{"id":7010,"date":"2026-02-24T16:18:52","date_gmt":"2026-02-24T15:18:52","guid":{"rendered":"https:\/\/www.infinigate.com\/be\/?post_type=event&#038;p=7010"},"modified":"2026-02-24T16:27:48","modified_gmt":"2026-02-24T15:27:48","slug":"fortinet-ztna-replacement-of-ssl-ipsec-forticlient-vpn","status":"publish","type":"event","link":"https:\/\/www.infinigate.com\/be\/events\/fortinet-ztna-replacement-of-ssl-ipsec-forticlient-vpn\/","title":{"rendered":"Fortinet ZTNA &#8211; Replacement of SSL &amp; IPSec FortiClient VPN"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\">\n<h3 class=\"wp-block-heading is-style-border-left wp-block-heading\" id=\"h-what\">What?<\/h3>\n\n\n\n<p>Zero Trust Network Access (ZTNA) is an access control method that uses client device identification, authentication, and Zero Trust tags to provide role- based application access. It gives administrators the flexibility to manage network access for On-net local users and Off-net remote users. Access to applications is granted only after device verification, authenticating the user\u2019s identity, authorizing the user, and then performing context based posture checks using Zero Trust tags.<\/p>\n\n\n\n<p>In this workshop, participants learn about how Fortinet offers a firewall-based approach to ZTNA that results in a flexible and comprehensive solution that delivers universal ZTNA. Wherever the user is and wherever the application is, Fortinet\u2019s can effectively and efficiently grant (or block) application access based on a variety of factors.<\/p>\n\n\n\n<h3 class=\"wp-block-heading wp-block-heading\" id=\"h-agenda\">Agenda<\/h3>\n\n\n\n<p>Participants who attend this workshop will learn how to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Integrate FortiClient Endpoint Management Server (EMS) into Security Fabric<\/li>\n\n\n\n<li>Configure EMS Zero Trust tags, policies, and rules to protect corporate and remote users<\/li>\n\n\n\n<li>Configure FortiGate ZTNA HTTPS Access Proxy for secure remote access to applications<\/li>\n\n\n\n<li>Configure FortiGate ZTNA IP\/MAC Based Access Control policies for On-net dynamic access<\/li>\n\n\n\n<li>Demonstrate successful operation of these critical functions<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading is-style-border-left wp-block-heading\" id=\"h-prerequisites\">Prerequisites<\/h3>\n\n\n\n<p>Knowledge of network protocols<\/p>\n\n\n\n<h3 class=\"wp-block-heading is-style-border-left wp-block-heading\" id=\"h-who-should-attend\">Who should attend?<\/h3>\n\n\n\n<p>Network &amp; security engineers<\/p>\n\n\n\n<h3 class=\"wp-block-heading is-style-border-left wp-block-heading\" id=\"h-trainer\">Trainer<\/h3>\n\n\n\n<p>Lieven Pauwels &#8211; Head of tech enablement Infinigate Belgium<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40px\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading is-style-border-left wp-block-heading\" id=\"h-register-here\">Register here<\/h3>\n\n\n\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    portalId: \"7214250\",\n    formId: \"b45a30ca-5306-4600-8538-2e81fc756f79\",\n    region: \"na1\"\n  });\n<\/script>\n\n\n\n<h3 class=\"wp-block-heading is-style-border-left wp-block-heading\" id=\"h-location\">Location<\/h3>\n\n\n\n<p><strong>Infinigate Belgium<\/strong><\/p>\n\n\n\n<p><strong>Blarenberglaan 3B, 2800 Mechelen<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading is-style-border-left wp-block-heading\" id=\"h-course-duration\">Course Duration<\/h3>\n\n\n\n<p>4 hours<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In this workshop, participants learn about how Fortinet offers a firewall-based approach to ZTNA that results in a flexible and comprehensive solution that delivers universal ZTNA. Wherever the user is and wherever the application is, Fortinet\u2019s can effectively and efficiently grant (or block) application access based on a variety of factors.<\/p>\n","protected":false},"author":57,"featured_media":5367,"template":"","meta":{"_acf_changed":false,"footnotes":""},"event-type":[45],"event_folder":[],"class_list":["post-7010","event","type-event","status-publish","has-post-thumbnail","hentry","event-type-workshop"],"acf":[],"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Infinigate | Belgium","distributor_original_site_url":"https:\/\/www.infinigate.com\/be","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/event\/7010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/event"}],"about":[{"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/types\/event"}],"author":[{"embeddable":true,"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/users\/57"}],"version-history":[{"count":0,"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/event\/7010\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/media\/5367"}],"wp:attachment":[{"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/media?parent=7010"}],"wp:term":[{"taxonomy":"event-type","embeddable":true,"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/event-type?post=7010"},{"taxonomy":"event_folder","embeddable":true,"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/event_folder?post=7010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}