Business & Technology
Designing and deploying a security strategy for any organization is a daunting task. In addition to the challenges of assessing your business needs and risks, you have to select a vendor - or vendors - that you are willing to entrust with the protection of your company’s most valuable assets. There are literally hundreds of security vendors in the market, and many of them claim to be “market leaders” in one way or another. So what criteria do you use when selecting vendors to evaluate for your security infrastructure?
There are lots of ways to slice this pie. Selection criteria can include the reputation of the manufacturer, their longevity in the market, or seeing how they place in third-party evaluations over time. Other criteria include such things as features and innovation, support for the various networks your data traverses (cloud, SD-WAN, remote offices, mobile workers, etc.), or performance that protects your data without slowing down your business. Because security complexity is also an issue, many organizations are increasingly looking for open solutions that can be easily integrated into an existing security ecosystem.
The challenge is that there are just too many variables to consider, and many organizations simply don’t have the time or resources to sort through the dozens of contenders vying for their security dollars. One effective strategy for cutting through that complexity is to simply see what technologies other organizations are deploying. While there are certainly security fads that come and go, solutions that are consistently the most frequently purchased and deployed are probably worth your careful consideration
Which is why Fortinet is proud to announce today the results from International Data Corporation’s (IDC) latest Worldwide Quarterly Security Appliance Tracker. The 2016Q4 and historical report data reinforces Fortinet’s continued leadership within the security industry by once again shipping the most security appliances, which also further strengthens our industry-leading global network of threat intelligence sensors.
Widening our leadership position, Fortinet saw fourth quarter 2016 appliance shipments increase by 29% year-over-year, earning us a 23% unit market share for the quarter. In fact, Fortinet shipped more units in 2016 than the next two competitors combined.
Fortinet has shipped over 3 Million security appliances since our founding, with each device also functioning as a threat intelligence sensor. These devices collectively form our threat intelligence sensor network that continuously collects and delivers threat data to our FortiGuard Labs threat research and response teams. Our leadership in worldwide unit shipments ensures that FortiGuard Labs continues to have the most comprehensive and valuable threat intelligence data available, allowing us to build the industry-leading security services that power the Fortinet Security Fabric. These services deliver broad visibility and actionable intelligence to defend against the global threat landscape.
Using Fortinet’s threat intelligence sensor network, FortiGuard Labs was able to thwart 60,000 botnets and command and control servers, block 240,000 malicious websites, resist 375,000 network intrusion attempts, and neutralize 60,000 malware programs every minute in the first quarter of 2017. Fortinet’s broad visibility and advanced threat research capabilities are highlighted in detail in our latest Global Threat Landscape Report.
John Maddison, Fortinet’s senior vice president of products and solutions, recently said, “As customers move towards consolidation and a seamless, tightly integrated approach to security, we were able to increase the adoption of Fortinet’s security fabric architecture in 2016. The market’s confidence in Fortinet allowed us to increase market share in global Enterprise Firewall and UTM, with quarterly shipments approaching 25% of the overall market. Our ability to provide a broad, powerful and automated Security Fabric that protects all points in the network – from IoT to cloud, physical and virtual networks, wired and wireless environments – provides our customers with the comprehensive threat protection they need, today and for the future.”