
The growth of insecure or unknown devices attaching to the network, along with a host of breaches due to stolen credentials, has stretched trust beyond the breaking point. Network administrators must adopt a zero-trust approach to network access. Fortinet Network Access solutions offer the necessary device security to see and control all devices and users across the entire network. With proactive protection, organizations can ensure their networks are secure from the latest threats. IoT Endpoint and Device Protection Identify and secure unknown IoT endpoint and devices entering the network. Integrated endpoint visibility, control, and advanced protection ensure organizations are secure. Identity and Access Management Identify users entering the network with high reliability. Secure authentication is key in the implementation of an effective security policy—many of today’s most damaging security breaches have been due to compromised user accounts and passwords. These breaches have been exacerbated by users with inappropriate levels of access. Website: Zero Trust Access
![]() |
Ching Ping Wong Senior Business Development for SEAHK, Fortinet |
Day 2 – 22 Oct: 1100 – 1120 |
|

Zero Trust Access - FortiNAC overview
In this demo, you can see how FortiNAC Zero Trust Network Access approach address MAC spoofing attempts by providing visibility, control, and automated response)