REPORT
www.fortinet.com	 1
Wireless Security Trends: State of the Market
Enterprise-wide security is an integral part of any IT strategy and
implementation. Growing threats to data center and network infrastructures,
communications and applications require end-to-end security for maximum
protection. This survey report provides an overview of the key security
challenges faced by enterprise IT decision-makers in an ever-changing,
globally networked ecosystem.
Key Findings
Wireless LAN Vulnerability Remains Top of Mind
The threat landscape is evolving. With the dynamics of an unrelenting increase in
number and type of networked devices, IT decision-makers believe their WLANs are
exposed. Despite implementation of a broad range of security measures, wireless LAN
infrastructure and access are considered to be at the greatest risk to security breaches.
Enterprise IoT Applications Are Mission Critical
From the factory floor to the hospital recovery room, networked Internet of Things
(IoT) devices range from industrial robotics to advanced medical sensors. They are
being deployed in huge numbers for a wide range of innovative and game-changing
applications. These new types of wireless devices can generate massive amounts
of critical data and network traffic on a daily basis. This creates a new set of security
challenges for IT managers.
Adoption of Cloud-Managed Wi-Fi Continues to Grow
Especially in distributed enterprises, the migration from on-premise to cloud-managed
WLANs is gaining momentum. Cloud Wi-Fi provides simplified deployment, management,
visibility and control. It also brings the need for a different approach to WLAN security:
requiring access points to run a broad set of protection measures in real time.
Wireless Security Survey 2016 The Need for Integrated
Security
Enterprise organizations want a
secure architecture that provides
flexible end-to-end protection
across their entire IT environment.
With high-profile attacks on major
organizations, cybersecurity and the
protection of critical company and
customer data are top concerns.
Most survey respondents—79%—
expect an integrated architecture
to address the challenges of
cybersecurity while also enabling
secure network access.
Not surprisingly, the large majority
of enterprises surveyed have
implemented some form of firewall,
authentication and antivirus. In
a significant change from last
year, there is notable growth in
the implementation of intrusion
protection and application
awareness/control worldwide.
While enterprises do believe they
need an end-to-end security
infrastructure, they may find that
deploying an integrated solution is
difficult to configure, deploy and
manage. Many security holes are
the result of incorrect setup; often
a result of products with different
management and control systems.
SURVEY REPORT: WIRELESS SECURITY SURVEY 2016
www.fortinet.com	 2
This global survey looks at the state of the market for WLAN
security among enterprises across a broad range of industries.
All respondents were sourced from the independent market
research company Lightspeed GMI online paneli
and were
customers of all the major WLAN equipment vendors.
Respondent Profiles
The findings of this report come from an independent survey
of 1,300 IT decision-makers (ITDMs) in 11 countries. It is the
second of our annual security surveys representing the input of
enterprise organizations. The report comprises a broad spectrum
of industries including manufacturing, telecommunications,
financial services, education, public sector and more.
FIGURE 1: STRUCTURE OF THE SAMPLE
Ongoing Worries Over Wireless Security
Enterprise IT decision-makers continue to have concerns
with their wireless LAN security. There is little change from last
year’s survey, with 45% of the 2016 study respondents stating
the loss of company and customer data to be the top risk.
Industrial espionage remains second on the list with 24% of
ITDMs stating this is their top risk. These enterprises may already
be experiencing breaches and they are taking more action to
remedy security gaps across their IT infrastructure.
People have come to expect pervasive Wi-Fi access for
personal and professional devices, making BYOD seem like a
well-accepted business practice. However, there is a significant
regional difference in regards to BYOD support and its related
IT access control. Worldwide, only 56% of ITDMs indicated
that BYOD is allowed in their organizations. However, in North
America 67% allow BYOD access, and 72% of respondents
expect IT to have complete control of all employee devices.
FIGURE 2: BIGGEST RISK
FIGURE 3: LEVEL OF SECURITY VULNERABILITY
Compare this to EMEA, where only
46% allow BYOD and 63% expect
IT to have complete control.
This reflects a significant lack of
confidence in IT’s ability to securely
control access, especially among
European and Asian respondents,
where only 41% believe they have
very secure access in place.
SURVEY REPORT: WIRELESS SECURITY SURVEY 2016
www.fortinet.com	 3
Enterprises Are Increasing Wireless
Security Measures
In face of these risks, enterprise organizations are increasing
their deployment of security solutions across the enterprise. They
consider their WLANs to be most vulnerable and are investing
in broader security architectures. Compared to last year, the
2016 study shows a more balanced mix of security methods.
Interestingly, the implementation of intrusion protection systems
grew 45% year over year, while application awareness and
control deployments grew a whopping 60%.
Function 2015 2016 % Growth
Firewall 71% 84% 18%
Authentication 63% 77% 21%
Antivirus 61% 72% 17%
IPS 41% 60% 45%
App Awareness/Control 37% 59% 60%
FIGURE 4: IMPLEMENTATION OF SECURITY FEATURES
This trend toward a broader range of security coverage is a
positive change. However, it may also lead to implementation
challenges such as complex integration, management and
control of multi-vendor solutions. This greatly compromises
IT’s ability to tackle threats since it lacks a cohesive integration
of security products. As a result, enterprises cannot effectively
close the gaps between these “islands” of security solutions.
In fact, ITDMs indicate a huge desire for an enterprise-wide
security architecture that combines cybersecurity with
access while enabling segmentation across wired and
wireless networks. It is counterproductive to deploy a
fragmented wireless security solution that cannot share
information with the rest of the network or monitor just one
segment of the infrastructure. In addition, dealing with multiple
management interfaces is time-consuming and makes for
problematic troubleshooting.
FIGURE 5: SECURE ACCESS ARCHITECTURE : FEATURES AND FUNCTIONALITY
The Internet of Things Is Here in a Big Way
The IoT has become mission critical in enterprise organizations
for most every vertical market. Globally, more than half
of ITDMs indicated they have deployed business-critical
IoT applications. More striking is in North America, where
76% of the respondents said they are using IoT equipment
for innovative applications. Smart sensors are becoming
ubiquitous. In healthcare, they may save lives. In manufacturing,
they can improve quality and lower cost. In process control, IoT
equipment and applications increase safety and enable
real-time monitoring. We find many IoT applications in “smart”
cities and transportation systems of all types.
IoT devices present big security challenges. Typically appliances
and sensors are used for data collection and transfer. Most of
these devices are unsecured and unable to support common
client-based security solutions. As a result, almost one-half
of IT decision-makers are worried about the challenges of
securing IoT devices. In North America, where we see the most
enterprise IoT deployments, 56% of the respondents are “very”
and 39% are “somewhat” concerned. Not surprisingly, 80%
of ITDMs are now including IoT as a major component of their
overall security strategy.
FIGURE 6: LEVEL OF CONCERN OVER INTERNET OF THINGS SECURITY
SURVEY REPORT: WIRELESS SECURITY SURVEY 2016
The Migration to Cloud-Managed WLAN Continues
In general, IT executives are becoming more comfortable
with cloud-managed service models. Over one-half of the
respondents prefer cloud-based solutions over on-premise
wireless LAN management and control. There are a number
of reasons that distributed enterprises, in particular, are
implementing cloud-managed Wi-Fi. Gravitation from CAPEX- to
OPEX-based models is a major driver. With cloud-managed Wi-
Fi, scaling the network involves just the cost of additional access
points and subscription fees. For deployment in branch offices,
where on-site expertise is limited, it saves time and resources.
Centralized management and control without regard to location
assures network reliability and uptime.
However, security concerns may hold back customers from
migrating to cloud-managed Wi-Fi. In some ways, cloud WLAN
security requirements are greater than on-premise systems, yet
can be even more secure than equivalent on-premise solutions.
FIGURE 7: WIRELESS NETWORK MANAGING
Fortinet Secure Access Architecture
With these trends and challenges, the deployment and
management of enterprise networks, applications and devices
must be simplified. Even with a broad range of security
measures in place, IT managers may be uncertain about optimal
configurations. Multi-vendor deployments are difficult to set up,
integrate and manage.
With our Secure Access Architecture, Fortinet leads the way in
solving these challenges by providing customers the integrated
security solution they need and want. SAA was developed
to deliver scalable, end-to-end security across the wired and
wireless access layer to guard against data breaches and
cybersecurity threats.
FIGURE 8: SECURE ACCESS ARCHITECTURE
Fortinet Security Fabric is the most comprehensive and flexible architecture
covering all deployment options and network segmentations. SAA addresses
the challenges and concerns of IT for securing their wireless infrastructure,
giving peace of mind that your network is secure, stable, and reliable.
i
The Fortinet Wireless Security Survey was a research exercise undertaken in March 2016 by the market research company Lightspeed GMI. The survey was conducted online
among 1,300 qualified IT decision-makers—predominantly CIOs, CTOs, IT Directors and Heads of IT—in Enterprise organizations around the globe. Eleven countries were included
in the survey: Australia, Canada, France, Germany, Hong Kong, Italy, Japan, Singapore, Spain, the UK and USA.
Copyright © 2016 Fortinet, Inc. All rights reserved. Fortinet®
, FortiGate®
, FortiCare®
and FortiGuard®
, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law
trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other
results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied,
except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in
such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal
lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most
current version of the publication shall be applicable.
GLOBAL HEADQUARTERS
Fortinet Inc.
899 Kifer Road
Sunnyvale, CA 94086
United States
Tel: +1.408.235.7700
www.fortinet.com/sales
EMEA SALES OFFICE
905 rue Albert Einstein
Valbonne
06560, Alpes-Maritimes,
France
Tel +33 4 8987 0500
APAC SALES OFFICE
300 Beach Road 20-01
The Concourse
Singapore 199555
Tel: +65.6513.3730
LATIN AMERICA SALES OFFICE
Paseo de la Reforma 412 piso 16
Col. Juarez
C.P. 06600
México D.F.
Tel: 011-52-(55) 5524-8428
May 2, 2016

More Related Content

PDF
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
PDF
Is Your Network Ready for the Age of IoT?
PDF
IT Security Trends in 2012
PDF
Safeguarding the Internet of Things
PDF
Wireless Vulnerability Management: What It Means for Your Enterprise
PDF
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
PDF
Mobile Vision 2020
PDF
ICS_WhitePaper_Darktrace
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
Is Your Network Ready for the Age of IoT?
IT Security Trends in 2012
Safeguarding the Internet of Things
Wireless Vulnerability Management: What It Means for Your Enterprise
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Mobile Vision 2020
ICS_WhitePaper_Darktrace

What's hot (20)

PDF
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
PDF
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
PPTX
SC Magazine & ForeScout Survey Results
PDF
CIO Review - Top 20 CyberSecurity
PDF
Cybersecurity in the Age of Mobility
PPT
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
PDF
Safeguarding the Enterprise
PPTX
CompTIA International Trends in Cybersecurity
PDF
State of the OpenCloud Report 2020
PDF
IoT in industry
PPTX
Cybersecurity in the Era of IoT
PDF
The Secure Path to Value in the Cloud by Denny Heaberlin
PPTX
Top 2016 Mobile Security Threats and your Employees
PDF
CABA Whitepaper - Cybersecurity in Smart Buildings
PDF
Best practices for mobile enterprise security and the importance of endpoint ...
PDF
Cisco Award Write Up
PDF
The Evolution of and Need for Secure Network Access
PDF
Insights success the 10 most trusted networking solution provider companies 2...
PDF
IBM InterConnect 2013 Security Keynote
PPTX
Securing the Digital Economy: Reinventing the Internet
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
SC Magazine & ForeScout Survey Results
CIO Review - Top 20 CyberSecurity
Cybersecurity in the Age of Mobility
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Safeguarding the Enterprise
CompTIA International Trends in Cybersecurity
State of the OpenCloud Report 2020
IoT in industry
Cybersecurity in the Era of IoT
The Secure Path to Value in the Cloud by Denny Heaberlin
Top 2016 Mobile Security Threats and your Employees
CABA Whitepaper - Cybersecurity in Smart Buildings
Best practices for mobile enterprise security and the importance of endpoint ...
Cisco Award Write Up
The Evolution of and Need for Secure Network Access
Insights success the 10 most trusted networking solution provider companies 2...
IBM InterConnect 2013 Security Keynote
Securing the Digital Economy: Reinventing the Internet
Ad

Similar to Wireless survey-report-saa-2016 (20)

PDF
Wireless security trends
PDF
Solution Guide Secure Access Architecture
PPTX
Secure Access Architecture
PPTX
160415 lan and-wan-secure-access-architecture
PDF
How Secure are you Around “IoT”_.pdf
PPTX
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
PDF
Wireless Security on Context (disponible en español)
PDF
Security Industry Overview
PPTX
Network Security of Data Protection
PDF
Cyber Security in Manufacturing
PDF
Io t security defense in depth charles li v1 20180425c
PPTX
Fortinet
PPTX
2016 Network Security Outlook
PDF
Io t business-index-2020-securing-iot
PDF
Security Threats Predictions in 2015 – Netmagic
PDF
IT Security Trends 2013
PDF
A Guide to 802.11 WiFi Security by US-CERT
PDF
Wireless Security Architecture Designing and Maintaining Secure Wireless for ...
PDF
Csa summit la transformación digital y el nuevo rol del ciso
PDF
Y20151003 IoT 資訊安全_趨勢科技分享
Wireless security trends
Solution Guide Secure Access Architecture
Secure Access Architecture
160415 lan and-wan-secure-access-architecture
How Secure are you Around “IoT”_.pdf
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Wireless Security on Context (disponible en español)
Security Industry Overview
Network Security of Data Protection
Cyber Security in Manufacturing
Io t security defense in depth charles li v1 20180425c
Fortinet
2016 Network Security Outlook
Io t business-index-2020-securing-iot
Security Threats Predictions in 2015 – Netmagic
IT Security Trends 2013
A Guide to 802.11 WiFi Security by US-CERT
Wireless Security Architecture Designing and Maintaining Secure Wireless for ...
Csa summit la transformación digital y el nuevo rol del ciso
Y20151003 IoT 資訊安全_趨勢科技分享
Ad

Recently uploaded (20)

PPT
Geologic Time for studying geology for geologist
PDF
STKI Israel Market Study 2025 version august
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
August Patch Tuesday
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Modernising the Digital Integration Hub
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
DOCX
search engine optimization ppt fir known well about this
PPT
What is a Computer? Input Devices /output devices
PPTX
observCloud-Native Containerability and monitoring.pptx
Geologic Time for studying geology for geologist
STKI Israel Market Study 2025 version august
Zenith AI: Advanced Artificial Intelligence
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
Univ-Connecticut-ChatGPT-Presentaion.pdf
August Patch Tuesday
DP Operators-handbook-extract for the Mautical Institute
Final SEM Unit 1 for mit wpu at pune .pptx
sustainability-14-14877-v2.pddhzftheheeeee
Module 1.ppt Iot fundamentals and Architecture
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Modernising the Digital Integration Hub
Hindi spoken digit analysis for native and non-native speakers
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
A novel scalable deep ensemble learning framework for big data classification...
search engine optimization ppt fir known well about this
What is a Computer? Input Devices /output devices
observCloud-Native Containerability and monitoring.pptx

Wireless survey-report-saa-2016

  • 1. REPORT www.fortinet.com 1 Wireless Security Trends: State of the Market Enterprise-wide security is an integral part of any IT strategy and implementation. Growing threats to data center and network infrastructures, communications and applications require end-to-end security for maximum protection. This survey report provides an overview of the key security challenges faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem. Key Findings Wireless LAN Vulnerability Remains Top of Mind The threat landscape is evolving. With the dynamics of an unrelenting increase in number and type of networked devices, IT decision-makers believe their WLANs are exposed. Despite implementation of a broad range of security measures, wireless LAN infrastructure and access are considered to be at the greatest risk to security breaches. Enterprise IoT Applications Are Mission Critical From the factory floor to the hospital recovery room, networked Internet of Things (IoT) devices range from industrial robotics to advanced medical sensors. They are being deployed in huge numbers for a wide range of innovative and game-changing applications. These new types of wireless devices can generate massive amounts of critical data and network traffic on a daily basis. This creates a new set of security challenges for IT managers. Adoption of Cloud-Managed Wi-Fi Continues to Grow Especially in distributed enterprises, the migration from on-premise to cloud-managed WLANs is gaining momentum. Cloud Wi-Fi provides simplified deployment, management, visibility and control. It also brings the need for a different approach to WLAN security: requiring access points to run a broad set of protection measures in real time. Wireless Security Survey 2016 The Need for Integrated Security Enterprise organizations want a secure architecture that provides flexible end-to-end protection across their entire IT environment. With high-profile attacks on major organizations, cybersecurity and the protection of critical company and customer data are top concerns. Most survey respondents—79%— expect an integrated architecture to address the challenges of cybersecurity while also enabling secure network access. Not surprisingly, the large majority of enterprises surveyed have implemented some form of firewall, authentication and antivirus. In a significant change from last year, there is notable growth in the implementation of intrusion protection and application awareness/control worldwide. While enterprises do believe they need an end-to-end security infrastructure, they may find that deploying an integrated solution is difficult to configure, deploy and manage. Many security holes are the result of incorrect setup; often a result of products with different management and control systems.
  • 2. SURVEY REPORT: WIRELESS SECURITY SURVEY 2016 www.fortinet.com 2 This global survey looks at the state of the market for WLAN security among enterprises across a broad range of industries. All respondents were sourced from the independent market research company Lightspeed GMI online paneli and were customers of all the major WLAN equipment vendors. Respondent Profiles The findings of this report come from an independent survey of 1,300 IT decision-makers (ITDMs) in 11 countries. It is the second of our annual security surveys representing the input of enterprise organizations. The report comprises a broad spectrum of industries including manufacturing, telecommunications, financial services, education, public sector and more. FIGURE 1: STRUCTURE OF THE SAMPLE Ongoing Worries Over Wireless Security Enterprise IT decision-makers continue to have concerns with their wireless LAN security. There is little change from last year’s survey, with 45% of the 2016 study respondents stating the loss of company and customer data to be the top risk. Industrial espionage remains second on the list with 24% of ITDMs stating this is their top risk. These enterprises may already be experiencing breaches and they are taking more action to remedy security gaps across their IT infrastructure. People have come to expect pervasive Wi-Fi access for personal and professional devices, making BYOD seem like a well-accepted business practice. However, there is a significant regional difference in regards to BYOD support and its related IT access control. Worldwide, only 56% of ITDMs indicated that BYOD is allowed in their organizations. However, in North America 67% allow BYOD access, and 72% of respondents expect IT to have complete control of all employee devices. FIGURE 2: BIGGEST RISK FIGURE 3: LEVEL OF SECURITY VULNERABILITY Compare this to EMEA, where only 46% allow BYOD and 63% expect IT to have complete control. This reflects a significant lack of confidence in IT’s ability to securely control access, especially among European and Asian respondents, where only 41% believe they have very secure access in place.
  • 3. SURVEY REPORT: WIRELESS SECURITY SURVEY 2016 www.fortinet.com 3 Enterprises Are Increasing Wireless Security Measures In face of these risks, enterprise organizations are increasing their deployment of security solutions across the enterprise. They consider their WLANs to be most vulnerable and are investing in broader security architectures. Compared to last year, the 2016 study shows a more balanced mix of security methods. Interestingly, the implementation of intrusion protection systems grew 45% year over year, while application awareness and control deployments grew a whopping 60%. Function 2015 2016 % Growth Firewall 71% 84% 18% Authentication 63% 77% 21% Antivirus 61% 72% 17% IPS 41% 60% 45% App Awareness/Control 37% 59% 60% FIGURE 4: IMPLEMENTATION OF SECURITY FEATURES This trend toward a broader range of security coverage is a positive change. However, it may also lead to implementation challenges such as complex integration, management and control of multi-vendor solutions. This greatly compromises IT’s ability to tackle threats since it lacks a cohesive integration of security products. As a result, enterprises cannot effectively close the gaps between these “islands” of security solutions. In fact, ITDMs indicate a huge desire for an enterprise-wide security architecture that combines cybersecurity with access while enabling segmentation across wired and wireless networks. It is counterproductive to deploy a fragmented wireless security solution that cannot share information with the rest of the network or monitor just one segment of the infrastructure. In addition, dealing with multiple management interfaces is time-consuming and makes for problematic troubleshooting. FIGURE 5: SECURE ACCESS ARCHITECTURE : FEATURES AND FUNCTIONALITY The Internet of Things Is Here in a Big Way The IoT has become mission critical in enterprise organizations for most every vertical market. Globally, more than half of ITDMs indicated they have deployed business-critical IoT applications. More striking is in North America, where 76% of the respondents said they are using IoT equipment for innovative applications. Smart sensors are becoming ubiquitous. In healthcare, they may save lives. In manufacturing, they can improve quality and lower cost. In process control, IoT equipment and applications increase safety and enable real-time monitoring. We find many IoT applications in “smart” cities and transportation systems of all types. IoT devices present big security challenges. Typically appliances and sensors are used for data collection and transfer. Most of these devices are unsecured and unable to support common client-based security solutions. As a result, almost one-half of IT decision-makers are worried about the challenges of securing IoT devices. In North America, where we see the most enterprise IoT deployments, 56% of the respondents are “very” and 39% are “somewhat” concerned. Not surprisingly, 80% of ITDMs are now including IoT as a major component of their overall security strategy. FIGURE 6: LEVEL OF CONCERN OVER INTERNET OF THINGS SECURITY
  • 4. SURVEY REPORT: WIRELESS SECURITY SURVEY 2016 The Migration to Cloud-Managed WLAN Continues In general, IT executives are becoming more comfortable with cloud-managed service models. Over one-half of the respondents prefer cloud-based solutions over on-premise wireless LAN management and control. There are a number of reasons that distributed enterprises, in particular, are implementing cloud-managed Wi-Fi. Gravitation from CAPEX- to OPEX-based models is a major driver. With cloud-managed Wi- Fi, scaling the network involves just the cost of additional access points and subscription fees. For deployment in branch offices, where on-site expertise is limited, it saves time and resources. Centralized management and control without regard to location assures network reliability and uptime. However, security concerns may hold back customers from migrating to cloud-managed Wi-Fi. In some ways, cloud WLAN security requirements are greater than on-premise systems, yet can be even more secure than equivalent on-premise solutions. FIGURE 7: WIRELESS NETWORK MANAGING Fortinet Secure Access Architecture With these trends and challenges, the deployment and management of enterprise networks, applications and devices must be simplified. Even with a broad range of security measures in place, IT managers may be uncertain about optimal configurations. Multi-vendor deployments are difficult to set up, integrate and manage. With our Secure Access Architecture, Fortinet leads the way in solving these challenges by providing customers the integrated security solution they need and want. SAA was developed to deliver scalable, end-to-end security across the wired and wireless access layer to guard against data breaches and cybersecurity threats. FIGURE 8: SECURE ACCESS ARCHITECTURE Fortinet Security Fabric is the most comprehensive and flexible architecture covering all deployment options and network segmentations. SAA addresses the challenges and concerns of IT for securing their wireless infrastructure, giving peace of mind that your network is secure, stable, and reliable. i The Fortinet Wireless Security Survey was a research exercise undertaken in March 2016 by the market research company Lightspeed GMI. The survey was conducted online among 1,300 qualified IT decision-makers—predominantly CIOs, CTOs, IT Directors and Heads of IT—in Enterprise organizations around the globe. Eleven countries were included in the survey: Australia, Canada, France, Germany, Hong Kong, Italy, Japan, Singapore, Spain, the UK and USA. Copyright © 2016 Fortinet, Inc. All rights reserved. Fortinet® , FortiGate® , FortiCare® and FortiGuard® , and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. GLOBAL HEADQUARTERS Fortinet Inc. 899 Kifer Road Sunnyvale, CA 94086 United States Tel: +1.408.235.7700 www.fortinet.com/sales EMEA SALES OFFICE 905 rue Albert Einstein Valbonne 06560, Alpes-Maritimes, France Tel +33 4 8987 0500 APAC SALES OFFICE 300 Beach Road 20-01 The Concourse Singapore 199555 Tel: +65.6513.3730 LATIN AMERICA SALES OFFICE Paseo de la Reforma 412 piso 16 Col. Juarez C.P. 06600 México D.F. Tel: 011-52-(55) 5524-8428 May 2, 2016