Top Selling Multipurpose WP Theme
Home CEO/Interviews Mr.Jitendra Ghughal, National Channel Manager, India & SAARC, Fortinet.

Mr.Jitendra Ghughal, National Channel Manager, India & SAARC, Fortinet.

1. What are the key focus for you when it comes to UTM in India?

Connected UTM for SMBs:
Jitendra GhughalDeploying effective network security has always been challenging for Small and Medium Business networks sharing the same threat environment with larger organizations yet with limited resources with which to defend themselves. They look to security vendors to be a trusted advisor to help them:

•    Deliver comprehensive network security that can protect against sophisticated attacks across a wide range of locations
•    Support new initiatives, like enabling secure wireless guest access or integrating mobile devices into your network
•    Meet compliance requirements and ensure business continuity while reducing total cost of ownership

Fortinet’s Connected UTM solution provides SMB customers with a single, proven high-performance platform for all of their network security requirements that is both comprehensive and cost-effective. Unlike other UTM devices that combine a few security technologies into a single device, Connected UTM allows you to optimize your customers’ Small or Medium network by using a single security platform to deliver a wide range of centrally managed security, access, and connectivity technologies.

Internal Network Firewall for Enterprise:
Attacks are finding ever more ways into Enterprise networks, and once inside taking their time to cause damage. Enterprises need to find new ways to protect their networks from the inside-out, and to protect them continuously, so they can shorten the window of exposure to threats.

Until now traditional border firewalls have not been effective as internal firewalls due to the high-level of performance required on internal networks, in addition to the complexity to deploy. Fortinet’s Internal Network Firewall (INFW) takes advantage of the ASIC architecture to provide multi-gigabit throughput, without disruption to existing applications or systems. Pre-configured Transparent Mode enables rapid and easy deployment with instant network traffic visibility.

2. Where are the big opportunities in this space? Please share with us some of the big trends in this space?

Organizations of all sizes are being targeted by cyber criminals and must defend their critical infrastructures and proprietary data from advanced, highly focused threats more than ever before. Yet, increased bandwidth requirements and network utilization complicate the process, particularly as organizations increase in size and scope. What they need are industry-leading solutions that provide the security effectiveness and features to protect from advanced threats, while delivering the performance and connectivity to future-proof their infrastructures.

Traditional firewalls have not kept pace with the changing threat landscape, forcing organizations to look to next-generation firewalls for a deeper level of inspection. Today, customers want gateways that fight advanced threats, like zero-day malware and that respond to new cybercriminal tactics, such as encrypting payloads or stolen data inside of an SSL tunnel. Therefore, advanced threat prevention, sandboxing and more are becoming the norm with an emphasis on security effectiveness and performance above all else. Customers are looking for high-performance, next-generation security that won’t slow down their business or break their budget.

3. What are the innovations that you are bringing to the market?

Advanced Cyber Security: Inside and Out
The current state of network threat protection is often focused primarily on the border, working to prevent outside threats. Yet, this approach can be ineffective once a threat gets “past the gate” and enters the internal network by other means, such as end-point devices, infected flash drives, or even internal employees or consultants, putting critical data at risk. The reality is that sophisticated hacker attacks and insider threats continue to penetrate more deeply and persist undetected for long periods of time inside an organization’s internal network, making it even more critical for organizations to mitigate potential damage. Hackers are taking advantage of the typically flat internal architectures to put internal networks at greater risk.

Fortinet has introduced a new class of firewall to combat these internal threats, leveraging proven and robust FortiGate Security Appliances. Fortinet’s new INFW employs a layered approach to security that sits closer to the assets within an organizations’ network, segmenting and preventing breaches from spreading, while providing full visibility into all traffic types, users and devices, to help protect against threats inside the network.

4. What is your go to market strategy for this space?

Trends for mobility, agile infrastructures and cloud set alongside the evolution in advanced cyber threats, means organizations increasingly demand high-performance, integrated security solutions and experienced partner support. Fortinet will support resellers to increase expertise and leverage our end-to-end network security solutions to better align their services with the needs of their customers, and ultimately boost value.

5. What kind of growth are you looking at and where is this growth going to come from?

According to Frost & Sullivan Fortinet has had a very successful year in 2014, and has registered a revenue growth of 51.9 percent in the Network Security Market in India.

Fortinet has been gaining both revenue and shipment market share in the Datacenter, Enterprise and SMB market segments. Fortinet attributes this ongoing market momentum to a strong customer focus, return on its sales and marketing investments, partner momentum and continuous best-of-breed technology innovation.

Our broad product line of complementary solutions goes beyond traditional Network Security to address all of the security needs of the extended enterprise – whether network, branch, cloud, mobile, data center or other complex environments.  This end-to-end security solution includes scalable management, control and reporting, giving comprehensive visibility on the state of the network provides partners multiple business opportunity to address each and every network security need of customers of all sizes.

@2023 – Cellit. All Rights Reserved.

Contact us: contact@cellit.in