Welcome!

News Feed Item

Fortinet Unveils New Network Security Expert Certification Program

Eight-Level Certification Aims to Give Partners, Customers and Security Professionals In-Depth Expertise on Full Range of Fortinet Network Security Products

SUNNYVALE, CA -- (Marketwired) -- 07/28/14 -- Fortinet® (NASDAQ: FTNT) -- a world leader in high-performance network security -- today announced a comprehensive new technical certification program, the Network Security Expert (NSE), that is designed to enable partners, customers and security professionals to demonstrate expertise on the full range of Fortinet's network security product offerings, while helping them to boost value and expand into new markets.

"We are pleased to unveil the Fortinet Network Security Expert certification, representing a new industry standard that sets the bar even higher for Fortinet's partners, customers and employees," said Joe Sykora, vice president of Americas sales operations and channels at Fortinet. "We have designed the new certification program to help enable participants to greatly expand upon their knowledge and expertise of Fortinet's expansive network security portfolio, and to better prepare them to enter untapped markets."

NSE Certification: Setting a New Standard
The new, eight-level certification Fortinet Network Security Expert certification is designed for all technical professionals interested in independent validation of their network security skills and experience. Open to everyone, including the entire partner community and 190,000+ Fortinet customers, the new program will enable participants to fully leverage the entirety of its network security platform and be recognized in the industry among an elite group of security professionals.

Altogether, NSE includes a wide range of self-paced and instructor led courses, as well as practical, experiential exercises that demonstrate mastery of complex network security concepts. Topics range from survey-level courses at the lower levels to advanced architectural level subject matter at the high levels. The time commitment varies depending upon course level, with the highest levels requiring extensive experience and study. All of Fortinet's online courses are free to channel partners.

The new NSE program incorporates newly created content not covered in FCNSA and FCNSP certifications, and over time will eventually replace the existing certifications. Fortinet's current certifications FCNSA and FCNSP will remain in effect for one year following the NSE launch, with complete benefits for participants. After a year, participants will be required to update their certifications according to the terms of the new NSE program.

Expanding Partner Opportunities
For channel partners, the new program offers additional courses and higher levels of certifications that are designed to help them sell more products and provide higher levels of support. Among other things, an NSE certification is designed to help enable Fortinet partners to:

  • Leverage Fortinet's full range of network security products while consolidating solutions and reducing risk
  • Validate network security skills and experience
  • Accelerate sales and the ability to offer new services
  • Demonstrate value and a desire to stay up to date with technical skills to current and future employers

In addition, the NSE program also offers a number of tangible benefits for partners specific to their level, which include enhanced escalation, invitations to NSE-only events and public recognition.

Fortinet also supports college students and graduates looking to pursue network or security industry professions by working with educational institutions around the world. Fortinet provides these institutions with equipment, subscriptions and curriculum, among other things, which ultimately helps prepare them to meet NSE certification criteria.

"The launch of Fortinet's NSE program gives partners like Industry Retail Group (IRG) additional resources to further validate our network security expertise to customers," said Mike Luzio, CEO & president of IRG. "This kind of industry-wide recognition represents a tangible way to demonstrate industry expertise, which will help provide a competitive advantage when approaching new customers for both IRG and Fortinet."

The Fortinet NSE Advantage
Fortinet is a leading global provider of high-performance network security appliances, serving the majority of the Fortune Global 500 companies and boasting more than 190,000 customers worldwide. In 2013, the company surpassed Juniper as the third largest network security company in the world behind Cisco and Check Point, according to IDC.

For channel partners, service providers, and other network security professionals, the new industry-wide certification recognizes Fortinet's leadership position in network security and the pervasiveness of its products around the world that serve a large and rapidly growing customer base ranging from distributed offices to large carriers, data centers and multinational enterprises.

"Certification is an industry-wide validation and testament of technical skills," said John Grady, program manager for IDC's Security Products group. "Holders of specialized technical certifications are more employable and have higher earning potential than their non-certified counterparts. Further, Fortinet's Network Security Expert certification provides an important differentiator for partners, allowing them to demonstrate a diverse range of key skills to better service existing and new customers."

The new certification program is currently available. For more information, go to http://www.fortinet.com/training/nse.html.

About Fortinet
Fortinet (NASDAQ: FTNT) helps protect networks, users and data from continually evolving threats. As a global leader in high-performance network security, we enable enterprises, service providers and governments to consolidate and integrate stand-alone technologies without suffering performance penalties. Unlike costly, inflexible and low-performance alternatives, Fortinet solutions empower customers to embrace new technologies and business opportunities while protecting essential systems and content. Learn more at www.fortinet.com.

Copyright © 2014 Fortinet, Inc. All rights reserved. The symbols ® and ™ denote respectively federally registered trademarks and unregistered trademarks of Fortinet, Inc., its subsidiaries and affiliates. Fortinet's trademarks include, but are not limited to, the following: Fortinet, FortiGate, FortiGuard, FortiManager, FortiMail, FortiClient, FortiCare, FortiAnalyzer, FortiReporter, FortiOS, FortiASIC, FortiWiFi, FortiSwitch, FortiVoIP, FortiBIOS, FortiLog, FortiResponse, FortiCarrier, FortiScan, FortiAP, FortiDB, FortiVoice and FortiWeb. Other trademarks belong to their respective owners. Fortinet has not independently verified statements or certifications herein attributed to third parties, such as IDC, and Fortinet does not independently endorse such statements. Notwithstanding anything to the contrary herein, nothing herein constitutes a warranty, guarantee, binding specification or other binding commitment by Fortinet, and performance and other specification information herein may be unique to certain environments. Nothing in this press release should be understood to imply that patent inventions or other technology referred to in this press release will be incorporated into Fortinet's products and Fortinet's expressly disclaims any obligation to do that. This news release may contain forward-looking statements that involve uncertainties, such as expected benefits from Fortinet's new Network Security Expert Certification Program. Changes of circumstances, changes in market and competitive dynamics, product release delays, changes in product plans and other risks as stated in our filings with the Securities and Exchange Commission, located at www.sec.gov, may cause results to differ materially from those expressed or implied in this press release. If the uncertainties materialize prove incorrect, results may differ materially from those expressed or implied by such forward-looking statements. All statements other than statements of historical fact are statements that could be deemed forward-looking statements. Fortinet assumes no obligation to update any forward-looking statements, and expressly disclaims any obligation to update forward-looking statements.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
SYS-CON Events announced today the Docker Meets Kubernetes – Intro into the Kubernetes World, being held June 9, 2016, in conjunction with 18th Cloud Expo | @ThingsExpo, at the Javits Center in New York, NY. Register for 'Docker Meets Kubernetes Workshop' Here! This workshop led by Sebastian Scheele, co-founder of Loodse, introduces participants to Kubernetes (container orchestration). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, participants learn ...
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...