Thursday, October 31st
 

Product Management Session - FortiInsight/FortiIsolator/FortiDeceptor

Dive into our latest offerings with our Product Managers for:

FortiInsight - Fortinet’s User and Entity Behavior Analytics (UEBA) technology protects organizations from insider threats by continuously monitoring users and endpoints with automated detection and response capabilities. Leveraging machine learning and advanced analytics, FortiInsight automatically identifies non-compliant, suspicious, or anomalous behavior and rapidly alerts any compromised user accounts. This proactive approach to threat detection delivers an additional layer of protection and visibility, whether users are on or off the corporate network.

FortiIsolator - Fortinet’s browser isolation platform, adds an additional advanced threat protection capability to the Fortinet Security Fabric and protects critical business data from sophisticated threats out on the web. Content and files from the web are accessed in a remote container and then risk-free content is rendered to users.
FortiDeceptor - FortiDeceptor allows organizations to rapidly create a fabricated deception network through the automatic deployment of deception VMs and decoys that seamlessly integrate with an existing infrastructure to lure attackers into revealing themselves. FortiDeceptor helps serve as an early warning system by providing accurate detection that correlates an attacker’s activity details and lateral movement that feeds up to a broader threat campaign. Threat intelligence gathered from the attacker can be applied automatically to inline security controls to stop attacks before any real damage is done.

FortiDeceptor - FortiDeceptor allows organizations to rapidly create a fabricated deception network through the automatic deployment of deception VMs and decoys that seamlessly integrate with an existing infrastructure to lure attackers into revealing themselves. FortiDeceptor helps serve as an early warning system by providing accurate detection that correlates an attacker’s activity details and lateral movement that feeds up to a broader threat campaign. Threat intelligence gathered from the attacker can be applied automatically to inline security controls to stop attacks before any real damage is done.

 

Competitive Update

In the Cyber Security space all vendors boast their technologies.  Learn as we separate fact from fiction, dispel the FUD & how to use this to differentiate competing architectures.

 

Sizing - Is bigger really better?

Learn how to interpret  and assess customer requirements & recommend the right size Fortinet products.