Interactive Program Guide

Filtered by:

Clear All
1 2 3 4 5  ... 
6000F Series: Evolution of the NGFW Appliance for Hyper-Connected Enterprise
  • by Wei Ling Neo, Fortinet and Rajoo Nagar, Fortinet 
Time Slot: 01:30 PM Tue 02/27/18

View Abstract

New cyber threat realities combined with the blazing speed of technological advances in today’s hyper-connected environments is driving architectural innovation in next-generation firewalls to deliver the highest levels of security while handling the digital network requirements. When it comes to security vs efficiency why choose? Fortinet is at the forefront of NGFW innovation, raising the bar for network security. Join us to learn more about the new FortiGate 6000F capabilities and architecture and how this changes the game especially for modern data centers and large enterprise environments where requirements for speed, security efficacy, and ease of management are paramount for these complex environments. We also take a sneak peek into the largest FortiGate chassis the FG-7120F. In the last year, total data traffic in mobile networks has increased by 65% and operators are increasingly deploying networks to support higher throughputs. The FortiGate FG-7120F is uniquely suited for these demands, providing both interface density and unparalleled NGFW performance. The FG-7120F also extends functionality to include GPRS Tunneling Protocol (GTP) inspection at the highest levels of performance.

Addressing the BROAD Digital Attack Surface with Security Fabric using FortiOS and FortiManager 6.0
  • by Ling Lu, Fortinet, Robert May, Fortinet and Jordan Thompson, Fortinet 
Time Slot: 01:30 PM Tue 02/27/18

View Abstract

Today's Enterprises need to leverage SaaS services, IaaS efficiencies and endpoint apps and devices to be most competitive. This constantly evolving attack surface needs a security fabric that seamlessly grows & adapts with it. The new security fabric expands from a single Enterprise location, to now cover cloud segments, remote sites and all users connecting into the fabric environment. Topics covered in this session will include integrations between the fabric and Public and Private cloud locations, remote sites (SD-WAN), SDN Connectors, Dynamic Policies, integrated UEBA tracking and central management.

Combatting the Latest Ransomware and Other Cyber Threats with the Fortinet Security Fabric
  • by David Finger, Fortinet and Hari Bandi, Fortinet 
Time Slot: 01:30 PM Tue 02/27/18

View Abstract

In 2017, new cyberattacks like Wannacry burst onto the scene at the same time that existing ones such as Locky continued to evolve, demonstrating yet again the challenge a mature and constantly evolving threat landscape poses to organizations. In this session, we will discuss how the Fortinet Security Fabric generates and distributes dynamic threat intelligence--related to the very latest and most advanced threats--for integrated detection and response across the breadth of the organization. Join us to learn about Fortinet’s vision, key solution components, and most common customer use cases. This session provides the foundation for follow-on sessions covering the very latest in securing your email traffic, web applications, endpoints, and more.

Day 1: Offense and Defense: Playing Both Sides
  • by Anthony Giandomenico, Fortinet, Aamir Lakhani, Fortinet and Oladipupo (Ladi) Adefala, Fortinet 
Time Slot: 01:30 PM Tue 02/27/18

View Abstract

Successful attacks continue on many organizations despite the continued investments in the latest technologies. To successfully defend our cyber assets whether from a Nation State Actor or an Organized Criminal companies need to understand both their adversary’s tradecraft as well as how to analyze and respond to their cyber weapons. Can the battle be won? Day 1 will consist of common attack tools and techniques used by attackers to identify your attack surface, breach your network, increase foothold and remain invisible. Day 2 will center around building threat intelligence and analysis capabilities within your organization which will include basic malware analysis, system forensics and threat information sharing concepts. To help ensure participants gain as much as possible from this workshop it is highly recommended that they have experience in the following areas: - General understanding of Networking - Understanding of Windows and Linux - Basic Understanding of security principals Note: This is a very intensive workshop containing a lot of material and hands-on labs in a two-day span, so please be ready to “drink from the firehose”! 1: Attendees must be prepared with their laptops with VMWare Fusion or VMWare workstation to participate in the course. Attendees are required to have basic knowledge of VMWare and how to set up guest operating systems 2: The workshop requires attendees to participate in technical labs. The majority of this class will consist of technical labs 3: The attendees should not use work laptops since the workshop will contain live labs and may require the students to reinstall software. 4: Attendees agree to the outlines or accept the risks associated with not following them.

Extend Your Security Fabric for Multi-Cloud Security
  • by Warren Wu, Fortinet and Jun Kato, Fortinet 
Time Slot: 01:30 PM Tue 02/27/18

View Abstract

Enterprise data centers that have been rapidly adopting both private and public cloud infrastructure to transform their data centers are increasingly not just hybrid cloud, but multi-cloud as well. By using multiple IaaS providers (including AWS, Azure, Google, Oracle and IBM) as appropriate for different workloads, as well as leveraging SaaS-based cloud applications, organizations face a more complex and expanded attack surface. Thus security, privacy, and compliance remain top enterprise concerns when migrating to the cloud. This session will cover: -Market trends and drivers around cloud computing and cloud adoption -Cloud use cases and requirements for elastic scaling, micro-segmentation, and end-to-end segmentation -Fortinet solutions for private cloud, public cloud, and SaaS -Integration with third-party Fabric-Ready orchestration and automation solutions

Going Beyond SMB: How S and M are Very Different When it Comes to Security
  • by Peter Newton, Fortinet 
Time Slot: 01:30 PM Tue 02/27/18

View Abstract

The networks of small and mid-sized organizations are frequently lumped into a single SMB descriptor, regardless of their differences. However, the security discussion for a company of 50 is and should be very different than for a company of 500. In this session, we will discuss the differences in needs and capabilities for small and mid-sized organizations, as well as recent technology trends affecting them. We will include a variety of topics, including cloud, sandbox, and automation as it relates to S and MB. The Fortinet Security Fabric scales from small to Enterprise and offers different solutions to meet the distinct needs of these different organizations.

Introduction to Best-in-Class Profitability, Partner Predominant Business Models© and Operational Maturity Levels©
  • by Steve Lewis, Service Leadership, Inc. 
Time Slot: 01:30 PM Tue 02/27/18

View Abstract

Join Steve Lewis, Senior Client Advisor at Service Leadership, Inc., the solution provider industry’s leading profitability benchmarking and consulting firm, for this compelling and actionable look at how your business model and Operational Maturity Level determine your profit potential and your ability to realize that profit. Audience members will come away with the ability to look at the economic drivers of their Predominant Business Model the same way the top performers do and to score five key operational methods using Service Leadership’s proven Operational Maturity Level approach.

Next Generation Web Application Security: Extending Fortinet Security Fabric Protection to Web Applications with FortiWeb and FortiADC
  • by Mark Byers, Fortinet, Idan Soen, Fortinet and Erez Yashar, Fortinet 
Time Slot: 01:30 PM Tue 02/27/18

View Abstract

Web application vulnerabilities remain a top point of entry that attackers use to compromise an organization’s IT infrastructure and the sensitive data it contains. The list of breaches directly attributed to these vulnerabilities grows every year, including the high-profile 2017 Equifax attack. Gartner highly recommends a Web Application Firewall (WAF) to protect organizations from threats that target known and unknown exploits. In this session, we’ll first dive into the basics of Fortinet’s Fabric-integrated FortiWeb web application firewall and FortiADC application delivery controller to see how they’re used to defend against application layer attacks and deliver content securely. We’ll then move on to reveal and demo FortiWeb’s next generation, a sophisticated new feature that provides zero-day attack protection out-of-the-box, that virtually eliminates false positive detections.

NSE Technical Training: Centralized Management with FortiManager
  • by Chris Nguyen, Fortinet and Garrick Chang, Fortinet 
Time Slot: 01:30 PM Tue 02/27/18

View Abstract

As networks continue to evolve, organizations struggle to keep ahead. Too many solutions with varying management tools strain already overworked security teams. FortiManager provides a single-pane-of-glass for visibility across the entire Fortinet Security Fabric. FortiManager also lets you maintain control over your FortiGate, FortiSwitch, and FortiAP topologies through an easy-to-use and centralized management console. Learn how to easily control the deployment of security policies, FortiGuard content security updates, firmware revisions, and individual configurations for thousands of FortiOS-enabled devices.

NSE Technical Training: Detecting Zero-Day Threats with FortiSandbox
  • by Ahsan Ali, Fortinet, Joe Yu, Fortinet and John Burroughs, Fortinet 
Time Slot: 01:30 PM Tue 02/27/18

View Abstract

With a dynamic attack surface due to the rise of IoT and cloud services, it's clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how FortiMail, FortiClient, and FortiSandbox work together to protect your critical IT assets.

1 2 3 4 5  ...