Schauen Sie sich die Liste kommender Webinare, Konferenzen und Veranstaltungen an.
events found.
The Quantum Shift: What It Means for Your Security Strategy
Join Fortinet experts for a clear, practical conversation on how quantum computing will change today’s cryptographic landscape, where your environment is most exposed, and what it takes to build a quantum-safe posture without adding operational complexity.
Unlock 24x7 Enterprise Protection with SOC-as-a-Service
In this webinar, Fortinet experts Max Zeumer and Ali Razavi share how FortiGuard SOC-as-a-Service delivers always-on monitoring, detection, and response that is powered by the same Fortinet technologies used worldwide.
Securing the Modern Workspace from AI-powered Threats and Insider Risks
Join leaders from LRMG and Fortinet to learn how organizations are tackling emerging threats and protecting sensitive data across email, browsers, and collaboration tools.
Is Zero Trust Right for OT, Right Now? Featuring a Forrester Analyst and Fortinet Experts
Join to hear our unique perspective, plus our guest and trusted analyst, Brian Wrozek from Forrester who will be providing invaluable insights into OT trends and the evolution of the ZT security strategy.
How to Protect Your Data Center and Your Bottom Line: Expert Roundtable
Join us to hear from the experts as they explore the overall data center security market trends and challenges, customer journeys, and key independent research results from our recent study.
Move at the Speed of Digital Acceleration with Usage-based Licensing
Join our webinar to understand the key considerations for managing digital acceleration costs, particularly across cloud journeys, and how to choose a solution that will help you achieve your goals while optimizing investments.
Stay ahead of cybercriminals with current and reliable threat intelligence
This webinar will guide you through the concept of Threat Informed Defense, the MITRE CTID, the two published projects, and current projects in development.
OT Aware Fabric: Specialized Industrial Cybersecurity Solutions
Join us to hear about new and enhanced rugged and non-rugged network security solutions, deception for OT, SIEM and SOAR OT solutions leveraging the ICS MITRE ATT&CK matrix for industrial security and professional assessment services.
Zero-Trust Security for Identities and Privileged Accounts
Cyberattackers understand that user identities are the keys to the kingdom when they are targeting organizations. This makes it critical to ensure your cybersecurity is tied to user identities.
Stopping Spray- and- Pray Nation- State Ransomware Attacks
Join us to hear about the latest data coming from the Financial Crimes Enforcement Network regarding new spray-and-pray ransomware attempts originating in Russia
Protecting Against Zero-day Threats & Sophisticated Attack Tactics
Join us to learn how you can protect your organization by adopting inline sandboxing and deception technologies, powered by artificial intelligence (AI).
How to Protect the Data Center in a Changing Environment
The data center model is evolving towards physical, virtual and cloud infrastructures on the journey towards digital transformation. Is your security the right fit? Join the discussion.
Join our FortiGuard Labs experts to hear about the cyber threat activity we saw in the second half of 2022, predictions for 2023, and smart strategies you can implement today to protect your organization against the ever-changing threat landscape.
My Firewall Can Do That? Top Five Predictions That Will Elevate NGFWs in 2023
Advanced cyber threats, encrypted broadband, network brownouts, and a complex mess of point products make it difficult for IT teams. Join this new webcast to learn how network firewalls will evolve to help enterprises face these challenges in 2023.
General Sir Richard Shirreff joins FortiGuard Labs’ Glenn Maiden to look behind the current state of cyber threat and the drivers behind the trends, and what we need to do as businesses, nations and individuals to face challenges in the current geopolitical landscape.
Hear about the recent ransomware trends, learn how to prevent ransomware from infiltrating your businesses along with how Fortinet’s comprehensive security fabric and real-time threat intelligence can help your organisation thwart ransomware.
OT Demo Series: Identifying and Protecting OT Assets with Fortinet
IT and OT convergence is a compelling pathway for organisations to maintain competitive advantage within our digital economy. However, with this convergence, the attack surface expands, highlighting the vulnerable critical infrastructure and technology that were historically air-gapped.
Yesterday’s SD-WAN is not Meeting Today’s Requirements
Learn how organisations can leverage their existing security infrastructure and how organisations can add important new capabilities to not only support hybrid working but increase their overall security posture at the same time.
Managing Cloud Risk with Context-Rich Insights from FortiCNP
Introducing FortiCNP, Fortinet’s new cloud-Native protection solution, built to help Security teams simplify cloud security and proactively manage cloud risk.
Modern organizations need to secure their work-from-anywhere (WFA) workforces with a contextual and consistent security posture using ZTNA across all remote environments, with a coordinated security and management solution in an integrated and automated cybersecurity platform.
To defend against current threats, you need to know what they are. Join our threat experts to get the details on what FortiGuard Labs has seen in the first half of 2022.
IT teams have less time than ever to ensure the campus network is operating at peak efficiency. A secure LAN Edge from Fortinet helps by simplifying network design and improving overall user experience.
Transforming the WAN Edge? The Right SD-WAN and WWAN Solution Matter!
Successful WAN edge transformation with secure SD-WAN and wireless WAN can be challenging if you start down the wrong path with a solution that can’t scale with your growing business.
Forrester TEI Study Reveals Impactful Business Outcome of Fortinet Secure SD-WAN
Join us to hear from our guests with Forrester Consulting Group as they provide an in-depth overview of a recent study and more about the business outcomes and benefits that Fortinet Secure SD-WAN has had on organizations in multiple industries.
Die Betreiber kritischer Infrastrukturen werden immer attraktiver für Cyberkriminelle. In diesem Zusammenhang fällt unter IT-Experten in OT-Umgebungen ein Begriff besonders häufig: Zero Trust.
Envision a Better Way to Ensure Secure Local Area Networks
Our experts will discuss how Fortinet LAN Edge solution offers simple yet pervasive security at the LAN, simplifying management while offering more features and less licensing compared to others.
Why Industry Must Transform its Cybersecurity Approach Amid a New Era of Attacks
Cyber attacks targeting infrastructure and industry are becoming a major business risk. Watch this webinar to explore the NIST cybersecurity framework, the fallacy of the operational technology air gap and how organizations can better protect their industrial environments.
Delivering Advanced Threat Protection for OT Environments
Industry and infrastructure are becoming an increasingly attractive target for hackers. Watch this webinar to explore challenges, approaches as well as a strategy around securing OT environments.
Back to Basics: Adaptive Visibility, Monitoring and Control
Join this webinar and learn: the optimal strategy to assist customers in adjusting to the SOCI Act legislation; immediate use case availability, integration and reduction of response times; and the available solutions that enable scalable threat protection to safeguard assets and people in an OT environment without disrupting operations.
Converge Networking and Security for Remote Users with a Single-Vendor SASE
Join us to learn how Fortinet’s single-vendor SASE approach delivers a comprehensive SASE solution, converges cloud-delivered networking (SD-WAN) and cloud-delivered security.
Don’t Settle: An Expert Discussion on Microsoft’s Network Security Solutions
Microsoft is asking you to trust your
Azure workloads to their new firewall. Should you? This panel will
discuss the merits of cloud- specific firewalls vs. multi-cloud
solutions, and what you should consider when choosing your cloud
firewall.
Forrester Discusses the Building Blocks of a Successful Zero-Trust Approach
Join experts as they discuss a successful zero-trust approach. This webcast is ideal for anyone at any organization interested in zero-trust security and successfully deploying it.
Explore how Fortinet Secure Networking solutions help public sector and education IT teams deliver and protect critical services, such as student learning systems, first responder connectivity and next-generation 911 technologies. In these environments, networking and security convergence improves performance and overall operability.
Critical Considerations in Securing Service Providers Success in a Cloud-native World
Service providers around the world are collaborating in dynamic ecosystems in which cloud is a key technology - and the resilience of these cloud environments is critical to maintaining trust and success. Addressing security across complex and highly diverse environments is an immense undertaking.
How a Modern Monitoring Strategy Helps S&P Global Successfully Execute IT Projects
Achieve end-to-end visibility for today’s dynamic, modern infrastructures. S&P Global will share how it delivered successful IT projects by monitoring end-to-end infrastructure and application performance, improving collaboration, and automating workflows to increase operational efficiency.
The Power of SIEM: Why it must be part of any successful organisation’s Operational Technology strategy
Security operations centers face evolving and complex cyber threats which are becoming increasingly difficult to combat. Organizations need tools which help them quickly understand what to focus on, rather than being overwhelmed by thousands of alerts.
Join us for actionable insights on reducing modern network complexity and the common challenges IT leaders are facing today. Learn how Fortinet’s unique security and network convergence solves IT-team challenges with integrated cybersecurity, AIOps, NAC, automation, and much more.
Solving the Remote Work Puzzle With Zero - Trust and Home Network Control
Working from home presents several challenges, such as competing bandwidth for productivity against entertainment streaming and securing an inherently unsecured environment. Learn how to control the home network in a way that doesn’t overwhelm IT departments and preserves employee privacy, using zero-trust principles to control application access no matter where the employee or application are located.
Digital Transformation offers enormous benefits to asset owners but also
increases risks. Join this webinar to learn how to secure your digital
transformation, what’s necessary for secure remote access for
third-parties, and the essential capabilities required for a NOC/SOC
strategy that can manage both IT and OT.
Securing the endpoint has never been more important. With nearly half of employees working from home at least part time, safe access to corporate resources is critical.
Kritische Infrastrukturen: Deutsche Gesetzgebung auch bald in der Schweiz und in Österreich?
Registrieren Sie sich, um sich die Aufzeichnung des Webinars zum Thema "Kritische Infrastrukturen – Deutsche Gesetzgebung auch bald in der Schweiz und in Österreich?" anzusehen.
Moving to a Zero Trust Edge Architecture? IDC and Fortinet Discuss the Critical Role of Secure SD-WAN
The increase in work-from-anywhere employees and sophisticated cyberattacks are transforming WANs. Secure SD-WAN is the de facto solution to tackle these trends, but how can Secure SD-WAN help organizations moving to a Zero Trust Edge architecture? Attend this webcast and get advice from IDG and Fortinet experts.
Gemeinsam mit einem Experten von »Sichere Industrie« werfen wir einen Blick auf das oftmals unbekannte Thema „OT-Organisation“. Besonders auf die Möglichkeiten, die damit in der Digitalisierung und OT-Security verbunden sind.
Blind Management at the Campus? Open your Eyes with FortiGate
Organizations are struggling with lack of visibility, smarter threats, and complex management of legacy solutions. Join us to explore a better approach to securing the campus edge.
Plus, get details on how the FortiGate 600 series delivers a converged networking and security for campus edge deployments support a zero-trust edge strategy.
Blind Management at the Campus? Open Your Eyes with FortiGate
More and more connected devices, direct internet access, and the evolution of threats make management and service delivery more difficult at the campus edge. Join us to learn how FortiGate Mid-Range NGFWs solve these security challenges.
Scalable and Secure Web Protection for the Evolving Hybrid Workforce
Learn how Fortinet’s Secure Web Gateway solution protects on-site and remote workers with cloud-delivered services.
Our advanced technologies deliver a defense-in-depth approach that includes web and video filtering, DNS filtering, IP reputation, anti-botnet, and more. This secures all edges against known and zero-day threats.
While VPN access has been around for a while, it may not be as secure as you think. It’s also difficult to use and manage, making it clear a better approach is needed for connecting users to corporate resources.
Shift Your Security Posture Into High Gear: Boost Your Web App and API Security
Join
us to learn how to implement and use FortiWeb Cloud Web Application
Firewall-as-a-Service with the resources you’ve got now. Don’t let the
skills gap keep you from realizing the benefits of an effective web app
security solution.
Secure the Workday: Keep Your Organization, Data, and Employees Secure
Hear
from cybersecurity experts on how to secure your workforce as they work
from anywhere—in the office, at home, or anywhere in between. You’ll
learn how to spot risk: phishing, spear phishing, ransomware, and social
engineering and how secure organizations have bolstered against
attacks.
Don’t Wait for Cable: Build a Reliable Network Edge with Fortinet LTE/5G Wireless WAN
Hear
from enterprise customer, The Paper Store on real-life use cases plus
see the viable options of scalable, cost-effective, and resilient
LTE/5G, and Ethernet solutions.
The explosion of edges created by digital acceleration places an enormous strain on any cybersecurity infrastructure. Simply put, security has to be everywhere and traditional security approaches cannot handle today’s challenges.
Major Cyber Threat Trends – Aligning Your Defenses
Join us for an eye-opening discussion on the latest and most dangerous cyber threats. We will take you through the most important findings from the latest FortiGuard Labs threat report so you can prepare your defenses. Learn how to make the best security strategy decisions from our threat intelligence expert.
As the 5G ecosystem expands to support its application in perimeter-less networks, the importance of ensuring effective and consistent security is becoming readily apparent. Join Fortinet for an interactive discussion on:
How to apply zero trust principles in a 5G ecosystem
How this best practice will sustain and strengthen the deployment of 5G-enabled applications and services
Securely Connect the Distributed Enterprise with Verizon and Fortinet
Digital transformation enables companies large and small to innovate and improve every aspect of their business. It can also introduce the potential peril of an unwieldy, ever-expanding attack surface.
See how Fortinet’s vision for the LAN edge can transform your wired and wireless infrastructure. Plus, join our experts to get the details of our LAN Edge portfolio, and to take a deep dive into the 2021 Gartner® Magic Quadrant™ for Enterprise Wired & Wireless LAN Infrastructure, and learn how we use AI and ML to deliver better networking.
The Log4j zero-day vulnerability affects millions of servers and can be exploited to allow for remote code execution and total control over vulnerable systems. Join this FortiGuard Labs webinar to learn how Log4j can be exploited, additional vulnerabilities that have been discovered, and threat-hunting strategies to identify possible exploits in your network.