Por Riane Vilela
A evolução dos exames por imagens 2D e 3D tem contribuído de maneira significativa com os diagnósticos e tratamentos de diversas doenças, e certamente representa um caminho sem volta no dia a dia de clínicas e hospitais. Entretanto, expõe alguns desafios importantes na sua implementação e operacionalização.
Os sistemas mais conhecidos que aplicam essas tecnologias utilizam um repositório de imagens centralizado, como o PACS (Picture Archiving and Communication System), que é acessado pelos profissionais através da infraestrutura de rede local. Ou seja, os profissionais que utilizam essas imagens, na grande maioria dos casos, devem estar na mesma unidade onde o exame foi gerado para poder acessá-lo. Caso contrário, sofrerão com quedas de comunicação, indisponibilidade e lentidão, podendo colocar em risco a integridade do exame devido ao possível comprometimento do arquivo. Isso se deve ao grande volume de dados gerados em exames como esses, que são consolidados em arquivos que chegam facilmente a mais de 500MB.
O que pretendo destacar em relação ao volume de dados armazenados, que podem chegar aos Petabytes ao ano, é a escalabilidade dos recursos tecnológicos para garantir a disponibilidade, confidencialidade e desempenho que viabilizem sua utilização mesmo em localidades remotas, utilizando circuitos de comunicação de longa distância, trazendo maior eficiência na utilização não só dos recursos tecnológicos envolvidos, mas também – e principalmente – de recursos humanos.
A disponibilidade de profissionais capacitados e aptos para a emissão de laudos e análises baseados em exames por imagem é algo crítico na estrutura de atendimento de saúde. Assim, a centralização dessas análises e emissões de laudos é extremamente desejada; é preciso que os exames por imagem feitos nas diversas unidades estejam disponíveis remotamente aos profissionais que atuarão em sua análise com total confidencialidade e na velocidade esperada.
Para que isso seja possível, devemos olhar também para as comunicações de longa distância entre as unidades nas quais as imagens são armazenadas e a localidade onde estes profissionais estarão alocados para realizar seu trabalho. Normalmente, a primeira e mais utilizada forma de viabilizar esta comunicação atendendo às premissas já citadas é o investimento em novos circuitos de longa distância ou o incremento de suas capacidades de forma que respondam a tais premissas; entretanto, esta abordagem eleva os custos, além de não ser escalável para acompanhar a demanda crescente.
Com a evolução da tecnologia para transmissão de dados em longa distância, conhecida como SD-WAN (Software Defined Wide Area Network), por meio de diversas técnicas que possibilitam a combinação de múltiplos circuitos de longa distância de diferentes meios e/ou fornecedores, é possível balancear a carga de tráfego entre unidades remotas com base em políticas orientadas à identificação da aplicação que deve ser priorizada, além de mecanismos para correção de erros e a aceleração do tráfego, mesmo entre as localidades mais remotas do país, garantindo a integridade e segurança das imagens.
Como resultado, temos um impacto positivo nas operações das instituições de saúde e soluções que agregam real valor aos usuários.
*Riane Vilela é Engenheiro de Sistemas de Rede da Aruba
Por Riane Vilela
A new report defining the global Network Access Control (NAC) Solutions market offers readers with vivid details on current and most recent industry developments along with futuristic predictions that allow players to recognize exact vendor initiatives, end-user preferences and purchase decisions along with profitability. The report delivers pertinent details on strategic planning and tactical business decisions that influence and stabilize growth prognosis in global Network Access Control (NAC) Solutions market.
The report in its opening section introduces the global Network Access Control (NAC) Solutions market, featuring market definitions, overview, classification, segmentation, inclusive of market type and applications followed by product specifications, manufacturing initiatives,pricing structures, raw material sourcing and the like. Following this, the report also focuses and analyzes the main regional market conditions followed by a global assessment.
The report draws references of an extensive analysis of the Network Access Control (NAC) Solutions market, entailing crucial details about key market players, complete with a broad overview of expansion probability and expansion strategies.
Barracuda CloudGen Firewall
Available Sample Report in PDF Version along with Graphs and Figures@ https://www.orbisresearch.com/contacts/request-sample/4214501?utm_source=PoojaM
The report incorporates versatile understanding on various parameter including product price, profit margin, capacity fortification, production initiatives, supply, demand overview and market growth rate assessment along with foreseeable futuristic forecast numbers etc. The concluding sections, of the report introduces new insights on SWOT analysis and futuristic growth potential, investment feasibility and profit assessment, along with investment return analysis.
Global Network Access Control (NAC) Solutions market Segmentation:
The following sections subsequently allow market players to gauge into the scope of activities and initiatives that could be taken by keen manufacturers and investors eying favorable stance and optimum positioning on the global growth curve. The report is systematically based on dominant market trends along with past growth landmarks that systematically guided the growth prognosis in global Network Access Control (NAC) Solutions market.
Details on diverse market segments have been critically assessed to understand various market segmentation and stratification.
The following is a reliable source of market segmentation by which global Network Access Control (NAC) Solutions market is diversified into the following:
Analysis by Type: .
Analysis by Application:
SME (Small and Medium Enterprises)
Regional Overview: Global Network Access Control (NAC) Solutions Market
The following sections of the report also deals with thorough analysis and evaluation guide featuring geographical developments across various countries, proceeding beyond local developments across North and South American countries, Europe, MEA, and APAC. Mexico, Brazil, Argentina, France, Germany, UK, Singapore, South Korea, India, Japan, and India.
Read complete report along with TOC @ https://www.orbisresearch.com/reports/index/global-network-access-control-nac-solutions-market-size-status-and-forecast-2020-2026?utm_source=PoojaM
The report encompasses an analytical review of production and manufacturing details that govern volumetric returns in the aforementioned Network Access Control (NAC) Solutions market. Pricing strategies of the market across multiple timelines, inclusive of past developments along with current developments are significantly catered to arrive at logical deductions across the futuristic timeline in global Network Access Control (NAC) Solutions market that are indispensable to ensure high potential growth. The potential of the segments is critically comprehended to gauge into volumetric returns. Critical information as such is crucial to contemplate growth proficient business strategies.
Some Major TOC Points:
Chapter 1. Report Overview
Chapter 2. Global Growth Trends
Chapter 3. Market Share by Key Players
Chapter 4. Breakdown Data by Type and Application
Chapter 5. Market by End Users/Application
Chapter 6. COVID-19 Outbreak: Network Access Control (NAC) Solutions Industry Impact
Chapter 7. Opportunity Analysis in Covid-19 Crisis
Chapter 9. Market Driving Force
And Many More…
Shoot your queries at:@ https://www.orbisresearch.com/contacts/enquiry-before-buying/4214501?utm_source=PoojaM
Market Report Offerings in a Gist:
• A thorough reference of the dominant trends as well as relevant market dynamics
• Elaborate analysis and reference of core products and dynamic segments
• A thorough analysis of the competition spectrum and winning strategies of the major players
• COVID-19 analysis and recovery route
• PESTEL and SWOT analysis besides other analysis
” The Global Network Access Control (NAC) Solutions Market report aims to offer an extensive overview of the Global Network Access Control (NAC) Solutions Market with a broad Market segmentation on the basis of products, services, application, as well as regional overview. The research report on Network Access Control (NAC) Solutions Market offers a comprehensive analysis of the Global Market with in-depth and specialized analysis of the Network Access Control (NAC) Solutions Market. In addition, the Network Access Control (NAC) Solutions Market report also provides a complete analysis of the Global Market Trends that are influencing the Global Market over the forecast period. Moreover, the Global Network Access Control (NAC) Solutions Market is likely to witness a significant growth over the forecast period. Furthermore, the Network Access Control (NAC) Solutions Market report offers a complete analysis of the Global Market, and the report also comprises an extensive study of application and product type with the comprehensive regional scenario. With the objective to offer a complete Market overview the Network Access Control (NAC) Solutions report includes regional competitive landscape for the number of major Market service providers.
Major companies of this report:
Barracuda CloudGen Firewall
Request a sample of this report @ https://www.orbisresearch.com/contacts/request-sample/4670409?utm_source=Ancy
The Network Access Control (NAC) Solutions Market report also gives a Key Statistics depending on the Market status and it also provides major Market Trends as well as opportunities in the Global Network Access Control (NAC) Solutions Market. Additionally, the Global Network Access Control (NAC) Solutions Market report offers a comprehensive analysis of the major service providers impacting the Market are also profiled in the report. In addition, the Global Network Access Control (NAC) Solutions Market report also emphasizes on the major Market service providers with data such as product and services, company profiles, financial data of previous years, and Key development in past years. Moreover, the Network Access Control (NAC) Solutions Market report is an intelligence report with the significant efforts undertaken to analyze the valuable as well as right information. Furthermore, the Network Access Control (NAC) Solutions Market report also provides the detailed information which has been analyzed on the basis of upcoming competitors and the existing leading players. In addition to this, the research report on Network Access Control (NAC) Solutions Market offers a detailed overview of the business strategies of the major service providers and the new Market entering across the globe are analyzed in the report. Additionally, the Network Access Control (NAC) Solutions Market report also studies a complete assessment of the aspects that are anticipated to influence the growth of the Market. Moreover, the Network Access Control (NAC) Solutions Market report has been consistently studied with respect to the significant Market segments.
Every year the prediction period is precisely considered in terms of worth and production in the Global as well as regional Markets respectively. In addition, technical growth aspects of the Global Network Access Control (NAC) Solutions Market have been studied by majorly focusing on the number of technical platforms, methodologies, and tools. The report also contains the substantial features of the Global Network Access Control (NAC) Solutions Market. Moreover, the Network Access Control (NAC) Solutions Market report also offers and assesses the figures of the Global Network Access Control (NAC) Solutions Market as well as it also presents the robust predictions as to the industry’s growth aspects over the forecast period.
Browse the complete report @ https://www.orbisresearch.com/reports/index/network-access-control-nac-solutions-market-research-global-status-and-forecast-by-geography-type-and-application-2016-2026?utm_source=Ancy
Segmentation by Type:
Segmentation by Application:
SME (Small and Medium Enterprises)
Moreover, reports offers Market competition through region segmentation of Markets that enables in thorough analysis of the Market in terms of revenue generation potential, demand & supply comparison, business opportunities and future estimates of the Market. The annual progression for the Global Network Access Control (NAC) Solutions Market in different regions cannot always be listed down as it will keep changing, thus studying and reviewing Markets occasionally becomes vital. Major regions highlighted for the Global Network Access Control (NAC) Solutions Market report, include North America, South America, Asia, Europe and Middle East.
Market research report on the Global Network Access Control (NAC) Solutions Market, also has the Market analyzed on the basis of different end user applications and type. End user application segments analysis allows defining the consumer behavior as well. It is helpful to investigate product application in order to foretell the products outcome. Analyzing different segment type is also crucial aspect. It helps determine which type of the product or service needs improvement. When reports are product centric, they also includes information about sales channel, distributors, traders as well as dealers. This facilitates effective planning as well as execution of the supply chain management. In a nutshell, a Market research report is through guide of a Market that aids the better Marketing and management of businesses.
Make an enquiry of this report @ https://www.orbisresearch.com/contacts/enquiry-before-buying/4670409?utm_source=Ancy
UserLock makes it easy for a business to enable two-factor authentication on Windows accounts, managed by Active Directory. Watch how UserLock works with YubiKey – the hardware security keys manufactured by Yubico.
YubiKey offers users an easy and secure second factor of authentication
In addition to mobile authentication and Token2, UserLock now partners with Yubico to offer companies the chance to use YubiKeys to protect their Windows Active Directory users. Once 2FA is activated by the administrator within UserLock, enrollment for using the YubiKey is intuitive and simple for users to do on their own.
- Plug the YubiKey into the USB port of their computer
- Login as normal
- UserLock automatically detects a YubiKey is connected
- Press the YubiKey to enter the validation code
- UserLock now programs the YubiKey & updates the button to ‘Success’.
- To verify, the user just presses the success button and touches the YubiKey.
(A 6-digit code is displayed and the operation completed)
For all subsequent logins:
- The user plugs the YubiKey into a USB port
- The user logs in
- UserLock requests the authentication code
- The user simply touches the YubiKey button, the edit box will display the associated 6-digit code.
- In order to logon, The user clicks “Verify and continue”.
Customize MFA with UserLock & YubiKey
UserLock makes it easy to customize the frequency for YubiKey authentication.
You can also customize the circumstances by connection type (local logins and RDP sessions), by RDP connections that originate from outside the corporate network and by workstation and/or server connections.
In addition, you can combine with UserLock’s own restrictions based on the login context, to further secure all user access. Transparent to the end-user they create an additional barrier to any attacker but don’t impede employee productivity. They also allow administrators to be more confident in customizing 2FA controls that avoid prompting the user for a second authentication each time they log in.
Secure On-Premises Active Directory Hosting
UserLock is installed on your own on-premise environment to offer maximum security and can be administered from any workstation remotely. With no internet connection needed, user authentication is possible just about everywhere.
So if you are looking to protect Windows logins beyond a simple password, download now the fully functional free trial of UserLock. See for yourself how easily you can enable two factor authentication to all your Windows Active Directory users.
To detect where your users are logged on in real-time, watch this 2-minute overview of UserLock. It will also show you how to react and respond to any login, direct from the UserLock console, and how to start controlling and restricting how your users can connect.
UserLock allows you to see and react in real-time to all user activity across your network. The intuitive console gives you real-time information on user habits such as currently active and locked sessions, users with multiple sessions and connections to web applications such as Outlook Web Access.
React & Respond to Access Activity
From the console, you can interact with your users by sending a pop-up message to an open session. You can also perform daily tasks such as logging off an open or locked session. For helpdesk requests, you can easily identify where the user has an open session and remote desktop into that machine, to troubleshoot the issue.
Report on all Session History
You can right-click on a specific user to access some quick reports such as the session history, where you can see all the connections of that user for the last 30 days. You can customize your reports by selecting a predefined one under the reports tab. Simply enter the criteria you’d like to add such as session types, a specific group of users, as well as a time frame. You can choose to schedule this report or launch it in real-time. And here I see all the connection attempts for those users during that time.
Report on Working Hours
You can use the working hours reports to see how long your users are connected throughout the day. This report quickly shows you the users first and last connection of the day as well as total active time. Use the dynamic filters below to search for users’ first logon after a certain time for example or those with the total session time of under 8 hours. Click print data to export the report as proof of users total working hours including active versus locked time.
Control Access Restrictions
To manage who connects to your network, create a protected account for a user, group or OU from your Active Directory to put in place access policies that secure your environment without disrupting your users. To comply with security policies you can limit your users to a maximum amount of concurrent sessions. Then use the workstation restrictions to further reduce your attack surface by allowing these users access to a specific computer OU from your Active Directory.
So that’s how you can manage access policies across your network while monitoring and protecting all connections with UserLock.
A Free Fully Functional 30 Day UserLock Trial
Don’t take our word for it, download now the fully functional free trial and see for yourself how easily UserLock can help you identify and manage all logins to your domain.
*** This is a Security Bloggers Network syndicated blog from Enterprise Network Security Blog from ISDecisions authored by Chris Bunn. Read the original post at: https://www.isdecisions.com/blog/it-security/find-where-a-user-is-logged-on-in-a-domain-and-more/IT Security
With more and more organizations allowing flexible work hours and users working remotely, it is increasingly important to be able to manage and monitor employee’s working hours. Being able to track not only login and logout times, but lock and unlock activities a manager can obtain an accurate view of how their employees spend time at their computer and view an attendance report per user.
The access management and security software UserLock can help you do this and more. By also applying restrictions on when, how and where an employee can login, an organization can also control connection times and force logoff when outside of authorized hours.
Why do you need attendance monitoring?
There are many different reasons for accurately tracking employee hours.
Human resources needs
It can be a question of wanting to control the working time of the employees in order to value overtime, or to ensure daily, weekly, monthly or annual maximum working time thresholds are respected.
For several countries, regulations insist that the employer must keep documents available that can demonstrate the working hours performed by each employee.
In the event of a control from the labor inspectorate or a dispute with an employee, the employer must be able to explain and justify the working hours for the company. This will allow them to show that they respect the rules relating to the various limits defined in the matter, the allocation of rest days, the compensation for work on public holidays and/or non-working days, etc…
Information security needs
This is about monitoring user connection times to detect suspicious access times. In the event where compromised credentials are used to logon at 3 a.m. on a Saturday morning, a notification on this access could alert the IT team that an attack is possibly underway.
Employee login logout software
To manage and react to employees’ attendance, overtime thresholds, productivity and suspicious access times, UserLock offers detailed and interactive reporting on users’ connection times.
These reports allow you to better manage users’ connection times, and provide accurate, detailed data required by management.
4 reports are available:
Working hours history:
Overall view of users working hours by day.
Working hours by week:
More detailed analysis of your users’ working hours, illustrating clearly the user’s daily activity.
Working hours by month:
A broader view of the hours worked, highlighting the total active and locked session time.
Unauthorized working hours:
Report on connection times outside of what is defined as the authorized working hours.
Discover UserLock’s new reports:
Going further by limiting connection times
If you want to avoid paying overtime, make sure that your employees respect certain working time quotas or even avoid suspicious access, you only have to limit connection times.
With UserLock, you can limit access to specific time limits. Set connection time restrictions, maximum time quotas, and force logoff automatically outside of authorized hours.
Os paulistas acabam de ganhar mais uma loja da Centauro, com um novo e inédito formato na Av. Paulista. Provadores inteligentes, caixas móveis e experiencia de bikes são apenas algumas das novidades. A SYMMETRY Informática muito se orgulha de fazer parte desse time inovador. Viabilizamos a solução Aruba, a Hewlett Packard Enterprise Company além da parceria com a LAB3 DVLP para prover serviços de Captive Portal (o Ctrl Spot). A Centauro pode assim atender seus clientes com maior conforto, provendo uma estrutura de WiFi sólida, com excelente experiência para o usuário (algo inédito e diferenciado) e em total conformidade com o Marco Civil da Internet e a nova LGPD. Aos nossos amigos da SBF Centauro desejamos MUITO SUCESSO. Contem conosco para tornar essa nova realidade um sucesso na experiência dos clientes.
Last fall, the Wi-Fi Alliance announced their Wi-Fi CERTIFIED 6™ program which is designed to ensure that Wi-Fi 6 capable devices meet the highest standards for security and interoperability. Certification ensures reliability and service quality that cannot otherwise be delivered by other products available in the market today.
Well I’m happy to share today that Aruba leads the industry with the official certification of all the Aruba 500, 510, 530, and 550 Series Wi-Fi 6 access points!
Undergoing certification is our commitment to customers that Aruba wireless networks can interoperate with Wi-Fi 6 client devices with no technical impact to your business. This also ensures that user experience is unaffected – which is critical as iPhone 11, new Galaxy S20 and Galaxy Note 10 (the top 3 selling phones in the world) – now support Wi-Fi 6.
But in order for all these new mobile devices to realize the benefits of Wi-Fi 6, the network needs to be ready. Let’s look at what Aruba has to offer in terms of Wi-Fi 6 today.
Aruba’s Market Leading Solution
Interest in Aruba Wi-Fi 6 has been astounding – not just from existing customers, but also from our new ones. Based on the most recent Q3 Wi-Fi 6 market share report from 650 Group, Aruba is the reigning market leader, with over 35% of global Wi-Fi 6 market share in terms of both product sales and shipments. Recent analyst reports also view Aruba favorably – the Forrester New Wave™: Wireless Solutions, Q3, 2019 and the 2019 Gartner Magic Quadrant and Critical Capabilities for the Wired and Wireless LAN Access Infrastructure have all placed Aruba as a leader in the networking industry.
Aruba’s Wi-Fi 6 portfolio has also grown tremendously to provide AI-powered capabilities and expanded IoT connectivity options to meet a range of customer use cases. Today, the portfolio includes the 500, 510, 530 and 550 Series to provide secure connectivity for a range of uses from entry-level to high-density environments.
Wi-Fi for the Future
There’s no doubt that IoT and cloud have had a major impact on the IT infrastructure and Aruba views Wi-Fi 6 as the critical industry mechanism to enable enterprises to tap into the full potential of their IT organizations to leap forward into a future where connectivity is not just high-performing, but seamless, immersive and experiential.
To learn more about Aruba’s Wi-Fi 6 capabilities, please visit our Wireless LAN portfolio page.
We’ve just kicked off a new decade and while it might not be as spectacular as a new millennium with all of the Y2K suspense from 20 years ago, a decade is still a significant period of time where technology can bring major changes to how we live, work and play. In particular, data center networks are now facing a major transition in this edge-to-cloud world we live in.
Data center evolution
Look back to the dotcom bubble and the evolution of the modern enterprise data center. We saw significant growth in data centers during the 1990s, driven by the need to power workloads across the World Wide Web – ahem – I mean the Internet.
Following the mass proliferation of data centers in the 1990s and 2000s, enterprises began their quest to consolidate those data centers and continue to do so today. In parallel, we saw the launch of AWS and the public cloud, which brought the hyperscale data center and another option for hosting enterprise workloads.
The 2020s will be all about the edge
As we enter the 2020s, it’s becoming apparent that another data center evolution is under way.
After two decades marked by centralization of compute and infrastructure, the pendulum is swinging back toward the edge. Digital transformation and the need to harness data from connected devices to create real-time, connected experiences at the edge is driving this paradigm shift.
According to Gartner, today 90% of data is created and processed inside centralized data centers or the cloud. But by 2025, about 75% of data will need to be processed, analyzed, and acted upon at the edge. With this swing, you should expect some changes to your data center.
First, expect traditional data centers to continue to shrink, due to higher density from hyperconvergence and also because workloads continue to move to the cloud.
Secondly, as more workloads are placed at “the centers of data” to optimize performance and costs, expect the emergence of “edge” data centers. Enterprise-owned data centers will likely consist of two types:
- A blending of traditional data centers and campus environments.
- Mini data centers with IoT-enabled environments, such as large manufacturing centers.
Last, as we continue to see more DevOps and agile practices from application teams, we will see more pressure on network teams to optimize around workload-driven operations.
Three networking requirements for the edge-to-cloud era
Change is imminent for the network, too, as you seek to balance the new requirements of edge data centers with growing use of cloud and your remaining on-prem footprint.
While you are likely already on your journey toward this new era of data center networking, here are three top considerations to keep in mind. In fact, these three requirements are applicable for any type of data center including private cloud, co-location, and edge.
1. Simplification through automation
Application teams continue to adopt DevOps and other agile methodologies to accelerate software development. To better support these teams and the business, expect networking operations to become far more automated and simpler than they are today.
What you’ll need are solutions that align with current and future operating models and existing investments. Look for turnkey automation to simplify common, yet time-consuming configuration tasks. For teams with more mature DevOps practices, extending common automation platforms like Ansible to network-related workflows will be a must. Finally, as we continue to see more DevOps and agile practices in application teams within IT, expect those practices to influence how the other organizations within IT function.
2. Actionable insights via analytics
There is perhaps no bigger resource drain on network operations than trying to troubleshoot issues. Having better network visibility is imperative to shortening MTTR, improving IT service delivery, and keeping short-staffed teams focused on more strategic matters.
Gaining network-wide telemetry, captured and processed natively on each node, will be a huge leap forward. These analytics with built in remediation will be instrumental in providing better network assurance and helping troubleshooters proactively identify or even preempt user- or business-impacting issues.
Predictive analytics can also help anticipate issues before they arise and also help with capacity planning efforts, especially during periods of high usage, ensuring the network is right-sized to deliver on user experience demands.
3. Always-on availability
Five 9s of availability is by no means a new data center requirement. However, you can argue that the need for highly resilient networks will only intensify in a digital era where even a minor hiccup has huge ramifications for the business.
Automating day-to-day operations will help improve uptime by avoiding human error. But what networking teams also need is a far simpler, more reliable way of ensuring high availability, while also delivering on the promise of non-disruptive upgrades. Having a cloud-native, microservices-based operating system will ensure added resiliency at the software level, and being able to orchestrate live software upgrades to eliminate maintenance windows will also be critical.
HPE + Aruba = Data Center Nirvana
Like previous decades, we’re not seeing a decline of traditional data centers, but rather an evolution. In this case, the emergence of edge data centers to power IoT and other digital initiatives at distributed business locations.
As your organization begins this latest transition, you won’t be alone. HPE and Aruba are leading the way in providing technology solutions for the data center with our CX portfolio.
No total, são 24 cursos com certificação, os quais abrangem de conhecimentos básicos a níveis avançados na área de segurança da informação
A Fortinet, empresa de cibersegurança, disponibilizou gratuitamente todos os seus treinamentos, antes abertos apenas a parceiros, a quem quiser expandir seus conhecimentos na área. Em um cenário que torna os usuários mais suscetíveis a ameaças cibernéticas, o objetivo é diminuir a exposição de organizações e pessoas físicas.
No total, são 24 cursos que abrangem de conhecimentos básicos a níveis avançados de cibersegurança. Os módulos, em sua maioria provenientes do currículo oficial do instituto Network Security Expert (NSE) – programa de treinamento que fornece validação a profissionais técnicos em segurança de rede – serão gratuitos até o fim de 2020.
“O momento forçou muitas organizações a enfrentarem mudanças rápidas e novos riscos à medida que adotaram modelos de trabalho remotos. As equipes de TI estão sob pressão para proteger efetivamente suas empresas em ambientes altamente dinâmicos e que exigem extensas habilidades de segurança. Como uma empresa de tecnologia e também de treinamento, disponibilizamos todo o nosso catálogo de cursos avançados gratuitamente online e em ritmo personalizado, para que qualquer pessoa possa expandir seus conhecimentos e habilidades”, explicou John Maddison, vice-presidente executivo de produtos e diretor de marketing da Fortinet.
Os 24 cursos disponibilizados pela empresa podem ser cursados de acordo com a agenda individual. Imagem: Pixabay
Desde que passou a oferecer gratuitamente os módulos básicos NSE 1 e 2 e o curso avançado FortiGate Essentials no início de abril, a empresa vem recebendo, globalmente, cerca de uma nova inscrição a cada 30 segundos. Já são mais de 48 mil pessoas inscritas nos módulos básicos e mais de 14 mil no FortiGate Essentials.
Vale lembrar que os cursos podem ser realizados conforme a disponibilidade de cada pessoa e o único pré-requisito para acompanhá-los é a fluência em inglês. Os vídeos já disponíveis para visualização serão complementados com transmissões ao vivo, programadas regularmente com instrutores certificados pela Fortinet. Ao fim de cada módulo, os participantes receberão certificados.
Para aqueles que se interessarem, os cursos gratuitos poderão ser acessados via site da Fortinet.