3 - Secure Application Journey
3 - Secure Application Journey
Vulnerabilities
69% 42%
Broken Access Control
Cryptographic Failures
Injection
Insecure Design
Security Misconfigurations
Vulnerable and Outdated Components Web applications are the Web applications are the
Identification and Authentication Failures top Action vector involved top Action vector involved
in incidents.* in breaches.*
Software and Data Integrity Failures
Security Logging and Monitoring Failures
Service-Side Request Forgery (SSRF)
*Verizon Data Breach Investigations Report 2022
Other Vulnerabilities
This content is shared exclusively with the CTO Office and Product Management teams and is considered void if transferred to (or presented by) anyone outside of this group.
The contents are for individual use and should not be copied, transferred, uploaded or shared to anyone without written consent. © Fortinet Inc. All Rights Reserved.
CONFIDENTIAL 3
Access Limited to Authorized Personnel
Email’s use as a primary threat vector…
*FBI IC3 Report 2022 *2022 Verizon Data Breach Report *FBI IC3 Report 2022 *2022 Verizon Data Breach Report
This content is shared exclusively with the CTO Office and Product Management teams and is considered void if transferred to (or presented by) anyone outside of this group.
The contents are for individual use and should not be copied, transferred, uploaded or shared to anyone without written consent. © Fortinet Inc. All Rights Reserved.
CONFIDENTIAL 4
Access Limited to Authorized Personnel
Cyber Threat Assessment Program: MS365 Stats
This content is shared exclusively with the CTO Office and Product Management teams and is considered void if transferred to (or presented by) anyone outside of this group.
The contents are for individual use and should not be copied, transferred, uploaded or shared to anyone without written consent. © Fortinet Inc. All Rights Reserved.
CONFIDENTIAL 5
Access Limited to Authorized Personnel
Fabric Solution: Secure Application Journey
Protected Web
Cloud-native Security
Applications Reduced friction across clouds and
>4200 simplified operations with cloud-native
integrations
Hybrid Security
Protect and connect networks across clouds,
data centers, hybrid clouds, and edge compute
Cloud-native Protection
Reduce friction across cloud deployments with
security that integrates with and works natively
with cloud services
Workload Protection
Seamlessly protect critical workloads
FortiGuard Services
Real-time protection for applications and
workloads no matter where they live
File Scanning
FortiSandbox /
FortiSandbox Cloud
FortiDevSec FortiDAST
DAST
results/config
File Scanning
Protected FortiClient /
Web Applications FortiClient EMS
ZTNA
FortiWeb Client Verification
FortiWeb Cloud
A FortiWeb can be configured Unified Threat Analytics Threat Analytics
to join a Security Fabric through dashboard
This content is shared exclusively with the CTO Office and Product Management teams and is considered void if transferred to (or presented by) anyone outside of this group.
The contents are for individual use and should not be copied, transferred, uploaded or shared to anyone without written consent. © Fortinet Inc. All Rights Reserved.
CONFIDENTIAL 8
Access Limited to Authorized Personnel
Comprehensive protection
Detect Building
SECURE INBOUND EMAILS SECURE OUTBOUND EMAILS Operation Modes
Blocks
Deployment Types
Founded in 2002, FortiGuard Labs is Fortinet’s elite cybersecurity threat
intelligence and research organization. A pioneer and security industry
innovator, FortiGuard Labs develops and utilizes leading-edge machine learning
and AI technologies to provide customers with timely and consistently top-rated
protection and actionable threat intelligence. Appliance VM FortiMail Cloud
This content is shared exclusively with the CTO Office and Product Management teams and is considered void if transferred to (or presented by) anyone outside of this group.
The contents are for individual use and should not be copied, transferred, uploaded or shared to anyone without written consent. © Fortinet Inc. All Rights Reserved.
CONFIDENTIAL 9
Access Limited to Authorized Personnel
Title
Fortinet Security Purpose-built aligned to NIST-800-50 and NIST 800-16 Guidelines
Awareness
and Training High Quality
Engaging
Communication
Security Training & Reinforcement
Designed by Security
Experts Resources
This content is shared exclusively with the CTO Office and Product Management teams and is considered void if transferred to (or presented by) anyone outside of this group.
The contents are for individual use and should not be copied, transferred, uploaded or shared to anyone without written consent. © Fortinet Inc. All Rights Reserved.
CONFIDENTIAL 10
Access Limited to Authorized Personnel