You are here

Webinars

Upcoming Webinars

Fortinet’s Advanced Threat Protection Framework: A Cohesive Lifecycle Approach
Wednesday, April 30, 2014 - 9:00am to 10:00am

“Sandboxes” or “breach detection systems”- virtual environments to analyze code for attacks that may have slipped through established defenses- are all the rage. Some vendors would have you believe that deploying one will magically stop all the sophisticated attacks designed to bypass traditional defenses. At Fortinet, we have a different...
Beyond the Hype: Real-world testing of Breach Detection Systems, NSS Labs findings
Wednesday, May 7, 2014 - 9:00am to 10:00am

With data breaches continually making headlines, it seems most every security vendor has THE ANSWER to combating sophisticated cyberthreats. In its inaugural Breach Detection Systems Group Test, NSS Labs pioneers independent, real-world testing of solutions. Join this webcast to learn: · Why independent testing is essential...
Cloud Security Webcast Series: Now You See Me, Now You Don’t – Strategies for Ensuring Network Privacy in the Cloud
Thursday, May 8, 2014 - 9:00am to 10:00am

Challenges with visibility, protection and compliance can arise as network traffic becomes abstracted and the data center becomes agile and dynamic. In the first of a continuing series on Cloud Security, this webcast explores network firewall and segmentation strategies for virtual and cloud environments....
How to Build a High-performance, Secure Application Delivery Network
Thursday, May 15, 2014 - 11:00am to 12:00pm

Modern web-based applications need more than just bandwidth and basic server load balancing to be available to your end users. Today’s advanced threats target your applications directly where traditional firewalls and intrusion prevention systems can’t always stop unwanted disruptions and breaches to your organization’s sensitive data. In this webinar...

Recorded Webinars

The Need for a Secure Wireless LAN in Education
Join Neil Sundstrom, VP Wireless Solutions and Jim Brausen, Director Education, as they explore how Fortinet’s Secure Wireless LAN solution can support your BYOD and mobility needs.
On Demand
Beyond the Hype. Real-world Testing of APT Solutions
Since the release of its first Beach Detection Systems comparative group test- with its surprising recommendations, cautions and “no-shows”- there has been quite a bit of self-promotion and consternation from the vendor community..
On Demand
PCI, Segmentation, and Data Breaches
Data segmentation is an essential part of achieving PCI Compliance, yet many distributed enterprise networks fail to perform even basic isolation of regulated data and systems.
On Demand
Is Your Data Center Ready for Today’s DDoS Threats?
In this webinar from Fortinet you’ll learn the basics of a DDoS Attack, methods to mitigate them, and why a hardware-based DDoS Attack Mitigation Appliance is the best option for protecting your Data Center from the latest DDoS threats.
On Demand
Extending Your NGFW with SSL Inspection
In this webcast, one of three, we will explore the first requirement - SSL inspection. Specifically, why Gartner believes security leaders must address threats from rising SSL traffic, the people, process and technology issues involved and exactly how Fortinet helps enterprises tackle this challenge.
On Demand
Connected UTM: Optimizing Your SMB Network
This complexity is from adding stand-alone technologies over time to meet new threats or satisfy new business requirements. We'll be discussing how Fortinet¹s Connected UTM solution allows you to consolidate and simplify your network while increasing protection and performance.
On Demand
Stopping Advanced Targeted Attacks: Do I really need a whole new security infrastructure and staff?
Many breach reports - Verizon in the U.S., PwC for the UK government, Ponemon for Japan – echo similar advisements that “organizations of all sizes are being successfully penetrated and indeed compromised for months at a time.
On Demand
The Target Data Breach: What We Can All Learn From It?
There is rarely a crystal clear picture, nor a set of practices guaranteed to stop data breach like Target and other ones. But there are always lessons to be learned and decisions to be made about managing risk vs. cost.
On Demand
Connected UTM – Integrated Network Security and Access Webcast
Watch this webcast and learn how to protect against Advanced Threats even with scarce IT resources, while reducing the complexity and cost of your legacy security systems.
On Demand
Fast, Secure, Cost-Effective: How to Protect Tomorrow's Data Center Network
Stan Gibson, Sr Managing Editor and Patrick Bedwell, VP of Product Marketing at Fortinet, discuss the challenges organizations face in trying to protect their data centers in the face of ever-increasing network speeds and a more sophisticated threat landscape.
On Demand
What are Enterprises Really Doing With a NGFW?
Join us as we explore customer deployments- business driver, key requirements, solutions considered/selected and what’s next.
On Demand
Extend your FortiGate to Address APTs
FortiSandbox is an Advanced Threat Protection Appliance designed to identify and help customers thwart the highly targeted and tailored attacks that increasingly bypass traditional defenses and lurk within networks. Offering a unique dual-level Sandbox, inspection of all protocols in one appliance and optional integration with your existing FortiGate infrastructure, FortiSandbox delivers highly effective protection against this emerging class of threats that is affordable to buy and simple to deploy and manage.
On Demand
Top 5 New Innovations and Best Practices in UTM
Top 5 New Innovations and Best Practices in UTM - looks at the latest engineering and threat research as well as the current technology advancements that ensure your company’s defenses keep your business-critical networks, applications and data safe.
On Demand
Fortinet & Hughes Webinar - Going Beyond Traditional Carrier Offerings - Reinventing the WAN
The rapid growth of cloud services, mobile applications, including customer Wi-Fi, BYOD (bring your own device) initiatives, and video usage are overwhelming current networks. This is especially true for network security and capacity as it impacts distributed enterprises (businesses with many branch locations), such as retail, restaurant, retail petroleum, and banking that have to deal with limited on-site IT resources and strict cost mandates.
On Demand
The Power to Fortify the Cloud
See How Fortinet Technologies and Services Address Your Cloud and Data Center Security Challenges
On Demand
Security Threat Predictions: What You Can Expect In 2013
FortiGuard Labs, one of the leading cyber-security research organizations in the world, has released a list of the top 6 threat predictions for 2013.
On Demand
Measuring Security ROI
Understanding the IANS Approach to Measuring Security ROI
On Demand
Securing the Mid Enterprise
Your organization faces the same security threats and IT challenges as larger organizations, but you often lack the resources to stay abreast of the latest attack techniques and countermeasures. At the same time, you’re under pressure to simplify your network and lower your operations costs.
On Demand
FortiOS 5: The World's Most Advanced Network Security Operating System
An overview of new features and benefits to the industry's most advanced security operating system. Specific details on how FortiOS provides protection against advanced threats, helps you secure your network in a BYOD world and how you smart policy creation can help increase the efficiencies of your security operations.
On Demand
Securing Today's Network with Unified Threat Management (UTM) - Webcast Featuring IDC
IDC forecasts the UTM space as one of the fastest grouping segments of the security industry. More and more, customers like you are selecting multifunction appliances to secure their networks because of the flexibility allowed by having several different security capabilities on one single appliance. Innovation in the traditional firewall market is slowing down and your complex needs demand more.
On Demand
Network Security Risks Today's Organizations Face
Join Gartner, Fortinet and The Wet Seal in an on-demand video presentation discussing next generation firewalls, application control and the need for securing the entire corporate network.
On Demand
Breaking Point Webinar: Harden Defenses Against Cyber Attacks Through Content-Aware Testing
Join Fortinet and BreakingPoint to learn how military and intelligence organizations are conducting competitive device bake-offs using a six-step methodology and implementing a deterministic measurement of performance, security, and stability of networks to conduct pre-deployment testing and select the best devices for their unique networks.
On Demand