Hi [[ session.user.profile.firstName ]]

Now You See Me, Now You Don't - Ensuring Network Privacy in the Cloud

Data centers are being transformed with server virtualization, cloud computing, and software-defined networks. As your business consolidates servers and data centers, and extends workloads into hybrid and public clouds, how can you ensure data is properly isolated in multi-tenant environments? How do you provide broader access for mobile devices and BYOD while avoiding unauthorized exposure of corporate resources?

Warren Wu, Senior Director of Product Marketing for Data Center at Fortinet will discuss:

- Network visibility challenges in private and public clouds
- North-south vs east-west topologies for virtual switch traffic
- Physical vs virtual firewalls and security appliances
- Managing security in the cloud and from the cloud
- Four key considerations for architecting network security for the cloud
Recorded May 13 2014 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Warren Wu, Senior Director of Product Marketing, Data Center, Fortinet
Presentation preview: Now You See Me, Now You Don't - Ensuring Network Privacy in the Cloud

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • One Firewall to Rule them All! Nov 8 2016 10:00 am UTC 45 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    The firewall wars have caused nothing but confusion in the market. Lines have been drawn between UTM and NGFW; are they different or are they the same thing? Unfortunately that confusion has led to introducing complexity and vulnerability in enterprise networks. There is a better way. Rather than fighting through a sea of acronyms, focus on what’s really important - How can I simplify my security infrastructure and improve my ability to fight off advanced attacks, no matter where they occur in the network?

    This session will present a new way of thinking about firewalls, one without the confusion, acronyms and complexity.
  • Stop Taking a Reactive Approach to Network Security Recorded: Oct 11 2016 42 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    Preparation and advance planning are key words for a number of activities but when it comes to securing a network, it seems that being reactive is more the norm.

    This session will focus on the consequences of not taking a proactive approach: dealing with the consequences of past decisions while trying to respond to the challenges of today.
  • Scaling & Segmenting the Agile Data Center with Software Defined Security Recorded: Sep 21 2016 43 mins
    Ronen Shpirer, Security Solutions, Fortinet
    Data center transformation with server and network virtualization are leading to agile IT environments that accelerate business initiatives and deliver more responsive applications.

    How can security itself be made more elastic and agile in Software-Defined Data Centers?

    A vision for Software-Defined Security is introduced, and a three-part framework will outline how network security is evolving across all layers of the network architecture, from the data plane to the control plane to the management plane.
  • Secure Unified Access Layer – Creating Universal Solutions Recorded: Jun 23 2016 36 mins
    Ben Wilson, Senior Director, Product Management, Fortinet
    During the past 15 years, access layer solutions have evolved, especially in terms wireless connectivity.

    Today's wireless connectivity has multiple approaches, each better meeting the specific requirements of organisations through a choice of different architectures. Whether its a refresh, redeployment, change of application or a brand new site, there are a lot of options.

    During this webinar we’ll examine different approaches and how to apply them to different verticals or deployment scenarios. As wireless connectivity continues to evolve, we will also look to the future and see how trends in new hardware can provide cutting edge solutions to meet the potential needs of tomorrow's organisations.

    The presentation will end with an overview of Fortinet's Secure Access Architecture and how it can meet today's and tomorrow's wireless requirements.
  • Advanced Threat Protection – Can Technology Alone Deliver What’s Needed? Recorded: Jun 15 2016 36 mins
    Patrick Grillo, Senior Director, Security Strategy
    More and more solutions are crowding into the market but data breaches are still happening and there’s no end in sight. Is an over reliance of technology creating a false sense of “everything’s okay”? This session will focus on the three key aspects of comprehensive advanced threat protection; technology, awareness and in particular the role of threat intelligence.
  • The Internet of Things – Good, Bad or just plain Ugly? Recorded: May 26 2016 28 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    IoT is everywhere these days and like most new and shiny things our attention is focused on its coolness factor.

    However, behind that pleasing and shining exterior lurks a potentially devastating menace. In the rush to bring product to market, very few if any manufacturers are security conscious, and as more and more of these products are deployed in the enterprise, the risk of a successful network breach increases exponentially.

    This session will focus on the potential dangers with IoT and look at the question of how and why IoT security is different from traditional IT security.
  • Securing ICS/SCADA Networks Recorded: May 17 2016 48 mins
    Ronen Shpirer, Security Solutions Architect, Fortinet
    Automation is at the base of many industries and Supervisory Control And Data Acquisition (SCADA) is the base architecture enabling interactive automation of the industrial environment. The industrial environment has been going through rapid innovation, moving from isolated legacy systems to IP based, interconnected systems. In recent years, the Industrial Control Systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyber-attacks.

    Join Fortinet to learn more about the ICS/SCADA specific environment, its security challenges and Fortinet’s unique solutions for the industrial environment.
  • Gartner on demand Webcast: The Growing Need for Internal Segmentation Firewall Recorded: May 10 2016 40 mins
    Lawrence Pingree, Research Director, Gartner & Warren Wu, Fortinet
    Cloud applications and BYOD have brought new functionality to enterprise networks - and unfortunately, also new security weaknesses and opportunities for cyber espionage. The addition of an Internal Segmentation Firewall (ISFW) offers strategic protections within the network that can bolster existing defenses and limit potential exposures.

    This webcast – “Strong on the Inside: The Growing Need for Internal Segmentation Firewalls” – features leading experts from Gartner and Fortinet as they discuss the latest in internal network security for today’s threat landscape, including:

    •Why targeted attacks worldwide are becoming more pervasive, and how a single malicious breach can cripple a company
    •How ISFWs differ from traditional firewalls - and why they can uniquely reduce the attack surface, contain internal threats, and minimize damages after a breach occurs
    •Why multi-gigabit performance is critical to an ISFW’s ability to provide deep visibility without slowing down the network
  • Your Money or Your Life: Defeating Ransomware Recorded: Apr 13 2016 47 mins
    Simon Bryden, Consulting Systems Engineer
    Ransomware is an ever-increasing threat to enterprises and new strains are being seen on a regular basis. This presentation starts by tracing the history of ransomware from its roots as being not much more than an annoyance, to the current highly sophisticated encrypting varieties.
    Following this will be a deep dive into how the malware is delivered to the victim, and an analysis of the different stages of an attack.
    Finally, we will look at methods of mitigating the attack in order to minimise or eliminate the damage done.
  • Security that counts: What’s in your Data Center? Recorded: Mar 17 2016 43 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    The Data Center is not an island. It is part of a complex ecosystem, working and evolving together for the overall benefit of the enterprise.

    Data Center security can no longer be treated as an island. It must integrate and interact with the overall enterprise ecosystem and security infrastructure to provide a real-time, effective security posture.

    This webinar will present a high level view as to the importance of deploying an integrated, end-to-end enterprise security platform for achieving data center security.

    Because sometimes, the best data center security solution has nothing to do with the data center!
  • Lessons learned about Advanced Threat Protection Recorded: Mar 17 2016 38 mins
    Tyson Macaulay, Chief Security Strategist and VP Security Services
    According to recent surveys, the majority of IT Security Executives are concerned about protecting customer data from cybercriminals, but only 1 in 3 is concerned about the loss of their own company’s intellectual property. While understandable, such thinking can also be disastrous, for organizations small and large.

    In this webinar, Fortinet Chief Security Strategist Tyson MacAulay, discusses accounts of real-world attacks on unsuspecting businesses, targeted by sophisticated cybercriminals, as well as the measures they have taken to successfully defend themselves.
  • Deploy Next Generation Firewalls for Internal Protection Recorded: Mar 15 2016 2 mins
    John Kindervag, Forrester VP and Principal Analyst
    John Kindervag from Forrester talks about protecting your organization against internal threats through a zero trust approach that you can start to deploy today by using Next Generation Firewalls (NGFW) to protect internal network segments.
  • Internal Segmentation Firewalls for Zero-Trust Networks Recorded: Mar 14 2016 3 mins
    John Kindervag, Forrester VP and Principal Analyst
    Forrester VP and Principal Analyst John Kindervag discusses how traditional firewalls need to evolve into Internal Segmentation Firewalls for zero-trust networks.

    Instead of hierarchical networks with Next-Generation Firewalls at the edge, firewalls need to act as internal “network segmentation gateways” with high performance, security effectiveness and compatibility with existing deployments.
  • Advanced Threat Protection: For all of the Network, All of the Time Recorded: Feb 25 2016 48 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    The headlines are full of claims by security companies having the key to solving the problem of Advanced Persistent Threats (APT).

    However, on closer inspection it seems that while the technology that they’re touting is interesting, it’s only a partial solution because it only addresses part of the problem.

    In today’s changing threat horizon, attacks can come from anywhere, at anytime and in any form. An effective Advanced Threat Protection (ATP) capability must be able operate in the same manner - everywhere in the network, with any technology and fully collaborative.

    This webinar will present and focus on the following:
    1.The range of technologies needed
    2.How to close off exploitable gaps with common threat intelligence
    3.Technology is only part of the final solution
  • The Evolving Threat Landscape Recorded: Dec 2 2015 47 mins
    Simon Bryden, Consulting Systems Engineer, Fortinet
    This webinar reviews some of the headline attacks and threat events of 2015, then asks what can be learned from them. After looking at some of the trends and directions that today's attacks are taking, it looks at key challenges facing the enterprise, and how they can be addressed by leveraging the latest developments in security technologies, combined with constantly updated threat intelligence.
  • Secure Access Architecture – Understanding the choices and why they matter Recorded: Nov 26 2015 45 mins
    Ben Wilson, Senior Director, Product Management, Fortinet
    Wireless is now the expected medium of choice for network users. Delivering it successfully can be a challenge especially with multiple different approaches and architectures available. What is right for your organisation? Cloud? Controller? How is it all secured?

    This session will discuss 3 main Wi-Fi architecture types, their different advantages, the wired edge, and how to secure it all. Importantly, we will finish with what to consider when making the right choice for your needs.
  • Internal Segmentation Firewall: Securing the Network from the Inside-Out Recorded: Nov 10 2015 59 mins
    Ronen Shpirer, Security Solutions Architect, Fortinet
    As organisations embrace the latest IT technology, such as Mobility and Cloud, the traditional network boundaries are becoming increasingly complex to control and secure. There are now many different ways into an enterprise network.

    Organisations have focused on building defences across the borders of their networks, leaving the internal network flat and open. However, advanced threats use this to their advantage because, once inside, they get free access to the entire enterprise network and assets.

    In this webinar we will present:
    1.The state of enterprise security
    2.Hard on the outside and chewy on the inside – internal network risks
    3.Internal Segmentation Firewall to the rescue – protecting the network from the inside-out
  • Forget About Minding the Gap, Close it Off Completely! Recorded: Oct 14 2015 37 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    Advanced Threat Protection is built on the principle of Prevention, Detection and Mitigation. However, if the different technologies within each of these areas operate independently, there will be gaps between the different elements, gaps that can and will be exploited during an attack.

    This session will focus the concept of bringing together all of the elements of Advanced Threat Protection to form a holistic, collaborative solution that encompasses all of the network.
  • Data Center Consolidation - Security considerations, challenges and solutions Recorded: Oct 5 2015 47 mins
    Ronen Shpirer, Security Solutions Architect, Fortinet
    As organizations become more and more data-centric, the way this data is put to use and delivered via applications and services holds the key to the organization’s overall competitiveness and success.

    A consolidated data center environment provides an optimized platform for innovation, applications and services delivery, cost reduction and efficiency.

    Consolidation in the data center has multiple facets, all introducing security challenges and risks that must be recognized and dealt with.

    This session will introduce the consolidated data center environment, the technologies deployed, their related security challenges and the possible solutions available.
  • A Voyage: From Security to Software Defined Security Recorded: Sep 16 2015 40 mins
    Ronen Shpirer, Solution Marketing EMEA & APAC
    With the growing adaptation of Software-Defined technologies as the foundation for enterprises’ data centers, private & hybrid clouds and overall IT agility, security infrastructure transformation must take place to efficiently integrate with the Software-Defined ecosystem and become software defined itself. This presentation will highlight the need for Software Defined Security (SD-Security) and Fortinet’s framework to deliver optimized security for the Software Defined IT.
Fortinet EMEA
Fortinet is a global leader and innovator in Network Security. Our mission is to deliver the most innovative, highest performing network security platform to secure and simplify your IT infrastructure.

We are a provider of network security appliances and security subscription services for carriers, data centers, enterprises, distributed offices and MSSPs. Because of constant innovation of our custom ASICs, hardware systems, network software, management capabilities and security research, we have a large, rapidly growing and highly satisfied customer base, including the majority of the Fortune Global 100, and we continue to set the pace in the Network Security market.

Our market position and solution effectiveness has been widely validated by industry analysts, independent testing labs, business organizations, and the media worldwide. Our broad product line of complementary solutions goes beyond Network Security to help secure the extended enterprise.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Now You See Me, Now You Don't - Ensuring Network Privacy in the Cloud
  • Live at: May 13 2014 2:00 pm
  • Presented by: Warren Wu, Senior Director of Product Marketing, Data Center, Fortinet
  • From:
Your email has been sent.
or close