The 3 Most Important Aspects of Perimeter Security and Identity

As application access from within the corporate network give way to more fragmented apps in the cloud, with access via mobile devices, your traditional security perimeter of firewall, VPN, and LAN requires a new model where identity protects beyond the security perimeter.

Join David McNeely, Vice President of Strategy for Centrify, and Koroush Saraf, Senior Director of Product Management at Fortinet, for this interactive presentation and demonstration where you'll learn how you can:

  • Centrally manage access to on-site and cloud apps
  • Secure and manage macs and mobile devices from AD
  • Provide single sign-on to all apps and devices
  • Secure access to enterprise wired and wireless networks
  • Leverage security policy tied to AD groups and roles