FortiAI Partner Technical Enablement
FortiAI Partner Technical Enablement
FortiAI Partner Technical Enablement
01 02
FortiAI Evolution of Malware
Product Vision
03 04
FortiAI introduction Virtual Security AnalystTM
Capabilities
05 06
How FortiAI works Demo
Breach Reduced
Investigation Detection Time
Use ML/AI to mimic some Reduce detection time from
intense human functions minutes to sub-second verdict
• Incident analysis
• On average 3-5 years
experience with 1 week+
to trace source of attack
• Outbreak Search
• Malware Analyst
Secure WLAN/LAN
Identity Network Incident Response
SASE/SWG
5B 5B+
4.7B
Significant
Threat
Incidents Sasser VPNFilter
Melissa Code Red Slammer Zeus Conficker Stuxnet Cryptolocker Wannacry COVID-19
Timeline 1990–1999 2000–2001 2002–2003 2004–2005 2006–2007 2008–2009 2010–2011 2012–2014 2015–2017 2018–2019 2020+
© Fortinet Inc. All Rights Reserved. *many undisclosed | Record Stolen Reference—Breach Level Index | Ransomware stats—Statista 6
An overview of
Malware Evolution
History of Artificial Intelligence
Nearing a Century of AI
Turing, Kleene AI research The First AI applied to data Deep learning IBM Watson Fortinet Fortinet
and Church formally founded AI Winter mining, medical is achieved using application for AutoCPRL – using introduce AI in
propose machine as a discipline at Difficulty resulted diagnosis with faster computing, management ML for malware Web application
learning solution Dartmouth in funding cuts in increased CPU large data decisions of lung detection i.e. Security
College US and Britain power structures cancer treatment machine
generated CRPL
Fortinet
acquires Zonefox
Fortinet started
product research
McCullouch and IBM Deep Blue in AI technology, Elon Musk calls Fortinet
Pitts create formal AI research Proliferation of beats Grand first iteration of for the regulation FortiAI Ready to
design of Turing’s heavily funded by Expert Systems Master Kasparov machine learning 2,700+ AI projects of AI before we hit launch as a
‘artificial neurons’ the U. S. military Lisp vs. PC in chess in Cybersecurity in place at Google 100 years product
Use of AI in CyberSecurity
Gen
Intelligence
cannot solve today.” • Machine Learning
M. Xie, CTO Fortinet • Virtual Security Analyst TM
ATP
2 • Sub-second Verdict
nd
Gen
Toolkit
• Malware evolves
• Time to detect – minutes
Signature
1
st
• Automated malware analysis
Gen
Based
• Detection Delay
• Intense Compute
• Static Analysis
Evolution
Inspect core of apple… Let me take a bite… Let me describe it - Let me place
rotten, smells... more apples…
Um, it’s bad. Um, it’s bad.
Um, it’s bad. …with traps.
© Fortinet Inc. All Rights Reserved. * Measured by Breaking Point malware strike pack 13
FortiAI Key Benefits
Skillset Required
• Malware research experience
• Breach investigation analysis
Consider
• Cost of a Breach, Reputation
Damage
• Offload current SA / Human Errors
• Human + AI analyst
* Based on https://www.salary.com/research/salary/benchmark/information-security-analyst-ii-salary
HQ FortiGate
(Inline Blocking)
Infected
Source
Worms /
Integrated / Encrypted submissions Lateral
Movement
Attack Scenario
How malware was spread
through the network
Scenario Finding “Patient Zero”
based engine linking infections by time
Sub-second verdict
Ability to quarantine with FortiGates
SMB
Patient Zero Worm Spread
Outbreak FortiAI
Search Similarity Engine
CIO FAI VSATM
Variant 1 Hash DEF
WannaCry
Variant 2 Hash GHI
Hash ABC
Variant…N Hash JKL
Q: Are we infected A: Let me search!
by this headline
malware? e.g.
Similarity
WannaCry Engine
FortiAI –
PRE-trained
On-Prem
(6mil+ features)
Detection! learning Features
(feedback)
Time
Neural Networks
• Features DB
• 6mil+ Features
• GPU/hardware accelerated
FortiGuard Updates
• ANN update
• Keep up with latest threats
Further learning
• On Customer Premises
Feature
Breakdown
Malware
Classification &
Description
Investigator View
Worm Spreading
Scenario
STIXv2 / JSON
Output
VSATM Manual
Filter on File/Malware
types
Threat Investigation
Source of Fabric
Device or Sniffer
Specify which
FortiGate VDOM to
target
FWB
FGT
FSA FAI (reduce FSA load, FSA FAI (reduce FSA load,
increase coverage)
© Fortinet Inc. All Rights Reserved. increase coverage)
41
V1
.5
FortiAI - AI-driven Security Operations .1
Figure – FSA FortiAI system settings * FSA device only appears after file is submitted