, plus sandboxing
Unique dual-level sandbox Unique dual-level sandbox
Integrates with FortiGate for simple Integrates with FortiGate for simple
deployment and management deployment and management
10 Fortinet - Confidential
FortiSandbox Advanced Threat Protection
11 Fortinet - Confidential
FortiSandbox Advanced Threat Protection
12 Fortinet - Confidential
What makes FortiSandbox different? Advanced yet simple.
FortiGuard
Labs
13
200K New Samples / Day
(Monitored Threat Landscape)
13 Fortinet - Confidential
What else should I know? This is a 1.0 product.
Begins with a limited set of supported protocols, object types, operating environments
and integrations
Casts a broad net for high risk items, with limited detection of network anomalies
requiring further investigation
14 Fortinet - Confidential
Top 3 benefits
1. Identifies previously unknown threats that may have otherwise gone undetected for
weeks, months or more
15 Fortinet - Confidential
FortiSandbox Advanced Threat Protection
16 Fortinet - Confidential
Advanced Threat Protection Step 1
DEEP AV DEEP AV
" 99.82% " 99.81%
Effective 573
Effective
18,165
33 VB100 Awards, RAP Leader
STREAM STREAM
>96% Reactive and Proactive Detection
WILDLIST
" 98.6% " 28.18%
Q4 2013: #1 Proactive Vendor (Single Engine)
Effective Effective
Vendors like Checkpoint cannot compete
Public Results: www.virusbtn.com/vb100/rap-index.html
17 Fortinet - Confidential
FortiGuard Internal Test Comparative
ATP: Botnet Control Step 1
Callback Detection
Black List vs. Proactive Intelligence
PROTOCOL RESEARCH
Botnet C2 Decoder (AppCtl)
" FortiGuard creates decoders
IRIS (IP Reputation)
" FortiGate, Sandbox understands botnet commands
Webfiltering
" Proactive C2 detection results
18 Fortinet - Confidential
Sandbox Locally Step 2
4 Results sent to
FortiGuard for
5 Updates pushed out by Updates
FortiGuard Network
(To FortiGates, FortiSandbox)
FortiSandbox!
19 Fortinet - Confidential
Sandbox in the Cloud Step 2
FortiGuard Sandbox!
20 Fortinet - Confidential
FortiSandbox Advanced Threat Protection
Delivers high level and detailed visibility into previously unknown attacks
21 Fortinet - Confidential
Partner Call to Action
Top 3 things to do
Get up to speed on FortiSandbox
Educate customers about Advanced Targeted Attacks and the need
for Advanced Threat Protection
Contact your CAM for support on early opportunities
22 Fortinet - Confidential
File Detection Advanced Threat Protection
23 Fortinet - Confidential
Network Alerts Advanced Threat Protection
24 Fortinet - Confidential
By FortiGate Advanced Threat Protection
25 Fortinet - Confidential
Drill Down Report Advanced Threat Protection
26 Fortinet - Confidential
Threat Analysis Advanced Threat Protection
Delivers high level and detailed visibility into previously unknown attacks
27 Fortinet - Confidential
Threat Analysis Advanced Threat Protection
28 Fortinet - Confidential
PDF Report Advanced Threat Protection
29 Fortinet - Confidential
On Demand Advanced Threat Protection
30 Fortinet - Confidential
Threat Analysis Advanced Threat Protection
Delivers high level and detailed visibility into previously unknown attacks
31 Fortinet - Confidential
VM Activity Advanced Threat Protection
Delivers high level and detailed visibility into previously unknown attacks
32 Fortinet - Confidential