Welcome!

Machine Learning Authors: Yeshim Deniz, Liz McMillan, Pat Romanski, Elizabeth White, Corey Roth

News Feed Item

Fortinet Webinar to Outline Security Best Practices for IM and P2P Applications

Fortinet Webinar to Outline Security Best Practices for IM and P2P Applications

SUNNYVALE, Calif., April 21 /PRNewswire/ -- Fortinet -- the pioneer and leading provider of multi-threat security solutions -- will discuss best practices for securing and managing the use of instant messaging (IM) and peer-to-peer (P2P) applications during a 45-minute webinar on April 25, 2006.

The educational webinar, led by Mike Rothman, president and principal analyst of Security Incite, will provide valuable information on how enterprises can reap the rewards of IM and P2P applications without jeopardizing the security of their networks. The webinar will address critical issues such as:

-- Benefits and pitfalls of enterprise IM and P2P usage -- Security risks resulting from IM and P2P applications -- Solutions architectures and best practices for securing against IM and P2P threats

The webinar will also feature Chris Roeckl, vice president of marketing for Fortinet, who will speak about the company's integrated multi-threat security solutions and how customers are using them to protect against all types of threats, including IM and P2P.

Fortinet's latest firmware, FortiOS 3.0, includes new features and enhancements for IM and P2P threat management including granular access control, monitoring and audit, antivirus and intrusion/attack prevention. Fortinet is the only vendor to integrate complete content protection -- including full antivirus (AV) scanning, blocking and quarantining of IM traffic and file attachments, intrusion prevention (IPS) signature updates, and URL filtering -- for IM applications into an existing multi-threat security system.

To register for the event, which will take place at noon PDT on Tuesday, April 25, please visit http://www.fortinet.com/promo/IMwebinar2006.html.

About Fortinet (http://www.fortinet.com/)

Fortinet is the pioneer and leading provider of ASIC-accelerated multi-threat security systems, which are used by enterprises and service providers to increase their security while reducing total operating costs. Fortinet solutions were built from the ground up to integrate multiple levels of security protection -- including firewall, antivirus, intrusion prevention, VPN, spyware prevention and antispam -- providing customers a way to protect multiple threats as well as blended threats. Leveraging a custom ASIC and unified interface, Fortinet solutions offer advanced security functionality that scales from remote office to chassis-based solutions with integrated management and reporting. Fortinet solutions have won multiple awards around the world and are the only security products that are certified eight times over by the ICSA (firewall, antivirus, IPSec, SSL, IDS, client antivirus detection, cleaning and antispyware). Fortinet is privately held and based in Sunnyvale, California.

Fortinet, Inc.

CONTACT: Jennifer Leggio, Inc., +1-408-486-7876, or [email protected],
or Michelle Spolver, +1-408-486-7837, or [email protected], both of
Fortinet

Web site: http://www.fortinet.com/

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
SYS-CON Events announced today that DatacenterDynamics has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY. DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
The technologies behind big data and cloud computing are converging quickly, offering businesses new capabilities for fast, easy, wide-ranging access to data. However, to capitalize on the cost-efficiencies and time-to-value opportunities of analytics in the cloud, big data and cloud technologies must be integrated and managed properly. Pythian's Director of Big Data and Data Science, Danil Zburivsky will explore: The main technology components and best practices being deployed to take advantage of data and analytics in the cloud, Architecture, integration, governance and security scenarios and Key challenges and success factors of moving data and analytics to the cloud
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Most DevOps journeys involve several phases of maturity. Research shows that the inflection point where organizations begin to see maximum value is when they implement tight integration deploying their code to their infrastructure. Success at this level is the last barrier to at-will deployment. Storage, for instance, is more capable than where we read and write data. In his session at @DevOpsSummit at 20th Cloud Expo, Josh Atwell, a Developer Advocate for NetApp, will discuss the role and value extensible storage infrastructure has in accelerating software development activities, improve code quality, reveal multiple deployment options through automated testing, and support continuous integration efforts. All this will be described using tools common in DevOps organizations.