Secure Access and Endpoint Solutions
Secure Access and Endpoint Solutions
Securing
Secure Access Zero Trust
Endpoints
"Network operations and network security leaders "The shift from implicit trust to zero trust is a "Organizations are looking to integrate the endpoint
looking to support the anywhere, anytime access response to the rising incidents and costs of protection platform (EPP)/EDR with network and
requirements of a distributed, hybrid workforce cybercrime. A robust implementation of zero-trust cloud security technologies and make use of
should consider an integrated, cloud-centric solution" solutions can reduce the likelihood of attack." managed detection and response service"
Gartner The state of Zero-Trust Report, January 2022 Gartner How to Choose the Best EPP/EDR for Your
MarketGartner
Guide Market Guide for Single-Vendor SASE, September 2022
for Single-Vendor SASE Organization, June 2021
Published September 2022
Anywhere, Anytime Secure Zero-trust Mindset is the answer Move towards endpoint security
access for users convergence
Converged Agent
Travel
Endpoint Protection Extended Detection & Response
Data Center
Device Access
Identity
Converged Agent
Internet
FortiClient
FortiToken 400
Travel
Data Center
FortiNAC
FortiEDR
SaaS
RDP
Data
Centre 1 File Share
EMS FortiGate-HW
Web App
RDP
File Share
FGT
INTERNET
Device User
SaaS Apps
SASE
Web App
1 2 3 4 5
Data RDP
Validate Verify Device Application Centre 2
Encrypted File Share
Device User Posture Access Only
FortiGate-HW
This content is shared exclusively with the CTO Office and Product Management teams and is considered void if transferred to (or presented by) anyone outside of this group.
The contents are for individual use and should not be copied, transferred, uploaded or shared to anyone without written consent. © Fortinet Inc. All Rights Reserved.
CONFIDENTIAL 8
Access Limited to Authorized Personnel
Universal ZTNA Defined
Remote User
On-Prem User Cloud
Cloud
SASE SWG
Web
te FWaaS
riva p
P p
A
SD-WAN
AI-Powered
Security Data Center
ZTNA
Securing Remote Users Cloud-delivered Security & Networking Better User Experience
Fortinet Privileged & Confidential © Fortinet Inc. All Rights Reserved. 11
FortiSASE
Secure Internet Access for Remote Users & Locations
Internet
Safe browsing from anywhere
This content is shared exclusively with the CTO Office and Product Management teams and is considered void if transferred to (or presented by) anyone outside of this group.
The contents are for individual use and should not be copied, transferred, uploaded or shared to anyone without written consent. © Fortinet Inc. All Rights Reserved.
CONFIDENTIAL 12
Access Limited to Authorized Personnel
FortiSASE
Natively Integrated ZTNA
Internet Private
Apps Enabling Universal ZTNA
DCs/Cloud
App Gateway
Cloud provisioned
Management
Plane
ZTNA connections
Inline
CASB Private
ZTNA Apps Device attributes, user info,
posture-based security
HQs/Branches
SWG FWaaS App Gateway
Granular per-session
posture checks
This content is shared exclusively with the CTO Office and Product Management teams and is considered void if transferred to (or presented by) anyone outside of this group.
The contents are for individual use and should not be copied, transferred, uploaded or shared to anyone without written consent. © Fortinet Inc. All Rights Reserved.
CONFIDENTIAL 13
Access Limited to Authorized Personnel
FortiSASE
Secure Private Access (SPA)
Internet
Apps Secure corporate app access
DCs/Cloud
HQs/Branches
Highly granular Access Control
FGT
Context-based zero-trust access enforcement,
SWG FWaaS
app based and adaptive with AI/ML
This content is shared exclusively with the CTO Office and Product Management teams and is considered void if transferred to (or presented by) anyone outside of this group.
The contents are for individual use and should not be copied, transferred, uploaded or shared to anyone without written consent. © Fortinet Inc. All Rights Reserved.
CONFIDENTIAL 14
Access Limited to Authorized Personnel
FortiSASE
Secure SaaS Access for Visibility and Control
Internet
Secure Access to Cloud apps and files
This content is shared exclusively with the CTO Office and Product Management teams and is considered void if transferred to (or presented by) anyone outside of this group.
The contents are for individual use and should not be copied, transferred, uploaded or shared to anyone without written consent. © Fortinet Inc. All Rights Reserved.
CONFIDENTIAL 15
Access Limited to Authorized Personnel
Endpoint Detection & Response
(EDR)
FortiEDR Components Architecture
Collectors Aggregated
Registration and information from
health status Collector and Core Environment and
Security
orchestration
Threat Hunting
Queries
Threat Hunting
Compressed
OS metadata
Threat intelligence
Core/Jumpbox
This content is shared exclusively with the CTO Office and Product Management teams and is considered void if transferred to (or presented by) anyone outside of this group.
The contents are for individual use and should not be copied, transferred, uploaded or shared to anyone without written consent. © Fortinet Inc. All Rights Reserved.
CONFIDENTIAL 17
Access Limited to Authorized Personnel
FortiEDR
Modern Endpoint Security
Legacy Endpoint Protection (EPP with EDR)