In this course, participants will learn how to deploy, administrate, and troubleshoot a secured SD-WAN solution. After completing this course, your will be able to: Configure SD-WAN for Internet access Configure SD-WAN for the communication with branch offices Troubleshoot SD-WAN implementations Use FortiManager to centrally manage a SD-WAN solution Configure ADVPN to enable on-demand VPN tunnels between sites.
Note: This is a pre-paid session. Pre-Registration is required.
In this two-day class, you will learn the fundamentals of using FortiManager for centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager. After completing this course, you will be able to: Describe the key features and capabilities of FortiManager Deploy administrative domains (ADOMs) to support multiple customers on a single FortiManager Restrict concurrent ADOM access by using workspaces and workflow mode Use provisioning templates for device-level changes across many devices Identify the synchronization states and manage the revision history of managed devices Manage firewall policies across multiple FortiGate devices using policy packages with shared and dynamic objects Deploy policies and objects from the global ADOM to multiple ADOMs Understand Security Fabric integration with FortiManager Deploy SD-WAN using central management FortiManager Describe high-availability (HA), backup, and recovery options for FortiManager Manage the firmware of supported devices centrally Offer a local FortiGuard distribution server to your Fortinet devices Diagnose and troubleshoot import and installation issues.
Note: This is a pre-paid session. Pre-Registration is required.
In this course, students will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. After completing this course, participants will be able to: Integrate FortiManager, FortiAnalyzer, and multiple FortiGate devices using the Fortinet Security Fabric Centralize the management and monitoring of network security events Optimize FortiGate resources Diagnose and monitor user traffic using FortiGate debug tools Troubleshoot issues with conserve mode, high CPU, firewall policies, session helpers, IPsec, FortiGuard, content inspection, routing, and HA Harden the enterprise services Simultaneously deploy IPsec tunnels to multiple sites using the FortiManager VPN console Configure ADVPN to enable on-demand VPN tunnels between sites Combine OSPF and BGP to route the enterprise traffic.
Note: This is a pre-paid session. Pre-Registration is required.
This session will take place in two rooms - 129/130 & 123 (CCIB, Level P1)
In this course, participants will learn how FortiOS, FortiAP, FortiSwitch, and FortiAuthenticator enable secure connectivity, no matter where users are located and how they are connecting. The course covers the deployment and troubleshooting of advanced authentication scenarios, together with best practices for securely connecting wireless and wired users. After completing this course, participants should be able to: Configure advanced user authentication and authorization scenarios using RADIUS and LDAP Troubleshoot user authentication and authorization problems Implement two-factor authentication using digital certificates Manage FortiSwitch devices using FortiLink Configure layer 2 authentications for wired and wireless users using 802.1.x Secure the layer 2 network Secure the wireless network Provide secure access to guest users.
Note: This is a pre-paid session. Pre-Registration is required.
FortiOS provides several tools that help with troubleshooting both hardware and software issues. The objective of this 2-day workshop is to learn how to establish a baseline, define the problem, and create a troubleshooting plan. It is also helpful to understand the logic behind some of the built-in debugging tools and when to use them. The content of this workshop will include troubleshooting methodologies, introduction to diagnostic commands, high availability best practices, SD-WAN Health Diagnostics, troubleshooting IPsec VPN and FortiOS routing.
Note: This is a pre-paid session. Pre-Registration is required.
In this advanced, hands-on, class, you will learn about the different components that make up the infrastructures of the top public cloud providers, and the security challenges these environments present, including high availability (HA), auto-scaling, software-defined network (SDN) connectors, and how to manage traffic in the cloud with Fortinet products. After completing this course, you will be able to: Deploy a FortiGate VM on Amazon Web Services (AWS) and Azure in single, HA, and auto-scaling modes Use Fortinet templates to easily deploy complex environments Deploy FortiWeb in AWS and Azure Use SDN connectors with cloud vendors Integrate other Fortinet services and products with cloud vendors.
Note: This is a pre-paid session. Pre-Registration is required.
In this course, you will learn how to use advanced FortiGate networking and security. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, single sign-on (SSO), web proxy, and diagnostics. After completing this course, you should be able to: Analyze a FortiGate route table Route packets using policy-based and static routes for multipath and load-balanced deployments Configure SD-WAN to load balance traffic between multiple WAN links effectively Inspect traffic transparently, forwarding as a Layer 2 device Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs) Establish an IPsec VPN tunnel between two FortiGate devices Compare policy-based to route-based IPsec VPN Implement a meshed or partially redundant VPN Diagnose failed IKE exchanges Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD) Deploy FortiGate devices as an HA cluster for fault tolerance and high performance Deploy implicit and explicit proxy with firewall policies, authentication, and caching Diagnose and correct common problems.
Note: This is a pre-paid session. Pre-Registration is required.
In this course, you will learn how to leverage the powerful and diverse capabilities of the FortiNAC system, using best practices for achieving visibility, control, and response. In interactive labs, you will explore the administrative tasks necessary to achieve network visibility, control, and automated threat response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation. After completing this course, you should be able to: Configure a FortiNAC system to achieve network visibility Leverage the control capabilities for network access and automated policy enforcement Combine the visibility and control features with security device integrations to automate threat responses to security risks.
Note: This is a pre-paid session. Pre-Registration is required.
In this course, you will learn how to use FortiSIEM, and how to integrate FortiSIEM into your network awareness infrastructure. You will learn about initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of the environment. Additionally, you will learn how you can use the configuration database to greatly facilitate compliance audits. After completing these courses, you will be able to: Identify business drivers for using SIEM tools Describe SIEM and PAM concepts Describe key features of FortiSIEM Understand how collectors, workers, and supervisors work together Create new users and custom roles Describe the discovery process Perform real-time, historic structured searches Group and aggregate search results Examine performance metrics Create custom incident rules Export CMDB information Describe what Windows Agents are used for Understand how the Windows Agent Manager works in various deployment models Understand FortiSIEM Linux File Monitoring Agent.
Note: This is a pre-paid session. Pre-Registration is required.
The NSE 8 Immersion is an all hands-on lab that students preparing for the NSE 8 practical exam can do to get an exam-like experience. Based on the previous NSE 8 practical exam, students will be tasked with completing the lab in a challenging learning environment. Fortinet products in the lab include FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, FortiADC, FortiAuthenticator, and FortiSandbox. During the sessions, an NSE8 certified instructor is available for questions and to help gain knowledge in getting prepared for becoming NSE 8 certified.
Note: This is a pre-paid session. Pre-Registration is required.
In this course, you will learn how to use basic FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, security fabric, user authentication, SSL VPN, dial-up IPsec VPN, and how to protect your network using security profiles such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. After completing this course, you should be able to: Deploy the appropriate operation mode for your network Use the GUI and CLI for administration Identify the characteristics of the Fortinet Security Fabric Control network access to configured networks using firewall policies Apply port forwarding, source NAT, and destination NAT Authenticate users using firewall policies Understand encryption functions and certificates Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies FortiGate Security Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports Fight hacking and denial of service (DoS) Offer an SSL VPN for secure access to your private network Implement a dialup IPsec VPN tunnel between FortiGate and FortiClient Collect and interpret log entries.
Note: This is a pre-paid session. Pre-Registration is required.
In this course, participants will learn how FortiOS, FortiAP, FortiSwitch, and FortiAuthenticator enable secure connectivity, no matter where users are located and how they are connecting. The course covers the deployment and troubleshooting of advanced authentication scenarios, together with best practices for securely connecting wireless and wired users. After completing this course, participants should be able to: Configure advanced user authentication and authorization scenarios using RADIUS and LDAP Troubleshoot user authentication and authorization problems Implement two-factor authentication using digital certificates Manage FortiSwitch devices using FortiLink Configure layer 2 authentications for wired and wireless users using 802.1.x Secure the layer 2 network Secure the wireless network Provide secure access to guest users.
Note: This is a pre-paid session. Pre-Registration is required.
In this course, you will learn how to leverage the powerful and diverse capabilities of the FortiNAC system, using best practices for achieving visibility, control, and response. In interactive labs, you will explore the administrative tasks necessary to achieve network visibility, control, and automated threat response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation. After completing this course, you should be able to: Configure a FortiNAC system to achieve network visibility Leverage the control capabilities for network access and automated policy enforcement Combine the visibility and control features with security device integrations to automate threat responses to security risks
In this course, you will learn how to use basic FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, security fabric, user authentication, SSL VPN, dial-up IPsec VPN, and how to protect your network using security profiles such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. After completing this course, you should be able to: Deploy the appropriate operation mode for your network Use the GUI and CLI for administration Identify the characteristics of the Fortinet Security Fabric Control network access to configured networks using firewall policies Apply port forwarding, source NAT, and destination NAT Authenticate users using firewall policies Understand encryption functions and certificates Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies FortiGate Security Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports Fight hacking and denial of service (DoS) Offer an SSL VPN for secure access to your private network Implement a dialup IPsec VPN tunnel between FortiGate and FortiClient Collect and interpret log entries.
Note: This is a pre-paid session. Pre-Registration is required.
In this course, you will learn how to use advanced FortiGate networking and security. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, single sign-on (SSO), web proxy, and diagnostics. After completing this course, you should be able to: Analyze a FortiGate route table Route packets using policy-based and static routes for multipath and load-balanced deployments Configure SD-WAN to load balance traffic between multiple WAN links effectively Inspect traffic transparently, forwarding as a Layer 2 device Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs) Establish an IPsec VPN tunnel between two FortiGate devices Compare policy-based to route-based IPsec VPN Implement a meshed or partially redundant VPN Diagnose failed IKE exchanges Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD) Deploy FortiGate devices as an HA cluster for fault tolerance and high performance Deploy implicit and explicit proxy with firewall policies, authentication, and caching Diagnose and correct common problems.
Note: This is a pre-paid session. Pre-Registration is required.
In this two-day class, you will learn the fundamentals of using FortiManager for centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager. After completing this course, you will be able to: Describe the key features and capabilities of FortiManager Deploy administrative domains (ADOMs) to support multiple customers on a single FortiManager Restrict concurrent ADOM access by using workspaces and workflow mode Use provisioning templates for device-level changes across many devices Identify the synchronization states and manage the revision history of managed devices Manage firewall policies across multiple FortiGate devices using policy packages with shared and dynamic objects Deploy policies and objects from the global ADOM to multiple ADOMs Understand Security Fabric integration with FortiManager Deploy SD-WAN using central management FortiManager Describe high-availability (HA), backup, and recovery options for FortiManager Manage the firmware of supported devices centrally Offer a local FortiGuard distribution server to your Fortinet devices Diagnose and troubleshoot import and installation issues.
Note: This is a pre-paid session. Pre-Registration is required.
The NSE 8 Immersion is an all hands-on lab that students preparing for the NSE 8 practical exam can do to get an exam-like experience. Based on the previous NSE 8 practical exam, students will be tasked with completing the lab in a challenging learning environment. Fortinet products in the lab include FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, FortiADC, FortiAuthenticator, and FortiSandbox. During the sessions, an NSE8 certified instructor is available for questions and to help gain knowledge in getting prepared for becoming NSE 8 certified.
Note: This is a pre-paid session. Pre-Registration is required.
In this course, students will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. After completing this course, participants will be able to: Integrate FortiManager, FortiAnalyzer, and multiple FortiGate devices using the Fortinet Security Fabric Centralize the management and monitoring of network security events Optimize FortiGate resources Diagnose and monitor user traffic using FortiGate debug tools Troubleshoot issues with conserve mode, high CPU, firewall policies, session helpers, IPsec, FortiGuard, content inspection, routing, and HA Harden the enterprise services Simultaneously deploy IPsec tunnels to multiple sites using the FortiManager VPN console Configure ADVPN to enable on-demand VPN tunnels between sites Combine OSPF and BGP to route the enterprise traffic.
Note: This is a pre-paid session. Pre-Registration is required.
This session will take place in two rooms - 129/130 & 123 (CCIB, Level P1)
FortiOS provides several tools that help with troubleshooting both hardware and software issues. The objective of this 2-day workshop is to learn how to establish a baseline, define the problem, and create a troubleshooting plan. It is also helpful to understand the logic behind some of the built-in debugging tools and when to use them. The content of this workshop will include troubleshooting methodologies, introduction to diagnostic commands, high availability best practices, SD-WAN Health Diagnostics, troubleshooting IPsec VPN and FortiOS routing.
Note: This is a pre-paid session. Pre-Registration is required.
In this course, participants will learn how to deploy, administrate, and troubleshoot a secured SD-WAN solution. After completing this course, your will be able to: Configure SD-WAN for Internet access Configure SD-WAN for the communication with branch offices Troubleshoot SD-WAN implementations Use FortiManager to centrally manage a SD-WAN solution Configure ADVPN to enable on-demand VPN tunnels between sites.
Note: This is a pre-paid session. Pre-Registration is required.
In this advanced, hands-on, class, you will learn about the different components that make up the infrastructures of the top public cloud providers, and the security challenges these environments present, including high availability (HA), auto-scaling, software-defined network (SDN) connectors, and how to manage traffic in the cloud with Fortinet products. After completing this course, you will be able to: Deploy a FortiGate VM on Amazon Web Services (AWS) and Azure in single, HA, and auto-scaling modes Use Fortinet templates to easily deploy complex environments Deploy FortiWeb in AWS and Azure Use SDN connectors with cloud vendors Integrate other Fortinet services and products with cloud vendors
In this course, you will learn how to use FortiSIEM, and how to integrate FortiSIEM into your network awareness infrastructure. You will learn about initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of the environment. Additionally, you will learn how you can use the configuration database to greatly facilitate compliance audits. After completing these courses, you will be able to: Identify business drivers for using SIEM tools Describe SIEM and PAM concepts Describe key features of FortiSIEM Understand how collectors, workers, and supervisors work together Create new users and custom roles Describe the discovery process Perform real-time, historic structured searches Group and aggregate search results Examine performance metrics Create custom incident rules Export CMDB information Describe what Windows Agents are used for Understand how the Windows Agent Manager works in various deployment models Understand FortiSIEM Linux File Monitoring Agent.
Note: This is a pre-paid session. Pre-Registration is required.
The coming of 5G is exciting and promising for both Mobile Network Operators (MNOs) and Enterprises. 5G deploys new technologies and capabilities that enable new industry and vertical use cases for enterprises. These will drive innovation and growth for both the enterprise and the MNO. In the wake of the 5G era, security has even a bigger and more important role to play is securing and enabling these new capabilities and use cases. This session will provide an introduction to the role security plays in 5G use cases and technology as a business enabler and a revenue generator.
Discover our focus areas, how to compete in your territory and the investments we are making to help you drive growth in your country. Led by our Sales Vice-Presidents, this session will help you discover your 2020 route to success!
With a dynamic attack surface due to the rise of IoT and cloud services, it's clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Email is a critical tool for businesses. But it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. Gartner asserts that "Advanced threats (such as ransomware and business email compromise) are easily the signature-based and reputation-based prevention mechanisms that a secure email gateway (SEG) has traditionally used. FortiMail replaces incumbent secure email gateways with a product tailored for advanced threat defense. FortiMail email security shields users, and ultimately data, from a wide range of cyber threats. These include: ever growing volumes of unwanted spam, socially-engineered phishing and business email compromise, accelerating variants of ransomware and other malware, increasingly targeted attacks from adversaries of all kinds, and more. At the same time, FortiMail can be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more. Attend this technical training workshop and gain hands-on experience protecting your organization against phishing, spam, malware and advanced targeted attacks via email.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. Fortinet strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient is more than advanced endpoint protection. As an integrated agent, FortiClient contains three key modules; Fabric Agent for security Fabric connectivity, the endpoint security modules and the secure remote access modules. Fabric Agent shares endpoint telemetry with the Security Fabric and delivers broad endpoint visibility, compliance control and vulnerability management. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. FortiClient also provides secure remote access with built-in VPN, single-sign-on, and two-factor authentication for added security. FortiEDR (enSilo) is a next-gen endpoint security solution that packs a broad set of EDR capabilities with easy deployment and use. FortiEDR offers certified NGAV, automated EDR, threat hunting, forensics and virtual patching capabilities all in one single agent to prevent breaches and comply with regulations like PCI/DSS and HIPAA. The lightweight agent is managed by an easy-to-use management console for pre and post infection capabilities. FortiEDR features multi-tenant management in the cloud, on-premise, and hybrid. Attend this technical training workshop to gain hands-on experience controlling endpoints using Fortinet Advanced Endpoint Protection tools in mixed Windows & Linux environments and see first-hand how these solutions integrate with the Fortinet Security Fabric to protect your company’s critical assets.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Cyberattacks are a 24/7 reality. The complexity and growth of the enterprise estate – Infrastructure, Applications, VM’s, Cloud, Endpoints and IoT means the attack surface grows exponentially. Coupled with a skills shortage, and resource constraints, security becomes everybody’s problem but visibility, event correlation and remediation are other people’s responsibility. Effective security requires visibility – all the devices, all the infrastructure in realtime – but also with context – what devices represent a threat, what is their capability so you manage the threat the business faces, not the noise multiple security tools create. FortiSIEM - Fortinet’s Multivendor Security Incident and Events Management solution brings it all together by integrating NOC-SOC Solutions to Automate IT Processes and Security Responses. Visibility, Correlation, Automated Response and Remediation in a single, scalable solution. Using a FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources, improving breach detection. Worldwide 80% of breaches go undetected because of skills shortage and event information ‘noise’. FortiSIEM provides the cross correlation, applies machine learning and UEBA to improve response, to stop breaches before they occur. Use this Hands-on technical training to familiarize yourself with the Powerful Security Incident and Event Management capabilities of a FortiSIEM.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Today, more than ever, businesses are measured by the value of their data. This includes product designs, patents, and corporate financial records. The most critical, and most valuable data, is the confidential information of your customers, including credentials, and credit cards. Secure access, including, transmission, processing, and storage of all of this sensitive data is critical to the success of any business. Failing to protect this information will not only cost a business in direct, immediate losses, but also in fines, legal liabilities, and an erosion of customer loyalty. To assist businesses with protecting this valuable information, the Payment Card Industry Data Security Standard (PCI DSS) was introduced. PCI DSS standards ensure that all businesses that accept payment card, or other e-commerce, transactions have the tools to securely accept, process, transmit, and store, this information in a secure environment. FortiWeb provides the tools and resources to address many specific requirements of PCI DSS compliance. Not only does FortiWeb provide the basic HTTP/HTTPS firewall functions, but also allows you to address areas such as secure access, data encryption during transmission, sensitive data masking, and vulnerability scanning. Machine Learning helps to ensure your applications are protected from Zero Day threats.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
FortiSOAR™ is a holistic and enterprise-built security orchestration and security automation workbench that empowers security operation teams. FortiSOAR™ increases a team’s effectiveness by increasing efficiency, allowing for response in near real time. In this session, you’ll learn how FortiSOAR™ takes your security operation team to the next level by automating the incident response process and facilitating collaboration, behind a single console to power it all.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility. On top of that, Gartner estimates that by 2019, 80% of enterprise traffic will be encrypted and 50% of attacks targeting enterprise will be hidden in encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users and network. FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted cloud access. Attend this technical training workshop and gain hands-on experience fortifying the enterprise network with Fortinet NGFW solution.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Enterprise networking and security teams are struggling with evolving their WAN and branch office IT architecture to support digital transformation. A typical branch office consists of multiple point products creating both security and complexity challenges. IT teams are looking to consolidate these point products to increase agility and save money, while improving the security and visibility of network access at the branch office. Fortinet’s secure access architecture powered by FortiLink is uniquely suited to SD-Branch deployments with ethernet switch and wireless access point management built into the same platform that drives our Secure SD-WAN solution, the FortiGate and FortiOS. Come learn how this common platform enables you to have all of the compelling features of Fortinet’s SD-WAN extended directly to branch network access through FortiSwitch, FortiAP and FortiLink, including global security policies enforced by an industry leading security platform in FortiGate.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud are accelerating advancements in wide area networking technologies. The traditional wide area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply can't accommodate shifting, and often temporary resource allocation and workloads. Attend this technical training workshop to learn how software-defined networking (SDN) applies to software control of wide area networks in an enterprise environment. Gain hands-on experience through actual configuration of virtualized products supporting WAN aggregation, both directly configuring the FortiGates, as well as doing the configurations remotely through FortiManager.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Attend this technical training workshop to gain hands-on experience configuring FortiNAC to secure IoT devices within the Fortinet Security Fabric.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Digital transformation is happening actively across Industries, as a result it also introduces advanced cybersecurity threats. Traditional security architectures are proving futile, and many organizations struggle to protect themselves because they lack the skills and resources to combat these threats. Fortinet provides a superior protection against these advanced threats with a Broad, Integrated and Automated approach with its Security Fabric. A key component of the Fabric is Management and Analytics, that’s used for effective security management. This Fast Track covers FortiManager and FortiAnalyzer, part of the Management and Analytics solution. In this Fast Track attendees will see how the solution provides powerful automation-ready single pane of glass management and visibility, advanced compliance reporting, and network-aware rapid response.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Kubernetes, an open source container management system, has surged in popularity in the past several years and has been adopted by the largest enterprises in a wide range of industries. As organisations are increasingly deploying Kubernetes clusters in production environments, Kubernetes network security has become of paramount importance. Calico is an open source networking and network security solution for a broad range of platforms including Kubernetes, OpenShift, and Docker EE. It is trusted and running in production at large enterprises including SaaS providers, financial services companies, and manufacturers. The largest public cloud providers have selected Calico to provide network security for their hosted Kubernetes services (Amazon EKS, Azure AKS, Google GKE, and IBM IKS) running across tens of thousands of clusters. The Tigera (the company behind project Calico) and Fortinet joint solution extends firewalls to Kubernetes clusters. It will enable customers to enforce network security policies for traffic into and out of the Kubernetes cluster (North/South traffic) as well as traffic between pods within the cluster (East/West traffic). Attend this hands-on workshop to gain experience with basic and advanced networking and network security for Kubernetes. Additionally, you will gain hands-on experience deploying FortiManager and Calico Enterprise to protect Kubernetes clusters.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
In a public cloud environment like AWS, organisations are leaning towards multiple-VPC design to provide better segmentation between the different applications. When they want secure connectivity between the different applications and their on-premises network, they also look for a centralized security posture. While VPC peering and VPN connectivity to the on-premises network provide a solution, it gets cumbersome when the number of VPCs and branch offices increase. This drives a need for a solution which can simplify and secure the connectivity between multiple VPCs and on-premises network. Due to the increase in the number of web-based applications in AWS and the shared security responsibility model in the cloud, a scalable Web Application Firewall solution increases customer’s confidence to deploy in public cloud environment. Attend this technical workshop to gain hands-on experience to learn how Fortinet’s integration with Transit Gateway solves the need for secure connectivity between multiple VPCs and how Fortinet’s WAF solution protects customer’s web applications in a highly available manner with in-built fault tolerance that provides tight integration with AWS’s native tools.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Discover Fortinet Engage, our brand new partner program which will take our relationship to the next level. This is a must-attend session to understand how it will support your growth by leveraging new Fortinet consumption models enabling you to capitalize on existing customers and land new ones. Find out about the flexible options that will suit your business.
The financial services industry continues its radical shift in business models due to digital transformation. As a result, new cybersecurity models, tools, and architectures are required. In this interactive panel session, learn how two leading Financial Services firms are implementing Secure SD-WAN and Internal Network Segmentation respectively to enable new business advantage, optimize costs, and deliver enhanced efficiency.
Learn how to grow your Business leveraging AWS - In this presentation, Amazon Web Services (AWS), the world’s most comprehensive and broadly adopted cloud platform, will discuss the advantages of Cloud and use cases that power customers infrastructure, make them more agile and lower costs. You will learn about the Shared Security Responsibility Model, the areas AWS provides security of the Cloud, what customers are responsible for in the cloud and where partners can drive additional value-add to solve these customer challenges. We will discuss the AWS Partner Network [APN] and market opportunity, how you can become a partner, and how you leverage the AWS Marketplace to transform your business and monetize on Cloud opportunities with specific use cases. Additionally, we will provide technical use cases on the various integrations Fortinet has on AWS to help drive enterprise customer adoption and their journey to the Cloud.
Fortinet understands the challenges that customers face in maintaining visibility and automated control over their network as the threat and risk landscape changes. The Fortinet Security Fabric delivers key capabilities to protect your organization. In this session, we will dive into best practices and approaches to help our customers safeguard their organizations and mitigate risks.
The new Fortinet Engage Partner Program allows you to choose your go-to-market approach. During this session, we'll deep-dive into the new MSSP opportunity, what the requirements and benefits are, trends and market opportunities, flexible and profitable service models, capabilities to build and expand differentiated service offerings and how you can leverage it to grow your business.
Securing renewal business allows you to increase your customer retention and improve the customer journey. Attendees will learn how to best identify the business and leverage the opportunities to upsell and cross-sell with Fortinet solutions.
Note: This session is located outside the CCIB at the Hilton Hotel (adjacent to the CCIB). Ballroom A - Ground Floor.
With a dynamic attack surface due to the rise of IoT and cloud services, it's clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Cyberattacks are a 24/7 reality. The complexity and growth of the enterprise estate – Infrastructure, Applications, VM’s, Cloud, Endpoints and IoT means the attack surface grows exponentially. Coupled with a skills shortage, and resource constraints, security becomes everybody’s problem but visibility, event correlation and remediation are other people’s responsibility. Effective security requires visibility – all the devices, all the infrastructure in realtime – but also with context – what devices represent a threat, what is their capability so you manage the threat the business faces, not the noise multiple security tools create. FortiSIEM - Fortinet’s Multivendor Security Incident and Events Management solution brings it all together by integrating NOC-SOC Solutions to Automate IT Processes and Security Responses. Visibility, Correlation, Automated Response and Remediation in a single, scalable solution. Using a FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources, improving breach detection. Worldwide 80% of breaches go undetected because of skills shortage and event information ‘noise’. FortiSIEM provides the cross correlation, applies machine learning and UEBA to improve response, to stop breaches before they occur. Use this Hands-on technical training to familiarize yourself with the Powerful Security Incident and Event Management capabilities of a FortiSIEM.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Today, more than ever, businesses are measured by the value of their data. This includes product designs, patents, and corporate financial records. The most critical, and most valuable data, is the confidential information of your customers, including credentials, and credit cards. Secure access, including, transmission, processing, and storage of all of this sensitive data is critical to the success of any business. Failing to protect this information will not only cost a business in direct, immediate losses, but also in fines, legal liabilities, and an erosion of customer loyalty. To assist businesses with protecting this valuable information, the Payment Card Industry Data Security Standard (PCI DSS) was introduced. PCI DSS standards ensure that all businesses that accept payment card, or other e-commerce, transactions have the tools to securely accept, process, transmit, and store, this information in a secure environment. FortiWeb provides the tools and resources to address many specific requirements of PCI DSS compliance. Not only does FortiWeb provide the basic HTTP/HTTPS firewall functions, but also allows you to address areas such as secure access, data encryption during transmission, sensitive data masking, and vulnerability scanning. Machine Learning helps to ensure your applications are protected from Zero Day threats.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Email is a critical tool for businesses. But it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. Gartner asserts that "Advanced threats (such as ransomware and business email compromise) are easily the signature-based and reputation-based prevention mechanisms that a secure email gateway (SEG) has traditionally used. FortiMail replaces incumbent secure email gateways with a product tailored for advanced threat defense. FortiMail email security shields users, and ultimately data, from a wide range of cyber threats. These include: ever growing volumes of unwanted spam, socially-engineered phishing and business email compromise, accelerating variants of ransomware and other malware, increasingly targeted attacks from adversaries of all kinds, and more. At the same time, FortiMail can be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more. Attend this technical training workshop and gain hands-on experience protecting your organization against phishing, spam, malware and advanced targeted attacks via email.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. Fortinet strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient is more than advanced endpoint protection. As an integrated agent, FortiClient contains three key modules; Fabric Agent for security Fabric connectivity, the endpoint security modules and the secure remote access modules. Fabric Agent shares endpoint telemetry with the Security Fabric and delivers broad endpoint visibility, compliance control and vulnerability management. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. FortiClient also provides secure remote access with built-in VPN, single-sign-on, and two-factor authentication for added security. FortiEDR (enSilo) is a next-gen endpoint security solution that packs a broad set of EDR capabilities with easy deployment and use. FortiEDR offers certified NGAV, automated EDR, threat hunting, forensics and virtual patching capabilities all in one single agent to prevent breaches and comply with regulations like PCI/DSS and HIPAA. The lightweight agent is managed by an easy-to-use management console for pre and post infection capabilities. FortiEDR features multi-tenant management in the cloud, on-premise, and hybrid. Attend this technical training workshop to gain hands-on experience controlling endpoints using Fortinet Advanced Endpoint Protection tools in mixed Windows & Linux environments and see first-hand how these solutions integrate with the Fortinet Security Fabric to protect your company’s critical assets.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Organizations are increasingly deploying a variety of workloads across multiple clouds. In turn, business-critical data and services are increasingly scattered across this distributed infrastructure. Using the shared responsibility model as a guiding principle, enterprises rely on cloud providers to protect the network, storage, and computing layers, while enterprises own the security. This drives a need for solutions that complement traditional physical appliance form factors which provide visibility and maintain consistent security policy as workloads, users and data migrate to more agile, elastic, and virtualized infrastructure. Attend this technical training workshop and gain hands-on experience configuring virtual NGFWs and Application Gateways utilizing Fortinet products to protect public cloud resources.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility. On top of that, Gartner estimates that by 2019, 80% of enterprise traffic will be encrypted and 50% of attacks targeting enterprise will be hidden in encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users and network. FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted cloud access. Attend this technical training workshop and gain hands-on experience fortifying the enterprise network with Fortinet NGFW solution.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Enterprise networking and security teams are struggling with evolving their WAN and branch office IT architecture to support digital transformation. A typical branch office consists of multiple point products creating both security and complexity challenges. IT teams are looking to consolidate these point products to increase agility and save money, while improving the security and visibility of network access at the branch office. Fortinet’s secure access architecture powered by FortiLink is uniquely suited to SD-Branch deployments with ethernet switch and wireless access point management built into the same platform that drives our Secure SD-WAN solution, the FortiGate and FortiOS. Come learn how this common platform enables you to have all of the compelling features of Fortinet’s SD-WAN extended directly to branch network access through FortiSwitch, FortiAP and FortiLink, including global security policies enforced by an industry leading security platform in FortiGate.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
FortiSOAR™ is a holistic and enterprise-built security orchestration and security automation workbench that empowers security operation teams. FortiSOAR™ increases a team’s effectiveness by increasing efficiency, allowing for response in near real time. In this session, you’ll learn how FortiSOAR™ takes your security operation team to the next level by automating the incident response process and facilitating collaboration, behind a single console to power it all.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud are accelerating advancements in wide area networking technologies. The traditional wide area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply can't accommodate shifting, and often temporary resource allocation and workloads. Attend this technical training workshop to learn how software-defined networking (SDN) applies to software control of wide area networks in an enterprise environment. Gain hands-on experience through actual configuration of virtualized products supporting WAN aggregation, both directly configuring the FortiGates, as well as doing the configurations remotely through FortiManager.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Attend this technical training workshop to gain hands-on experience configuring FortiNAC to secure IoT devices within the Fortinet Security Fabric.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Digital Transformation is accelerating with AI, Blockchain, IoT, 5G and other exponentially growing technologies. Very popular is the notion of the 4.0 Industrial Revolution. While mainly used in the context of the Industrial Sector, its impact spans across many industries, especially where Services are at the center of business. This session discusses Digitalization and Technology Innovations like Augmented Reality, Blockchain, 5G and others related to the future of expertise.
Small business continues to be Fortinet’s backbone and has been since the beginning. Partners targeting small business customers are invited to discover the small business market opportunities to grow in EMEA. Get inspired by our CISO bureau speakers and learn more about the market trends and tendencies along with the complex threats that we will all face in the future.
Note: This session is located outside the CCIB at the Hilton Hotel (adjacent to the CCIB). Ballroom B/C - Ground Floor.
Email is a critical tool for businesses. But it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. Gartner asserts that "Advanced threats (such as ransomware and business email compromise) are easily the signature-based and reputation-based prevention mechanisms that a secure email gateway (SEG) has traditionally used. FortiMail replaces incumbent secure email gateways with a product tailored for advanced threat defense. FortiMail email security shields users, and ultimately data, from a wide range of cyber threats. These include: ever growing volumes of unwanted spam, socially-engineered phishing and business email compromise, accelerating variants of ransomware and other malware, increasingly targeted attacks from adversaries of all kinds, and more. At the same time, FortiMail can be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more. Attend this technical training workshop and gain hands-on experience protecting your organization against phishing, spam, malware and advanced targeted attacks via email.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud are accelerating advancements in wide area networking technologies. The traditional wide area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply can't accommodate shifting, and often temporary resource allocation and workloads. Attend this technical training workshop to learn how software-defined networking (SDN) applies to software control of wide area networks in an enterprise environment. Gain hands-on experience through actual configuration of virtualized products supporting WAN aggregation, both directly configuring the FortiGates, as well as doing the configurations remotely through FortiManager.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
FortiSOAR™ is a holistic and enterprise-built security orchestration and security automation workbench that empowers security operation teams. FortiSOAR™ increases a team’s effectiveness by increasing efficiency, allowing for response in near real time. In this session, you’ll learn how FortiSOAR™ takes your security operation team to the next level by automating the incident response process and facilitating collaboration, behind a single console to power it all.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Attend this technical training workshop to gain hands-on experience configuring FortiNAC to secure IoT devices within the Fortinet Security Fabric.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. Fortinet strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient is more than advanced endpoint protection. As an integrated agent, FortiClient contains three key modules; Fabric Agent for security Fabric connectivity, the endpoint security modules and the secure remote access modules. Fabric Agent shares endpoint telemetry with the Security Fabric and delivers broad endpoint visibility, compliance control and vulnerability management. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. FortiClient also provides secure remote access with built-in VPN, single-sign-on, and two-factor authentication for added security. FortiEDR (enSilo) is a next-gen endpoint security solution that packs a broad set of EDR capabilities with easy deployment and use. FortiEDR offers certified NGAV, automated EDR, threat hunting, forensics and virtual patching capabilities all in one single agent to prevent breaches and comply with regulations like PCI/DSS and HIPAA. The lightweight agent is managed by an easy-to-use management console for pre and post infection capabilities. FortiEDR features multi-tenant management in the cloud, on-premise, and hybrid. Attend this technical training workshop to gain hands-on experience controlling endpoints using Fortinet Advanced Endpoint Protection tools in mixed Windows & Linux environments and see first-hand how these solutions integrate with the Fortinet Security Fabric to protect your company’s critical assets.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
With a dynamic attack surface due to the rise of IoT and cloud services, it's clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Organizations are increasingly deploying a variety of workloads across multiple clouds. In turn, business-critical data and services are increasingly scattered across this distributed infrastructure. Using the shared responsibility model as a guiding principle, enterprises rely on cloud providers to protect the network, storage, and computing layers, while enterprises own the security. This drives a need for solutions that complement traditional physical appliance form factors which provide visibility and maintain consistent security policy as workloads, users and data migrate to more agile, elastic, and virtualized infrastructure. Attend this technical training workshop and gain hands-on experience configuring virtual NGFWs and Application Gateways utilizing Fortinet products to protect public cloud resources.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Enterprise networking and security teams are struggling with evolving their WAN and branch office IT architecture to support digital transformation. A typical branch office consists of multiple point products creating both security and complexity challenges. IT teams are looking to consolidate these point products to increase agility and save money, while improving the security and visibility of network access at the branch office. Fortinet’s secure access architecture powered by FortiLink is uniquely suited to SD-Branch deployments with ethernet switch and wireless access point management built into the same platform that drives our Secure SD-WAN solution, the FortiGate and FortiOS. Come learn how this common platform enables you to have all of the compelling features of Fortinet’s SD-WAN extended directly to branch network access through FortiSwitch, FortiAP and FortiLink, including global security policies enforced by an industry leading security platform in FortiGate.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility. On top of that, Gartner estimates that by 2019, 80% of enterprise traffic will be encrypted and 50% of attacks targeting enterprise will be hidden in encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users and network. FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted cloud access. Attend this technical training workshop and gain hands-on experience fortifying the enterprise network with Fortinet NGFW solution.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Cyberattacks are a 24/7 reality. The complexity and growth of the enterprise estate – Infrastructure, Applications, VM’s, Cloud, Endpoints and IoT means the attack surface grows exponentially. Coupled with a skills shortage, and resource constraints, security becomes everybody’s problem but visibility, event correlation and remediation are other people’s responsibility. Effective security requires visibility – all the devices, all the infrastructure in realtime – but also with context – what devices represent a threat, what is their capability so you manage the threat the business faces, not the noise multiple security tools create. FortiSIEM - Fortinet’s Multivendor Security Incident and Events Management solution brings it all together by integrating NOC-SOC Solutions to Automate IT Processes and Security Responses. Visibility, Correlation, Automated Response and Remediation in a single, scalable solution. Using a FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources, improving breach detection. Worldwide 80% of breaches go undetected because of skills shortage and event information ‘noise’. FortiSIEM provides the cross correlation, applies machine learning and UEBA to improve response, to stop breaches before they occur. Use this Hands-on technical training to familiarize yourself with the Powerful Security Incident and Event Management capabilities of a FortiSIEM.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Today, more than ever, businesses are measured by the value of their data. This includes product designs, patents, and corporate financial records. The most critical, and most valuable data, is the confidential information of your customers, including credentials, and credit cards. Secure access, including, transmission, processing, and storage of all of this sensitive data is critical to the success of any business. Failing to protect this information will not only cost a business in direct, immediate losses, but also in fines, legal liabilities, and an erosion of customer loyalty. To assist businesses with protecting this valuable information, the Payment Card Industry Data Security Standard (PCI DSS) was introduced. PCI DSS standards ensure that all businesses that accept payment card, or other e-commerce, transactions have the tools to securely accept, process, transmit, and store, this information in a secure environment. FortiWeb provides the tools and resources to address many specific requirements of PCI DSS compliance. Not only does FortiWeb provide the basic HTTP/HTTPS firewall functions, but also allows you to address areas such as secure access, data encryption during transmission, sensitive data masking, and vulnerability scanning. Machine Learning helps to ensure your applications are protected from Zero Day threats.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
In a public cloud environment like AWS, organisations are leaning towards multiple-VPC design to provide better segmentation between the different applications. When they want secure connectivity between the different applications and their on-premises network, they also look for a centralized security posture. While VPC peering and VPN connectivity to the on-premises network provide a solution, it gets cumbersome when the number of VPCs and branch offices increase. This drives a need for a solution which can simplify and secure the connectivity between multiple VPCs and on-premises network. Due to the increase in the number of web-based applications in AWS and the shared security responsibility model in the cloud, a scalable Web Application Firewall solution increases customer’s confidence to deploy in public cloud environment. Attend this technical workshop to gain hands-on experience to learn how Fortinet’s integration with Transit Gateway solves the need for secure connectivity between multiple VPCs and how Fortinet’s WAF solution protects customer’s web applications in a highly available manner with in-built fault tolerance that provides tight integration with AWS’s native tools.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Kubernetes, an open source container management system, has surged in popularity in the past several years and has been adopted by the largest enterprises in a wide range of industries. As organisations are increasingly deploying Kubernetes clusters in production environments, Kubernetes network security has become of paramount importance. Calico is an open source networking and network security solution for a broad range of platforms including Kubernetes, OpenShift, and Docker EE. It is trusted and running in production at large enterprises including SaaS providers, financial services companies, and manufacturers. The largest public cloud providers have selected Calico to provide network security for their hosted Kubernetes services (Amazon EKS, Azure AKS, Google GKE, and IBM IKS) running across tens of thousands of clusters. The Tigera (the company behind project Calico) and Fortinet joint solution extends firewalls to Kubernetes clusters. It will enable customers to enforce network security policies for traffic into and out of the Kubernetes cluster (North/South traffic) as well as traffic between pods within the cluster (East/West traffic). Attend this hands-on workshop to gain experience with basic and advanced networking and network security for Kubernetes. Additionally, you will gain hands-on experience deploying FortiManager and Calico Enterprise to protect Kubernetes clusters.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Digital transformation is happening actively across Industries, as a result it also introduces advanced cybersecurity threats. Traditional security architectures are proving futile, and many organizations struggle to protect themselves because they lack the skills and resources to combat these threats. Fortinet provides a superior protection against these advanced threats with a Broad, Integrated and Automated approach with its Security Fabric. A key component of the Fabric is Management and Analytics, that’s used for effective security management. This Fast Track covers FortiManager and FortiAnalyzer, part of the Management and Analytics solution. In this Fast Track attendees will see how the solution provides powerful automation-ready single pane of glass management and visibility, advanced compliance reporting, and network-aware rapid response.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Learn more about Fortinet’s SMB positioning in EMEA and how Fortinet continues to lead the SB market. Get a bigger piece of the pie with the new dedicated program that will support your growth and that is adapted to your MSSP and Cloud aspirations.
Note: This session is located outside the CCIB at the Hilton Hotel (adjacent to the CCIB). Ballroom B/C - Ground Floor.
As Enterprises and Service Providers increasingly adopt Private Cloud technologies to build compute infrastructures, virtual firewall solutions help apply consistent security across a variety of deployments. In this session you will learn how Private Cloud FortiGate VM enables key use cases such as segmentation, security automation and integrations with VMWare NSX/NSX-T as well as virtualized edge security. In addition to that you'll also get an overview of the latest in the FortiGate-VM Product line.
Do you struggle with multiple vendor products on your network that aren't integrated together? Are you concerned about the complexity of operating these tools? Fabric Management Center (FMC) a core part of the Fortinet Security Fabric simplifies operations by automating workflows across Operations teams. It comes with flexible deployment and pricing options for customers across segments – SMB, Mid-Market & Enterprises. Join us for this presentation to learn more about Fabric Management Center, covering: 1. Key Use Cases we see Customers across segments leverage 2. FortiManager & FortiAnalyzer – What’s New in 6.4 3. Customer Story around how FMC has helped in their deployment
Fortinet understands the challenges that customers face in maintaining visibility and automated control over their network as the threat and risk landscape changes. The Fortinet Security Fabric delivers key capabilities to protect your organization. In this session, we will dive into best practices and approaches to help our customers safeguard their organizations and mitigate risks.
The new Fortinet Engage Partner Program allows you to choose your go-to-market approach. During this session, we'll deep-dive into the new Marketplace opportunity, what the requirements and benefits are and how you can leverage it to grow your business.
Cyberattacks are a 24/7 reality. The complexity and growth of the enterprise estate – Infrastructure, Applications, VM’s, Cloud, Endpoints and IoT means the attack surface grows exponentially. Coupled with a skills shortage, and resource constraints, security becomes everybody’s problem but visibility, event correlation and remediation are other people’s responsibility. Effective security requires visibility – all the devices, all the infrastructure in realtime – but also with context – what devices represent a threat, what is their capability so you manage the threat the business faces, not the noise multiple security tools create. FortiSIEM - Fortinet’s Multivendor Security Incident and Events Management solution brings it all together by integrating NOC-SOC Solutions to Automate IT Processes and Security Responses. Visibility, Correlation, Automated Response and Remediation in a single, scalable solution. Using a FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources, improving breach detection. Worldwide 80% of breaches go undetected because of skills shortage and event information ‘noise’. FortiSIEM provides the cross correlation, applies machine learning and UEBA to improve response, to stop breaches before they occur. Use this Hands-on technical training to familiarize yourself with the Powerful Security Incident and Event Management capabilities of a FortiSIEM.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
FortiSOAR™ is a holistic and enterprise-built security orchestration and security automation workbench that empowers security operation teams. FortiSOAR™ increases a team’s effectiveness by increasing efficiency, allowing for response in near real time. In this session, you’ll learn how FortiSOAR™ takes your security operation team to the next level by automating the incident response process and facilitating collaboration, behind a single console to power it all.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Enterprise networking and security teams are struggling with evolving their WAN and branch office IT architecture to support digital transformation. A typical branch office consists of multiple point products creating both security and complexity challenges. IT teams are looking to consolidate these point products to increase agility and save money, while improving the security and visibility of network access at the branch office. Fortinet’s secure access architecture powered by FortiLink is uniquely suited to SD-Branch deployments with ethernet switch and wireless access point management built into the same platform that drives our Secure SD-WAN solution, the FortiGate and FortiOS. Come learn how this common platform enables you to have all of the compelling features of Fortinet’s SD-WAN extended directly to branch network access through FortiSwitch, FortiAP and FortiLink, including global security policies enforced by an industry leading security platform in FortiGate.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud are accelerating advancements in wide area networking technologies. The traditional wide area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply can't accommodate shifting, and often temporary resource allocation and workloads. Attend this technical training workshop to learn how software-defined networking (SDN) applies to software control of wide area networks in an enterprise environment. Gain hands-on experience through actual configuration of virtualized products supporting WAN aggregation, both directly configuring the FortiGates, as well as doing the configurations remotely through FortiManager.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. Fortinet strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient is more than advanced endpoint protection. As an integrated agent, FortiClient contains three key modules; Fabric Agent for security Fabric connectivity, the endpoint security modules and the secure remote access modules. Fabric Agent shares endpoint telemetry with the Security Fabric and delivers broad endpoint visibility, compliance control and vulnerability management. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. FortiClient also provides secure remote access with built-in VPN, single-sign-on, and two-factor authentication for added security. FortiEDR (enSilo) is a next-gen endpoint security solution that packs a broad set of EDR capabilities with easy deployment and use. FortiEDR offers certified NGAV, automated EDR, threat hunting, forensics and virtual patching capabilities all in one single agent to prevent breaches and comply with regulations like PCI/DSS and HIPAA. The lightweight agent is managed by an easy-to-use management console for pre and post infection capabilities. FortiEDR features multi-tenant management in the cloud, on-premise, and hybrid. Attend this technical training workshop to gain hands-on experience controlling endpoints using Fortinet Advanced Endpoint Protection tools in mixed Windows & Linux environments and see first-hand how these solutions integrate with the Fortinet Security Fabric to protect your company’s critical assets.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Organizations are increasingly deploying a variety of workloads across multiple clouds. In turn, business-critical data and services are increasingly scattered across this distributed infrastructure. Using the shared responsibility model as a guiding principle, enterprises rely on cloud providers to protect the network, storage, and computing layers, while enterprises own the security. This drives a need for solutions that complement traditional physical appliance form factors which provide visibility and maintain consistent security policy as workloads, users and data migrate to more agile, elastic, and virtualized infrastructure. Attend this technical training workshop and gain hands-on experience configuring virtual NGFWs and Application Gateways utilizing Fortinet products to protect public cloud resources.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Attend this technical training workshop to gain hands-on experience configuring FortiNAC to secure IoT devices within the Fortinet Security Fabric.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Email is a critical tool for businesses. But it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. Gartner asserts that "Advanced threats (such as ransomware and business email compromise) are easily the signature-based and reputation-based prevention mechanisms that a secure email gateway (SEG) has traditionally used. FortiMail replaces incumbent secure email gateways with a product tailored for advanced threat defense. FortiMail email security shields users, and ultimately data, from a wide range of cyber threats. These include: ever growing volumes of unwanted spam, socially-engineered phishing and business email compromise, accelerating variants of ransomware and other malware, increasingly targeted attacks from adversaries of all kinds, and more. At the same time, FortiMail can be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more. Attend this technical training workshop and gain hands-on experience protecting your organization against phishing, spam, malware and advanced targeted attacks via email.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
With a dynamic attack surface due to the rise of IoT and cloud services, it's clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility. On top of that, Gartner estimates that by 2019, 80% of enterprise traffic will be encrypted and 50% of attacks targeting enterprise will be hidden in encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users and network. FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted cloud access. Attend this technical training workshop and gain hands-on experience fortifying the enterprise network with Fortinet NGFW solution.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.
Today, more than ever, businesses are measured by the value of their data. This includes product designs, patents, and corporate financial records. The most critical, and most valuable data, is the confidential information of your customers, including credentials, and credit cards. Secure access, including, transmission, processing, and storage of all of this sensitive data is critical to the success of any business. Failing to protect this information will not only cost a business in direct, immediate losses, but also in fines, legal liabilities, and an erosion of customer loyalty. To assist businesses with protecting this valuable information, the Payment Card Industry Data Security Standard (PCI DSS) was introduced. PCI DSS standards ensure that all businesses that accept payment card, or other e-commerce, transactions have the tools to securely accept, process, transmit, and store, this information in a secure environment. FortiWeb provides the tools and resources to address many specific requirements of PCI DSS compliance. Not only does FortiWeb provide the basic HTTP/HTTPS firewall functions, but also allows you to address areas such as secure access, data encryption during transmission, sensitive data masking, and vulnerability scanning. Machine Learning helps to ensure your applications are protected from Zero Day threats.
Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.