Deploying Wireless Networks in Operational Technology (OT) Environments with Fortinet

OT environments bring their own series of challenges for IT administrators. Often times the devices are purpose built and can’t be patched to bring them up to the latest security level needed for a secure networks. Fortinet offers a full compliment of solutions for the OT space, including purpose build Wi-Fi access points, OT features […]

Wireless as a Service with Fortinet’s FortiFlex Program and Firewall as a Service

Fortinet believes in offering flexibility to our customers to plan and deploy their networks in the way that works best for them. Our Sr. Director of Product Management, Alexandre Vizzari goes through how our FortiFlex program allows for flexible consumption of our Firewall platform. As the FortiGate is our wireless controller, this creates a flexible […]

Solving IoT Needs in a WPA3 World – Fortinet’s MPSK for WPA3

Dealing with IoT and other headless devices creates a real challenge for IT professionals. MPSK was a great solution for WPA2 to allow devices to have a PSK that did not match the PSK given out to people. This same method did not work for WPA3. Our Sr. Director of Product Management Sumanth Gorajala will […]

Secure Flexible Wi-Fi 7 with Fortinet’s FortiAP-441K Wi-Fi Access Point

Fortinet is on the forefront of releasing andshipping Enterprise class Wi-Fi 7 access points. Our Sr. Director of Product Management Sumanth Gorajala will go over the basics of the new standard as well as the full Fortinet wireless portfolio. This presentation also includes a demo of the capabilities of the new access point.

Fortinet’s Secure WLAN Vision for 2024

Fortinet is much more than a firewall company, we offer a full suite of cybersecurity and networking products that span all the pieces that IT and Security professionals need to build a stable and secure wired and wireless network.

Index Engines CyberSense Version 8.6 Update

CyberSense 8.6 supports smarter recovery from ransomware attacks, introduces customizable threshold alerts and broadens platform and workload compatibility. Also highlighted is support for new platforms and applications.

Introduction to Index Engines CyberSense AI-Powered Data Analysis

Distinguishing itself as the only data integrity software, harnessing over 200 content-based analytics indicative of ransomware corruption, CyberSense employs robust AI-based machine learning models to generate alerts with 99.5% accuracy when corruption is detected. Furthermore, CyberSense’s post-attack reports furnish the intelligence necessary for expedited recovery with minimal data loss.

Index Engines Understanding the Ransomware Challenge

Cyber criminals are getting more sophisticated, deploying ransomware variants that are harder to detect with thresholds, metadata-level scanning or entropy changes alone. Cyber criminals are using AI and slow encryption to corrupt data without detection. The results have been devastating for organizations worldwide. Why is it critical to winning the war against ransomware? Data integrity […]

Introduction to Index Engines with Geoff Barrall

For over 20 years Index Engines has provided purpose-built enterprise software. Discover how they’re developing the last line of defense against ransomware attacks, and the first line of recovery with CyberSense. Today we will be discussing how to recover smarter by harnessing AI to recover from ransomware.

Revolutionizing Cloud Data Security – A Palo Alto Prisma Cloud DSPM Demo

Vinayak Shastri, Product Line Manager for Prisma Cloud DSPM at Palo Alto Networks, provides an in-depth walkthrough of the Prisma Cloud DSPM platform, featuring diverse use cases. In this session, participants will gain insights into addressing the top questions posed by CISOs: What data resides across our multi-cloud environments? Who has access to our most […]

Revolutionizing Cloud Data Security with Palo Alto DSPM and DDR

Are you thinking about data security in 2024? Growing data volumes and increased regulation make it difficult for organizations to understand which sensitive data they hold, who can access it and where it’s exposed. To regain visibility and control, organizations are exploring data security posture management with data detection and response. In this session you’ll […]

Sign up for updates to
Tech Field day events

Thank you for being part of the Tech Field Day community! Our mailing list is a great way to stay up to date on our events and technical content, and we appreciate your signup.

We promise that we’ll never spam you, send ads, or sell your information. This list will only be used to communicate with our community about our events and content. And we’ll limit it to no more than one message per week.

Although we only need your email address, it would be nice if you provided a little more information to help us get to know you better!