Hi [[ session.user.profile.firstName ]]

Fortinet APAC

  • Date
  • Rating
  • Views
  • Gartner 2017 Magic Quadrant for Enterprise Firewalls
    Gartner 2017 Magic Quadrant for Enterprise Firewalls John Maddison, Sr. Vice President, Products and Solutions, Fortinet Recorded: Oct 17 2017 23 mins
    Fortinet's Enterprise Firewall is an industry leader in completeness of vision on how to protect your network from the edge to the core to the cloud. Attend this webinar to understand how the Fortinet Enterprise Firewall.
    Solution:
    - Leverages FortiGate, FortiGuard, FortiManager and the recently released FortiOS 5.6 to provide the highest performing and most flexible protection of your network
    - Is deployed by enterprises like the Pittsburgh Steelers to ensure the toughest defense against threats; and
    - How and why the solution has been recognized as a leader by top analyst firms in the industry
  • The General Data Protection Regulation or “We Don’t Know What We Don’t Know”
    The General Data Protection Regulation or “We Don’t Know What We Don’t Know” Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Oct 10 2017 49 mins
    The clock is ticking on the General Data Protection Regulation (GDPR) coming into effect and while there isn’t wide scale panic yet, lots of organizations are either 1) in denial or 2) just coming to grips with its implications.

    The difficulty with GDPR is that the regulation states the “WHAT” but pretty much is silent on the “HOW”. The overwhelming majority of the regulation deals with process, procedure and is it really necessary to collect the data and stresses the rights of the data subject. How to protect the data, in movement and in rest, is left to individual organizations to decide except for the vague mention of “continuous risk assessment” and “state of the art”.

    Another major change from the existing national regulations, which were enacted during the mid to late 1990s, GDPR takes into account the massive change in how technology plays in everyday. To protect the data subject, the punitive aspect of non-compliance is significant with penalties of €20M or 4% of annual turnover, whichever is GREATER.

    So in this confusing and changing environment, where do cyber security technologies come into play?

    This session will focus on the role of the underlying network in any organization’s GDPR compliance efforts and how to take advantage of certain aspects of GDPR to avoid the substantial penalties associated with the regulation.
  • It’s My Life but I no Longer Have Control Over it!
    It’s My Life but I no Longer Have Control Over it! Gavin Chow, Network and Security Strategist Recorded: Dec 8 2016 49 mins
    We all know that technology plays a role in our everyday life but do you know the extent of that role? Advertising tells us to spend more and more of our life online and embrace technology in our homes, cars and everywhere else a microchip can be placed.

    But nowhere is there a message about the consequences of the misuse of that technology. 2016 has seen a rise in the number of incidents involving ransomware, IoT, and simply well intentioned connectivity gone wrong. That momentum is set to continue into 2017 and beyond.

    Although past performance does not guarantee future results, this session will focus on what we have seen this year and what we expect to see in the near future.
  • One Firewall to Rule them All!
    One Firewall to Rule them All! Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Nov 8 2016 27 mins
    The firewall wars have caused nothing but confusion in the market. Lines have been drawn between UTM and NGFW; are they different or are they the same thing? Unfortunately that confusion has led to introducing complexity and vulnerability in enterprise networks. There is a better way. Rather than fighting through a sea of acronyms, focus on what’s really important - How can I simplify my security infrastructure and improve my ability to fight off advanced attacks, no matter where they occur in the network?

    This session will present a new way of thinking about firewalls, one without the confusion, acronyms and complexity.
  • Secure Unified Access Layer – Creating Universal Solutions
    Secure Unified Access Layer – Creating Universal Solutions Ben Wilson, Senior Director, Product Management, Fortinet Recorded: Jun 23 2016 36 mins
    During the past 15 years, access layer solutions have evolved, especially in terms wireless connectivity.

    Today's wireless connectivity has multiple approaches, each better meeting the specific requirements of organisations through a choice of different architectures. Whether its a refresh, redeployment, change of application or a brand new site, there are a lot of options.

    During this webinar we’ll examine different approaches and how to apply them to different verticals or deployment scenarios. As wireless connectivity continues to evolve, we will also look to the future and see how trends in new hardware can provide cutting edge solutions to meet the potential needs of tomorrow's organisations.

    The presentation will end with an overview of Fortinet's Secure Access Architecture and how it can meet today's and tomorrow's wireless requirements.
  • Advanced Threat Protection – Can Technology Alone Deliver What’s Needed?
    Advanced Threat Protection – Can Technology Alone Deliver What’s Needed? Matthew Kuan, Director, Solutions Marketing Recorded: Jun 16 2016 31 mins
    More and more solutions are crowding into the market but data breaches are still happening and there’s no end in sight. Is an over reliance of technology creating a false sense of “everything’s okay”? This session will focus on the three key aspects of comprehensive advanced threat protection; technology, awareness and in particular the role of threat intelligence.
  • Your Money or Your Life: Defeating Ransomware
    Your Money or Your Life: Defeating Ransomware Jack Chan, Network and Security Strategist Recorded: Apr 21 2016 40 mins
    Ransomware is an ever-increasing threat to enterprises and new strains are being seen on a regular basis. This presentation starts by tracing the history of ransomware from its roots as being not much more than an annoyance, to the current highly sophisticated encrypting varieties.

    Following this will be a deep dive into how the malware is delivered to the victim, and an analysis of the different stages of an attack.
    Finally, we will look at methods of mitigating the attack in order to minimise or eliminate the damage done.
  • Security that counts: What’s in your Data Center?
    Security that counts: What’s in your Data Center? Ronen Shpirer Recorded: Mar 22 2016 43 mins
    The Data Center is not an island. It is part of a complex ecosystem, working and evolving together for the overall benefit of the enterprise.

    Data Center security can no longer be treated as an island. It must integrate and interact with the overall enterprise ecosystem and security infrastructure to provide a real-time, effective security posture.

    This webinar will present a high level view as to the importance of deploying an integrated, end-to-end enterprise security platform for achieving data center security.

    Because sometimes, the best data center security solution has nothing to do with the data center!
  • Advanced Threat Protection:  For all of the Network, All of the Time
    Advanced Threat Protection: For all of the Network, All of the Time Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Feb 25 2016 48 mins
    The headlines are full of claims by security companies having the key to solving the problem of Advanced Persistent Threats (APT).

    However, on closer inspection it seems that while the technology that they’re touting is interesting, it’s only a partial solution because it only addresses part of the problem.

    In today’s changing threat horizon, attacks can come from anywhere, at anytime and in any form. An effective Advanced Threat Protection (ATP) capability must be able operate in the same manner - everywhere in the network, with any technology and fully collaborative.

    This webinar will present and focus on the following:
    1.The range of technologies needed
    2.How to close off exploitable gaps with common threat intelligence
    3.Technology is only part of the final solution
  • The Evolving Threat Landscape
    The Evolving Threat Landscape Simon Bryden, Consulting Systems Engineer & Matthew Kuan, Fortinet Recorded: Dec 3 2015 47 mins
    This webinar reviews some of the headline attacks and threat events of 2015, then asks what can be learned from them. After looking at some of the trends and directions that today's attacks are taking, it looks at key challenges facing the enterprise, and how they can be addressed by leveraging the latest developments in security technologies, combined with constantly updated threat intelligence.

Embed in website or blog