You are here


Upcoming Webinars

Top 5 Ways to Improve Protection from Advanced Threats
Tuesday, July 29, 2014 - 8:00am to 9:00am

In a recent IDG Research Survey, enterprise executives cited both the sophisticated threat environment and consolidation of security functions as top drivers for next generation firewall (NGFW) deployments. Among other things, this webcast will discuss the top 5 ways organizations can improve their security posture in light of advanced threats. And we’ll share the 5 times faster next generation...
Essential Security Trends, Predictions and Recommendations from Fortinet’s FortiGuard Labs
Thursday, August 14, 2014 - 8:00am to 9:00am

With a continued stream of high profile data breaches as a result of Cyber attacks throughout the first half of 2014, Fortinet’s midyear threat report from FortiGuard Labs shines a light on the latest trends that enterprise security professionals need to know.

Recorded Webinars

Top 5 Ways FortiGuard Labs and the New FortiOS 5.2 Help Combat APTs
With breaches related to advanced malware routinely making the headlines, enterprises are looking at increasing security protections to reduce the risk of it happening to them.
On Demand
SDN & Security for Next-Generation Data Centers
In this webinar, experts from Gartner and Fortinet discuss the rise of software-defined networking (SDN) and its impact on the data center and network security.
On Demand
Top 5 Requirements for Today’s NGFW
Peer Perspective: Top Drivers, Requirements and Selection Criteria for NGFWs
On Demand
Frost & Sullivan Discuss Social Media Risks and How to Mitigate Them
Chris Rodriguez, Senior Industry Analyst at Frost & Sullivan and Matt De Vincentis, Product Marketing Manager at Fortinet discuss the risks of social media in the workplace. View the webinar to learn the top 5 ways to mitigate social media risks using Fortinet’s consolidated security technology.
On Demand
How to Build a High-performance, Secure Application Delivery Network
In this webinar you’ll learn why you need to start with security first in building your Application Delivery Network (ADN) to ensure your applications are not only available to your users, but are also safe from the latest application threats
On Demand
Top Strategies for Ensuring Network Privacy in the Cloud
Challenges with visibility, protection and compliance can arise as Network traffic becomes abstracted and the Data Center becomes agile and dynamic. In the first of a continuing series on Cloud Security, this webcast explores Network Firewall and Segmentation Strategies for Virtual and Cloud environments
On Demand
NSS Labs Discusses Breach Detection Systems Test Results
Join Mike Spanbauer, Managing Director of Research, NSS Labs, and David Finger, Director of Product Marketing at Fortinet and learn why independent testing is essential, how NSS Labs went about establishing a real-world test methodology, how the actual testing is conducted, what NSS Labs observed, and their final results/guidance and how Fortinet’s FortiSandbox performed in the NSS Labs testing and why.
On Demand
High Performance Wireless with High Performance Security – 802.11ac
Join us for this webcast as we explore the new IEEE 802.11ac Gigabit WiFi protocol.
On Demand
Fortinet’s Advanced Threat Protection Framework: A Cohesive Lifecycle Approach
“Sandboxes” or “breach detection systems”- virtual environments to analyze code for attacks that may have slipped through established defenses- are all the rage.
On Demand
How Application Visibility Can Impact Your Enterprise
Understanding the types of application traffic that traverse your network is critical to formulating effective security and corporate acceptable use policies. Learn how FortiAnalyzer can augment your enterprise NGFW deployment by visualizing the utilization of traditional and HTTP-based applications.
On Demand
The Need for a Secure Wireless LAN in Education
Join Neil Sundstrom, VP Wireless Solutions and Jim Brausen, Director Education, as they explore how Fortinet’s Secure Wireless LAN solution can support your BYOD and mobility needs.
On Demand
Beyond the Hype. Real-world Testing of APT Solutions
Since the release of its first Beach Detection Systems comparative group test- with its surprising recommendations, cautions and “no-shows”- there has been quite a bit of self-promotion and consternation from the vendor community..
On Demand
PCI, Segmentation, and Data Breaches
Data segmentation is an essential part of achieving PCI Compliance, yet many distributed enterprise networks fail to perform even basic isolation of regulated data and systems.
On Demand
Is Your Data Center Ready for Today’s DDoS Threats?
In this webinar from Fortinet you’ll learn the basics of a DDoS Attack, methods to mitigate them, and why a hardware-based DDoS Attack Mitigation Appliance is the best option for protecting your Data Center from the latest DDoS threats.
On Demand
Extending Your NGFW with SSL Inspection
In this webcast, one of three, we will explore the first requirement - SSL inspection. Specifically, why Gartner believes security leaders must address threats from rising SSL traffic, the people, process and technology issues involved and exactly how Fortinet helps enterprises tackle this challenge.
On Demand
Connected UTM: Optimizing Your SMB Network
This complexity is from adding stand-alone technologies over time to meet new threats or satisfy new business requirements. We'll be discussing how Fortinet¹s Connected UTM solution allows you to consolidate and simplify your network while increasing protection and performance.
On Demand
Stopping Advanced Targeted Attacks: Do I really need a whole new security infrastructure and staff?
Many breach reports - Verizon in the U.S., PwC for the UK government, Ponemon for Japan – echo similar advisements that “organizations of all sizes are being successfully penetrated and indeed compromised for months at a time.
On Demand
The Target Data Breach: What We Can All Learn From It?
There is rarely a crystal clear picture, nor a set of practices guaranteed to stop data breach like Target and other ones. But there are always lessons to be learned and decisions to be made about managing risk vs. cost.
On Demand
Connected UTM – Integrated Network Security and Access Webcast
Watch this webcast and learn how to protect against Advanced Threats even with scarce IT resources, while reducing the complexity and cost of your legacy security systems.
On Demand
Fast, Secure, Cost-Effective: How to Protect Tomorrow's Data Center Network
Stan Gibson, Sr Managing Editor and Patrick Bedwell, VP of Product Marketing at Fortinet, discuss the challenges organizations face in trying to protect their data centers in the face of ever-increasing network speeds and a more sophisticated threat landscape.
On Demand
What are Enterprises Really Doing With NGFW?
Join us as we explore customer deployments- business driver, key requirements, solutions considered/selected and what’s next.
On Demand
Extend your FortiGate to Address APTs
FortiSandbox is an Advanced Threat Protection Appliance designed to identify and help customers thwart the highly targeted and tailored attacks that increasingly bypass traditional defenses and lurk within networks. Offering a unique dual-level Sandbox, inspection of all protocols in one appliance and optional integration with your existing FortiGate infrastructure, FortiSandbox delivers highly effective protection against this emerging class of threats that is affordable to buy and simple to deploy and manage.
On Demand
Top 5 New Innovations and Best Practices in UTM
Top 5 New Innovations and Best Practices in UTM - looks at the latest engineering and threat research as well as the current technology advancements that ensure your company’s defenses keep your business-critical networks, applications and data safe.
On Demand
Security Threat Predictions: What You Can Expect In 2013
FortiGuard Labs, one of the leading cyber-security research organizations in the world, has released a list of the top 6 threat predictions for 2013.
On Demand
Measuring Security ROI
Understanding the IANS Approach to Measuring Security ROI
On Demand
Securing the Mid Enterprise
Your organization faces the same security threats and IT challenges as larger organizations, but you often lack the resources to stay abreast of the latest attack techniques and countermeasures. At the same time, you’re under pressure to simplify your network and lower your operations costs.
On Demand
FortiOS 5: The World's Most Advanced Network Security Operating System
An overview of new features and benefits to the industry's most advanced security operating system. Specific details on how FortiOS provides protection against advanced threats, helps you secure your network in a BYOD world and how you smart policy creation can help increase the efficiencies of your security operations.
On Demand
Securing Today's Network with Unified Threat Management (UTM) - Webcast Featuring IDC
IDC forecasts the UTM space as one of the fastest grouping segments of the security industry. More and more, customers like you are selecting multifunction appliances to secure their networks because of the flexibility allowed by having several different security capabilities on one single appliance. Innovation in the traditional firewall market is slowing down and your complex needs demand more.
On Demand
Network Security Risks Today's Organizations Face
Join Gartner, Fortinet and The Wet Seal in an on-demand video presentation discussing next generation firewalls, application control and the need for securing the entire corporate network.
On Demand
Breaking Point Webinar: Harden Defenses Against Cyber Attacks Through Content-Aware Testing
Join Fortinet and BreakingPoint to learn how military and intelligence organizations are conducting competitive device bake-offs using a six-step methodology and implementing a deterministic measurement of performance, security, and stability of networks to conduct pre-deployment testing and select the best devices for their unique networks.
On Demand